220-1002 CompTIA A+
PL-CCAS003B CAS-003 - CompTIA CASP+ with Exam Prep
CV0-002 CompTIA Cloud+
CS0-002 CompTIA Cybersecurity Analyst (CySA+)
FC0-U61 CompTIA IT Fundamentals+
XK0-004 CompTIA Linux+
N10-007 CompTIA Network+
N10-008 CompTIA Network+ N10-008
PT0-001 CompTIA PenTest+
SY0-601 CompTIA Security+
SK0-004 CompTIA Server +
220-1002 CompTIA A+
220-1002 CompTIA A+
- Operating System Types and Features
- Implementing Different Boot Methods and Types of Operating System Installation
- Disk Partitioning Methods and File Systems
- Installing System Configuration Settings
- Using Microsoft Command Line Tools
- Using Microsoft Operating System Tools and Features
- Microsoft Windows System Utilities
- Using Microsoft Windows Control Panel Utilities
- Using Microsoft Windows Control Panel’s User Related Utilities
- Application Software Installation and Configuration Methods
- Features and Tools of Mac OS and Linux Desktop Operating System
- Logical Security Concepts
- Wi-fi Security Protocols and Authentication Methods
- Working with Tools and Methods of Malware Prevention, Detection, and Removal
- Microsoft Windows OS Security Settings
- Implementing Security Best Practices to Secure a Workstation
- Using Data Destruction and Disposal Methods
- Troubleshooting Microsoft Windows Issues
- Troubleshooting PC Security Issues
- Malware Removal Best Practices
- Implementing Basic Change Management Best Practices
- Implement Basic Disaster Prevention and Recovery Methods
Basics of Scripting - Working with Remote Access Technologies
- Documentation and Licences Best Practices
- Using Proper Communication Techniques and Professionalism
- Using System Restore
- Working with BitLocker
- CompTIA imageCompTIA A+ icon
PL-CCAS003B CAS-003 - CompTIA CASP+ with Exam Prep
PL-CCAS003B CAS-003 – CompTIA CASP+ with Exam Prep
- Module 1: Networking Fundamentals
- Module 2: Basic Ethernet LAN Implementation
- Module 3: Designing Ethernet LANS
- Module 4: Understanding IPv4
- Module 5: Working With Cisco Routers
- Module 6: IPv4 Design And Troubleshooting
- Module 7: IPv4 Services
- Module 8: Implementing IP
Course Information
- Total Course Video Hours: 20 Hrs 10 Min
- Total Videos: 68
CV0-002 CompTIA Cloud+
CV0-002 CompTIA Cloud+
- Getting Ready for Cloud Technologies
- Deploying a Cloud Solution
- Securing a Cloud Solution – Part 1
- Securing a Cloud Solution – Part 2
- Maintaining a Cloud Solution – Part 1
- Maintaining a Cloud Solution – Part 2
- Managing a Cloud Solution – Part 1
- Managing a Cloud Solution – Part 2
- Troubleshooting a Cloud Solution – Part 1
- Troubleshooting a Cloud Solution – Part 2
CS0-002 CompTIA Cybersecurity Analyst (CySA+)
CS0-002 CompTIA Cybersecurity Analyst (CySA+)
- Vulnerabilities
- Attack Types
- Information Gathering and Sharing
- Supporting Organizational Security
- Scripting
- Threat Data
- Types of Scanning
- Vulnerability Identification and Remediation
- Web Application Scanners
- Infrastructure Vulnerability Scanners
- Enumeration
- Wireless and Cloud Assessment Tools
- Vulnerabilities in Specialized Technology
- Log Monitoring and Review
- Security Monitoring Activities
- Data and Application Controls
- Improving Network Security
- Infrastructure Security
- Identity and Access Management
- Infrastructure Solutions
- Automation Concepts
- Importance of Incident Response
- Initial Phases of Incident Response
- Later Phases of Incident Response
- Host Related Incident Compromise Indicators
- Network and Application Related Incident Compromise Indicators
- Digital Forensics Techniques
- Certificate Management
- Applying Security Concepts to Mitigate Risk
- Frameworks, Controls, Policies, and Procedures
- CompTIA imageCompTIA Cybersecurity Analyst (CySA+) icon
FC0-U61 CompTIA IT Fundamentals+
FC0-U61 CompTIA IT Fundamentals+
- Manage Operating System Tools
- Installing Windows
- Run Linux from a Live CD
- Configure Mobile Devices
- Manage File System Security
- Configure Network-based Anti-Malware
- Manage Operating System Updates
- Password Policies
- Multifactor Authentication and Run As
- Manage Backup and Restore
- Manage User Authentication with RADIUS
- Working with Basic HTML Tags
- Fundamentals of Software Programming
- Working with Primitive Data Types in Javascript
- Working with Primitive Data Types in Python
- Converting Data Types in Python
- Core Database Concepts
- Data Storage
- Modify Data
- Administering Databases
- Social Engineering Reconnaissance
- Install Productivity Software
- Working with Business Software – Desktop Publishing and PDF Creator
- Manage Application Delivery Methods
- Troubleshoot Network Connectivity Issues
- Troubleshoot Windows Operating System Errors
- Manage Web Browser Settings Part 1
- Manage Web Browser Settings Part 2
- Managing Units of Measure – Disks, Network Throughput and Processor
- Implement Device Security with Anti-Malware Apps
- Implement Device Security with Host-Based Firewall and Password Policy
- Implement Device Security with Signed Software, Trusted Sites and Application Control
XK0-004 CompTIA Linux+
XK0-004 CompTIA Linux+
