25.13.16
This website uses cookies to ensure you get the best experience on our website. Learn more

CompTIA Security+ 701 Preparation

Syllabus: Day in a SOC Analyst Life – Writing an Escalation Report Rules Logic - Network Investigation Windows Event Log & Sysmon Digital Forensics - First Steps Using Autopsy Network Protection Using WAF Introduction to Splunk Enterprise Security Splunk - Rules and Alerts Splunk - Reporting and Dashboards Account Policy Configuration Windows Event Log Introduction to Cryptography - Hands-on Hashing Introduction to Cryptography - Web Server Certificate Common Attack Types - Cracking Passwords Common Attack Types - Investigating Password Cracking Common Attack Types - Performing SQLi Introduction to MISP Common Attack Types - Vulnerability Exploitation Common Attack Types - Creating a Trojan Introduction to Autopsy Security+ 701 Lesson 1.0.0 - Domain 1 Overview Security+ 701 - Welcome to the Course Security+ 701 - About the Exam Security+ 701 Lesson 1.2.1 - Fundamental Security Concepts Security+ 701 Lesson 1.2.2 - Zero Trust Security+ 701 Lesson 1.2.3 - Physical Security Security+ 701 Lesson 1.2.4 - Deception and Disruption Techniques Security+ 701 Lesson 1.3.1 - Business Processes Impacting Security Operations Security+ 701 Lesson 1.3.3 - Documentation and Version Control Security+ 701 Lesson 1.4.1 - Public Key Infrastructure (PKI) Security+ 701 Lesson 1.4.2 - Encryption Security+ 701 Lesson 1.4.3 - Encryption Tools Security+ 701 Lesson 1.4.4 - Obfuscation Techniques Security+ 701 Lesson 1.4.5 - Encryption Techniques Security+ 701 Lesson 1.4.6 - Certificates Security+ 701 Lesson 2.0.0 - Domain 2 Overview Security+ 701 Lesson 2.1.1 - Threat Actors and Attributes Security+ 701 Lesson 2.1.2 - Threat Actors Motivations Security+ 701 Lesson 2.2.1 - Threat Vectors Security+ 701 Lesson 2.2.2 - Attack Surfaces Security+ 701 Lesson 2.2.3 - Human Vectors/Social Engineering Security+ 701 Lesson 2.3.1 - Software-based Vulnerabilities Security+ 701 Lesson 2.3.2 - Hardware-based Vulnerabilities Security+ 701 Lesson 2.3.3 - Additional Vulnerabilities Security+ 701 Lesson 2.4.1 - Malware Attacks Security+ 701 Lesson 2.4.2 - Physical and Network Attacks Security+ 701 Lesson 2.4.3 - Application Attacks Security+ 701 Lesson 2.4.4 - Cryptographic and Password Attacks Security+ 701 Lesson 2.4.5 - Attack Indicators Security+ 701 Lesson 2.5.1 - Mitigation Techniques Security+ 701 Lesson 2.5.2 - Hardening Techniques Security+ 701 Lesson 3.0.0 - Domain 3 Overview Security+ 701 Lesson 3.1.1 - Architecture and Infrastructure Concepts Security+ 701 Lesson 3.1.2 - Architecture Considerations Security+ 701 Lesson 3.2.1 - Infrastructure Considerations Security+ 701 Lesson 3.2.2 - Secure Communications/Access Security+ 701 Lesson 3.3.1 - Data Types and Classifications Security+ 701 Lesson 3.3.2 - Data Considerations and Security Security+ 701 Lesson 3.4.1 - Resilience and Recovery Security+ 701 Lesson 3.4.2 - Testing and Backups Security+ 701 Lesson 4.0.0 - Domain 4 Overview Security+ 701 Lesson 4.1.1 - Security Baselines and Device Hardening Security+ 701 Lesson 4.1.2 - Mobile Solutions Security+ 701 Lesson 4.1.3 - Wireless and Application Security Security+ 701 Lesson 4.2.1 - Asset Management Security+ 701 Lesson 4.3.1 - Vulnerability Identification Methods Security+ 701 Lesson 4.3.2 - Vulnerability Analysis Security+ 701 Lesson 4.4.1 - Security Monitoring Security+ 701 Lesson 4.3.3 - Vulnerability Response and Remediation Security+ 701 Lesson 4.4.2 - Monitoring Tools Security+ 701 Lesson 4.5.1 - Security