CompTIA Linux+ (XK0-004)
CompTIA Security+ (SY0-601)
CompTIA Cloud Essentials+ (CLO-002)
CompTIA Cloud+ (CVO-002)
CompTIA CV0-001: CompTIA Cloud +
CompTIA Cloud Overview
Unix Administration Basics
CompTIA MB0-001: Mobility+
CompTIA FC0-U61: IT Fundamentals
CompTIA LX0-101 & LX0-102: CompTIA Linux+
CompTIA Advanced Security Practitioner (CASP) CAS-003
CompTIA PenTest+ (PT0-001)
CompTIA A+ 220-1001 (Core 1)
CompTIA CySA+ (Cybersecurity Analyst+) CS0-002
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Network+ N10-007
CompTIA Network+ N10-008 (New)
CompTIA Linux+ (XK0-004)
CompTIA Linux+ (XK0-004)
- Module 1: Intro & Performing Basic Linux Tasks
- Module 2: Managing Users and Groups
- Module 3: Managing Permissions and Ownership
- Module 4: Managing Storage
- Module 5: Managing Files and Directories
- Module 6: Managing Kernel Modules
- Module 7: Managing the Linux Boot Process
- Module 8: Managing System Components
- Module 9: Managing Devices
- Module 10: Managing Networking
- Module 11: Managing Packages and Software
- Module 12: Securing Linux Systems
- Module 13: Working with Bash Scripts
- Module 14: Automating Tasks
- Module 15: Installing Linux
Course Information:
- Total Course Video Hours: 24 Hrs 34 Min
- Total Videos: 68
CompTIA Security+ (SY0-601)
CompTIA Security+ (SY0-601)
- Module 1: Information Security Roles Security Control and Framework Types
- Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
- Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
- Module 4: Social Engineering, Indicators of Malware Attacks
- Module 5: Cryptography
- Module 6: Certificates and PKI
- Module 7: Authentication
- Module 8: Identity and Accounts, Authorization, Personnel Polices
- Module 9: Network Design and Hardware (Part 1)
- Module 10: Network Hardware (Part 2)
- Module 11: Network Protocols
- Module 12: Endpoint Security
- Module 13: Mobile Devices
- Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
- Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
- Module 16: Privacy and Data Protection
- Module 17: Incident Response
- Module 18: Forensic
- Module 19: Risk Management and Business Impact Analysis
- Module 20: Redundancy and Backup Strategies
- Module 21: Physical Security
- Module 22: Afterword
Course Information:
- Total Course Video Hours: 14 Hrs 4 Min
- Total Videos: 91
CompTIA Cloud Essentials+ (CLO-002)
CompTIA Cloud Essentials+ (CLO-002)
- Module 1: Understanding Cloud Computing Concepts
- Module 2: Applying Cloud Business Principles
- Module 3: Advising a Cloud Design and Migration
- Module 4: Operating in the Cloud
- Module 5: Managing Cloud Governance
- Module 6: Exam Information, Review and Summary
- Module 7: Activities
- Module 8: Tools and Resources
Course Information:
- Total Course Video Hours: 10 Hrs 6 Min
- Total Videos: 70
CompTIA Cloud+ (CVO-002)
CompTIA Cloud+ (CVO-002)
- Module 1: Preparing to Deploy Cloud Solutions
- Module 2: Deploying a Pilot Project
- Module 3: Testing Pilot Project Deployments
- Module 4: Designing a Secure and Compliant Cloud Infrastructure
- Module 5: Designing and Implementing a Secure Cloud Environment
- Module 6: Planning Identity and Access Management for Cloud Deployments
- Module 7: Determining CPU and Memory Sizing for Cloud Deployments
- Module 8: Determining Storage Requirements for Cloud Deployments
- Module 9: Analyzing Workload Characteristics to Ensure Successful Migration
- Module 10: Maintaining Cloud Systems
- Module 11: Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures
- Module 12: Analyzing Cloud Systems for Performance
- Module 13: Analyzing Cloud Systems for Anomalies and Growth Forecasting
- Module 14: Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues
- Module 15: Troubleshooting Connectivity Issues
- Module 16: Troubleshooting Security Issues
- Module 17: Exam Information, Review, and Summary
- Module 18: Activities
Course Information:
- Total Course Video Hours: 13 Hrs 55 Min
- Total Videos: 151
CompTIA CV0-001: CompTIA Cloud +
CompTIA CV0-001: CompTIA Cloud +
- Module 1
- Module 2
- Module 3
- Module 4
- Module 5
- Module 6
- Module 7
Course Information:
- Total Course Video Hours: 9 Hrs 52 Min
- Total Videos: 53
CompTIA Cloud Overview
CompTIA Cloud Overview
- Domain 1 – Characteristics of Cloud Services from a Business Perspect
- Domain 2 – Cloud Computing and Business Value
- Domain 3 – Technical Perspectives/Cloud Types
- Domain 4 – Steps to Successful Adoption of Cloud
- Domain 5 – Impact and Changes of Cloud Computing on IT Service Management
- Domain 6 – Risks and Consequences of Cloud Computing
Course Information:
- Total Course Video Hours: 5 Hrs 28 Min
- Total Videos: 42
Unix Administration Basics
Unix Administration Basics
- Module 1: Virtual Box
- Module 2: Basic Commands
- Module 3: Special Characters
- Module 4: File Editing
- Module 5: File System Structure
- Module 6: Finding Files
- Module 7: Shell Special Characters
- Module 8: Regular Expressions
- Module 9: Process Management
- Module 10: Job Scheduling
- Module 11: Customizing Your Account
- Module 12: Unix Printing
- Module 13: Networking
- Module 14: X Windows
- Module 15: Back Up And Compression
- Module 16: Text Utility
- Module 17: Shell Scripting
- Module 18: System Administration Basics
Course Information:
- Total Course Video Hours: 13 Hrs 59 Min
- Total Videos: 106
CompTIA MB0-001: Mobility+
CompTIA MB0-001: Mobility+
- Module 1: Over-The-Air Technologies
- Module 2: Network Infrastructure
- Module 3: Mobile Device Manager
- Module 4: Security
- Module 5: Troubleshooting
Course Information:
- Total Course Video Hours: 7 Hrs 41 Min
- Total Videos: 46
CompTIA FC0-U61: IT Fundamentals
CompTIA FC0-U61: IT Fundamentals
- Module 1: Instructions
- Module 2: Managing Software
- Module 3: Configuring Hardware
- Module 4: Managing Files
- Module 5: Booting Files
- Module 6: X
- Module 7: Admin
- Module 8: Basic Networking
- Module 9: Scripts
- Module 10: Security
Course Information:
- Total Course Video Hours: 9 Hrs 5 Min
Total Videos: 51
CompTIA LX0-101 & LX0-102: CompTIA Linux+
CompTIA LX0-101 & LX0-102: CompTIA Linux+
- Module 1 – IT Concepts and Terminology
- Module 2 – Infrastructure
- Module 3 – Applications and Software
- Module 4 – Software Development
- Module 5 – Database Fundamentals
- Module 6 – Security
Course Information:
- Total Course Video Hours: 9 Hrs 5 Min
- Total Videos: 51
CompTIA Advanced Security Practitioner (CASP) CAS-003
CompTIA Advanced Security Practitioner (CASP) CAS-003
- Module 1 – Risk Management
- Module 2 – Enterprise Security Architecture
- Module 3 – Enterprise Security Operations
- Module 4 – Technical Integration of Enterprise Security
- Module 5 – Research, Development and Collaboration
Course Information:
- Total Course Video Hours: 28 Hrs 22 Min
- Total Videos: 89
CompTIA PenTest+ (PT0-001)
CompTIA PenTest+ (PT0-001)
- Module 1 – The Pen Test Engagement
- Module 2 – Passive Reconnaissance
- Module 3 – Active Reconnaissance
- Module 4 – Physical Security
- Module 5 – Social Engineering
- Module 6 – Vulnerability Scan Analysis
- Module 7 – Password Cracking
- Module 8 – Penetrating Wired Networks
- Module 9 – Penetrating Wireless Networks
- Module 10 – Windows Exploits
- Module 11 – Linux Exploits
- Module 12 – Mobile Devices
- Module 13 – Specialized Systems
- Module 14 – Scripts
- Module 15 – Application Testing
- Module 16 – Web App Exploits
- Module 17 – Lateral Movement
- Module 18 – Persistence
- Module 19 – Cover Your Tracks
- Module 20 – The Report
- Module 21 – Post Engagement Cleanup
Course Information:
- Total Course Video Hours: 34 Hrs 22 Min
- Total Videos: 215
CompTIA A+ 220-1001 (Core 1)
CompTIA A+ 220-1001 (Core 1)
- Module 1 – Mobile Devices
- Module 2 – Networking
- Module 3 – Hardware
- Module 4 – Virtualization and Cloud Computing
- Module 5 – Hardware and Network Troubleshooting
Course Information:
- Total Course Video Hours: 20 Hrs 40 Min
- Total Videos: 61
CompTIA CySA+ (Cybersecurity Analyst+) CS0-002
CompTIA CySA+ (Cybersecurity Analyst+) CS0-002
- Module 1: Threat and Vulnerability Management
- Module 2: Software and Systems Security
- Module 3: Security Operations and Monitoring
- Module 4: Incident Response
- Module 5: Compliance and Assessment
- Module 6: Afterword
Course Information:
- Total Course Video Hours: 14 Hrs 34 Min
- Total Videos: 36
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Cybersecurity Analyst (CySA+)
- Module 1: Threat Management
- Module 2: Vulnerability Management
- Module 3: Cyber Incident Response
- Module 4: Security Architecture and Tool Sets
Course Information:
- Total Course Video Hours: 17 Hrs 55 Min
- Total Videos: 67
CompTIA Network+ N10-007
CompTIA Network+ N10-007
- Module 1 – Networking Concepts
- Module 2 – Infrastructure
- Module 3 – Network Operation
- Module 4 – Network Security
- Module 5 – Network Troubleshooting and Tools
Course Information:
- Total Course Video Hours: 33 Hrs 10 Min
- Total Videos: 162
CompTIA Network+ N10-008 (New)
CompTIA Network+ N10-008 (New)
- Module 1 – Networking Fundamentals
- Module 2 – Cables and Connectors
- Module 3 – Internet Protocol (IP)
- Module 4 – Layer 7 Protocols
- Module 5 – Network Services
- Module 6 – Networking Devices
- Module 7 – Networked Devices
- Module 8 – Routing and Bandwidth Management
- Module 9 – Ethernet Switching
- Module 10 – Wireless Technologies
- Module 11 – Network Performance
- Module 12 – High Availability and Disaster Recovery
- Module 13 – Organizational Documents
- Module 14 – Network Security
- Module 15 – Network Troubleshooting
Course Information:
- Total Course Video Hours: 46 Hrs 25 Min
- Total Videos: 189
- CompTIA Security (CAS-005) Course Intro
- 1.1 Security Program Management and Documentation
- 1.2 Governance Risk and Compliance
- 1.3 Change and Configuration Management
- 1.4 Data Governance in Staging Environments
- 1.5 Risk Assessment and Management
- 1.6 Risk Considerations
- 1.7 Industry Information Security Standards
- 1.8 Security and Reporting Frameworks
- 1.9 Privacy Regulations
- 1.10 Cross-Jurisdictional Compliance Requirements
- 1.11 Threat Actors and Characteristics
- 1.12 Attack Frameworks and Models
- 1.13 Attack Surface Determination
- 1.14 Security Challenges with Artificial Intelligence
- 2.1 Resilient System Design
- 2.2 Software and Hardware Assurance Methods
- 2.3 Continuous Integration-Continuous Deployment
- 2.4 Secure Architecture Design
- 2.5 Access Control Technologies
- 2.6 Access Control Models
- 2.7 Public Key Infrastructure
- 2.8 Implementing Secure Cloud Capabilities
- 2.9 Cloud Data Security Considerations
- 2.10 Cloud Shared Responsibility Model
- 2.11 Cloud Control Strategies
- 2.12 Integrating Zero Trust in Secure Architecture
- 3.1 Subject Access Control
- 3.2 Secrets Management
- 3.3 Conditional Access
- 3.4 Identity and Access Management Components
- 3.5 Endpoint and Server Security
- 3.6 Network Infrastructure Security Issues
- 3.7 Network Misconfigurations
- 3.8 IDS and IPS Issues
- 3.9 Domain Name Security
- 3.10 Email Security
- 3.11 Hardware Security Technologies and Techniques
- 3.12 Securing Specialized and Legacy Systems
- 3.13 Using Automation to Implement Security in the Enterprise
- 3.14 Security Content Automation Protocol
- 3.15 Examining Advanced Cryptographic Concepts
- 3.16 Identifying Cryptographic Use Cases
- 3.17 Applying Cryptographic Techniques
- 4.1 Security Information and Event Management
- 4.2 Data Aggregation Analysis
- 4.3 Behavior Baselines and Analytics
- 4.4 Incorporating Data Sources
- 4.5 Alerting, Reporting and Metrics
- 4.6 Attacks and Vulnerabilities
- 4.7 Mitigating Attacks and Vulnerabilities
- 4.8 Threat-hunting and Threat Intelligence
- 4.9 Threat Intelligence Sources
- 4.10 Analyzing Data and Artifacts
- 4.11 Malware Analysis
- 4.12 CompTIA SecurityX (CAS-005) Course Outro
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Device Hardware and Components
- 1.2 Mobile Device Connections and Accessories
- 1.3 Mobile Device Operating Systems
- 1.4 Troubleshooting Mobile Devices
- 1.5 Mobile Device,OS and Application Issues
- 1.6 Mobile Device,OS and Application Security
- 1.7 Identifying Connection Settings in Android
- 1.8 Identifying Connection Settings in iOS
- 2.1 Network Architecture