- Design Hard Disk Layout
- Create Partitions and Filesystems
- Using Various Disk Management Tools
- Working with Kernel, Boot Modules, and Files
- Working with Relative and Absolute Paths
- Work with the Flow Control Constructs
- Control Mounting and Unmounting of Filesystems
- View the Hard Drive Details
- Check and Repair Filesystems
- Using RPM and YUM Package Management
- Using Debian Package Management
- Using Repositories
- Managing User and Group Accounts and Related System Files
- Run User Level Queries
- Managing Disk Quotas
- Working with Bash Profiles and Bash Scripts
- Setup Host Security
- Perform Basic File Editing Operations Using vi
- Search Text Files using Regular Expressions
- Using Shell Input and Output Redirections
- Install and Configure a Web Server
- Performing Basic File Management
- Amending Hard and Symbolic Links
- Find System Files and Place Files in the Correct Location
- Use Systemctl and update-rc.d Utility to Manage Services
- Configuring Host Names
- Change Runlevels and Shutdown or Reboot System
- Maintain System Time
- Configure Client Side DNS
- Configure System Logging
- Mail Transfer Agent (MTA) Basics
- Automate System Administration Tasks by Scheduling Jobs
- Create, Monitor and Kill Processes
- Manage Printers and Printing
Accessibility - Manage File Permissions and Ownership
- Perform Security Administration Tasks
- Working with Access Control List
- Configure SELinux
- Maintain the Integrity of Filesystems
- Work with Pluggable Authentication Modules (PAM)
- Secure Communication using SSH
- Securing Data with Encryption
- Work with TTY
- Set up SFTP to Chroot Jail only for Specific Group
- Secure a Linux Terminal and Implement Logging Services
- Boot the System
- Configure UFW and DenyHosts
- Compress Data using Various Tools and Utilities
- Process Text Streams using Filters
- Basic Network Troubleshooting
- Use Streams Pipes and Redirects
- Perform CPU Monitoring and Configuration
- Perform Memory Monitoring and Configuration
- Perform Process Monitoring
- Modify Process Execution Priorities
- Manage File and Directory Permissions
- Access the Linux System
- Configure Inheritance and Group Memberships
- Patch the System
- Working with the Environment Variables
- Shells, Scripting and Data Management
- Customize or Write Simple Scripts
- Configure Permissions on Files and Directories
- Work with PKI
N10-007 CompTIA Network+
N10-007 CompTIA Network+
- Introduction to the OSI Model
- Configure IPv4 and IPv6 Addressing
- Network Management – Diagrams, Symbols and Documentation
- Network Services and Protocols – Part 1
- Network Services and Protocols – Part 2
- Network Services and Protocols – Part 3
- Install OS Updates and Configure Security Policy
- Common Network Vulnerabilities
- Implement a Host-based Firewall
- Install Hyper-V
- Troubleshoot Internet Connection and DNS Issues
- Install and Configure DHCP and DNS Servers
- Introduction to Software as a Service (SaaS)
- Detecting System Bottlenecks and Log Management
- Troubleshoot Network Connectivity with Network Utilities
- VPN Technologies and Services
- Install and Configure Network Load Balancing
- Configure Switching Features
- Configure and Verify Switch Security Features
- Configure Switching Concepts
- Backup and Restore
- Routing Concepts and Protocols
- Configure Gateway Redundancy Protocols
- Configure E-Mail Client Protocols
- Install and Configure SNMP
- Controlling VPN Access with RADIUS
- Assess Network Vulnerabilities and Threats using MBSA
N10-008 CompTIA Network+ N10-008
N10-008 CompTIA Network+ N10-008
- Introduction to the OSI Model
- Configure IPv4 and IPv6 Addressing
- Network Management – Diagrams, Symbols and Documentation
- Network Services and Protocols – Part 1
- Network Services and Protocols – Part 2
- Network Services and Protocols – Part 3
- Install OS Updates and Configure Security Policy
- Common Network Vulnerabilities
- Implement a Host-based Firewall
- Install Hyper-V
- Troubleshoot Internet Connection and DNS Issues
- Install and Configure DHCP and DNS Servers
- Introduction to Software as a Service (SaaS)
- Detecting System Bottlenecks and Log Management
- Troubleshoot Network Connectivity with Network Utilities
- VPN Technologies and Services
- Install and Configure Network Load Balancing
- Configure Switching Features
- Configure and Verify Switch Security Features
- Configure Switching Concepts
- Backup and Restore
- Routing Concepts and Protocols
- Configure Gateway Redundancy Protocols
- Configure E-Mail Client Protocols
- Install and Configure SNMP
- Controlling VPN Access with RADIUS
- Assess Network Vulnerabilities and Threats using MBSA
PT0-001 CompTIA PenTest+
PT0-001 CompTIA PenTest+
- Planning and Preparing for a Penetration Test Engagement
- Using the Metasploit Framework
- Performing Social Engineering
- Conducting Passive Reconnaissance for Vulnerabilities in a Network
- Conducting Active Reconnaissance for Vulnerabilities in a Network
- Perform Vulnerability Scan and Analyze Vulnerability Scan Results
- Exploiting the Network Vulnerabilities
- Exploiting Desktop Systems Vulnerabilities
- Exploit Web Application Vulnerabilities
- Performing Password Attacks
- Exploiting Discovered Vulnerabilities
- Work with Various Tools
- Performing Physical Security
- Working with Scripts
- Complete Post Exploit Tasks
- Analyzing and Reporting the Pen Test Results
SY0-601 CompTIA Security+
SY0-601 CompTIA Security+
- Identifying Different Cyber Attacks
- Social Engineering Techniques and Exploits
- Identifying Indicators of a Network Attack
- Network Security Assessment Tools
- Implementing Secure Network Solutions
- Enterprise Network Security Configuration Concepts
- Physical Security Control Mechanisms
- Gathering Intelligence on Threat Actors and Vectors
- Determining Security Vulnerabilities
- Security Assessment Techniques
- Penetration Testing Techniques
- Authentication and Authorization Implementation Techniques
- Authentication and Authorization Solutions
- Implementing a Public Key Infrastructure
- Implementation of Secure Protocols
- Securing an Environment using Mitigating Techniques
- Cybersecurity Backup and Restore Strategies
- Identity and Account Management Mechanisms
- Identifying Different Application Exploits
- Application Hardening Deployment Techniques
- Application and Host Hardening Techniques
- Cyber Security Vulnerabilities of Embedded Systems
- Cloud and Virtualization Concepts
- Securing a Cloud Infrastructure
- Incident Response Policies and Procedures
- Incident Response Tools
- Implementing Wireless Security Configurations
- Mobile Security Solutions
- Cryptographic Basic Concepts
- Digital Data Forensic Techniques
- Control Mechanisms, Standards, and Frameworks
- Organizational Risk Management and Policies
- Data Protection Implementation
SK0-004 CompTIA Server +
SK0-004 CompTIA Server +
- Retrieving System Information
- Install Hyper-V
- Server Optimization
- Apply Operating System Updates
- Configure IPv4 and IPv6 Addressing
- Cloning and Deploying Disk Images
- Remote and Unattended Installation of Windows OS
- Network Based OS Administration
- Install Server Roles
- Introduction to Failover Clustering
- Introduction to Network Load Balancing
- Understand File Compression Formats
- Understanding Common Ports and Protocols
- Routing and Remote Access Servers
- Installing a Directory Server
- Installing a Database Server
- Installing an Email Server
- Configuring a File Server
- Configuring a Print Server
- Storage Technologies using iSCSI
- Introduction to IPSec
- Controlling VPN Access with RADIUS
- Plan for Storage Capacity using Disk Quota
- Managing System Storage
- Understanding Public Key Infrastructure
- Understanding Malware
- Understand Server Backup and Restore
- Troubleshoot Operating Systems Part 1
- Troubleshoot Operating Systems Part 2
- Troubleshoot Operating Systems Part 3
- Operating System Types and Features
- Implementing Different Boot Methods and Types of Operating System Installation
- Disk Partitioning Methods and File Systems
- Installing System Configuration Settings
- Using Microsoft Command Line Tools
- Using Microsoft Operating System Tools and Features
- Microsoft Windows System Utilities
- Using Microsoft Windows Control Panel Utilities
- Using Microsoft Windows Control Panel’s User Related Utilities
- Application Software Installation and Configuration Methods
- Features and Tools of Mac OS and Linux Desktop Operating System
- Logical Security Concepts
- Wi-fi Security Protocols and Authentication Methods
- Working with Tools and Methods of Malware Prevention, Detection, and Removal
- Microsoft Windows OS Security Settings
- Implementing Security Best Practices to Secure a Workstation
- Using Data Destruction and Disposal Methods
- Troubleshooting Microsoft Windows Issues
- Troubleshooting PC Security Issues
- Malware Removal Best Practices
- Implementing Basic Change Management Best Practices
- Implement Basic Disaster Prevention and Recovery Methods Basics of Scripting
- Working with Remote Access Technologies
- Documentation and Licences Best Practices
- Using Proper Communication Techniques and Professionalism
- Using System Restore
- Working with BitLocker
- CompTIA imageCompTIA A+ icon
- Module 1 Notes
- Intro CASP
- CASP Introduction
- Mod 1.1 Exploring Cloud Services Act
- Mod 1.1 Acquisition Merger Demerger
- Mod 1.1 Acquisition Merger Demerger Part2
- Mod 1.2 Compare and Contrast
- Mod 1.3 Given Scenario Execute Risk
- Mod 1.3 Given Scenario Execute Risk Part2
- Mod 1.3 Continuing Terminology IT Governance
- Mod 1.4 Analyze Security Solution Metrics and Attributes
- Mod 1.4 Analyze Risk
- Mod 1.4 Trend Analysis Act
- Module 2 Notes
- Mod 2 Enterprise Security Architecture
- Mod 2.1 Network Device Security Act
- Mod 2.1 Application and Protocol
- Mod 2.1 Advanced Network Security Act
- Mod 2.1 Complex Network Security Solution
- Mod 2.1 Implementing VLANs Switchport Sec Act
- Mod 2.1 Implementing VLANs Switchport Sec Act Part2
- Mod 2.1 Distributed Denial of Service
- Mod 2.1 Exploring DoS Attacks Act
- Mod 2.1 Security Zones
- Mod 2.1 Network Access Control
- Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
- Mod 2.2 Analyze a Scenario Integrate Security
- Mod 2.2 Configuring Windows Firewall Act
- Mod 2.2 Log Monitoring and Auditing
- Mod 2.2 Group Policy Act
- Mod 2.2 Patch Management
- Mod 2.2 Management Interface
- Mod 2.2 Measured Launch
- Mod 2.3 Analyze a Scenario to Integrate Security Controls
- Mod 2.3 Security Implications Privacy
- Mod 2.3 Baseband
- Mod 2.4 Given Software Vulnerabilty Scenarios
- Mod 2.4 SQL Injection Act
- Mod 2.4 Improper Error and Exception Handling
- Mod 2.4 Buffer Overflows Act
- Mod 2.4 Memory Leaks
- Mod 2.4 Researching Vulnerabilities Exploits Act
- Module 3 Notes
- Mod 3 Enterprise Security Operations
- Mod 3 Runtime Debugging
- Mod 3.1 Fingerprinting an OS Services Act
- Mod 3.1 Code Review
- Mod 3.1 Conducting OSINT Act
- Mod 3.1 Types
- Mod 3.1 Conducting a Vulnerability Assessment Act
- Mod 3.2 Analyze a Scenario Output
- Mod 3.2 Network Sniffing Act
- Mod 3.2 Security Content Automation
- Mod 3.2 Using a SCAP Scanner Act
- Mod 3.2 Network Enumerator
- Mod 3.2 Password Cracking Act
- Mod 3.2 Host Vulnerability Scanner
- Mod 3.2 Using Command Line Tools Act
- Mod 3.2 OpenSSL
- Mod 3.2 Scanning for Heartbleed Act
- Mod 3.2 Local Exploitation Tools
- Mod 3.2 Verifying File Integrity with SFC Act
- Mod 3.2 Log Analysis Tools
- Mod 3.3 Given Scenario Implement Incident
- Mod 3.3 Facilitate Incident Detection Response
- Mod 3.3 Using Incident Response Support Tools Act
- Mod 3.3 Severity of Incident Detection Breach
- Module 4 Notes
- Mod 4 Technical Integration of Enterprise
- Mod 4 Technical Integration of Enterprise Part2
- Mod 4.1 DataSecurity Considerations
- Mod 4.1 Examing Network Diagrams Act
- Mod 4.1 Security and Privacy Considerations of Storage integration
- Mod 4.1 Exploring Directory Services and DNS Act
- Mod 4.2 Given Scenario Integrate Cloud and Virtualization
- Mod 4.2 Taking Another Look at Cloud Services Act
- Mod 4.2 Security Advantages and Disadvanatges of Virtualization
- Mod 4.2 Using Virtualization Act
- Mod 4.2 Cloud Augmented Security
- Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
- Mod 4.4 Given Scenario Cryptographic
- Mod 4.4 Cryptographic Part2
- Mod 4.4 Mobile Device Encryption
- Mod 4.4 Cryptography Act
- Mod 4.5 Select the Appropriate Control
- Mod 4.5 Phising Act
- Mod 4.5 Telephony VoIP Integration
- Module 5 Notes
- Mod 5 Research Methods to Determine Industry Trends
- Mod 5.1 Practicing Threat Intelligence Act
- Mod 5.2 Scenario Implememt Security Activities Across
- Mod 5.2 Static Testing
- Mod 5.3 Explain the Importance of Interaction
- CASP Conclusion
- Total Course Video Hours: 20 Hrs 10 Min
- Total Videos: 68
- Instructor Intro
- About the Exam
- Test Taking Tips and Techniques
- Explain the importance of threat data and intelligence
- Given a scenario, utilize threat intelligence to support organizational security
- Given a scenario, perform vulnerability management activities Pt 1
- Given a scenario, perform vulnerability management activities Pt 2
- Given a scenario, analyze the output from common vulnerability assessment tools
- Explain the threats and vulnerabilities associated with specialized technology
- Explain the threats and vulnerabilities associated with operating in the Cloud
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
- Outline
- Given a scenario, apply security solutions for infrastructure management Pt 1
- Given a scenario, apply security solutions for infrastructure management Pt 2
- Flashcards
- Given a scenario, apply security solutions for infrastructure management Pt 3
- Explain software assurance best practices
- Scatter
- Explain hardware assurance best practices
- Learn
- Speller
- Workbook
- Given a scenario, analyze data as part of security monitoring activities Pt 1
- Given a scenario, analyze data as part of security monitoring activities Pt 2
- Given a scenario, analyze data as part of security monitoring activities Pt 3
- Given a scenario, implement configuration changes to existing controls to improve security Pt 1
- Given a scenario, implement configuration changes to existing controls to improve security Pt 2
- Explain the importance of proactive threat hunting
- Compare and contrast automation concepts and technologies
- Explain the importance of the incident response process
- Given a scenario, apply the appropriate the incident response procedure
- Given an incident, analyze potential indicators of compromise
- Given a scenario, utilize basic digital forensic techniques
- Understand the importance of data privacy and protection
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
- Explain the importance of frameworks, policies, procedures, and controls Pt 1
- Explain the importance of frameworks, policies, procedures, and controls Pt 2
- Recap
- Review Questions
- Before the Exam
- 0.1 Instructor Intro
- 1.1 Compare and Contrast Notational Systems
- 1.1 Compare and Contrast Notational Systems Demo
- 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
- 1.3 Illustrate the Basics of Computing and Processing
- 1.4 Explain the Value of Data and Information
- 1.5 Compare and Contrast Common Units of Measures
- 1.5 Compare and Contrast Common Units of Measures Demo
- 1.6 Explain the Troubleshooting Methodology
- 2.1 Classify Common Types of Input-Output Device Interfaces
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
- 2.3 Explain the Purpose of Common Internal Computing Components
- 2.4 Compare & Contrast Common Internet Service Types-
- 2.5 Compare & Contrast Storage Types
- 2.6 Compare & Contrast Common Computing Devices & Their Purposes
- 2.7 Explain Basic Networking Concepts
- 2.7 Explain Basic Networking Concepts Demo
- 2.7 Explain Basic Networking Concepts Part 2
- 2.7 Explain Basic Networking Concepts Part 3
- 2.7 Explain Basic Networking Concepts Part 4
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
- 3.1 Explain the Purpose of Operating Systems
- 3.1 Explain the Purpose of Operating Systems Demo
- 3.2 Compare & Contrast Components of an Operating System
- 3.2 Compare & Contrast Components of an Operating System Demo
- 3.3 Explain the Purpose & Proper Use of Software
- 3.4 Explain Methods of Application Architecture & Delivery Models
- 3.5 Given a Scenario Configure & Use Web Browsers
- 3.5 Given a Scenario Configure & Use Web Browsers FireFox
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
- 3.6 Compare & Contrast General Application Concepts & Uses
- 4.1 Compare & Contrast Programming Language Categories-
- 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
- 4.3 Explain the Purpose & Use of Programming Concepts-
- 4.3 HTML Demo
- 5.1 Explain Database Concepts and the Purpose of Databases
- 5.2 Compare and Contrast Various Database Structures
- 5.3 Summarize Methods Used to Interface with Databases
- 5.3 Summarize Methods Used to Interface with Databases Demo
- 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
- 6.2 Explain Methods to Secure Devices and Best Practices
- 6.3 Summarize Behavioral Security Concepts
- 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
- 6.5 Explain Password Best Practices
- 6.6 Explain Common Uses of Encryption
- 6.7 Explain Business Continuity Concepts
- 6.8 Takeaways-
- 6.9 ITF Fundamentals Conclusion
- Instructor Introduction
- Course Introduction
- Identify The Linux Design Philosophy
- Enter Shell Commands
- Shell Commands Activity
- Get Help with Linux
- Assume Superuser and Groups
- Create, Modify, and Delete Users
- Create, Modify, and Delete Groups
- Query Users and Groups
- Configure Account Profiles
- Modify File and Directory Permissions
- Modify File and Directory Ownership
- Configure Special Permissions and Attributes
- Troubleshoot Permissions Issues
- Create Partitions
- Manage Logical Volumes
- Mount File Systems
- Manage File Systems
- Navigate the Linux Directory Structure
- Troubleshoot Storage Issues
- Create and Edit Text Files
- Search for Files
- Perform Operations on Files and Directories
- Process Text Files
- Manipulate File Output
- Explore the Linux Kernel
- Install and Configure Kernel Modules
- Monitor Kernel Modules
- Configure Linux Boot Components
- Configure GRUB
- Configure Localization Options
- Configure GUIs
- Manage Services
- Troubleshoot Process Issues
- Troubleshoot CPU and Memory Issues
- Identify the Types of Linux
- Configure Devices
- Monitor Devices
- Troubleshoot Hardware Issues
- Identify TCP/IP Fundamentals
- Identify Linux Server Roles
- Connect to a Network
- Configure DHCP and DNS Client Services
- Configure Cloud and Virtualization Technologies
- Troubleshoot Networking Issues
- Identify Package Managers
- Manage RPM Packages with YUM
- Manage Debian Packages with APT
- Configure Repositories
- Acquire Software
- Build Software from Source Code
- Troubleshoot Software Dependency Issues
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
- Schedule Jobs
- Implement Version Control Using Git
- Identify Orchestration Concepts
- Prepare for Linux Installation
- Perform the Installation
- Introduction to the OSI Model
- Configure IPv4 and IPv6 Addressing
- Network Management – Diagrams, Symbols and Documentation
- Network Services and Protocols – Part 1
- Network Services and Protocols – Part 2
- Network Services and Protocols – Part 3
- Install OS Updates and Configure Security Policy
- Common Network Vulnerabilities
- Implement a Host-based Firewall
- Install Hyper-V
- Troubleshoot Internet Connection and DNS Issues
- Install and Configure DHCP and DNS Servers
- Introduction to Software as a Service (SaaS)
- Detecting System Bottlenecks and Log Management
- Troubleshoot Network Connectivity with Network Utilities
- VPN Technologies and Services
- Install and Configure Network Load Balancing
- Configure Switching Features
- Configure and Verify Switch Security Features
- Configure Switching Concepts
- Backup and Restore
- Routing Concepts and Protocols
- Configure Gateway Redundancy Protocols
- Configure E-Mail Client Protocols
- Install and Configure SNMP
- Controlling VPN Access with RADIUS
- Assess Network Vulnerabilities and Threats using MBSA
- Module 1 Workbook
- Intro Network Plus N10 007
- Basic Networking
- Activity Basic Networking
- OSI Model
- Exploring the OSI Model- Act
- Protocol and Ports
- Activity Examining Protocols and Ports
- Connection-oriented vs. connectionless
- Activity Comparing TCP and UDP
- Internet Protocol (IP)
- Activity Examining the Lower Layer Protocols
- Layer 7 Remote Control Protocols
- Layer 7 File Transfer Protocols
- Layer 7 Messaging Protocols
- Activity Examining Messaging Protocols
- Layer 7 Web Traffic Protocols
- Layer 7 Streaming Media Protocols
- Layer 7 Infrastructure Management Protocols
- Switching
- Activity Creating Collision and Broadcast Domains
- Interface Properties and Segmentation
- Activity Creating a Basic Network Segment
- Switching prt 2
- Activity Switching
- Switching Loop Management
- Activity Managing Switching Loops
- VLANs
- Activity Creating VLANs
- routing
- Activity Examining ARP
- IP Addressing Basics
- Activity Configuring IP
- Routers
- Activity Setting Up a Router
- Routing Basics
- Activity Adding Static Routes
- VLAN Routing
- Activity Routing Between VLANs
- NAT/PAT
- Activity Configuring NAT/PAT
- Routing Protocols
- Activity Configuring a Routing Protocol
- Firewalls
- Activity Configuring Firewalls
- Advanced Switching and Routing Concepts
- Activity Exploring IPv6
- Performance Concepts
- IP Addressing
- Subnetting
- Activity Learning to Subnet
- Address Assignments
- Network Types and Topologies
- Wireless Topologies
- Network Types
- Technologies that Facilitate the Internet Of Things (IoT)
- Wireless Technologies
- 802.11 Standards
- Wi-Fi Frequencies
- Wi-Fi Antenna Concepts
- Bluetooth
- Cellular
- Activity Using an RF Spectrum Analyzer
- cloud concepts
- Activity Exploring Cloud Services
- Network Services
- Activity Setting up DNS
- DHCP Service
- Activity Setting Up DHCP
- NTP
- Module 2 Workbook
- Module 2 – Infrastructure
- Activity Testing a Fiber Optic Cable
- Plenum vs. PVC
- Activity Crimping on an RJ-45 Connector
- Transceivers
- Activity Terminating Cable to a 110 Block
- Copper Cable Standards
- Activity Creating a Crossover Cable
- Ethernet Deployment Standards
- Network Device Placement and Installation
- Repeater
- Router
- Modem
- Activity Setting up a WAP
- Firewall
- Media Converter
- Advanced Network Devices
- Wireless Controller
- Proxy Server
- Activity Configuring Proxy Settings
- VPN Concentrator
- Virtual Networking Components
- Network Storage Types
- WAN Technologies
- Transmission Mediums
- Activity Configuring WAN Links
- Termination
- Module 3 Workbook
- Network Operations Documentation
- Standard Operation Procedures
- Logical vs Physical Diagrams
- Rack Diagrams
- Change Management
- Wiring and Ports Locations
- IDF-MDF Documentation
- Labeling
- Using Documentation Act
- Continuity and Disaster
- MTTR Mean Time Repair
- Recovery
- Backing Up Your Data Act
- Event Management
- Metrics
- Scanning Monitoring Patching
- Testing the Network Act
- HTTPS-Management
- Out-of-Band Management
- RDP
- Remote Access Methods
- Remote File Access
- Making Remote Connections Act
- SSH
- VNC
- Policies and Best Practices
- Creating Policies and Procedures Act
- Module 4 Workbook
- Physical Security Devices
- Examining Security Devices Act
- Authentication and Access
- Access Controls Methods Act
- Multifactor Authentication
- Basic Wireless Network Security
- Demonstrating the Need for Wireless Act
- Common Network Attacks
- Conducting a Phishing Campaign Act
- Network Device Hardening
- Supporting Secure Authentication Encryption Act
- Updating Firmware
- Explain Common Mitigation Techniques
- Implementing a Honey Pot Act
- Module 5 Workbook
- Network Troubleshoot
- Using the Appropriate Tools
- Hardware Tools Analyzers
- Troubleshooting With Hardware Tools Act
- Software Tools
- Troubleshooting with Software Tools Act
- Software Tools Command Line
- Troubleshooting with Command Line Tools Act
- Troubleshoot Common Wired Connectivity
- Troubleshooting Signal Problems
- Physical Issues
- Transceiver Issues
- Troubleshooting Transceiver Problems
- Traffic Flow Issues
- Troubleshoot Common Wireless Connectivity
- Latency and Jitter
- Incorrect WAP Types
- Troubleshooting WAP Issues
- Troubleshooting Common Network
- DHCP Issues
- Firewall ACL Issues
- Advanced Network Issues
- Unresponsive Services
- Case Study Troubleshooting
- Outro N10 007
- Module 1 Notes
- 1.0 PenTest Plus Introduction
- 1.1 PenTest Plus Topics
- 1.2 PenTest Engagement
- 1.3 Threat Modeling
- 1.4 Technical Constraints
- 1.5 PenTest Engagement Review
- 1.6 Examining PenTest Engagement Documents Act
- Module 2 Notes
- 2.1 Passive Reconnaissance part1
- 2.2 WHOIS Act
- 2.3 Passive Reconnaissance part2
- 2.4 Google Hacking Act
- 2.5 Passive Reconnaissance part3
- 2.6 DNS Querying Act
- 2.7 Passive Reconnaissance part4
- 2.8 Email Server Querying Act
- 2.9 SSL-TLS Cerfificates
- 2.10 Shodan Act
- 2.11 The Havester
- 2.12 TheHarvester Act
- 2.13 Recon-ng
- 2.14 Recon-g Act
- 2.14 Recon-ng-Part-2-API-key Act
- 2.15 Maltego
- 2.16 Have I been Pwned
- 2.17 Punked and Owned Pwned Act
- 2.18 Fingerprinting Organization with Collected Archives
