Рет қаралды 781,057
This video is my complete CompTIA Security+ Exam Cram session covering all 5 domains of the exam, updated in 2022, including EVERY item in CompTIA's offical Exam Objectives. Also includes exam prep study materials strategy guidance, details on the exam format and what you can expect on exam day.
Security+ Official 2021 Study Guide and Practice Tests Bundle
amzn.to/3BALjcq
Security+ Official Exam Objectives
www.comptia.org/certification...
Security+ Exam Cram Series Resource Center
Resources, FAQs, and errata.
github.com/pzerger/comptiaexa...
Security+ Exam Acronyms List
getcertified.ecpi.edu/wp-cont...
How to register for online practice questions (from OSG)
• How to register for on...
Security+ Exam Cram: Intro and Strategy
• Comptia Security+ SY0-...
Errata, clarifications, and FAQs
github.com/pzerger/comptiaexa...
Chapters
00:00:00 Introduction
00:01:27 Recommended Study Plan
08:36 DOMAIN 1: Attacks, Threats and Vulnerabilities
00:05:56 1.1 Social Engineering Techniques
00:21:39 1.2 Indicators and Types of Attacks
00:45:44 1.3 Indicators of Application Attacks
01:04:23 1.4 Indicators of Network Attacks
01:24:50 1.5 Threat actors, vectors, and intelligence sources
01:34:52 1.6 Types of vulnerabilities
01:51:57 1.7 Security assessment techniques
02:09:56 1.8 Penetration testing techniques
02:19:00 DOMAIN 2: Architecture and Design
02:19:14 2.1 Enterprise security concepts
02:45:25 2.2 Virtualization and cloud computing concepts
03:08:18 2.3 Application development, automation, and deployment
03:20:45 2.4 Authentication and authorization design concepts
03:36:16 2.5 Implement cybersecurity resilience
03:56:24 2.6 Implications of embedded and specialized systems
04:17:51 2.7 Importance of physical security controls
04:46:50 2.8 Cryptographic concepts
05:11:55 DOMAIN 3: Implementation
05:12:21 3.1 Implement secure protocols
05:15:10 3.2 Implement host or application security solutions
05:58:33 3.3 Implement secure network designs
06:15:30 3.4 Install and configure wireless security settings
06:26:06 3.5 Implement secure mobile solutions
06:48:26 3.6 Apply cybersecurity solutions to the cloud
07:13:29 3.7 Implement identity and account management controls
07:26:19 3.8 Implement authentication and authorization solutions
07:42:02 3.9 Implement public key infrastructure.
08:01:12 DOMAIN 4: Operations and Incident Response
08:01:35 4.1 Tools to assess organizational security
08:22:20 4.2 Policies, processes, and procedures for incident response
08:37:29 4.3 Utilize data sources to support an investigation
08:52:52 4.4 Incident mitigation techniques or controls
09:24:42 4.5 Key aspects of digital forensics.
09:24:19 DOMAIN 5: Governance, Risk, and Compliance
09:02:31 5.1 Types of security controls
09:30:34 5.2 Regs, standards, or frameworks that impact security posture
09:44:46 5.3 Importance of policies to organizational security
10:09:03 5.4 Risk management processes and concepts
10:31:20 5.5 Privacy and sensitive data concepts in relation to security
PDF Presentation Downloads
----------------------------------------------
FULL COURSE (All 5 Domains)
1drv.ms/b/s!AmhtzcmYt5AViaJ4X...
DOMAIN 1: Attacks, Threats and Vulnerabilities
1drv.ms/b/s!AmhtzcmYt5AViPISg...
DOMAIN 2: Architecture and Design
1drv.ms/b/s!AmhtzcmYt5AViPVxs...
DOMAIN 3: Implementation
1drv.ms/b/s!AmhtzcmYt5AViPZrP...
DOMAIN 4: Operations and Incident Response
1drv.ms/b/s!AmhtzcmYt5AViPciE...
DOMAIN 5: Governance, Risk, and Compliance
1drv.ms/b/s!AmhtzcmYt5AViPcwt...
Additional Reading
-------------------------------
PW salting and Hashing in Azure AD
learn.microsoft.com/en-us/ans...
Additional Reading (mentioned in the video)
-----------------------------------------------------------------------
Implement password hash synchronization with Azure AD Connect sync
learn.microsoft.com/en-us/azu...
Salting and hashing Q & A
learn.microsoft.com/en-us/ans...
NOTICE: Some of our video description contain affiliate links, which means we may receive a small commission on a purchase without additional cost to you, if you buy something.