About
About Us
Help
Privacy Policy
Terms of Service
LearnDesk
Learn
Academics
Business
Creative
Health and Fitness
Lifestyle
Personal Development
Software
Topics
Admissions
Engineering
Hardware
Hospitality
Humanities
Chinese
Languages
Maths
Pharma
View All Topics
Topics
Accounting
Advertising
Analysis
Analytics
Business Communication
eCommerce
Entrepreneurship
Finance
Finance - India
Freelancing
View All Topics
Topics
Arts & Crafts
Audio Editing
Audio Production
Dance
Design
Film Production
Music
Photography
Video Production
Writing
View All Topics
Topics
Dieting
Fitness
Food Safety
Games
Medical
Medical Professionals
Meditation
Mental Health
Pregnancy
Safety & First Aid
View All Topics
Topics
Beauty & Makeup
Food
Fashion
Gaming
Home Improvement
Parenting
Pet Care & Training
Relationships
Sustainable Living
View All Topics
Topics
Career Development
Learning
Religion and Spirituality
Self-Improvement
View All Topics
Topics
Accounting
Amazon Web Services
App Development
Continuous Integration
Backup Software
Business Automation
Computational Fluid Dynamics
Business Intelligence
Computer Aided Design (CAD)
View All Topics
Teach
Teach Online
Schedule
Items
Billing
Users
Marketing
Analytics
Settings
Change School
Account
Log In
Sign Up
CompTIA Security+ (SY0-501): Complete Course and Practice Exam
Overview of Security
Welcome
Preview
Overview of Security
CIA Triad
AAA of Security
Security Threats
Mitigating Threats
Hackers
Threat Actors
Malware
Malware
Viruses
Worms
Trojans
Demo: Viruses and Trojans
Ransomware
Spyware
Rootkits
Spam
Summary of Malware
Malware Infections
Malware Infections
Common Delivery Methods
Demo: Phishing
Botnets and Zombies
Active Interception and Privilege Escalation
Demo: Privilege Escalation
Backdoors and Logic Bombs
Symptoms of Infection
Removing Malware
Preventing Malware
Security Applications and Devices
Security Applications and Devices
Software Firewalls
Demo: Software Firewalls
IDS
Pop-up Blockers
Data Loss Prevention (DLP)
Securing the BIOS
Securing Storage Devices
Disk Encryption
Mobile Device Security
Mobile Device Security
Securing Wireless Devices
Mobile Malware
SIM Cloning & ID Theft
Bluetooth Attacks
Mobile Device Theft
Security of Apps
BYOD
Hardening Mobile Devices
Hardening
Hardening
Unnecessary Applications
Restricting Applications
Demo: Unnecessary Services
Trusted Operating System
Updates and Patches
Patch Management
Group Policies
Demo: Group Policies
File Systems and Hard Drives
Virtualization
Virtualization
Hypervisors
Demo: How to create a VM
Threats to VMs
Securing VMs
Demo: Securing VMs
Application Security
Application Security
Web Browser Security
Web Browser Concerns
Demo: Web Browser Configuration
Securing Applications
Secure Software Development
Software Development
SDLC Principles
Testing Methods
Software Vulnerabilities and Exploits
Buffer Overflows
Demo: Buffer Overflow Attack
XSS and XSRF
SQL Injection
Demo: SQL Injection
Network Design
Network Security
The OSI Model
Switches
Routers
Network Zones
Network Access Control
VLANs
Subnetting
Network Address Translation
Telephony
Perimeter Security
Perimeter Security
Firewalls
Demo: SOHO Firewall
Proxy Servers
Honeypots and Honeynets
Data Loss Prevention
NIDS and NIPS
Unified Threat Management
Cloud Security
Cloud Computing
Cloud Types
As a Service
Cloud Security
Defending Servers
Network Attacks
Network Attacks
Ports and Protocols
Memorization of Ports
Unnecessary Ports
Denial of Service
DDoS
Stopping a DDoS
Spoofing
Hijacking
Replay Attack
Demo: Null Sessions
Transitive Attacks
DNS Attacks
ARP Poisoning
Securing Networks
Securing Networks
Securing Network Devices
Securing Network Media
Securing WiFi Devices
Wireless Encryption
Wireless Access Points
Wireless Attacks
Demo: Wireless Attack
Other Wireless Technologies
Physical Security
Physical Security
Surveillance
Door Locks
Demo: Lock Picking
Biometric Readers
Facilities Security
Facilities Security
Fire Suppression
HVAC
Shielding
Vehicles
Authentication
Authentication
