Price: 14.00.USD| Size: 6.62 GB | Duration : 21.12 Hours | 127 Video Lessons
PART-01
001. How to Pass your SY0-601 Security+ Exam
002. Phishing - SY0-601 CompTIA Security+ 1.1
003. Impersonation - CompTIA SY0-601 Security+ 1.1
004. Dumpster Diving - SY0-601 CompTIA Security+ 1.1
005. Shoulder Surfing - SY0-601 CompTIA Security+ 1.1
006. Hoaxes - SY0-601 CompTIA Security+ 1.1
007. Watering Hole Attacks - SY0-601 CompTIA Security+ 1.1
008. Spam - SY0-601 CompTIA Security+ 1.1
009. Influence Campaigns - SY0-601 CompTIA Security+ 1.1
010. Other Social Engineering Attacks - SY0-601 CompTIA Security+ 1.1
011. Principles of Social Engineering - SY0-601 CompTIA Security+ 1.1
012. An Overview of Malware - SY0-601 CompTIA Security+ 1.2
013. Viruses and Worms - SY0-601 CompTIA Security+ 1.2
014. Ransomware and Crypto-malware - SY0-601 CompTIA Security+ 1.2
015. Trojan and RATs - SY0-601 CompTIA Security+ 1.2
016. Rootkits - SY0-601 CompTIA Security+ 1.2
017. Spyware - SY0-601 CompTIA Security+ 1.2
018. Bots and Botnets - SY0-601 CompTIA Security+ 1.2
019. Logic Bombs - SY0-601 CompTIA Security+ 1.2
020. Password Attacks - SY0-601 CompTIA Security+ 1.2
021. Physical Attacks - SY0-601 CompTIA Security+ 1.2
022. Adversarial Artificial Intelligence - SY0-601 CompTIA Security+ 1.2
023. Supply Chain Attacks - SY0-601 CompTIA Security+ 1.2
024. Cloud-based vs. On-Premises Attacks - SY0-601 CompTIA Security+ 1.2
025. Cryptographic Attacks - SY0-601 CompTIA Security+ 1.2
026. Privilege Escalation - SY0-601 CompTIA Security+ 1.3
027. Cross-site Scripting - SY0-601 CompTIA Security+ 1.3
028. Injection Attacks - SY0-601 CompTIA Security+ 1.3
029. Buffer Overflows - SY0-601 CompTIA Security+ 1.3
030. Replay Attacks - SY0-601 CompTIA Security+ 1.3
031. Request Forgeries - SY0-601 CompTIA Security+ 1.3
032. Driver Manipulation - SY0-601 CompTIA Security+ 1.3
033. SSL Stripping - SY0-601 CompTIA Security+ 1.3
034. Race Conditions - SY0-601 CompTIA Security+ 1.3
035. Other Application Attacks - SY0-601 CompTIA Security+ 1.3
036. Rogue Access Points and Evil Twins - SY0-601 CompTIA Security+ 1.4
037. Bluejacking and Bluesnarfing - SY0-601 CompTIA Security+ 1.4
038. Wireless Disassociation Attacks - SY0-601 CompTIA Security+ 1.4
039. Wireless Jamming - SY0-601 CompTIA Security+ 1.4
040. RFID and NFC Attacks - SY0-601 CompTIA Security+ 1.4
041. Randomizing Cryptography - SY0-601 CompTIA Security+ 1.4
042. On-Path Attacks - SY0-601 CompTIA Security+ 1.4
043. MAC Flooding and Cloning - SY0-601 CompTIA Security+ 1.4
044. DNS Attacks - SY0-601 CompTIA Security+ 1.4
045. Denial of Service - SY0-601 CompTIA Security+ 1.4
046. Malicious Scripts - SY0-601 CompTIA Security+ 1.4
047. Threat Actors - SY0-601 CompTIA Security+ 1.5
048. Attack Vectors - SY0-601 CompTIA Security+ 1.5
049. Threat Intelligence - SY0-601 CompTIA Security+ 1.5
050. Threat Research - SY0-601 CompTIA Security+ 1.5
051. Vulnerability Types - SY0-601 CompTIA Security+ 1.6
052. Third-party Risks - SY0-601 CompTIA Security+ 1.6
053. Vulnerability Impacts - SY0-601 CompTIA Security+ 1.6
054. Threat Hunting - SY0-601 CompTIA Security+ 1.7