- 2.19 FOCA Act
- 2.20 Findings Analysis Weaponization
- 2.21 Chp 2 Review
- Module 3 Notes
- 3.1 Active Reconnaissannce
- 3.2 Discovery Scans Act
- 3.3 Nmap
- 3.4 Nmap Scans Types Act
- 3.5 Nmap Options
- 3.6 Nmap Options Act
- 3.7 Stealth Scans
- 3.8 Nmap Stealth Scans Act
- 3.9 Full Scans
- 3.10 Full Scans Act
- 3.11 Packet Crafting
- 3.12 Packet Crafting Act
- 3.13 Network Mapping
- 3.14 Metasploit
- 3.15 Scanning with Metasploit Act
- 3.16 Enumeration
- 3.17 Banner Grabbing Act
- 3.18 Windows Host Enumeration
- 3.19 Winddows Host Enumeration Act
- 3.20 Linux Host Enumeration
- 3.21 Linux Host Enumeration Act
- 3.22 Service Enumeration
- 3.23 Service Enumeration Act
- 3.24 Network Shares
- 3.25 SMB Share Enumeration Act
- 3.26 NFS Network Share Enumeration
- 3.27 NFS Share Enumeration Act
- 3.28 Null Sessions
- 3.29 Null Sessions Act
- 3.30 Website Enumeration
- 3.31 Website Enumeration Act
- 3.32 Vulnerability Scans
- 3.33 Compliance Scans Act
- 3.34 Credentialed Non-credentialed Scans
- 3.35 Using Credentials in Scans Act
- 3.36 Server Service Vulnerability Scan
- 3.37 Vulnerability Scanning Act
- 3.38 Web Server Database Vulnerability Scan
- 3.39 SQL Vulnerability Scanning Act
- 3.40 Vulnerability Scan Part 2 OpenVAS Act
- 3.41 Web App Vulnerability Scan
- 3.42 Web App Vulnerability Scanning Act
- 3.43 Network Device Vulnerability Scan
- 3.44 Network Device Vuln Scanning Act
- 3.45 Nmap Scripts
- 3.46 Using Nmap Scripts for Vuln Scanning Act
- 3.47 Packet Crafting for Vulnerbility Scans
- 3.48 Firewall Vulnerability Scans
- 3.49 Wireless Access Point Vunerability
- 3.50 Wireless AP Scans Act
- 3.51 WAP Vulnerability Scans
- 3.52 Container Security issues
- 3.53 How to Update Metasploit Pro Expired Trial License
- Module 4 Notes
- 4.1 Physical Security
- 4.2 Badge Cloning Act
- 4.3 Physical Security Review
- Module 5 Notes
- 5.1 Social Engineering
- 5.2 Using Baited USB Stick Act
- 5.3 Using Social Enginnering to Assist Attacks
- 5.4 Phishing Act
- 5.5 Social Engineering Review
- Module 6 Notes
- 6.1 Vulnerbility Scan Analysis
- 6.2 Validating Vulnerability Scan Results Act
- 6.3 Vulnerbility Scan Analysis Review
- Module 7 Notes
- 7.1 Password Cracking
- 7.2 Brute Force Attack Against Network Service Act
- 7.3 Network Authentication Interception Attack
- 7.4 Intercepting Network Authentication Act
- 7.5 Pass the Hash Attacks
- 7.6 Pass the Hash Act
- 7.7 Password Cracking Review
- Module 8 Notes
- 8.1 Penetrating Wired Network
- 8.2 Sniffing Act
- 8.3 Eavesdropping
- 8.4 Eavesdropping Act
- 8.5 ARP Poisoning
- 8.6 ARP Poisoning Act
- 8.7 Man In The Middle
- 8.8 MITM Act
- 8.9 TCP Session HiJacking
- 8.10 Server Message Blocks SMB Exploits
- 8.11 SMB Attack Act
- 8.12 Web Server Attacks
- 8.13 FTP Attacks
- 8.14 Telnet Server Attacks
- 8.15 SSH Server Attacks
- 8.16 Simple Network Mgmt Protocol SNMP
- 8.17 Simple Mail Transfer Protocol SMTP
- 8.18 Domain Name System DNS Cache Poisoning
- 8.19 Denail of Service Attack DoS-DDoS
- 8.20 DoS Attack Act
- 8.21 VLAN Hopping Review
- Module 9 Notes
- 9.1 Penetrating Wireless Networks
- 9.2 Jamming Act
- 9.3 Wireless Sniffing
- 9.4 Replay Attacks
- 9.5 WEP Cracking Act
- 9.6 WPA-WPA2 Cracking
- 9.7 WAP Cracking Act
- 9.8 Evil Twin Attacks
- 9.9 Evil Twin Attack Act
- 9.10 WiFi Protected Setup
- 9.11 Bluetooth Attacks
- 9.12 Penetrating Wireless Networks
- Module 10 Notes
- 10.1 Windows Exploits
- 10.2 Dumping Stored Passwords Act
- 10.3 Dictionary Attacks
- 10.4 Dictionary Attack Against Windows Act
- 10.5 Rainbow Table Attacks
- 10.6 Credential Brute Force Attacks
- 10.7 Keylogging Attack Act
- 10.8 Windows Kernel
- 10.9 Kernel Attack Act
- 10.10 Windows Components
- 10.11 Memory Vulnerabilities
- 10.12 Buffer Overflow Attack Act
- 10.13 Privilegde Escalation in Windows
- 10.14 Windows Accounts
- 10.15 Net and WMIC Commands
- 10.16 Sandboxes
- Module 11 Notes
- 11.1 Linux Exploits
- 11.2 Exploiting Common Linux Features Act
- 11.3 Password Cracking in Linux
- 11.4 Cracking Linux Passwords Act
- 11.5 Vulnerability Linux
- 11.6 Priviledge Escalation Linux
- 11.7 Linux Accounts
- 11.8 Linux Exploits Review
- Module 12 Notes
- 12.1 Mobile Devices
- 12.2 Hacking Android Act
- 12.3 Apple Exploits
- 12.4 Moblie Devices Review
- Module 13 Notes
- 13.1 Specialized Systems
- 13.2 Specialized Systems Review
- Module 14 Notes
- 14.1 Scripts
- 14.2 Powershell
- 14.3 Python
- 14.4 Ruby
- 14.5 Common Scripting Elements
- 14.6 Scripts Review
- 14.7 Better Ping Sweep
- 14.8 Simple Port Scanner2
- 14.9 Multitarget Port Scanner
- 14.10 Port Scanner with Nmap
- 14.11 Scripts Review
- Module 15 Notes
- 15.1 Application Testing
- 15.2 Reverse Engineering
- Module 16 Notes
- 16.1 Webb App Exploits
- 16.2 Injection Attacks
- 16.3 HTML Injection
- 16.4 SQL Hacking – SQLmap Act
- 16.5 Cross-Site Attacks
- 16.6 Cross-Site Request Forgery
- 16.7 Other Web-based Attacks
- 16.8 File Inclusion Attacks
- 16.9 Web Shells
- 16.10 Web Shells Review
- Module 17 Notes
- 17.1 Lateral Movement
- 17.2 Lateral Movement with Remote Mgmt Services
- 17.3 Process Migration Act
- 17.4 Passing Control Act
- 17.5 Pivoting
- 17.6 Tools the Enable Pivoting
- 17.7 Lateral Movement Review
- Module 18 Notes
- 18.1 Persistence
- 18.2 Breeding RATS Act
- 18.3 Bind and Reverse Shells
- 18.4 Bind Shells Act
- 18.5 Reverse Shells
- 18.6 Reverse Shells Act
- 18.7 Netcat
- 18.8 Netcat Act
- 18.9 Scheduled Tasks
- 18.10 Scheduled Tasks Act
- 18.11 Services and Domains
- 18.12 Persistence Review
- Module 19 Notes
- 19.1 Cover Your Tracks
- 19.2 Cover Your Tracks – Timestomp Files Act
- 19.3 Cover Your Tracks – Frame the Administrator Act
- 19.4 Cover Your Tracks – Clear the Event Log Act
- 19.5 Cover Your Tracks Review
- Module 20 Notes
- 20.1 The Report
- 20.2 The Report Review
- Module 21 Notes
- 21.1 Post Engagement Cleanup_1
- 21.3 Post Engagement Cleanup Review
- 21.4 PenTest Plus Conclusion
- Introduction and Overview
- Compare and Contrast Information Security Roles
- Compare and Contrast Security Control and Framework Types
- Module Summary
- Explain Threat Actor Types and Attack Vectors
- Explain Threat Intelligence Sources
- Module Summary
- Assess Organizational Security with Network Reconnaissance Tools
- Packet Capture and Replay Demo
- Explain Security Concerns with General Vulnerability Types
- Summarize Vulnerability Scanning Techniques
- Explain Penetration Testing Concepts
- Module Summary
- Compare and Contrast Social Engineering Techniques
- Analyze Indicators of Malware-based Attacks
- Fork Bomb Malware Demo
- Module Summary
- Compare and Contrast Cryptographic Ciphers
- Summarize Cryptographic Modes of Operation
- Summarize Cryptographic Use Cases and Weaknesses
- Summarize Other Cryptographic Technologies
- Module Summary
- Implement Certificates and Certificate Authorities
- Implement PKI Management
- Implementing a PKI Demo
- Module Summary
- Summarize Authentication Design Concepts
- Implement Knowledge-based Authentication
- Password Cracker Demo
- Implement Authentication Technologies
- Summarize Biometrics Authentication Concepts
- Module Summary
- Implement Identity and Account Types
- Implement Account Policies
- Account Types and Polices Demo
- Implement Authorization Solutions
- Explain the Importance of Personnel Policies
- Module Summary
- Implement Secure Network Designs
- Implement Secure Switching and Routing
- Various Types of Network Attacks Demo
- Implement Secure Wireless Infrastructure
- Implement Load Balancers
- Module Summary
- Implement Firewalls and Proxy Servers
- Implement Network Security Monitoring
- Summarize the Use of SIEM
- Module Summary
- Implement Secure Network Operations Protocols
- Implement Secure Application Protocols
- Implement Secure Remote Access Protocols
- Module Summary
- Implement Secure Firmware
- Implement Endpoint Security
- Endpoint Protection Demo
- Explain Embedded System Security Implications
- Module Summary
- Implement Mobile Device Management
- Implement Secure Mobile Device Connections
- Module Summary
- Analyze Indicators of Application Attack
- Analyze Indicators of Web Application Attacks
- Summarize Secure Coding Practices
- Implement Secure Script Environments
- Summarize Deployment and Automation Concepts
- Module Summary
- Summarize Secure Cloud and Virtualization Services
- Apply Cloud Security Solutions
- Summarize Infrastructure as Code Concepts
- Module Summary
- Explain Privacy and Data Sensitivity Concepts
- Explain Privacy and Data Protection Controls
- Module Summary
- Summarize Incident Response Procedures
- Utilize Appropriate Data Sources for Incident Response
- Apply Mitigation Controls
- Module Summary
- Explain Key Aspects of Digital Forensics Documentation
- Explain Key Aspects of Digital Forensics Evidence Acquisition
- Module Summary
- Explain Risk Management Processes and Concepts
- Explain Business Impact Analysis Concepts
- Module Summary
- Implement Redundancy Strategies
- Implement Backup Strategies
- Implement Cybersecurity Resiliency Strategies
- Module Summary
- Explain the Importance of Physical Site Controls
- Explain the Importance of Physical Host Security Controls
- Module Summary
- Retrieving System Information
- Install Hyper-V
- Server Optimization
- Apply Operating System Updates
- Configure IPv4 and IPv6 Addressing
- Cloning and Deploying Disk Images
- Remote and Unattended Installation of Windows OS
- Network Based OS Administration
- Install Server Roles
- Introduction to Failover Clustering
- Introduction to Network Load Balancing
- Understand File Compression Formats
- Understanding Common Ports and Protocols
- Routing and Remote Access Servers
- Installing a Directory Server
- Installing a Database Server
- Installing an Email Server
- Configuring a File Server
- Configuring a Print Server
- Storage Technologies using iSCSI
- Introduction to IPSec
- Controlling VPN Access with RADIUS
- Plan for Storage Capacity using Disk Quota
- Managing System Storage
- Understanding Public Key Infrastructure
- Understanding Malware
- Understand Server Backup and Restore
- Troubleshoot Operating Systems Part 1
- Troubleshoot Operating Systems Part 2
- Troubleshoot Operating Systems Part 3