Authentication Models
802.1x
LDAP and Kerberos
Remote Desktop Services
Remote Access Service
VPN
RADIUS vs TACACS+
Authentication Summary
Access Control
Access Control
Access Control Models
Best Practices
Users and Groups
Permissions
Usernames and Passwords
Demo: Policies
User Account Control
Risk Assessments
Risk Assessments
Qualitative Risk
Quantitative Risk
Methodologies
Security Controls
Vulnerability Management
Penetration Testing
OVAL
Vulnerability Assessments
Demo: Nmap Scanning
Demo: Vulnerability Scanning
Password Analysis
Demo: Password Cracking
Monitoring and Auditing
Monitoring Types
Performance Baselining
Protocol Analyzers
SNMP
Demo: Analytical Tools
Auditing
Demo: Auditing Files
Logging
Log Files
SIEM
Cryptography
Cryptography
Symmetric vs Asymmetric
Symmetric Algorithms
Public Key Cryptography
Asymmetric Algorithms
Pretty Good Privacy
Key Management
One-Time Pad
Demo: Steganography
Hashing
Demo: Hashing
Hashing Attacks
Increasing Hash Security
Public Key Infrastructure
Public Key Infrastructure
Digital Certificates
Demo: Certificates
Certificate Authorities
Web of Trust
Security Protocols
Security Protocols
S/MIME
SSL and TLS
SSH
VPN Protocols
Demo: Setting up a VPN
Planning for the Worst
Planning for the Worst
Redundant Power
Backup Power
Data Redundancy
Demo: RAIDs
Network Redundancy
Server Redundancy
Redundant Sites
Data Backup
Tape Rotation
Disaster Recovery Plan
Social Engineering
Social Engineering
Demo: Pretexting
Insider Threat
Phishing
More Social Engineering
User Education
Policies and Procedures
Policies and Procedures
Data Classifications
PII and PHI
Security Policies
User Education
Vendor Relationships
Disposal Policies
Incident Response Procedures
Data Collection Procedures
Demo: Disk Imaging
IT Security Frameworks
Conclusion
Conclusion
Exam Tricks
Demo: Software Firewalls
CompTIA Security+ (SY0-501): Complete Course and Practice Exam
Security Applications and Devices
By:
Packt Publishing
6 minutes
Share
Share the link to this page
Copied
Facebook
Twitter
WhatsApp
LinkedIn
Email
Add to Calendar
Add the class to your calendar
Add to Google Calendar
Add to Apple Calendar
Add to Yahoo Calendar
Add to Outlook Calendar
Print
Completed
You need to have access to the item to view this lesson.
One-time Fee
R2,582.99
Buy Class
₹12,613.99
Buy Class
₨12,613.99
Buy Class
$182.99
Buy Class
€175.78
Buy Class
£143.27
Buy Class
CA$262.21
Buy Class
A$293.06
Buy Class
S$247.12
Buy Class
HK$1,421.98
Buy Class
CHF 161.94
Buy Class
NOK kr2,062.15
Buy Class
DKK kr1,312.58
Buy Class
NZ$323.70
Buy Class
د.إ672.11
Buy Class
৳21,832.60
Buy Class
RM821.07
Buy Class
₦282,829.31
Buy Class
฿6,252.76
Buy Class
₺6,440.38
Buy Class
B$1,166.79
Buy Class
Лв344.05
Buy Class
₩266,663.94
Buy Class
₪667.80
Buy Class
₱10,734.19
Buy Class
¥28,761.45
Buy Class
MX$3,689.84
Buy Class
QR664.46
Buy Class
P2,537.41
Buy Class
KSh23,613.02
Buy Class
E£9,302.14
Buy Class
ብር23,262.04
Buy Class
Kz166,886.88
Buy Class
CLP$181,030.17
Buy Class
CN¥1,335.64
Buy Class
RD$11,128.97
Buy Class
DA24,722.19
Buy Class
FJ$424.28
Buy Class
Q1,407.29
Buy Class
GY$38,223.75
Buy Class
ISK kr25,536.25
Buy Class
DH1,842.41
Buy Class
L3,370.85
Buy Class
ден10,813.48
Buy Class
MOP$1,461.56
Buy Class
N$3,397.14
Buy Class
C$6,722.72
Buy Class
रु24,882.52
Buy Class
S/680.32
Buy Class
K741.52
Buy Class
SAR687.15
Buy Class
ZK5,056.19
Buy Class
L875.47
Buy Class
Kč4,425.06
Buy Class
Ft72,249.36
Buy Class
SEK kr1,991.34
Buy Class
ARS$187,946.78
Buy Class
Bs1,262.46
Buy Class
COP$807,499.72
Buy Class
₡92,764.87
Buy Class
L4,641.93
Buy Class
₲1,424,861.59
Buy Class
$U8,132.30
Buy Class
zł749.23
Buy Class
Already have an account?
Log In
Previous
Next
Sign Up
Signup to access thousands of classes
Continue with Facebook
Continue with Google
OR
Continue with Email
Already a member?
Log In
By registering for a LearnDesk account, you agree to our
Terms of Service
and
Privacy Policy
.
Share
Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.
Share with Google Contacts