Autoplay
Autocomplete
Previous Lesson
Complete and Continue
2025 CompTIA Security+ Certification Course
Materials and extra resources
How to get access to the students portal (3:28)
Introduction
Introduction (12:17)
Domain1: Security Fundamentals
1.1 Access Control Introduction (6:45)
1.2 Authorization (19:19)
1.3 Authentication (18:45)
1.4 Access Control Attacks (17:11)
1.5 Cryptography Fundamentals (1:37)
1.6 Steganography (7:51)
1.7 Symetrics Encryption (12:38)
1.8 Asymetrix Encryption (13:47)
1.9 Hashing (6:05)
1.10 Information Security Control (5:00)
1.11 Information Security Life Cycle 1 (14:09)
1.12 Information Security Life Cycle 2 (6:49)
1.13 Policy (2:38)
1.14 Steganography (7:51)
1.15 Asymmetric Encryptian (13:47)
1.16 Policy (2:38)
1.17 Threat Modeling (5:16)
1.18 Threat Modeling
1.19 Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems (6:52)
1.20 Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
1.21 Network Attack Mitigation-Part 1 (3:52)
1.22 Network Attack Mitigation-Part 1
1.23 Network Attack Mitigation-Part 2 (5:38)
1.24 Network Attack Mitigation-Part 2
1.25 Risk Appetite and Tolerance (5:41)
1.26 Risk Appetite and Tolerance
1.27 Patch and Vulnerability Management (8:04)
1.28 Patch and Vulnerability Management
Domain 2: Identifying Security Threats and Vulnerabilities
2.1 Social Engineering (12:19)
2.2 Email Spoofing (6:13)
2.3 Phising (13:11)
2.4 Information Security Awarness (6:37)
2.5 Maleware (12:30)
2.6 Types of Malicious Code with a proof of concept (14:51)
2.7 Software-Based Threats (4:24)
2.8 Password guessing and cracking (15:09)
2.9 Rambow table technique (19:20)
2.10 Application Attack (4:42)
2.11 What is SQL Injection Attack ? (14:05)
2.12 XSS Introduction (2:58)
2.13 Network-Based Threats (3:34)
2.14 Network Basic (12:02)
2.15 IP (16:07)
2.16 OSI Model Part 1 (14:39)
2.17 OSI Model Part 2 (14:10)
2.18What is Scanning (2:17)
2.19 Sniffiring 1 (15:19)
2.20 Sniffiring 2 (14:53)
2.21 Man in the Middle attack (11:59)
2.22 Wireless attack (2:41)
2.23 Wireless (7:15)
2.24 Warlessattacks (2:34)
2.25 WEP cracking (20:48)
2.26 Physical and Logical Access Control (5:07)
2.27 Physical and Logical Access Control
2.28 Identification, Authentication, and Authorization (4:49)
2.29 Identification, Authentication, and Authorization
2.30 Identity as a Service (4:59)
2.31 Identity as a Service
2.32 Authorization Mechanisms (4:36)
2.33 Authorization Mechanisms
2.34 Access Control Attack Mitigation (5:21)
2.35 Access Control Attack Mitigation
Domain3: Managing Data, Application, and Host Security
3.1 Managing Data Security (12:32)
3.2 Permissions (4:28)
3.3 Data Policies (6:23)
3.4 Manage Application security (8:53)
3.5 Validate application input (4:26)
3.6 Manage Device and Host Security (4:36)
3.7 Operating System Security (10:34)
3.8 TCB (9:17)
3.9 Logging (3:12)
3.10 Security Baseline (4:44)
3.11 Manage Mobile Security (4:33)
3.12 Fundamentals of Network- Part 1 (5:16)
3.13 Fundamentals of Network- Part 1
3.14 Fundamentals of Network- Part 2 (3:33)
3.15 Fundamentals of Network- Part 2
3.17 Fundamentals of Network-Part 3 (4:04)
3.18 Fundamentals of Network-Part 3
3.19 Communication Channel Security (5:38)
3.20 OSI Model (5:07)
3.21 OSI Model
3.22 Communication Channel Security