Measures and Devices Security+ 701 Lesson 4.5.2 - Filters and Secure Protocols Security+ 701 Lesson 4.5.3 - Email Security Security+ 701 Lesson 4.5.4 - Additional Security Measures Security+ 701 Lesson 4.6.1 - Identity and Access Management Concepts Security+ 701 Lesson 4.6.2 - Access Controls Security+ 701 Lesson 4.6.3 - Multifactor Authentication Security+ 701 Lesson 4.6.4 - Password Concepts and Privileged Access Management Security+ 701 Lesson 4.7.1 - Automation and Scripting Security+ 701 Lesson 4.7.2 - Benefits and Considerations of Automation Security+ 701 Lesson 4.8.1 - Incident Response Process Security+ 701 Lesson 4.8.2 - Incident Response Concepts and Digital Forensics Security+ 701 Lesson 4.9.1 - Log Data and Other Data Sources Security+ 701 Lesson 5.0.0 - Domain 5 Overview Security+ 701 Lesson 5.1.1 - Guidelines and Policies Security+ 701 Lesson 5.1.2 - Standards and Procedures Security+ 701 Lesson 5.1.3 - External Considerations Security+ 701 Lesson 5.1.4 - Governance Structure and Roles and Responsibilities Security+ 701 Lesson 5.2.1 - Risk Identification, Assessment, and Analysis Security+ 701 Lesson 5.2.2 - Risk Register, Tolerance, and Appetite Security+ 701 Lesson 5.2.3 - Risk Management Strategies and Reporting Security+ 701 Lesson 5.2.4 - Business Impact Analysis Security+ 701 Lesson 5.3.1 - Vendor Assessment and Selection Security+ 701 Lesson 5.3.2 - Agreement Types Security+ 701 Lesson 5.4.1 - Compliance Reporting and Monitoring Security+ 701 Lesson 5.4.2 - Privacy Concepts Security+ 701 Lesson 5.5.1 - Internal vs External Audits Security+ 701 Lesson 5.5.2 - Penetration Testing Security+ 701 Lesson 5.6.1 - Security Awareness Practices Security+ 701 Lesson 5.6.2 - Reporting, Development, and Execution Security+ 701 Quiz Lesson 1.1 - Security Controls Security+ 701 Quiz Lesson 1.2 - Security Concepts & Techniques Security+ 701 Quiz Lesson 1.3 - Security Operations Security+ 701 Quiz Lesson 1.4 - Encryption Concepts Security+ 701 Quiz Lesson 2.1 - Threat Actors Security+ 701 Quiz Lesson 2.2 - Threats Security+ 701 Quiz Lesson 2.3 - Vulnerability Types Security+ 701 Quiz Lesson 2.4 - Attack Types Security+ 701 Quiz Lesson 2.5 - Defense Techniques Security+ 701 Quiz Lesson 3.1 - Network Architecture Concepts Security+ 701 Quiz Lesson 3.2 - Infrastructure Securing Security+ 701 Quiz Lesson 3.3 - Data Handling Security+ 701 Quiz Lesson 3.4 - Cybersecurity Resilience Security+ 701 Quiz Lesson 4.1 - Device and Network Security Security+ 701 Quiz Lesson 4.2 - Asset Management Security+ 701 Quiz Lesson 4.3 - Vulnerability Analysis Security+ 701 Quiz Lesson 4.4 - Security Monitoring Security+ 701 Quiz Lesson 4.5 - Security Protocols and Concepts Security+ 701 Quiz Lesson 4.6 - Access Controls Security+ 701 Quiz Lesson 4.7 - Automation Concepts & Considerations Security+ 701 Quiz Lesson 4.8 - Incident Response Basics Security+ 701 Quiz Lesson 4.9 - Data Sources Security+ 701 Quiz Lesson 5.1 - Standards, Policies & Responsibilities Security+ 701 Quiz Lesson 5.3 - Vendor Assessment & Agreement Security+ 701 Quiz Lesson 5.4 - Compliance & Privacy Concepts Security+ 701 Quiz Lesson 5.5 - Penetration Testing Concepts & Types Security+ 701 Quiz Lesson 5.6 - Security Execution Methodologies Security+ 701 Lesson 1.1.1 - Security Control Categories and Types Security+ 701 Midterm Quiz Security+ 701 Final Assessment Security+ 701 Endterm Quiz Security+ 701 Lesson 1.3.2 - Technical Implications Security+ 701 Quiz Lesson 5.2 - Risk Management

Skills / Knowledge

  • Complete the "CompTIA Security+ 701 Preparation" course