Télécommunications

CompTIA Security+ Exam Cram (Full Training Course – All 5 Domains) – SY0-601

This video is my complete CompTIA Security+ Exam Cram session covering all 5 domains of the exam, updated in 2022, including EVERY item in CompTIA’s offical Exam Objectives. Also includes exam prep study materials strategy guidance, details on the exam format and what you can expect on exam day.

Security+ Official 2021 Study Guide and Practice Tests Bundle
https://amzn.to/3BALjcq

Security+ Official Exam Objectives
https://www.comptia.org/certifications/security#examdetails

Security+ Exam Acronyms List
https://getcertified.ecpi.edu/wp-content/uploads/2021/06/CompTIA-SecurityPlus601-Acronyms.pdf

How to register for online practice questions (from OSG)
https://youtu.be/expPsyQBcPQ

Security+ Exam Cram: Intro and Strategy
https://youtu.be/UnPlkq2waKU

Errata, clarifications, and FAQs
https://github.com/pzerger/comptiaexamcram/blob/main/Errata.md

*** TABLE OF CONTENTS ***
00:01:27 Recommended Study Plan

08:36 DOMAIN 1: Attacks, Threats and Vulnerabilities
00:05:56 1.1 Social Engineering Techniques
00:21:39 1.2 Indicators and Types of Attacks
00:45:44 1.3 Indicators of Application Attacks
01:04:23 1.4 Indicators of Network Attacks
01:24:50 1.5 Threat actors, vectors, and intelligence sources
01:34:52 1.6 Types of vulnerabilities
01:51:57 1.7 Security assessment techniques
02:09:56 1.8 Penetration testing techniques

02:19:00 DOMAIN 2: Architecture and Design
02:19:14 2.1 Enterprise security concepts
02:45:25 2.2 Virtualization and cloud computing concepts
03:08:18 2.3 Application development, automation, and deployment
03:20:45 2.4 Authentication and authorization design concepts
03:36:16 2.5 Implement cybersecurity resilience
03:56:24 2.6 Implications of embedded and specialized systems
04:17:51 2.7 Importance of physical security controls
04:46:50 2.8 Cryptographic concepts

05:11:55 DOMAIN 3: Implementation
05:12:21 3.1 Implement secure protocols
05:15:10 3.2 Implement host or application security solutions
05:58:33 3.3 Implement secure network designs
06:15:30 3.4 Install and configure wireless security settings
06:26:06 3.5 Implement secure mobile solutions
06:48:26 3.6 Apply cybersecurity solutions to the cloud
07:13:29 3.7 Implement identity and account management controls
07:26:19 3.8 Implement authentication and authorization solutions
07:42:02 3.9 Implement public key infrastructure.

08:01:12 DOMAIN 4: Operations and Incident Response
08:01:35 4.1 Tools to assess organizational security
08:22:20 4.2 Policies, processes, and procedures for incident response
08:37:29 4.3 Utilize data sources to support an investigation
08:52:52 4.4 Incident mitigation techniques or controls
09:24:42 4.5 Key aspects of digital forensics.

09:24:19 DOMAIN 5: Governance, Risk, and Compliance
09:02:31 5.1 Types of security controls
09:30:34 5.2 Regs, standards, or frameworks that impact security posture
09:44:46 5.3 Importance of policies to organizational security
10:09:03 5.4 Risk management processes and concepts
10:31:20 5.5 Privacy and sensitive data concepts in relation to security

PDF Presentation Downloads
———————————————-
FULL COURSE (All 5 Domains)
https://1drv.ms/b/s!AmhtzcmYt5AViaJ4XhijcMwUlPh_WA?e=XeL3Al

DOMAIN 1: Attacks, Threats and Vulnerabilities
https://1drv.ms/b/s!AmhtzcmYt5AViPISgQrCkcHp3RNaFw?e=16gTgH

DOMAIN 2: Architecture and Design
https://1drv.ms/b/s!AmhtzcmYt5AViPVxsBZ4-3U6JxYI0w?e=gw8Dvs

DOMAIN 3: Implementation
https://1drv.ms/b/s!AmhtzcmYt5AViPZrPjD5YCcryor2HA?e=8ZUwEP

DOMAIN 4: Operations and Incident Response
https://1drv.ms/b/s!AmhtzcmYt5AViPciEOaHzZgJUfaUwQ?e=AkeaF8

DOMAIN 5: Governance, Risk, and Compliance
https://1drv.ms/b/s!AmhtzcmYt5AViPcwtqSQeDqNmsrUyQ?e=H8f5AO

Additional Reading
——————————-
PW salting and Hashing in Azure AD
https://learn.microsoft.com/en-us/answers/questions/848370/salting-and-hashing.html

NOTICE: Some of our video description contain affiliate links, which means we may receive a small commission on a purchase without additional cost to you, if you buy something.

Views : 222190
cyber security

Source by Inside Cloud and Security

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *