Codar
Security+
This is a complete and comprehensive
CompTIA Security+ Certification
(SY0-601) course. It is designed to
prepare you to take and pass the
CompTIA exam
Motive && Objective
❖ Your new skills and the CompTIA Security+ Cert will help you land a great IT
security tech job or, get that raise or advancement you are after.
❖ You will have the knowledge and confidence to pass the CompTIA exam and
the skills to be a great IT security tech
❖ This course is ideal as both a study tool and an on-the-job reference for IT
Security tasks.
Introduction && Risk Management
❖ Introduction to compTIA Security+ SY0-601
❖ About the compTIA Security+ SY0-601 Exam
❖ Defining Risk
❖ Threat and Vulnerabilities
❖ Threat Intelligence
❖ Risk Management Concepts
❖ Security Controls
❖ Risk Assessments and Treatments
❖ Quantitative Risk Assessments
❖ Qualitative Risk Assessments
❖ Business Impact Analysis
Introduction && Risk Management
❖ Data Types and Roles
❖ Security and the Information Life Cycle
❖ Data Destruction
❖ Personnel Risk and Policies
❖ Third-Party Risk Management
❖ Agreement Types
❖ Chapter 1 Exam Question Review
❖ Wiping Disks with the dd Command Lab
❖ Chapter 1 Ask Me Anything (AMA)
❖ Chapter 1 Quiz
❖
Cryptography
❖ Cryptography Basics
❖ Data Protection
❖ Cryptographic Methods
❖ Symmetric Cryptosystems
❖ Symmetric Block Modes
❖ Asymmetric Cryptosystems
❖ Diffie-Hellman
❖ Hashing
❖ Understanding Digital Certificates
❖ Trust Models
❖ Public Key Infrastructure
Cryptography
❖ Certificate Types
❖ Touring Certificates
❖ Cryptographic Attacks
❖ Password Cracking
❖ Password Cracking Demo
❖ Chapter 2 Exam Question Review
❖ SSH Public Key Authentication Lab
❖ Chapter 2 Ask Me Anything (AMA)
❖ Chapter 2 Quiz
Identity && Account Management
❖ Identification, Authentication, and Authorization
❖ Enabling Multifactor Authentication
❖ Authorization
❖ Accounting
❖ Authentication Methods
❖ Access Control Schemes
❖ Account Management
❖ Network Authentication
❖ Identity Management Systems
❖ Chapter 3 Exam Question Review
❖ Creating LInux Users and Groups Lab
Identity && Account Management
❖ Chapter 3 Ask Me Anything (AMA)
❖ Chapter 3 Quiz
❖
❖
Tools Of The Trade
❖ Touring the CLI
❖ Shells
❖ The Windows Command Line
❖ Microsoft PowerShell
❖ Linux Shells
❖ Python Scripts
❖ Windows Command-Line Tools
❖ Linux Command-Line Tools
❖ Network Scanners
❖ Network Scanning with Nmap
❖ Network Protocol Analyzers
Tools Of The Trade
❖ Using Wireshark to Analyze Network Traffic
❖ Using tcpdump to Analyze Network Traffic
❖ Log Files
❖ Centralized Logging
❖ Configuring Linux Log Forwarding
❖ Chapter 4 Exam Question Review
❖ Linux Shell Script Lab
❖ Nmap Lab
❖ Chapter 4 Ask Me Anything (AMA)
❖ Chapter 4 Quiz
Securing Individual Systems
❖ Malware
❖ Weak Configurations
❖ Common Attacks
❖ Driver and Overflow Attacks
❖ Password Attacks
❖ Bots and Botnets
❖ Disk RAID Levels
❖ Securing Hardware
❖ Securing Endpoints
❖ Chapter 5 Exam Question Review
❖ Linux Software RAID Lab
Securing Individual Systems
❖ Chapter 5 Ask Me Anything (AMA)
❖ Chapter 5 Quiz
The Basic LAN
❖ The OSI Model
❖ ARP Cache Poisoning
❖ Other Layer 2 Attacks
❖ Network Planning
❖ Load Balancing
❖ Securing Network Access
❖ Honeypots
❖ Firewalls
❖ Proxy Servers
❖ Network and Port Address Translation
❖ IP Security (IPsec)
The Basic LAN
❖ Virtual Private Networks (VPNs)
❖ Intrusion Detection and Prevention Systems (IDS/IPS)
❖ Chapter 6 Exam Question Review
❖ Linux Snort IDS Lab
❖ Chapter 6 Ask Me Anything (AMA)
❖ Chapter 6 Quiz
Securing Wireless LANS
❖ Wi-Fi Encryption Standards
❖ RFID, NFC, and Bluetooth
❖ Wi-Fi Coverage and Performance
❖ Wi-Fi Discovery and Attacks
❖ Cracking WPA2
❖ Wi-Fi Hardening
❖ Chapter 7 Exam Question Review
❖ WPA2 Cracking Lab
❖ Chapter 7 Ask Me Anything (AMA)
❖ Chapter 7 Quiz
Securing Public Servers
❖ Defining a Public Server
❖ Common Attacks and Mitigations
❖ Containers and Software-Defined Networking
❖ Hypervisors and Virtual Machines
❖ Cloud Deployment Models
❖ Cloud Service Models
❖ Securing the Cloud
❖ Chapter 8 Exam Question Review
❖ Docker Container Lab
❖ Chapter 8 Ask Me Anything (AMA)
❖ Chapter 8 Quiz
Securing Dedicated Systems
❖ Embedded Systems
❖ Industrial Control System (ICS)
❖ Internet of Things (IoT) Devices
❖ Connecting to Dedicated and Mobile Systems
❖ Security Constraints for Dedicated Systems
❖ Mobile Device Deployment and Hardening
❖ Chapter 9 Exam Question Review
❖ Smartphone Hardening Lab
❖ Chapter 9 Ask Me Anything (AMA)
❖ Chapter 9 Quiz
Physical Security
❖ Physical Security Overview
❖ Physical Security
❖ Keylogger Demo
❖ Environmental Controls
❖ Chapter 10 Exam Question Review
❖ Physical Security Lab
❖ Chapter 10 Ask Me Anything (AMA)
❖ Chapter 10 Quiz
Secure Protocols and Applications
❖ DNS Security
❖ FTP Packet Capture
❖ Secure Web and E-mail
❖ Request Forgery Attacks
❖ Cross-Site Scripting Attacks
❖ Web Application Security
❖ Web App Vulnerability Scanning
❖ Chapter 11 Exam Question Review
❖ OWASP ZAP Web App Scan Lab
❖ Chapter 11 Ask Me Anything (AMA)
❖ Chpater 11 Quiz
Testing Infrastrures
❖ Testing Infrastructure Overview
❖ Social Engineering
❖ Social Engineering Attacks
❖ Vulnerability Assessments
❖ Penetration Testing
❖ Security Assessment Tools
❖ The Metasploit Framework
❖ Chapter 12 Exam Question Review
❖ hping3 Forged Packet Lab
❖ Chapter 12 Ask Me Anything (AMA)
❖ Chapter 12 Quiz
Dealing With Incidence
❖ Incident Response Overview
❖ Incident Response Plans (IRPs)
❖ Threat Analysis and Mitigating Actions
❖ Digital Forensics
❖ Gathering Digital Evidence
❖ Business Continuity and Alternate Sites
❖ Data Backup
❖ Chapter 13 Exam Question Review
❖ Autopsy Forensic Browser Lab
❖ Chapter 13 Ask Me Anything (AMA)
❖ Chapter 13 Quiz
❖ Exams
❖ Abbreviations
Thank you!