وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CompTIA Security+ SY0-601 Lab Course with Simulations/PBQ

سرفصل های دوره

Pass your Security+ SY0-601 exam on the first try with a lab base approach to learning. Tons of labs.


1 - Exam Info
  • 1 - About Me
  • 2 - Exam Information
  • 3 - My Experience Taking the Exam
  • 4 - Building a lab
  • 5 - Join me for a Live Q and A Session
  • 6 - MUST WATCH Exam Objectives and layout of this course
  • 6 - comptia-security-sy0-501-exam-objectives.pdf
  • 6 - comptia-security-sy0-601-exam-objectives-1-0.pdf

  • 2 - Security Basics
  • 7 - CIA Triade
  • 8 - IAAA
  • 9 - Basic security controls

  • 3 - 11 Social engineering techniques
  • 10 - Phishing Smishing Vishing Spear phishing Whaling
  • 11 - Dumpster diving and Shoulder surfing
  • 12 - Eliciting information and the principles of social engineering
  • 13 - Pharming
  • 14 - Spam
  • 15 - Tailgating
  • 16 - Other types Social Engineer techniques

  • 4 - 12 Potential indicators of attacks
  • 17 - Introduction to Malware
  • 18 - Ransomeware and Cryptomalware
  • 19 - Trojans and RATs
  • 20 - Bot and Command and control
  • 21 - Fileless Virus Logic bombs spyware rootkit backdoor
  • 22 - Adversarial artificial intelligence AI
  • 23 - Malicious USB cables drives and Card Cloning
  • 24 - Supply chain attacks
  • 25 - Keyloggers
  • 26 - How passwords are stored
  • 27 - Using hashcat to crack passwords
  • 28 - Using a brute force and rainbow tables to attack passwords

  • 5 - 13 Analyze potential indicators associated with application attacks
  • 29 - Privilege escalation SSL stripping Pass the hash
  • 30 - Crosssite scripting XSS and Injections
  • 31 - Pointer Dereference directory traversal buffer overflows and tocttou
  • 32 - Replay attacks
  • 33 - Request forgeries
  • 34 - API Attacks
  • 35 - Driver manipulation
  • 36 - Integer overflow Resource exhaustion Memory leak

  • 6 - 14 Analyze potential indicators associated with network attacks
  • 37 - Evil Twin and Rouge Access Point
  • 38 - Bluesnarfing and Bluejacking
  • 39 - Cracking WEP
  • 40 - Disassociation and Jamming
  • 41 - Man in the Middle browser and APR Poisoning
  • 42 - IV RFID NFC Attacks
  • 43 - MAC Flooding and Cloning
  • 44 - DDOS Attacks
  • 45 - Malicious Code

  • 7 - 15 Different threat actors vectors and intelligence sources
  • 46 - Actors and threats
  • 47 - Threat intelligence sources
  • 48 - Research sources

  • 8 - 16 Security concerns associated with various types of vulnerabilities
  • 49 - Cloudbased vs onpremises Zero Day
  • 50 - Weak configurations
  • 51 - Thirdparty risks Improper or weak patch legacy platforms
  • 52 - Impacts

  • 9 - 17 Techniques used in security assessments
  • 53 - Threat hunting
  • 54 - Vulnerability scans
  • 55 - SIEM and SOAR

  • 10 - 18 Techniques used in penetration testing
  • 56 - Penetration testing
  • 57 - Passive and active reconnaissance
  • 58 - Exercise types

  • 11 - Domain 1 Quiz

    12 - 21 Security concepts in an enterprise environment
  • 59 - Configuration management
  • 60 - Data Sovereignty and Protection
  • 61 - Other Security Consideration
  • 62 - Site Resiliency Hot Warm Cold
  • 63 - Deception and disruption

  • 13 - 22 Virtualization and cloud computing concepts
  • 64 - IaaS
  • 65 - PaaS
  • 66 - SaaS XaaS
  • 67 - Cloud Deployment
  • 68 - Cloud Application terms
  • 69 - IaC
  • 70 - Virtualization Issues

  • 14 - 23 Secure application development deployment and automation concepts
  • 71 - Software Development Environment
  • 72 - Secure Coding Techniques
  • 73 - DevOps and Automation

  • 15 - 24 Authentication and authorization design concepts
  • 74 - Authentication methods
  • 75 - Biometrics
  • 76 - MFA
  • 77 - Authentication authorization and accounting

  • 16 - 25 Implement cybersecurity resilience
  • 78 - Redundancy
  • 79 - Replication and storages
  • 80 - Backup Types
  • 81 - Nonpersistence high availability diversity
  • 82 - RAID

  • 17 - 26 Security implications of embedded and specialized systems
  • 83 - Embedded Systems
  • 84 - Industrial control system
  • 85 - IoT
  • 86 - IoT Communication and considerations

  • 18 - 27 Physical security controls
  • 87 - Physical Security Controls
  • 88 - Other physical security controls
  • 89 - Locks and Fencings
  • 90 - Fire Suppression
  • 91 - Secure data destruction

