1. CompTIA Security+ Certification Bootcamp
2. Introduction
3. What Is Security+
4. How To Succeed
5. Security Basics and CIA Triangle
6. The Power of Control, Different Types of Control
7. Different Types of Identity - Identification
8. Account Access Control and Privilege Management
9. File Access Control (Windows, Linux)
10. AAA Servers
11. Different Types of Authentication and Authentication Management
12. Different Existing Authentication and Authorization Mechanisms
13. Account Control Practices and Policies
14. OSI Model
15. Honeypots, Proxy Servers, Jump Servers, Load Balancers
16. Routers, Switches, ACL, Loop Protection
17. Firewalls
18. Network Segmentation
19. IDS, IPS, NAC
20. DNS, DNS Security
21. IP Addresses
22. Dynamic Host Configuration Protocol (DHCP)
23. Virtual Private Network (VPN)
24. Networking Tools - Commands
25. File Manipulation Tools - Commands
26. Forensic Tools - Commands
27. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
28. Unsecure Protocols
29. Secure Protocols
30. Wireless Infrastructure
31. Wireless Encryption and Threats
32. Wireless Authentication Protocols
33. Mobile Device Connection and Communication Methods
34. Mobile Device Management
35. Mobile Device Monitoring and Protection
36. Virtualization Theory
37. Virtual Box Demonstration
38. Cloud Technology
39. Cloud Services
40. Storing Data in Cloud and Cloud Security
41. Physical Security
42. What is Penetration Testing
43. Different Phases of a Penetration Test
44. Different Teams in Cyber Security
45. Vulnerabilities
46. Monitoring
47. Exercise Imposter Syndrome
48. Different Types of Attackers
49. Different Types of Malware
50. Social Engineering, Phishing
51. Network Attacks
52. Physical Attacks
53. Password Attacks
54. Overflow Attacks, Pointer Dereference, Error Handling
55. Application Attacks, Injection Attacks
56. Zero Days and Weak Configurations
57. Hijacking Attacks
58. Cryptographic Attacks
59. Third Party Attacks
60. Host Security Boot
61. Endpoint Protection Strategy
62. System Hardening
63. Inbuilt Devices and Specialized Devices
64. Secure Application Development and Secure Coding
65. Concept of Risk and Risk Types
66. Risk Control and Analysis
67. Business Impact Analysis
68. Security Information Groups and Sources
69. Facility Policies and Rules
70. Laws and Standards
71. Data Handling
72. Incident Response and Recovery Practices
73. Information Gathering for Incident Response
74. Controls and Techniques for Lowering Risk
75. Redundancy and Tolerance
76. Symmetric and Asymmetric Encryption
77. Concept of Public Key Infrastructure
78. Important Cryptographic Terms and Concepts
79. Thank You!