CompTIA Linux+ (XK0-004)
CompTIA Security+ (SY0-601)
CompTIA Cloud Essentials+ (CLO-002)
CompTIA Cloud+ (CVO-002)
CompTIA CV0-001: CompTIA Cloud +
CompTIA Cloud Overview
Unix Administration Basics
CompTIA MB0-001: Mobility+
CompTIA FC0-U61: IT Fundamentals
CompTIA LX0-101 & LX0-102: CompTIA Linux+
CompTIA Advanced Security Practitioner (CASP) CAS-003
CompTIA PenTest+ (PT0-001)
CompTIA A+ 220-1001 (Core 1)
CompTIA CySA+ (Cybersecurity Analyst+) CS0-002
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Network+ N10-007
CompTIA Network+ N10-008 (New)
CompTIA Linux+ (XK0-004)
CompTIA Linux+ (XK0-004)
- Module 1: Intro & Performing Basic Linux Tasks
- Module 2: Managing Users and Groups
- Module 3: Managing Permissions and Ownership
- Module 4: Managing Storage
- Module 5: Managing Files and Directories
- Module 6: Managing Kernel Modules
- Module 7: Managing the Linux Boot Process
- Module 8: Managing System Components
- Module 9: Managing Devices
- Module 10: Managing Networking
- Module 11: Managing Packages and Software
- Module 12: Securing Linux Systems
- Module 13: Working with Bash Scripts
- Module 14: Automating Tasks
- Module 15: Installing Linux
Course Information:
- Total Course Video Hours: 24 Hrs 34 Min
- Total Videos: 68
CompTIA Security+ (SY0-601)
CompTIA Security+ (SY0-601)
- Module 1: Information Security Roles Security Control and Framework Types
- Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
- Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
- Module 4: Social Engineering, Indicators of Malware Attacks
- Module 5: Cryptography
- Module 6: Certificates and PKI
- Module 7: Authentication
- Module 8: Identity and Accounts, Authorization, Personnel Polices
- Module 9: Network Design and Hardware (Part 1)
- Module 10: Network Hardware (Part 2)
- Module 11: Network Protocols
- Module 12: Endpoint Security
- Module 13: Mobile Devices
- Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
- Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
- Module 16: Privacy and Data Protection
- Module 17: Incident Response
- Module 18: Forensic
- Module 19: Risk Management and Business Impact Analysis
- Module 20: Redundancy and Backup Strategies
- Module 21: Physical Security
- Module 22: Afterword
Course Information:
- Total Course Video Hours: 14 Hrs 4 Min
- Total Videos: 91
CompTIA Cloud Essentials+ (CLO-002)
CompTIA Cloud Essentials+ (CLO-002)
- Module 1: Understanding Cloud Computing Concepts
- Module 2: Applying Cloud Business Principles
- Module 3: Advising a Cloud Design and Migration
- Module 4: Operating in the Cloud
- Module 5: Managing Cloud Governance
- Module 6: Exam Information, Review and Summary
- Module 7: Activities
- Module 8: Tools and Resources
Course Information:
- Total Course Video Hours: 10 Hrs 6 Min
- Total Videos: 70
CompTIA Cloud+ (CVO-002)
CompTIA Cloud+ (CVO-002)
- Module 1: Preparing to Deploy Cloud Solutions
- Module 2: Deploying a Pilot Project
- Module 3: Testing Pilot Project Deployments
- Module 4: Designing a Secure and Compliant Cloud Infrastructure
- Module 5: Designing and Implementing a Secure Cloud Environment
- Module 6: Planning Identity and Access Management for Cloud Deployments
- Module 7: Determining CPU and Memory Sizing for Cloud Deployments
- Module 8: Determining Storage Requirements for Cloud Deployments
- Module 9: Analyzing Workload Characteristics to Ensure Successful Migration
- Module 10: Maintaining Cloud Systems
- Module 11: Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures
- Module 12: Analyzing Cloud Systems for Performance
- Module 13: Analyzing Cloud Systems for Anomalies and Growth Forecasting
- Module 14: Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues
- Module 15: Troubleshooting Connectivity Issues
- Module 16: Troubleshooting Security Issues
- Module 17: Exam Information, Review, and Summary
- Module 18: Activities
Course Information:
- Total Course Video Hours: 13 Hrs 55 Min
- Total Videos: 151
CompTIA CV0-001: CompTIA Cloud +
CompTIA CV0-001: CompTIA Cloud +
- Module 1
- Module 2
- Module 3
- Module 4
- Module 5
- Module 6
- Module 7
Course Information:
- Total Course Video Hours: 9 Hrs 52 Min
- Total Videos: 53
CompTIA Cloud Overview
CompTIA Cloud Overview
- Domain 1 – Characteristics of Cloud Services from a Business Perspect
- Domain 2 – Cloud Computing and Business Value
- Domain 3 – Technical Perspectives/Cloud Types
- Domain 4 – Steps to Successful Adoption of Cloud
- Domain 5 – Impact and Changes of Cloud Computing on IT Service Management
- Domain 6 – Risks and Consequences of Cloud Computing
Course Information:
- Total Course Video Hours: 5 Hrs 28 Min
- Total Videos: 42
Unix Administration Basics
Unix Administration Basics
- Module 1: Virtual Box
- Module 2: Basic Commands
- Module 3: Special Characters
- Module 4: File Editing
- Module 5: File System Structure
- Module 6: Finding Files
- Module 7: Shell Special Characters
- Module 8: Regular Expressions
- Module 9: Process Management
- Module 10: Job Scheduling
- Module 11: Customizing Your Account
- Module 12: Unix Printing
- Module 13: Networking
- Module 14: X Windows
- Module 15: Back Up And Compression
- Module 16: Text Utility
- Module 17: Shell Scripting
- Module 18: System Administration Basics
Course Information:
- Total Course Video Hours: 13 Hrs 59 Min
- Total Videos: 106
CompTIA MB0-001: Mobility+
CompTIA MB0-001: Mobility+
- Module 1: Over-The-Air Technologies
- Module 2: Network Infrastructure
- Module 3: Mobile Device Manager
- Module 4: Security
- Module 5: Troubleshooting
Course Information:
- Total Course Video Hours: 7 Hrs 41 Min
- Total Videos: 46
CompTIA FC0-U61: IT Fundamentals
CompTIA FC0-U61: IT Fundamentals
- Module 1: Instructions
- Module 2: Managing Software
- Module 3: Configuring Hardware
- Module 4: Managing Files
- Module 5: Booting Files
- Module 6: X
- Module 7: Admin
- Module 8: Basic Networking
- Module 9: Scripts
- Module 10: Security
Course Information:
- Total Course Video Hours: 9 Hrs 5 Min
Total Videos: 51
CompTIA LX0-101 & LX0-102: CompTIA Linux+
CompTIA LX0-101 & LX0-102: CompTIA Linux+
- Module 1 – IT Concepts and Terminology
- Module 2 – Infrastructure
- Module 3 – Applications and Software
- Module 4 – Software Development
- Module 5 – Database Fundamentals
- Module 6 – Security
Course Information:
- Total Course Video Hours: 9 Hrs 5 Min
- Total Videos: 51
CompTIA Advanced Security Practitioner (CASP) CAS-003
CompTIA Advanced Security Practitioner (CASP) CAS-003
- Module 1 – Risk Management
- Module 2 – Enterprise Security Architecture
- Module 3 – Enterprise Security Operations
- Module 4 – Technical Integration of Enterprise Security
- Module 5 – Research, Development and Collaboration
Course Information:
- Total Course Video Hours: 28 Hrs 22 Min
- Total Videos: 89
CompTIA PenTest+ (PT0-001)
CompTIA PenTest+ (PT0-001)
- Module 1 – The Pen Test Engagement
- Module 2 – Passive Reconnaissance
- Module 3 – Active Reconnaissance
- Module 4 – Physical Security
- Module 5 – Social Engineering
- Module 6 – Vulnerability Scan Analysis
- Module 7 – Password Cracking
- Module 8 – Penetrating Wired Networks
- Module 9 – Penetrating Wireless Networks
- Module 10 – Windows Exploits
- Module 11 – Linux Exploits
- Module 12 – Mobile Devices
- Module 13 – Specialized Systems
- Module 14 – Scripts
- Module 15 – Application Testing
- Module 16 – Web App Exploits
- Module 17 – Lateral Movement
- Module 18 – Persistence
- Module 19 – Cover Your Tracks
- Module 20 – The Report