  • 19 - 29 Basics of cryptographic concepts
  • 92 - Introduction to cryptography
  • 93 - Goals of cryptography
  • 94 - Algorithm and Keys
  • 95 - Block and stream ciphers
  • 96 - Symmetric Ciphers
  • 97 - Asymmetric Ciphers
  • 98 - Hashing
  • 99 - Hybrid cryptography
  • 100 - Digital signatures
  • 101 - Block Chain
  • 102 - Steganography
  • 103 - Key stretching
  • 104 - Salting
  • 105 - Quantum
  • 106 - Ephemeral PFS Homomorphic
  • 107 - Cipher Modes
  • 108 - Lightweight cryptography
  • 109 - Ellipticcurve cryptography
  • 110 - Cipher suites
  • 111 - Common use cases
  • 112 - Limitations of encryptions

  • 20 - Domain 2 Quiz

    21 - 31 Implement secure protocols
  • 113 - DNSSEC
  • 114 - Email security with SMIME and PMP
  • 115 - Installing Wireshark on Windows 10
  • 116 - Install and setup an FTP Server and Client
  • 117 - Using Wireshark to capture an FTP Password and securing FTP Server
  • 118 - Lightweight Directory Access Protocol Over SSL
  • 119 - SRPT FTPS SFTP SNMP IMAP
  • 120 - SSH
  • 121 - VPN and IPSEC
  • 122 - Use Cases for secure protocols

  • 22 - 32 Implement host or application security solutions
  • 123 - Endpoint Protection
  • 124 - Boot integrity
  • 125 - Databases
  • 126 - Application Security
  • 127 - Hardening systems
  • 128 - Drive Encryption and sandboxing

  • 23 - 33 Implement secure network designs
  • 129 - Load Balancing
  • 130 - Network segmentation
  • 131 - How to download and install packet tracer
  • 132 - VLANs and Port Security
  • 133 - Firewalls
  • 134 - Configuring firewall rules
  • 135 - Jump and Proxy servers
  • 136 - IDS and IPS
  • 137 - Other network secure concepts

  • 24 - 34 Install and configure wireless security settings
  • 138 - Wireless Security
  • 139 - Wireless Installation Considerations

  • 25 - 35 Implement secure mobile solutions Given
  • 140 - Mobile Connection methods and receivers
  • 141 - Mobile device management MDM
  • 142 - UEM and MAM
  • 143 - Enforcement and monitoring of mobile devices
  • 144 - Mobile Deployment Models

  • 26 - 36 Apply cybersecurity solutions to the cloud
  • 145 - Cloud Solutions controls
  • 146 - Cloud Network and computing
  • 147 - Cloud Security terms

  • 27 - 37 Implement identity and account management controls
  • 148 - Identity and account types
  • 149 - Account policies

  • 28 - 38 Implement authentication and authorization solutions
  • 150 - Authentication management
  • 151 - Authentication Protocols
  • 152 - Access control schemes

  • 29 - 39 Implement public key infrastructure
  • 153 - Introduction to PKI
  • 154 - Process of getting a certificate
  • 155 - PKI Setup
  • 156 - Fields on a certificate
  • 157 - Certificate formats
  • 158 - Certificate types

  • 30 - Domain 3 Quiz

    31 - 41 Tool to assess organizational security
  • 159 - Introductions to commands
  • 160 - ARP and Route
  • 161 - hping
  • 162 - Curl
  • 163 - IP scanner
  • 164 - ipconfig ping tracert
  • 165 - Linux file manipulation head tail cat
  • 166 - Log
  • 167 - Cuckoo
  • 168 - thehavester
  • 169 - Nslookup and Dig
  • 170 - tcpdump
  • 171 - NetCat
  • 172 - Sniper
  • 173 - scanless
  • 174 - nmap
  • 175 - Managing Linux Permissions
  • 176 - Shell and script environments
  • 177 - Exploitation frameworks
  • 178 - Forensics tools

  • 32 - 42 Policies processes and procedures for incident response
  • 179 - Incident response process
  • 180 - Attack Frameworks
  • 181 - Incidents plans and exercises

  • 33 - 43 support an investigation
  • 182 - Log Files
  • 183 - Capture log files

  • 34 - 44 Apply mitigation techniques or controls to secure an environment
  • 184 - Incident mitigation techniques

  • 35 - 45 Key aspects of digital forensics
  • 185 - Documentation and evidence
  • 186 - Integrity of evidence
  • 187 - Order of volatility

  • 36 - Domain 4 Quiz

    37 - 51 Various types of controls
  • 188 - Control Types and category

  • 38 - 52 Regulations standards or frameworks that impact security
  • 189 - Regulations standards and legislation
  • 190 - Key frameworks
  • 191 - Secure configuration guides

  • 39 - 53 Policies to organizational security
  • 192 - Personnel Controls
  • 193 - Thirdparty risk management
  • 194 - Credential and organizations policies

  • 40 - 54 Risk management processes and concepts
  • 195 - Risk types terms and Process
  • 196 - Risk management strategies
  • 197 - Risk Assessments
  • 198 - Business impact analysis

  • 41 - 55 Privacy and sensitive data concepts in relation to security
  • 199 - Privacy breaches
  • 200 - Data types
  • 201 - Privacy technologies and roles

  • 42 - Domain 5 Quiz

    43 - Performance Based Questions
  • 202 - Performance Based Questions Introduction
  • 203 - PBQ Attack Types and Response
  • 204 - PBQ Incident Response
  • 205 - PBQ Social Engineering
  • 206 - PBQ Firewalls

  • 44 - Mock Exam

    45 - Ending
  • 207 - The End
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 13372
    حجم: 30596 مگابایت
    مدت زمان: 1463 دقیقه
    تاریخ انتشار: 20 خرداد 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید