Cybersecurity,  Learning,  Security,  Video

CompTIA Security Plus + Full Course [VIDEO]

Security+ Full Course video from YouTube.

**** Topics Discussed ****

Introduction to Network Devices (part 1) (0:00)

Introduction to Network Devices (part 2) (8:06)

Introduction to Network Devices (part 3) (15:50)

Secure Network Administration Concepts (34:00)

Cloud Concepts (41:00)

Secure Network Design Elements and Components (48:00)

Common Network Protocols (part 1) (55:20)

Common Network Protocols (part 2) (1:01:00)

Common Network Protocols (part 3) (1:08:00)

Wireless Security Considerations (1:13:54)

Risk Related Concepts (part 1) (1:23:12)

Risk Related Concepts (part 2) (1:29:43)

Risk Related Concepts (part 3) (1:36:08)

Integrating Data and Systems w Third Parties(21:50)

Risk Mitigation Strategies (1:41:27)

Basic Forensic Procedures (1:46:17)

Incident Response Concepts (1:54:15)

Security Related Awareness and Training (1:59:38)

Physical Security and Enviornmental Controls (2:08:03)

Disaster Recovery Concepts (2:15:46)

Risk Management Best Practices (2:23:30)

Goals of Security Controls (2:30:54)

Types of Malware (2:37:02)

A Summary of Types of Attacks (part 1) (2:43:23)

A Summary of Types of Attacks (part 2) (2:52:43)

A Summary of Social Engineering Attacks (2:59:15)

A Summary of Wireless Attacks (3:07:27)

Types of Application Attacks part 1 Types of Application Attacks part 2 (3:10:51)

Security Enhancement Techniques (3:15:33)

Overview of Security Assessment Tools (3:22:21)

Vulnerability Scanning vs Pen Testing (3:30:28)

Application Security Controls and Techniques (3:37:10)

Mobile Security Concepts and Technologies (part 1) (3:45:00)

Mobile Security Concepts and Technologies (part 2)(3:52:00)

Solutions Used to Establish Host Security (3:56:20)

Controls to Ensure Data Security (4:04:00)

Mitigating Risks In Alternative Environments (4:12:00)

Summary of Authentication Services (4:21:20)

Authentication and Authorization Basics (part 1) (4:28:00)

Authentication and Authorization Basics (part 2) (4:35:00)

Security Controls for Account Management Introduction to Cryptography (part 1) (4:44:00)

Introduction to Cryptography (part 2) (4:52:00)

Cryptographic Methods (part 1) (5:00:00)

Cryptographic Methods (part 2)(5:05:44)

Introduction to Public Key Infrastructure (part 1) (5:13:00)

Introduction to Public Key Infrastructure (part 2) (5:19:00)

*** Attribution ***

Course Created by: PaceIT Online YouTube: https://www.youtube.com/channel/UCyTe…

License: Creative Commons Attribution license (reuse allowed)

Website: https://cslesson.org

Leave a Reply

Your email address will not be published. Required fields are marked *