- Module 21 – Post Engagement Cleanup
Course Information:
- Total Course Video Hours: 34 Hrs 22 Min
- Total Videos: 215
CompTIA A+ 220-1001 (Core 1)
CompTIA A+ 220-1001 (Core 1)
- Module 1 – Mobile Devices
- Module 2 – Networking
- Module 3 – Hardware
- Module 4 – Virtualization and Cloud Computing
- Module 5 – Hardware and Network Troubleshooting
Course Information:
- Total Course Video Hours: 20 Hrs 40 Min
- Total Videos: 61
CompTIA CySA+ (Cybersecurity Analyst+) CS0-002
CompTIA CySA+ (Cybersecurity Analyst+) CS0-002
- Module 1: Threat and Vulnerability Management
- Module 2: Software and Systems Security
- Module 3: Security Operations and Monitoring
- Module 4: Incident Response
- Module 5: Compliance and Assessment
- Module 6: Afterword
Course Information:
- Total Course Video Hours: 14 Hrs 34 Min
- Total Videos: 36
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Cybersecurity Analyst (CySA+)
- Module 1: Threat Management
- Module 2: Vulnerability Management
- Module 3: Cyber Incident Response
- Module 4: Security Architecture and Tool Sets
Course Information:
- Total Course Video Hours: 17 Hrs 55 Min
- Total Videos: 67
CompTIA Network+ N10-007
CompTIA Network+ N10-007
- Module 1 – Networking Concepts
- Module 2 – Infrastructure
- Module 3 – Network Operation
- Module 4 – Network Security
- Module 5 – Network Troubleshooting and Tools
Course Information:
- Total Course Video Hours: 33 Hrs 10 Min
- Total Videos: 162
CompTIA Network+ N10-008 (New)
CompTIA Network+ N10-008 (New)
- Module 1 – Networking Fundamentals
- Module 2 – Cables and Connectors
- Module 3 – Internet Protocol (IP)
- Module 4 – Layer 7 Protocols
- Module 5 – Network Services
- Module 6 – Networking Devices
- Module 7 – Networked Devices
- Module 8 – Routing and Bandwidth Management
- Module 9 – Ethernet Switching
- Module 10 – Wireless Technologies
- Module 11 – Network Performance
- Module 12 – High Availability and Disaster Recovery
- Module 13 – Organizational Documents
- Module 14 – Network Security
- Module 15 – Network Troubleshooting
Course Information:
- Total Course Video Hours: 46 Hrs 25 Min
- Total Videos: 189
- 1.0 Introduction to the Course
- 1.1 Fundamental Security Concepts
- 1.2 Zero Trust
- 1.3 Deception and Disruption
- 1.3.1 ACTIVITY - Testing a Honeypot
- 1.4 Security Controls
- 1.5 Change Management and Security
- 1.6 Cryptography Basics
- 1.6.1 ACTIVITY - Examining Symmetric Encryption
- 1.7 Asymmetric Encryption
- 1.7.1 ACTIVITY - Exploring Asymmetric Encryption
- 1.8 Hashing
- 1.8.1 ACTIVITY - Verifying Integrity with Hashing
- 1.9 Digital Certificates
- 1.10 Public Key Infrastructure
- 1.11 Data and Keys
- 1.12 Crypto Implementations
- 1.13 Blockchain
- 1.14 Non-Cryptographic Data Protection
- 2.1 Threat Actors and Motivations
- 2.2 Threat Vectors
- 2.2.1 ACTIVITY - O.MG Cable Baiting
- 2.3 Social Engineering
- 2.4 Operating System Vulnerabilities and Attacks
- 2.5 Application Vulnerabilities and Attacks
- 2.5.1 ACTIVITY - Performing a Buffer Overflow
- 2.6 Web-based Vulnerabilities and Attacks
- 2.6.1 ACTIVITY - Abusing Unsanitized Input
- 2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection
- 2.6.3 ACTIVITY - Swiping a Token with XSS
- 2.7 Other Vulnerabilities
- 2.8 Common Malicious Activity Indicators
- 2.9 Insider Threat Indicators
- 2.10 Social Engineering Indicators
- 2.10.1 ACTIVITY - Capturing Credentials through Social Engineering
- 2.11 Malware Activity Indicators
- 2.12 Operating System Attack Indicators
- 2.13 Application Attack Indicators
- 2.13.1 ACTIVITY - Recognizing Directory Traversal
- 2.14 Physical Attack Indicators
- 2.14.1 ACTIVITY - Quickly Cloning an RFID Badge
- 2.15 Network Attack Indicators
- 2.15.1 ACTIVITY - Crashing a Target with DoS
- 2.16 Cryptographic Attack Indicators
- 2.17 Password Attack Indicators
- 2.17.1 ACTIVITY - Password Cracking
- 2.18 Network Segmentation
- 2.19 Access Control
- 2.20 Enterprise Device Hardening
- 3.1 Network Segmentation
- 3.1.1 ACTIVITY - Segementing a Network
- 3.2 High Availability
- 3.3 Virtualization
- 3.3.1 ACTIVITY - Deploying Docker Containers
- 3.4 Cloud
- 3.5 Serverless Computing
- 3.6 IoT
- 3.7 ICS SCADA
- 3.7.1 ACTIVITY - Operating a SCADA System
- 3.8 RTOS and Embedded Systems
- 3.9 Reducing the Attack Surface
- 3.10 Firewalls
- 3.11 IDS IPS.mp4
- 3.12 Secure Communications - Access
- 3.13 Port Security
- 3.14 SD-WAN and SASE
- 3.15 Data Classifications
- 3.16 Protecting Data Types
- 3.17 Data Considerations
- 3.18 Redundancy
- 3.19 Alternate Sites
- 3.20 Multiple Platforms
- 3.21 Business Continuity
- 4.1 Secure Baselines
- 4.2 Attack Surface Reduction
- 4.3 Wireless Installation
- 4.4 Wireless Security Settings
- 4.5 Mobile Solutions
- 4.5.1 ACTIVITY - Pwning a Mobile Device
- 4.6 Application Security Management
- 4.7 Asset Management
- 4.8 Vulnerability Management
- 4.9 Monitoring Activities
- 4.10 Monitoring Tools
- 4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities
- 4.11 Firewall Configuration
- 4.11.1 ACTIVITY - Configuring Firewall Rules
- 4.12 Intrusion Detection Configuration
- 4.13 Web Traffic Filtering
- 4.14 Operating System Policy
- 4.14.1 ACTIVITY - Examining Windows Group Policy
- 4.15 Network Service Security
- 4.16 Data Loss Protection
- 4.16.1 ACTIVITY - Checking File Integrity
- 4.17 Network Access Control
- 4.17.1 ACTIVITY - Require Multifactor Authentication
- 4.18 Identity Management
- 4.19 Access Management
- 4.19.1 ACTIVITY - Implementing Access Control
- 4.20 Security Automation
- 4.21 Incident Response
- 4.22 Digital Forensics
- 5.1 Elements of Effective Security Governance
- 5.2 Elements of the Risk Management Process
- 5.3 Third Party Risk Assessment and Management
- 5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure
- 5.4 Effective Security Compliance
- 5.5 Audits and Assessments
- 5.5.1 ACTIVITY - Conducting OSINT
- 5.5.2 ACTIVITY - Performing Active Reconnaissance
- 5.6 Security Awareness Practices
- 5.7 Course Outro
- 1.1 Course Introduction
- 1.2 Instructor Introduction
- 1.3 What is CySA
- 1.4 Exam Objectives
- 1.5 Cybersecurity Pathway
- 1.6 DoD Baseline Certification
- 2.1 Domain 1 - Security Operations Overview
- 2.2 System and Network Architecture Concepts in Security Operations
- 2.3 Log Files
- 2.4 Operating Systems
- 2.5 Infrastructure Concepts
- 2.6 Network Architecture
- 2.7 Software Defined Networking
- 2.8 Whiteboard Discussion - Network Architectures
- 2.9 Identity and Access Management IAM Basics
- 2.10 Demonstration - IAM
- 2.11 Encryption
- 2.12 Sensitive Data
- 2.13 1.2 Analyze Indicators of Potentially Malicious Activity
- 2.14 Network Attack
- 2.15 Host Attacks
- 2.16 Application Related Attacks
- 2.17 Social Attacks
- 2.18 Tools or Techniques to Determine Malicious Activity Overview
- 2.19 Tools and Toolsets For Identifying Malicious Activity
- 2.20 Common Techniques
- 2.21 Programming Concerns
- 2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
- 2.23 Threat Actors
- 2.24 Tactics, Techniques and Procedures
- 2.25 Confidence Levels IOC
- 2.26 Collection Sources
- 2.27 Threat Intelligence
- 2.28 Cyber Response Teams
- 2.29 Security Operations
- 2.30 Standardized Processes and Operations
- 2.31 Security Operations Tools and Toolsets
- 2.32 Module 2 Review
- 3.1 Domain 2 - Vulnerability Management Overview
- 3.2 Vulnerability Discovery and Scanning
- 3.3 Asset Discovery and Scanning
- 3.4 Industry Frameworks
- 3.5 Mitigating Attacks
- 3.6 CVSS and CVE
- 3.7 Common Vulnerability Scoring System (CVSS) interpretation
- 3.8 CVE Databases
- 3.9 Cross Site Scripting (XSS)
- 3.10 Vulnerability Response, Handling, and Management
- 3.11 Control Types (Defense in Depth, Zero Trust)
- 3.12 Patching and Configurations
- 3.13 Attack Surface Management
- 3.14 Risk Management Principles
- 3.15 Threat Modeling
- 3.16 Threat Models
- 3.17 Secure Coding and Development (SDLC)
- 3.18 Module 3 Review
- 4.1 Domain 3 - Incident Response and Management Overview
- 4.2 Attack Methodology Frameworks
- 4.3 Cyber Kill Chain
- 4.4 Frameworks to Know
- 4.5 Incident Response and Post Response
- 4.6 Detection and Analysis
- 4.7 Post-Incident Activities
- 4.8 Containment, Eradication, and Recovery
- 4.9 Module 4 Review
- 5.1 Domain 4 - Reporting and Communication Overview
- 5.2 Reporting Vulnerabilities Overview
- 5.2.1 Vulnerability Reporting
- 5.3 Compliance Reports
- 5.4 Inhibitors to Remediation
- 5.5 Metrics and KPIs
- 5.6 Incident Response Reporting and Communications Overview
- 5.7 Incident Declaration
- 5.8 Communication with Stakeholders
- 5.9 Root Cause Analysis
- 5.10 Lessons Learned and Incident Closure
- 5.11 Module 5 Review
- 6.1 Course Closeout Overview
- 6.2 Practice Questions
- 6.3 Exam Process
- 6.4 Continuing Education
- 6.5 Course Closeout
• Compare and contrast common operating system types and their purposes
• Compare and contrast features of Microsoft Windows versions
• Summarize general OS installation considerations and upgrade methods
• Given a scenario, use appropriate Microsoft command line tools
• Given a scenario, use Microsoft operating system features and tools
• Given a scenario, use Microsoft Windows Control Panel utilities
• Summarize application installation and configuration concepts
• Given a scenario, configure Microsoft Windows networking on a client/desktop
• Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating
systems
• Summarize the importance of physical security measures
• Explain logical security concepts
• Compare and contrast wireless security protocols and authentication methods
• Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• Compare and contrast social engineering, threats, and vulnerabilities
• Compare and contrast the differences of basic Microsoft Windows OS security settings
• Given a scenario, implement security best practices to secure a workstation
• Given a scenario, implement methods for securing mobile devices
• Given a scenario, implement appropriate data destruction and disposal methods
• Given a scenario, configure security on SOHO wireless and wired networks
•Given a scenario, troubleshoot Microsoft Windows OS problems
• Given a scenario, troubleshoot and resolve PC security issues
• Given a scenario, use best practice procedures for malware removal
• Given a scenario, troubleshoot mobile OS and application issues
• Given a scenario, troubleshoot mobile OS and application security issues
•Compare and contrast best practices associated with types of documentation
• Given a scenario, implement basic change management best practices
• Given a scenario, implement basic disaster prevention and recovery methods
• Explain common safety procedures • Explain environmental impacts and appropriate controls
• Explain the processes for addressing prohibited content/activity, and privacy, licensing, and
policy concepts
• Given a scenario, use proper communication techniques and professionalism
• Identify the basics of scripting • Given a scenario, use remote access technologies
- Total Course Video Hours: 14 Hrs 52 Min
- Total Videos: 60
- Module 1 Workbook
- 0.1 Intro to A+ Core1 Instructor
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Devices Part 1
- 1.1 Mobile Devices Part 2
- 1.1 Mobile Devices Part 3
- 1.2 Installing Components in Laptop
- 1.3 Laptop Features Part 1
- 1.3 Laptop Features Part 2
- 1.4 Compare and Contrast Types of Mobile Devices
- 1.5 Accessories and Ports of Other Mobile Devices Part 1
- 1.5 Accessories and Ports of Other Mobile Devices Part 2
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
- 1.7 Use Methods to Perform Mobile Device Synchronization
- 1.8 Laptop Disassemble and Assemble
- Module 2 Workbook
- 2.1 Networking Part 1
- 2.1 Networking Part 2
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
- 2.3 Setting Up a Wireless Router
- 2.4 Compare and Contrast Wireless Networking Protocols
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
- 2.6 Explain Common Network Configuration Concepts Part 1
- 2.6 Explain Common Network Configuration Concepts Part 2
- 2.7 Compare and Contrast Internet Connection Types Network Types and Features
- 2.8 Given a Scenario Using Appropriate Networking Tools
- Module 3 Workbook
- 3.1 Hardware Part 1
- 3.1 Hardware Part 2
- 3.1 Hardware Part 3
- 3.2 Identify Common Connector Types
- 3.3 Scenario Install RAM Types
- 3.4 Scenario Select Install and Configure Storage Devices
- 3.4 Scenario Select Install and Configure Storage Devices Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
- 3.5 Install Disassemble and Assemble a Desktop
- 3.6 Purposes for Peripherals and Types
- 3.7 Summarize Power Supplies
- 3.8 Scenario Select and Configure Appropriate Components for Customers PCs
- 3.9 Scenario Installand Configure Common Devices
- 3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
- 3.11 Scenario Install and Maintain Various Print Technologies Part 1
- 3.11 Scenario Install and Maintain Various Print Technologies Part 2
- 3.11 Scenario Install and Maintain Various Print Technologies Part 3
- Module 4 Workbook
- 4.1 Virtualization Part 1
- 4.1 Virtualization Part 2
- 4.2 Scenario Setup and Configure Client-side Virtualization
- Module 5 Workbook
- 5.1 Hardware and Networking Troubleshooting
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
- 5.3 Troubleshoot Hard Drives and RAID Arrays
- 5.4 Troubleshoot Video and Display Issues
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
- 5.6 Troubleshoot Printers
- 5.7 Troubleshoot Common Wired and Wireless Network Problems
- Total Course Video Hours: 20 Hrs 40 Min
- Total Videos: 61
- Module 1 Notes
- Intro CASP
- CASP Introduction
- Mod 1.1 Exploring Cloud Services Act
- Mod 1.1 Acquisition Merger Demerger
- Mod 1.1 Acquisition Merger Demerger Part2
- Mod 1.2 Compare and Contrast
- Mod 1.3 Given Scenario Execute Risk
- Mod 1.3 Given Scenario Execute Risk Part2
- Mod 1.3 Continuing Terminology IT Governance
- Mod 1.4 Analyze Security Solution Metrics and Attributes
- Mod 1.4 Analyze Risk
- Mod 1.4 Trend Analysis Act
- Module 2 Notes
- Mod 2 Enterprise Security Architecture
- Mod 2.1 Network Device Security Act
- Mod 2.1 Application and Protocol
- Mod 2.1 Advanced Network Security Act
- Mod 2.1 Complex Network Security Solution
- Mod 2.1 Implementing VLANs Switchport Sec Act
- Mod 2.1 Implementing VLANs Switchport Sec Act Part2
- Mod 2.1 Distributed Denial of Service
- Mod 2.1 Exploring DoS Attacks Act
- Mod 2.1 Security Zones
- Mod 2.1 Network Access Control
- Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
- Mod 2.2 Analyze a Scenario Integrate Security
- Mod 2.2 Configuring Windows Firewall Act
- Mod 2.2 Log Monitoring and Auditing
- Mod 2.2 Group Policy Act
- Mod 2.2 Patch Management
- Mod 2.2 Management Interface
- Mod 2.2 Measured Launch
- Mod 2.3 Analyze a Scenario to Integrate Security Controls
- Mod 2.3 Security Implications Privacy
- Mod 2.3 Baseband
- Mod 2.4 Given Software Vulnerabilty Scenarios
- Mod 2.4 SQL Injection Act
- Mod 2.4 Improper Error and Exception Handling
- Mod 2.4 Buffer Overflows Act
- Mod 2.4 Memory Leaks
- Mod 2.4 Researching Vulnerabilities Exploits Act
- Module 3 Notes
- Mod 3 Enterprise Security Operations
- Mod 3 Runtime Debugging
- Mod 3.1 Fingerprinting an OS Services Act
- Mod 3.1 Code Review
- Mod 3.1 Conducting OSINT Act
- Mod 3.1 Types
- Mod 3.1 Conducting a Vulnerability Assessment Act
- Mod 3.2 Analyze a Scenario Output
- Mod 3.2 Network Sniffing Act
- Mod 3.2 Security Content Automation
- Mod 3.2 Using a SCAP Scanner Act
- Mod 3.2 Network Enumerator
- Mod 3.2 Password Cracking Act
- Mod 3.2 Host Vulnerability Scanner
- Mod 3.2 Using Command Line Tools Act
- Mod 3.2 OpenSSL
- Mod 3.2 Scanning for Heartbleed Act
- Mod 3.2 Local Exploitation Tools
- Mod 3.2 Verifying File Integrity with SFC Act
- Mod 3.2 Log Analysis Tools
- Mod 3.3 Given Scenario Implement Incident
- Mod 3.3 Facilitate Incident Detection Response
- Mod 3.3 Using Incident Response Support Tools Act
- Mod 3.3 Severity of Incident Detection Breach
- Module 4 Notes
- Mod 4 Technical Integration of Enterprise
- Mod 4 Technical Integration of Enterprise Part2
- Mod 4.1 DataSecurity Considerations
- Mod 4.1 Examing Network Diagrams Act
- Mod 4.1 Security and Privacy Considerations of Storage integration
- Mod 4.1 Exploring Directory Services and DNS Act
- Mod 4.2 Given Scenario Integrate Cloud and Virtualization
- Mod 4.2 Taking Another Look at Cloud Services Act
- Mod 4.2 Security Advantages and Disadvanatges of Virtualization
- Mod 4.2 Using Virtualization Act
- Mod 4.2 Cloud Augmented Security
- Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
- Mod 4.4 Given Scenario Cryptographic
- Mod 4.4 Cryptographic Part2
- Mod 4.4 Mobile Device Encryption
- Mod 4.4 Cryptography Act
- Mod 4.5 Select the Appropriate Control
- Mod 4.5 Phising Act
- Mod 4.5 Telephony VoIP Integration
- Module 5 Notes
- Mod 5 Research Methods to Determine Industry Trends
- Mod 5.1 Practicing Threat Intelligence Act
- Mod 5.2 Scenario Implememt Security Activities Across
- Mod 5.2 Static Testing
- Mod 5.3 Explain the Importance of Interaction
- CASP Conclusion
- Total Course Video Hours: 28 Hrs 22 Min
- Total Videos: 89
- Overview
- History
- The Three Delivery Model Architecture
- SaaS
- Justification For Cloud
- Confidentiality And Availability
- Concepts From NIST
- On Demand Self-Service
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Reasons For Cloud-Agility-Part1
- Reasons For Cloud-Agility-Part2
- New Business Opportunities
- Technical Perspectives Cloud Types
- Sources
- Security Risk
- Technical Risk And Solutions
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
- Information Security Management System-Part1
- Information Security Management System-Part2
- Information Management And Security-Part1
- Information Management And Security-Part2
- The Data Security LifeCycle
- Governance
- Data Loss Prevention-Part1
- Data Loss Prevention-Part2
- Protecting Data
- Risk Management-Part1
- Risk Management-Part2
- Risk Management-Part3
- Risk Management-Part4
- Risk Management-Part5
- Recommendations-Part1
- Recommendations-Part2
- IT Governance
- Audit
- Recommendations For Audit-Part1
- Recommendations For Audit-Part2
- Total Course Video Hours: 5 Hrs 28 Min
- Total Videos: 42
- Total Course Video Hours: 13 Hrs 55 Min
- Total Videos: 151
- Introduction
- Models-Part 1
- Models-Part 2
- Service And Delivery Models
- Terms And Characteristics
- Objects Storage Concepts
- Virtualization
- Install Configure Manage VM And Devices
- Backups
- Virtual Disks
- Virtual Switches
- Virtual Resource Migration
- Benefits Of Virtualization In A Cloud Environment
- Compare And Contrast Virtua lEnvironment
- Infrastructure
- Different Access Protocols
- Explain Storage Configuration
- File Systems Types
- Executing Storage Provisioning
- Network Share Demo
- Implement Appropriate Network Configurations
- Importance Of Network Optimization
- Troubleshoot Basic Network Configuration-Part 1
- Troubleshoot Basic Network Configuration-Part 2
- Troubleshoot Commands-Part 1
- Troubleshoot Commands-Part 2
- Troubleshoot Commands-Part 3
- Explain Common Network Protocols
- Common Hardware Resources
- Resource Management-Part 1
- Resource Management-Part 2
- Establishing Baselines And Thresholds
- Appropriately Allocate Physical Host Resources-Part 1
- Appropriately Allocate Physical Host Resources-Part 2
- Appropriately Allocate Virtual Guest Resources-Part 1
- Appropriately Allocate Virtual Guest Resources-Part 2
- Use Appropriate Tools For Remote Access
- Security-Part 1
- Security-Part 2
- Storage Security Concepts And Methods
- Different Encryption Technologies
- Identify Access Control Methods
- Systems Management-Part 1
- Systems Management-Part 2
- Diagnose Remediate And Optimize-Part 1
- Diagnose Remediate And Optimize-Part 2
- Common Performance Concepts-Part 1
- Common Performance Concepts-Part 2
- Testing Techniques
- Business Continuity In Cloud-Part 1
- Business Continuity In Cloud-Part 2
- Solutions To Meet Availability Requirements
- Conclusion
- Total Course Video Hours: 9 Hrs 52 Min
- Total Videos: 53
- Introduction
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 1
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 2
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 3
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 4
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 5
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 6
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 7
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 8
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 9
- Given a scenario, analyze the results of a network reconnaissance Part 1
- Given a scenario, analyze the results of a network reconnaissance Part 2
- Given a scenario, analyze the results of a network reconnaissance Part 3
- Given a scenario, analyze the results of a network reconnaissance Part 4
- Given a scenario, analyze the results of a network reconnaissance Part 5
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
- Explain the purpose of practices used to secure a corporate environment Part 1
- Explain the purpose of practices used to secure a corporate environment Part 2
- Explain the purpose of practices used to secure a corporate environment Part 3
- Explain the purpose of practices used to secure a corporate environment Part 4
- Given a scenario, implement an information security vulnerability management process Part 1
- Given a scenario, implement an information security vulnerability management process Part 2
- Given a scenario, implement an information security vulnerability management process Part 3
- Given a scenario, implement an information security vulnerability management process Part 4
- Given a scenario, implement an information security vulnerability management process Part 5
- Given a scenario, implement an information security vulnerability management process Part 6
- Given a scenario, implement an information security vulnerability management process Part 7
- Given a scenario, analyze the output resulting from a vulnerability scan Part 1
- Given a scenario, analyze the output resulting from a vulnerability scan Part 2
- Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
- Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
- Compare and contrast common vulnerabilities found in the following targets within an organization Part 3
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 1
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 2
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 3
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 1
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 2
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 3
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 4
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 5
- Explain the importance of communications during the incident response process
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 1
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 2
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 3
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 4
- Summarize the incident recovery and post-incident response process Part 1
- Summarize the incident recovery and post-incident response process Part 2
- Summarize the incident recovery and post-incident response process Part 3
- Summarize the incident recovery and post-incident response process Part 4
- Explain the relationship between frameworks, common policies, controls, and procedures Part 1
- Explain the relationship between frameworks, common policies, controls, and procedures Part 2
- Explain the relationship between frameworks, common policies, controls, and procedures Part 3
- Explain the relationship between frameworks, common policies, controls, and procedures Part 4
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 1
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 2
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 3
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 4
- Given a scenario, review security architecture and make recommendations to implement compensating controls Part 1
- Given a scenario, review security architecture and make recommendations to implement compensating controls Part 2
- Given a scenario, review security architecture and make recommendations to implement compensating controls Part 3
- Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
- Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
- Overview
- Conclusion
- Total Course Video Hours: 17 Hrs 55 Min
- Total Videos: 67
- Instructor Intro
- About the Exam
- Test Taking Tips and Techniques
- Explain the importance of threat data and intelligence
- Given a scenario, utilize threat intelligence to support organizational security
- Given a scenario, perform vulnerability management activities Pt 1
- Given a scenario, perform vulnerability management activities Pt 2
- Given a scenario, analyze the output from common vulnerability assessment tools
- Explain the threats and vulnerabilities associated with specialized technology
- Explain the threats and vulnerabilities associated with operating in the Cloud
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
- Outline
- Given a scenario, apply security solutions for infrastructure management Pt 1
- Given a scenario, apply security solutions for infrastructure management Pt 2
- Flashcards
- Given a scenario, apply security solutions for infrastructure management Pt 3
- Explain software assurance best practices
- Scatter
- Explain hardware assurance best practices
- Learn
- Speller
- Workbook
- Given a scenario, analyze data as part of security monitoring activities Pt 1
- Given a scenario, analyze data as part of security monitoring activities Pt 2
- Given a scenario, analyze data as part of security monitoring activities Pt 3
- Given a scenario, implement configuration changes to existing controls to improve security Pt 1
- Given a scenario, implement configuration changes to existing controls to improve security Pt 2
- Explain the importance of proactive threat hunting
- Compare and contrast automation concepts and technologies
- Explain the importance of the incident response process
- Given a scenario, apply the appropriate the incident response procedure
- Given an incident, analyze potential indicators of compromise
- Given a scenario, utilize basic digital forensic techniques
- Understand the importance of data privacy and protection
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
- Explain the importance of frameworks, policies, procedures, and controls Pt 1
- Explain the importance of frameworks, policies, procedures, and controls Pt 2
- Recap
- Review Questions
- Before the Exam
- Total Course Video Hours: 14 Hrs 34 Min
- Total Videos: 36
- 0.1 Instructor Intro
- 1.1 Compare and Contrast Notational Systems
- 1.1 Compare and Contrast Notational Systems Demo
- 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
- 1.3 Illustrate the Basics of Computing and Processing
- 1.4 Explain the Value of Data and Information
- 1.5 Compare and Contrast Common Units of Measures
- 1.5 Compare and Contrast Common Units of Measures Demo
- 1.6 Explain the Troubleshooting Methodology
- 2.1 Classify Common Types of Input-Output Device Interfaces
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
- 2.3 Explain the Purpose of Common Internal Computing Components
- 2.4 Compare & Contrast Common Internet Service Types-
- 2.5 Compare & Contrast Storage Types
- 2.6 Compare & Contrast Common Computing Devices & Their Purposes
- 2.7 Explain Basic Networking Concepts
- 2.7 Explain Basic Networking Concepts Demo
- 2.7 Explain Basic Networking Concepts Part 2
- 2.7 Explain Basic Networking Concepts Part 3
- 2.7 Explain Basic Networking Concepts Part 4
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
- 3.1 Explain the Purpose of Operating Systems
- 3.1 Explain the Purpose of Operating Systems Demo
- 3.2 Compare & Contrast Components of an Operating System
- 3.2 Compare & Contrast Components of an Operating System Demo
- 3.3 Explain the Purpose & Proper Use of Software
- 3.4 Explain Methods of Application Architecture & Delivery Models
- 3.5 Given a Scenario Configure & Use Web Browsers
- 3.5 Given a Scenario Configure & Use Web Browsers FireFox
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
- 3.6 Compare & Contrast General Application Concepts & Uses
- 4.1 Compare & Contrast Programming Language Categories-
- 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
- 4.3 Explain the Purpose & Use of Programming Concepts-
- 4.3 HTML Demo
- 5.1 Explain Database Concepts and the Purpose of Databases
- 5.2 Compare and Contrast Various Database Structures
- 5.3 Summarize Methods Used to Interface with Databases
- 5.3 Summarize Methods Used to Interface with Databases Demo
- 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
- 6.2 Explain Methods to Secure Devices and Best Practices
- 6.3 Summarize Behavioral Security Concepts
- 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
- 6.5 Explain Password Best Practices
- 6.6 Explain Common Uses of Encryption
- 6.7 Explain Business Continuity Concepts
- 6.8 Takeaways-
- 6.9 ITF Fundamentals Conclusion
- Total Course Video Hours: 9 Hrs 5 Min Total Videos: 51
- Instructor Introduction
- Course Introduction
- Identify The Linux Design Philosophy
- Enter Shell Commands
- Shell Commands Activity
- Get Help with Linux
- Assume Superuser and Groups
- Create, Modify, and Delete Users
- Create, Modify, and Delete Groups
- Query Users and Groups
- Configure Account Profiles
- Modify File and Directory Permissions
- Modify File and Directory Ownership
- Configure Special Permissions and Attributes
- Troubleshoot Permissions Issues
- Create Partitions
- Manage Logical Volumes
- Mount File Systems
- Manage File Systems
- Navigate the Linux Directory Structure
- Troubleshoot Storage Issues
- Create and Edit Text Files
- Search for Files