3.23 Logging and Monitoring (4:18)
3.24 Logging and Monitoring
3.25 Control Monitoring (3:18)
3.26 Control Monitoring
Domain4: Implementing Network Security
4.1 Implementing Network Security (4:04)
4.2 IDS / IPS (6:53)
4.3 Types of Firewall (10:38)
4.4 Risk Management (4:32)
4.5 Risk management
4.5 Threat and Vulnerability Identification (5:02)
4.6 Threat and Vulnerability Identification
4.7 Risk Scenario (7:49)
4.8 Risk Scenario
4.9 Metrics and Reporting (3:24)
4.10 Metrics and Reporting
4.11 BCP (5:48)
4.12 BCP
4.13 Risk Assessment and Identification (5:43)
4.14 Risk Assessment and Identification
4.15 Post-Incident Reviews and Lessons Learned (3:53)
4.16 Post-Incident Reviews and Lessons Learned
4.17 Incident Classification and Prioritization (5:52)
4.18 Incident Classification and Prioritization
4.19 Key Performance Indicators (KPIs) (5:16)
4.20 Key Performance Indicators (KPIs)
Domain5: Implementing Compliance and Operational Security
5.1 Physical Security (5:31)
5.2 Legal Compliance (3:52)
5.3 Security Awareness and Training (6:31)
5.4 Security in the Engineering Lifecycle (5:49)
5.5 Security in the Engineering Lifecycle
5.6 System Component Security- Part 1 (5:15)
5.7 System Component Security- Part 1
5.8 System Component Security - Part 2 (3:44)
5.9 System Component Security - Part 2
5.10 System Component security - part 3 (4:18)
5.11 System Component Security - Part 3
5.12 Controls and Countermeasures in Enterprise Security (8:59)
5.13 Controls and Countermeasures in Enterprise Security
5.14 Secure Software Development Lifecycle (SDLC) - Part 1 (4:28)
5.15 Secure Software Development Lifecycle (SDLC) - Part 1
5.16 Secure Software Development Lifecycle (SDLC)- Part 2 (5:28)
5.17 Secure Software Development Lifecycle (SDLC)- Part 2
5.18 Secure Software Development Lifecycle (SDLC)- Part 3 (5:16)
5.19 Secure Software Development Lifecycle (SDLC)- Part 3
5.20 Secure coding practices-Part 1
5.21 Secure coding practices-Part 1 (4:56)
5.22 Secure coding practices- Part 2 (3:43)
5.23 Secure coding practices- Part 2
Domain6: Risk Management
6.1 Introduction to Risk (6:17)
6.2 What is a Risk ? (11:59)
6.3 Asset Evaluation (18:28)
6.4 Vulnerability Assessment Tools (Nessus) (13:45)
6.5 Cryptography Basics - Part 1 (3:05)
6.6 Cryptography Basics - Part 1
6.7 Cryptography Basics - Part 2 (0:53)
6.8 Cryptography Basics - Part 2
6.9 Cryptography Basics - Part 3
6.10 Cryptography Basics - Part 3 (1:55)
6.11 Symmetric vs. Asymmetric Cryptography (2:34)
6.12 Symmetric vs. Asymmetric Cryptography
6.13 Cryptography Applications (PKI,Digital Certificates and Signature)
6.14 Cryptography Applications (PKI,Digital Certificates and Signature)
6.15 Cryptography Applications (Digital Rights Management, Hishing) (6:55)
6.16 Cryptography Applications (Digital Rights Management, Hishing)
Domain7: Troubleshooting and Managing Security Incidents
7.1 Respond to Security Incidents (4:43)
7.2 Recover from a Security Incident (5:29)
Domain8: Business Continuity and Disaster Recovery Planning
8.1 Business Continuity Plans (14:32)
8.2 Business Impact Analysis (10:09)
8.3 MTD-RTO-RPO (11:39)
8.4 Disaster Recovery Plans (3:29)
8.5 Alternate Sites (8:05)
Teach online with
2.24 Warlessattacks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock