CompTIA Security+ Certification

Overview

Covered in This Course
Information Security

Risk Assessment

Risk Assessment Key Concepts
Asset Control Pt.1
Asset Control Pt.2
Vulnerability Assessment
Threat Profiling Pt.1
Threat Profiling Pt.2
Risk Assessment Pt.1
Risk Assessment Pt.2

Organizational Security

Organizational Security
Security Best Practices
Password Policy Example
Security Organization Pt.1
Security Organization Pt.2
Incident Response Pt.1
Incident Response Pt.2
Forensics Overview
Forensics Investigation
Change Management and Auditing

Infrastructure Security

Infrastructure Key Concepts
Physical Security
Physical Security Continued
Disaster Recovery/Business Continuity Pt.1
Disaster Recovery/Business Continuity Pt.2

Access Control/Authentication

Access Control Key Concepts
MAC/DAC/RBAC Pt.1
MAC/DAC/RBAC Pt.2
RADIUS and TCACS Pt.1
RADIUS and TCACS Pt.2
Username/Password and Kerberos
CHAP and Digital Certificates
Tokens and Biometrics Pt.1
Tokens and Biometrics Pt.2
Multifactor & Mutual Authentication Pt.1
Multifactor & Mutual Authentication Pt.2

Network Security

Network Security Overview
Network Devices Pt.1
Network Devices Pt.2
Remote Access Devices and Services Pt.1
Remote Access Devices and Services Pt.2
Wireless and Mobile Technologies Pt.1
Wireless and Mobile Technologies Pt.2
Virtual Private Networks
Secure Network Architecture Pt.1
Secure Network Architecture Pt.2

Server and Host Security

Server/Host Key Terms
E-Mail Services Pt.1
E-Mail Services Pt.2
Web Services
Directory Services
File Transfer Services
Terminal and Instant Messaging Pt.1
Terminal and Instant Messaging Pt.2
Baseline and Hardening Pt.1
Baseline and Hardening Pt.2

Monitoring and IDS

Monitoring, IDS/R Key Concepts
Monitoring - FCAPS
Monitoring - SNMP Pt.1
Monitoring - SNMP Pt.2
Intrusion Detection Systems
Network IDS
Host IDS
Honeypots
Installing Snort for Windows Pt.1
Installing Snort for Windows Pt.2

Cryptography and PKI

Cryptography Key Concepts
Encryption for Confidentiality
Data Integrity and Digital Hashes
Digital Signatures and Authentication
Symmetric Algorithms
Asymmetric Algorithms Pt.1
Asymmetric Algorithms Pt.2
PKI and Digital Certificates Pt.1
PKI and Digital Certificates Pt.2
PKI Standards and Protocols
Key and Certificate Management
Encrypting NTFS Volumes with EFS
PGP with Microsoft Outlook

Threats and Attacks

Threats and Attacks Key Concepts
Profile of an Attacker Pt.1
Profile of an Attacker Pt.2
Anatomy of an Attack
DOS and DDOS
Back Doors and Trojan Horses
Spoofing and Hijacking
Man-in-the-Middle and Replay
Password Cracking
Malicious Code

Resources

Resources & Tips

Credits

About This Author