- Perform Operations on Files and Directories
- Process Text Files
- Manipulate File Output
- Explore the Linux Kernel
- Install and Configure Kernel Modules
- Monitor Kernel Modules
- Configure Linux Boot Components
- Configure GRUB
- Configure Localization Options
- Configure GUIs
- Manage Services
- Troubleshoot Process Issues
- Troubleshoot CPU and Memory Issues
- Identify the Types of Linux
- Configure Devices
- Monitor Devices
- Troubleshoot Hardware Issues
- Identify TCP/IP Fundamentals
- Identify Linux Server Roles
- Connect to a Network
- Configure DHCP and DNS Client Services
- Configure Cloud and Virtualization Technologies
- Troubleshoot Networking Issues
- Identify Package Managers
- Manage RPM Packages with YUM
- Manage Debian Packages with APT
- Configure Repositories
- Acquire Software
- Build Software from Source Code
- Troubleshoot Software Dependency Issues
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
- Schedule Jobs
- Implement Version Control Using Git
- Identify Orchestration Concepts
- Prepare for Linux Installation
- Perform the Installation
- Total Course Video Hours: 24 Hrs 34 Min
- Total Videos: 68
- Introduction
- Introduction To Building Labs
- Things You Need To Do
- Install Demo Virtual Box
- Navigation
- Commands With LabDemo
- Internal And External Commands
- Overview Of Shell Commands Tricks
- Exploring Shell Configuration
- Stream Redirection
- Overview Of Processing Text Using Filters
- Overview File-Viewing Commands
- Overview Using Grep
- Sed Syntax And Summary
- Overview Of Exam Essentials
- Managing Software
- Managing Software
- Overview Using RPM
- RPM-Part 2
- Overview Using Cpio
- Overview Using Debian And Apt Cache
- Using Apt-get
- Debian Tools
- Managing Shared Libraries
- Overview Locating Library Files
- Foreground and Background Processes
- Managing Software Summary
- Configuring Hardware
- Configuring Devices
- Configuring USB
- Configuring Hard Disk
- Designing Hard Disk Layout
- Logical Volume Management
- Overview Using Fdisk
- Overview Common File System Types
- Creating Filesystem
- Overview Maintaining File System Health
- Configuring Hardware Summary
- Managing Files
- File Archiving Commands
- Managing Files Ownership
- Managing Disk Quotas
- Directories And Content
- Overview Tools For Locating Files
- Overview Of Exam Essentials
- Booting Linux And Editing Files
- Boot And Reboot
- Understanding The Boot Process
- Run Levels Process
- Managing Run Level Services
- Editing With Vi
- Booting Summary
- X Windows Systems
- X Configuration Options
- X Configuration Options-Part 2
- Untitled Media
- Configuring X Featuring Fonts
- Overview Managing GUI Logins
- Using X For Remote Access
- X Accessibility
- Addition Assistive Technologies
- Configuring Localization And Internationalization
- Querying And Setting Your Locale
- Configuring Printing-Part 1
- Configuring Printing-Part 2
- Using Web-Based CUPS Utilities
- Administering
- Directly Modifying Account Configuration
- Components Of Account
- Adding Groups
- Tuning User And System Environments
- Reviewing Log File Contents
- Maintaining System Time
- Admin Summary
- Basic Networking
- Network Addressing-Part 1
- Network Addressing-Part 2
- DNS Data Flow Zone And Resolution
- Network Ports
- Connections
- Testing Connectivity
- Wireshark Demo
- Basic Networking Summary
- Scripts E-mail And Databases
- Writing Scripts-Part 1
- Writing Scripts-Part 2
- Managing E-mail
- Managing Data With SQL
- Advantages Of Database
- Scripts Summary
- Security
- Configuring Xinetd
- Uninstalling Or Reconfiguring Servers
- Tools For Managing Passwords
- Configuring SSH
- SSH Keys
- Controlling SSH Access
- Using GPG
- Security Summary
- Total Course Video Hours: 9 Hrs 5 Min
- Total Videos: 51
- Introduction
- Over-The-Air-Technologies
- Wireless Technologies-Part 1
- Wireless Technologies-Part 2
- Radio Frequency
- RF Power Fun
- Antennas
- Issues With RF
- NON Wireless
- Governing Bodies And Regulations
- Network Foundations-Part 1
- Network Foundations-Part 2
- Network Foundations-Part 3
- Network Foundations-Part 4
- OSI Model Review
- Wireless Terms And Terminology-Part 1
- Wireless Terms And Terminology-Part 2
- Wireless Media And Communication
- Unified Wireless Architecture
- SSIDs And VLANs
- Mobile Device Management-Part 1
- Profiles And Polices-Part 1
- Profiles And Polices-Part 2
- Enterprise Mail And Messaging
- Wireless Site Survey-Part 1
- Wireless Site Survey-Part 2
- Wireless Site Survey-Part 3
- Wireless Site Survey-Part 4
- Wireless Device Management-Part 1
- Wireless Device Management-Part 2
- Mobile Device Security
- Network Security 101
- Security Protocols-Part 1
- Security Protocols-Part 2
- Security Protocols-Part 3
- EAP Overview
- Encryption Overview-Part 1
- Encryption Overview-Part 2
- Common Security Troubleshooting
- Wireless Risks-Part 1
- Wireless Risks-Part 2
- Other Risks
- Wireless Troubleshooting-Part 1
- Wireless Troubleshooting-Part 2
- Wireless Troubleshooting-Part 3
- Conclusion
- Total Course Video Hours: 7 Hrs 41 Min
- Total Videos: 46
- Module 1 Workbook
- Intro Network Plus N10 007
- Basic Networking
- Activity Basic Networking
- OSI Model
- Exploring the OSI Model- Act
- Protocol and Ports
- Activity Examining Protocols and Ports
- Connection-oriented vs. connectionless
- Activity Comparing TCP and UDP
- Internet Protocol (IP)
- Activity Examining the Lower Layer Protocols
- Layer 7 Remote Control Protocols
- Layer 7 File Transfer Protocols
- Layer 7 Messaging Protocols
- Activity Examining Messaging Protocols
- Layer 7 Web Traffic Protocols
- Layer 7 Streaming Media Protocols
- Layer 7 Infrastructure Management Protocols
- Switching
- Activity Creating Collision and Broadcast Domains
- Interface Properties and Segmentation
- Activity Creating a Basic Network Segment
- Switching prt 2
- Activity Switching
- Switching Loop Management
- Activity Managing Switching Loops
- VLANs
- Activity Creating VLANs
- routing
- Activity Examining ARP
- IP Addressing Basics
- Activity Configuring IP
- Routers
- Activity Setting Up a Router
- Routing Basics
- Activity Adding Static Routes
- VLAN Routing
- Activity Routing Between VLANs
- NAT/PAT
- Activity Configuring NAT/PAT
- Routing Protocols
- Activity Configuring a Routing Protocol
- Firewalls
- Activity Configuring Firewalls
- Advanced Switching and Routing Concepts
- Activity Exploring IPv6
- Performance Concepts
- IP Addressing
- Subnetting
- Activity Learning to Subnet
- Address Assignments
- Network Types and Topologies
- Wireless Topologies
- Network Types
- Technologies that Facilitate the Internet Of Things (IoT)
- Wireless Technologies
- 802.11 Standards
- Wi-Fi Frequencies
- Wi-Fi Antenna Concepts
- Bluetooth
- Cellular
- Activity Using an RF Spectrum Analyzer
- cloud concepts
- Activity Exploring Cloud Services
- Network Services
- Activity Setting up DNS
- DHCP Service
- Activity Setting Up DHCP
- NTP
- Module 2 Workbook
- Module 2 – Infrastructure
- Activity Testing a Fiber Optic Cable
- Plenum vs. PVC
- Activity Crimping on an RJ-45 Connector
- Transceivers
- Activity Terminating Cable to a 110 Block
- Copper Cable Standards
- Activity Creating a Crossover Cable
- Ethernet Deployment Standards
- Network Device Placement and Installation
- Repeater
- Router
- Modem
- Activity Setting up a WAP
- Firewall
- Media Converter
- Advanced Network Devices
- Wireless Controller
- Proxy Server
- Activity Configuring Proxy Settings
- VPN Concentrator
- Virtual Networking Components
- Network Storage Types
- WAN Technologies
- Transmission Mediums
- Activity Configuring WAN Links
- Termination
- Module 3 Workbook
- Network Operations Documentation
- Standard Operation Procedures
- Logical vs Physical Diagrams
- Rack Diagrams
- Change Management
- Wiring and Ports Locations
- IDF-MDF Documentation
- Labeling
- Using Documentation Act
- Continuity and Disaster
- MTTR Mean Time Repair
- Recovery
- Backing Up Your Data Act
- Event Management
- Metrics
- Scanning Monitoring Patching
- Testing the Network Act
- HTTPS-Management
- Out-of-Band Management
- RDP
- Remote Access Methods
- Remote File Access
- Making Remote Connections Act
- SSH
- VNC
- Policies and Best Practices
- Creating Policies and Procedures Act
- Module 4 Workbook
- Physical Security Devices
- Examining Security Devices Act
- Authentication and Access
- Access Controls Methods Act
- Multifactor Authentication
- Basic Wireless Network Security
- Demonstrating the Need for Wireless Act
- Common Network Attacks
- Conducting a Phishing Campaign Act
- Network Device Hardening
- Supporting Secure Authentication Encryption Act
- Updating Firmware
- Explain Common Mitigation Techniques
- Implementing a Honey Pot Act
- Module 5 Workbook
- Network Troubleshoot
- Using the Appropriate Tools
- Hardware Tools Analyzers
- Troubleshooting With Hardware Tools Act
- Software Tools
- Troubleshooting with Software Tools Act
- Software Tools Command Line
- Troubleshooting with Command Line Tools Act
- Troubleshoot Common Wired Connectivity
- Troubleshooting Signal Problems
- Physical Issues
- Transceiver Issues
- Troubleshooting Transceiver Problems
- Traffic Flow Issues
- Troubleshoot Common Wireless Connectivity
- Latency and Jitter
- Incorrect WAP Types
- Troubleshooting WAP Issues
- Troubleshooting Common Network
- DHCP Issues
- Firewall ACL Issues
- Advanced Network Issues
- Unresponsive Services
- Case Study Troubleshooting
- Outro N10 007
- Total Course Video Hours: 33 Hrs 10 Min
- Total Videos: 162
- Module 1 Notes
- 1.0 PenTest Plus Introduction
- 1.1 PenTest Plus Topics
- 1.2 PenTest Engagement
- 1.3 Threat Modeling
- 1.4 Technical Constraints
- 1.5 PenTest Engagement Review
- 1.6 Examining PenTest Engagement Documents Act
- Module 2 Notes
- 2.1 Passive Reconnaissance part1
- 2.2 WHOIS Act
- 2.3 Passive Reconnaissance part2
- 2.4 Google Hacking Act
- 2.5 Passive Reconnaissance part3
- 2.6 DNS Querying Act
- 2.7 Passive Reconnaissance part4
- 2.8 Email Server Querying Act
- 2.9 SSL-TLS Cerfificates
- 2.10 Shodan Act
- 2.11 The Havester
- 2.12 TheHarvester Act
- 2.13 Recon-ng
- 2.14 Recon-g Act
- 2.14 Recon-ng-Part-2-API-key Act
- 2.15 Maltego
- 2.16 Have I been Pwned
- 2.17 Punked and Owned Pwned Act
- 2.18 Fingerprinting Organization with Collected Archives
- 2.19 FOCA Act
- 2.20 Findings Analysis Weaponization
- 2.21 Chp 2 Review
- Module 3 Notes
- 3.1 Active Reconnaissannce
- 3.2 Discovery Scans Act
- 3.3 Nmap
- 3.4 Nmap Scans Types Act
- 3.5 Nmap Options
- 3.6 Nmap Options Act
- 3.7 Stealth Scans
- 3.8 Nmap Stealth Scans Act
- 3.9 Full Scans
- 3.10 Full Scans Act
- 3.11 Packet Crafting
- 3.12 Packet Crafting Act
- 3.13 Network Mapping
- 3.14 Metasploit
- 3.15 Scanning with Metasploit Act
- 3.16 Enumeration
- 3.17 Banner Grabbing Act
- 3.18 Windows Host Enumeration
- 3.19 Winddows Host Enumeration Act
- 3.20 Linux Host Enumeration
- 3.21 Linux Host Enumeration Act
- 3.22 Service Enumeration
- 3.23 Service Enumeration Act
- 3.24 Network Shares
- 3.25 SMB Share Enumeration Act
- 3.26 NFS Network Share Enumeration
- 3.27 NFS Share Enumeration Act
- 3.28 Null Sessions
- 3.29 Null Sessions Act
- 3.30 Website Enumeration
- 3.31 Website Enumeration Act
- 3.32 Vulnerability Scans
- 3.33 Compliance Scans Act
- 3.34 Credentialed Non-credentialed Scans
- 3.35 Using Credentials in Scans Act
- 3.36 Server Service Vulnerability Scan
- 3.37 Vulnerability Scanning Act
- 3.38 Web Server Database Vulnerability Scan
- 3.39 SQL Vulnerability Scanning Act
- 3.40 Vulnerability Scan Part 2 OpenVAS Act
- 3.41 Web App Vulnerability Scan
- 3.42 Web App Vulnerability Scanning Act
- 3.43 Network Device Vulnerability Scan
- 3.44 Network Device Vuln Scanning Act
- 3.45 Nmap Scripts
- 3.46 Using Nmap Scripts for Vuln Scanning Act
- 3.47 Packet Crafting for Vulnerbility Scans
- 3.48 Firewall Vulnerability Scans
- 3.49 Wireless Access Point Vunerability
- 3.50 Wireless AP Scans Act
- 3.51 WAP Vulnerability Scans
- 3.52 Container Security issues
- 3.53 How to Update Metasploit Pro Expired Trial License
- Module 4 Notes
- 4.1 Physical Security
- 4.2 Badge Cloning Act
- 4.3 Physical Security Review
- Module 5 Notes
- 5.1 Social Engineering
- 5.2 Using Baited USB Stick Act
- 5.3 Using Social Enginnering to Assist Attacks
- 5.4 Phishing Act
- 5.5 Social Engineering Review
- Module 6 Notes
- 6.1 Vulnerbility Scan Analysis
- 6.2 Validating Vulnerability Scan Results Act
- 6.3 Vulnerbility Scan Analysis Review
- Module 7 Notes
- 7.1 Password Cracking
- 7.2 Brute Force Attack Against Network Service Act
- 7.3 Network Authentication Interception Attack
- 7.4 Intercepting Network Authentication Act
- 7.5 Pass the Hash Attacks
- 7.6 Pass the Hash Act
- 7.7 Password Cracking Review
- Module 8 Notes
- 8.1 Penetrating Wired Network
- 8.2 Sniffing Act
- 8.3 Eavesdropping
- 8.4 Eavesdropping Act
- 8.5 ARP Poisoning
- 8.6 ARP Poisoning Act
- 8.7 Man In The Middle
- 8.8 MITM Act
- 8.9 TCP Session HiJacking
- 8.10 Server Message Blocks SMB Exploits
- 8.11 SMB Attack Act
- 8.12 Web Server Attacks
- 8.13 FTP Attacks
- 8.14 Telnet Server Attacks
- 8.15 SSH Server Attacks
- 8.16 Simple Network Mgmt Protocol SNMP
- 8.17 Simple Mail Transfer Protocol SMTP
- 8.18 Domain Name System DNS Cache Poisoning
- 8.19 Denail of Service Attack DoS-DDoS
- 8.20 DoS Attack Act
- 8.21 VLAN Hopping Review
- Module 9 Notes
- 9.1 Penetrating Wireless Networks
- 9.2 Jamming Act
- 9.3 Wireless Sniffing
- 9.4 Replay Attacks
- 9.5 WEP Cracking Act
- 9.6 WPA-WPA2 Cracking
- 9.7 WAP Cracking Act
- 9.8 Evil Twin Attacks
- 9.9 Evil Twin Attack Act
- 9.10 WiFi Protected Setup
- 9.11 Bluetooth Attacks
- 9.12 Penetrating Wireless Networks
- Module 10 Notes
- 10.1 Windows Exploits
- 10.2 Dumping Stored Passwords Act
- 10.3 Dictionary Attacks
- 10.4 Dictionary Attack Against Windows Act
- 10.5 Rainbow Table Attacks
- 10.6 Credential Brute Force Attacks
- 10.7 Keylogging Attack Act
- 10.8 Windows Kernel
- 10.9 Kernel Attack Act
- 10.10 Windows Components
- 10.11 Memory Vulnerabilities
- 10.12 Buffer Overflow Attack Act
- 10.13 Privilegde Escalation in Windows
- 10.14 Windows Accounts
- 10.15 Net and WMIC Commands
- 10.16 Sandboxes
- Module 11 Notes
- 11.1 Linux Exploits
- 11.2 Exploiting Common Linux Features Act
- 11.3 Password Cracking in Linux
- 11.4 Cracking Linux Passwords Act
- 11.5 Vulnerability Linux
- 11.6 Priviledge Escalation Linux
- 11.7 Linux Accounts
- 11.8 Linux Exploits Review
- Module 12 Notes
- 12.1 Mobile Devices
- 12.2 Hacking Android Act
- 12.3 Apple Exploits
- 12.4 Moblie Devices Review
- Module 13 Notes
- 13.1 Specialized Systems
- 13.2 Specialized Systems Review
- Module 14 Notes
- 14.1 Scripts
- 14.2 Powershell
- 14.3 Python
- 14.4 Ruby
- 14.5 Common Scripting Elements
- 14.6 Scripts Review
- 14.7 Better Ping Sweep
- 14.8 Simple Port Scanner2
- 14.9 Multitarget Port Scanner
- 14.10 Port Scanner with Nmap
- 14.11 Scripts Review
- Module 15 Notes
- 15.1 Application Testing
- 15.2 Reverse Engineering
- Module 16 Notes
- 16.1 Webb App Exploits
- 16.2 Injection Attacks
- 16.3 HTML Injection
- 16.4 SQL Hacking – SQLmap Act
- 16.5 Cross-Site Attacks
- 16.6 Cross-Site Request Forgery
- 16.7 Other Web-based Attacks
- 16.8 File Inclusion Attacks
- 16.9 Web Shells
- 16.10 Web Shells Review
- Module 17 Notes
- 17.1 Lateral Movement
- 17.2 Lateral Movement with Remote Mgmt Services
- 17.3 Process Migration Act
- 17.4 Passing Control Act
- 17.5 Pivoting
- 17.6 Tools the Enable Pivoting
- 17.7 Lateral Movement Review
- Module 18 Notes
- 18.1 Persistence
- 18.2 Breeding RATS Act
- 18.3 Bind and Reverse Shells
- 18.4 Bind Shells Act
- 18.5 Reverse Shells
- 18.6 Reverse Shells Act
- 18.7 Netcat
- 18.8 Netcat Act
- 18.9 Scheduled Tasks
- 18.10 Scheduled Tasks Act
- 18.11 Services and Domains
- 18.12 Persistence Review
- Module 19 Notes
- 19.1 Cover Your Tracks
- 19.2 Cover Your Tracks – Timestomp Files Act
- 19.3 Cover Your Tracks – Frame the Administrator Act
- 19.4 Cover Your Tracks – Clear the Event Log Act
- 19.5 Cover Your Tracks Review
- Module 20 Notes
- 20.1 The Report
- 20.2 The Report Review
- Module 21 Notes
- 21.1 Post Engagement Cleanup_1
- 21.3 Post Engagement Cleanup Review
- 21.4 PenTest Plus Conclusion
- Total Course Video Hours: 34 Hrs 22 Min
- Total Videos: 215
- Introduction and Overview
- Compare and Contrast Information Security Roles
- Compare and Contrast Security Control and Framework Types
- Module Summary
- Explain Threat Actor Types and Attack Vectors
- Explain Threat Intelligence Sources
- Module Summary
- Assess Organizational Security with Network Reconnaissance Tools
- Packet Capture and Replay Demo
- Explain Security Concerns with General Vulnerability Types
- Summarize Vulnerability Scanning Techniques
- Explain Penetration Testing Concepts
- Module Summary
- Compare and Contrast Social Engineering Techniques
- Analyze Indicators of Malware-based Attacks
- Fork Bomb Malware Demo
- Module Summary
- Compare and Contrast Cryptographic Ciphers
- Summarize Cryptographic Modes of Operation
- Summarize Cryptographic Use Cases and Weaknesses
- Summarize Other Cryptographic Technologies
- Module Summary
- Implement Certificates and Certificate Authorities
- Implement PKI Management
- Implementing a PKI Demo
- Module Summary
- Summarize Authentication Design Concepts
- Implement Knowledge-based Authentication
- Password Cracker Demo
- Implement Authentication Technologies
- Summarize Biometrics Authentication Concepts
- Module Summary
- Implement Identity and Account Types
- Implement Account Policies
- Account Types and Polices Demo
- Implement Authorization Solutions
- Explain the Importance of Personnel Policies
- Module Summary
- Implement Secure Network Designs
- Implement Secure Switching and Routing
- Various Types of Network Attacks Demo
- Implement Secure Wireless Infrastructure
- Implement Load Balancers
- Module Summary
- Implement Firewalls and Proxy Servers
- Implement Network Security Monitoring
- Summarize the Use of SIEM
- Module Summary
- Implement Secure Network Operations Protocols
- Implement Secure Application Protocols
- Implement Secure Remote Access Protocols
- Module Summary
- Implement Secure Firmware
- Implement Endpoint Security
- Endpoint Protection Demo
- Explain Embedded System Security Implications
- Module Summary
- Implement Mobile Device Management
- Implement Secure Mobile Device Connections
- Module Summary
- Analyze Indicators of Application Attack
- Analyze Indicators of Web Application Attacks
- Summarize Secure Coding Practices
- Implement Secure Script Environments
- Summarize Deployment and Automation Concepts
- Module Summary
- Summarize Secure Cloud and Virtualization Services
- Apply Cloud Security Solutions
- Summarize Infrastructure as Code Concepts
- Module Summary
- Explain Privacy and Data Sensitivity Concepts
- Explain Privacy and Data Protection Controls
- Module Summary
- Summarize Incident Response Procedures
- Utilize Appropriate Data Sources for Incident Response
- Apply Mitigation Controls
- Module Summary
- Explain Key Aspects of Digital Forensics Documentation
- Explain Key Aspects of Digital Forensics Evidence Acquisition
- Module Summary
- Explain Risk Management Processes and Concepts
- Explain Business Impact Analysis Concepts
- Module Summary
- Implement Redundancy Strategies
- Implement Backup Strategies
- Implement Cybersecurity Resiliency Strategies
- Module Summary
- Explain the Importance of Physical Site Controls
- Explain the Importance of Physical Host Security Controls
- Module Summary
- Conclusion and General Exam Tips
- Total Course Video Hours: 14 Hrs 4 Min
- Total Videos: 91
- Total Course Video Hours: 10 Hrs 6 Min
- Total Videos: 70
- Total Course Video Hours: 46 Hrs 25 Min
- Total Videos: 189
- Virtual Box-Part 1
- Virtual Box-Part 2
- Virtual Box-Part 3
- Virtual Box-Part 4
- Virtual Box-Part 5
- Virtual Box-Part 6
- Basic Commands-Part 1
- Basic Commands-Part 2
- Basic Commands-Part 3
- Basic Commands-Part 4
- Basic Commands-Part 5
- Basic Commands-Part 6
- Basic Commands-Part 7
- Basic Commands-Part 8
- Basic Commands-Part 9
- Basic Commands-Part 10
- Special Characters-Part 1
- Special Characters-Part 2
- Special Characters-Part 3
- File Editing-Part 1
- File Editing-Part 2
- File Editing-Part 3
- File Editing-Part 4
- File Editing-Part 5
- File Editing-Part 6
- File Editing-Part 7
- File System Structure-Part 1
- File System Structure-Part 2
- File System Structure-Part 3
- File System Structure-Part 4
- Finding Files-Part 1
- Finding Files-Part 2
- Finding Files-Part 3
- Shell Special Characters-Part 1
- Shell Special Characters-Part 2
- Shell Special Characters-Part 3
- Regular Expressions-Part 1
- Regular Expressions-Part 2
- Regular Expressions-Part 3
- Regular Expressions-Part 4
- Regular Expressions-Part 5
- Regular Expressions-Part 6
- Process Management-Part 1
- Process Management-Part 2
- Process Management-Part 3
- Process Management-Part 4
- Process Management-Part 5
- Process Management-Part 6
- Process Management-Part 7
- Process Management-Part 8
- Job Scheduling-Part 1
- Job Scheduling-Part 2
- Job Scheduling-Part 3
- Job Scheduling-Part 4
- Job Scheduling-Part 5
- Job Scheduling-Part 6
- Customizing Your Account-Part 1
- Customizing Your Account-Part 2
- Customizing Your Account-Part 3
- Customizing Your Account-Part 4
- Customizing Your Account-Part 5
- Customizing Your Account-Part 6
- Unix Printing-Part 1
- Unix Printing-Part 2
- Unix Printing-Part 3
- Unix Printing-Part 4
- Networking-Part 1
- Networking-Part 2
- Networking-Part 3
- Networking-Part 4
- Networking-Part 5
- Networking-Part 6
- Networking-Part 7
- Networking-Part 8
- Networking-Part 9
- Networking-Part 10
- X Windows-Part 1
- X Windows-Part 2
- X Windows-Part 3
- X Windows-Part 4
- X Windows-Part 5
- Back Up And Compression-Part 1
- Back Up And Compression-Part 2
- Back Up And Compression-Part 3
- Back Up And Compression-Part 4
- Text Utility-Part 1
- Text Utility-Part 2
- Text Utility-Part 3
- Text Utility-Part 4
- Text Utility-Part 5
- Shell Scripting-Part 1
- Shell Scripting-Part 2
- Shell Scripting-Part 3
- Shell Scripting-Part 4
- Shell Scripting-Part 5
- Shell Scripting-Part 6
- Shell Scripting-Part 7
- Shell Scripting-Part 8
- Shell Scripting-Part 9
- Shell Scripting-Part 10
- Shell Scripting-Part 11
- System Administration Basics-Part 1
- System Administration Basics-Part 2
- System Administration Basics-Part 3
- System Administration Basics-Part 4
- System Administration Basics-Part 5
- Total Course Video Hours: 13 Hrs 59 Min
- Total Videos: 106