055. Vulnerability Scans - SY0-601 CompTIA Security+ 1.7
056. Security Information and Event Management - SY0-601 CompTIA Security+ 1.7
057. Penetration Testing - SY0-601 CompTIA Security+ 1.8
058. Reconnaissance - SY0-601 CompTIA Security+ 1.8
059. Security Teams - SY0-601 CompTIA Security+ 1.8
060. Configuration Management - SY0-601 CompTIA Security+ 2.1
061. Protecting Data - SY0-601 CompTIA Security+ 2.1
062. Data Loss Prevention - SY0-601 CompTIA Security+ 2.1
063. Managing Security - SY0-601 CompTIA Security+ 2.1
064. Site Resiliency - SY0-601 CompTIA Security+ 2.1
065. Honeypots and Deception - SY0-601 CompTIA Security+ 2.1
066. Cloud Models - SY0-601 CompTIA Security+ 2.2
067. Edge and Fog Computing - SY0-601 CompTIA Security+ 2.2
068. Designing the Cloud - SY0-601 CompTIA Security+ 2.2
069. Infrastructure as Code - SY0-601 CompTIA Security+ 2.2
070. Virtualization Security - SY0-601 CompTIA Security+ 2.2
071. Secure Deployments - SY0-601 CompTIA Security+ 2.3
072. Provisioning and Deprovisioning - SY0-601 CompTIA Security+ 2.3
073. Secure Coding Techniques - SY0-601 CompTIA Security+ 2.3
074. Software Diversity - SY0-601 CompTIA Security+ 2.3
075. Automation and Scripting - SY0-601 CompTIA Security+ 2.3
076. Authentication Methods - SY0-601 CompTIA Security+ 2.4
077. Biometrics - SY0-601 CompTIA Security+ 2.4
078. Multi-factor Authentication - SY0-601 CompTIA Security+ 2.4
079. Disk Redundancy - SY0-601 CompTIA Security+ 2.5
080. Network Redundancy - SY0-601 CompTIA Security+ 2.5
081. Power Redundancy - SY0-601 CompTIA Security+ 2.5
082. Replication - SY0-601 CompTIA Security+ 2.5
083. Backup Types - SY0-601 CompTIA Security+ 2.5
084. Resiliency - SY0-601 CompTIA Security+ 2.5
085. Embedded Systems - SY0-601 CompTIA Security+ 2.6
086. Embedded Systems Communication - SY0-601 CompTIA Security+ 2.6
087. Embedded Systems Constraints - SY0-601 CompTIA Security+ 2.6
088. Physical Security Controls - SY0-601 CompTIA Security+ 2.7
089. Secure Areas - SY0-601 CompTIA Security+ 2.7
090. Secure Data Destruction - SY0-601 CompTIA Security+ 2.7
091. Cryptography Concepts - SY0-601 CompTIA Security+ 2.8
092. Symmetric and Asymmetric Cryptography - SY0-601 CompTIA Security+ 2.8
093. Hashing and Digital Signatures - SY0-601 CompTIA Security+ 2.8
094. Cryptographic Keys - SY0-601 CompTIA Security+ 2.8
095. Steganography - SY0-601 CompTIA Security+ 2.8
096. Quantum Computing - SY0-601 CompTIA Security+ 2.8
097. Stream and Block Ciphers - SY0-601 CompTIA Security+ 2.8
098. Blockchain Technology - SY0-601 CompTIA Security+ 2.8
099. Cryptography Use Cases - SY0-601 CompTIA Security+ 2.8
PART-02
101. Secure Protocols - SY0-601 CompTIA Security+ 3.1
102. Endpoint Protection - SY0-601 CompTIA Security+ 3.2
103. Boot Integrity - SY0-601 CompTIA Security+ 3.2
104. Database Security - SY0-601 CompTIA Security+ 3.2
105. Application Security - SY0-601 CompTIA Security+ 3.2
106. Application Hardening - SY0-601 CompTIA Security+ 3.2
SY0-601 CompTIA Security+ Course 2021 Video Training Online Course & PDF Guides
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.