- 2.2 Ports and Protocols
- 2.3 Wireless Networking
- 2.4 Network Hosts and Services
- 2.5 DNS and DHCP
- 2.5.1 Activity - Working with DNS and DHCP
- 2.6 VPNs and VLANs
- 2.7 Network Devices
- 2.8 Basic SOHO Configuration
- 2.9 Internet Connections and Network Types
- 2.10 Networking Tools
- 2.11 Networking in Windows
- 2.11.1 Activity - Configuring Networking in Windows
- 2.12 Networking Commands
- 2.12.1 Activity - Working with Networking Commands
- 2.13 Troubleshooting Network Issues
- 3.1 Display Components and Attributes
- 3.2 Basic Cables and Connections
- 3.3 Network Cables and Connections
- 3.4 Storage Devices and Connections
- 3.5 Introduction to RAID
- 3.6 Motherboards and Form Factors
- 3.7 Motherboard Connections
- 3.8 BIOS and UEFI
- 3.9 CPUs and CPU Architecture
- 3.10 Expansion Cards
- 3.11 System Cooling
- 3.12 Power Supply Units
- 3.13 Printers and Multifunction Devices
- 3.14 Printer Maintenance
- 3.15 Troubleshooting Computer Components
- 3.16 Troubleshooting Storage and RAID Issues
- 3.17 Troubleshooting Video and Display Issues
- 3.18 Troubleshooting Printer Issues
- 4.1 Workstation Operating Systems
- 4.2 Common File System Types
- 4.3 Operating System Installation Types
- 4.4 Operating System Boot Methods
- 4.5 Storage Paritioning
- 4.5.1 Activity - Working with Storage Partitions
- 4.6 Identifying Windows Editions
- 4.7 Windows Upgrades
- 4.8 Windows OS Installations
- 4.9 Using Windows Task Manager
- 4.9.1 Activity - Working with Windows Task Manager
- 4.10 MMC Snap-ins
- 4.10.1 Activity - Working with MMC Snap-ins
- 4.11 Windows Operating System Tools
- 4.12 Microsoft Command Line Tools
- 4.12.1 Activity - Working with Microsoft Command Prompt
- 4.13 Configuring Microsoft Windows Settings
- 4.14 Configuring Windows Power Options
- 4.14.1 Activity - Working with Windows Power Options
- 4.15 Windows File Explorer
- 4.15.1 Activity - Working with File Explorer
- 4.16 Windows Domains vs Workgroups
- 4.17 macOS System Configuration
- 4.17.1 Activity - macOS Features and Tools
- 4.18 Linux Components
- 4.19 Linux Tools
- 4.20 Common Application Installation
- 5.1 Virtualization Concepts
- 5.1.1 Activity - Working with Virtual Machines
- 5.2 Working with Virtual Machines
- 5.2.1 Activity - Working with the Cloud
- 5.3 Cloud Computing
- 5.4 Working with the Cloud
- 5.5 Cloud Productivity Tools
- 6.1 Physical Security
- 6.2 Physical Access Security
- 6.3 Logical Security
- 6.4 Windows Security - Firewalls and Antivirus
- 6.4.1 Activity - Working with the Windows Firewalls and Antivirus
- 6.5 Windows Security Users and Groups
- 6.6 Windows Security - NTFS and Share Permissions
- 6.6.1 Activity - Working with NTFS and Share Permissions
- 6.7 Windows Security - Active Directory
- 6.8 Windows Security - Data Encryption
- 6.9 Wireless Security
- 6.10 Malware Types
- 6.11 Malware Detection and Prevention
- 6.12 Social Engineering
- 6.13 Security Threats
- 6.13.1 Activity - Security Vulnerabilities
- 6.14 Malware Removal Process
- 6.15 Workstation Security
- 6.16 Data Destruction Concepts
- 6.17 SOHO Network Security
- 6.18 Browser Security Settings
- 6.19 Troubleshooting PC Security Issues
- 7.1 Ticketing Systems
- 7.2 Asset Management
- 7.3 Document Types
- 7.4 Change Management
- 7.5 Workstation Backup and Recovery
- 7.6 Common Safety Procedures
- 7.7 Environmental Impact and Controls
- 7.8 Licensing and Policy Concepts
- 7.9 Communication and Professionalism
- 7.10 Basics of Scripting
- 7.11 Remote Access Technologies
- 7.12 Basics of Artificial Intelligence
- 7.13 Troubleshooting Methodology
- 7.14 CompTIA A+ Course Closeout
- Course Welcome
- Module Overview
- Instructor Introduction
- What is the CompTIA Data Plus Exam
- Roles that should consider the exam
- Exam Objectives
- Discussion - The Importance of Data
- US DOD Member Data Directives and 8570
- 1.1 Module Overview
- 1.2 Understanding Data Schemes
- 1.3 Databases
- 1.4 Demonstration - Google Cloud SQL
- 1.5 Data Warehouses and Data Lakes
- 1.7 Comparing OLTP and OLAP Processing
- 1.8 Demonstration - AWS Redshift
- 1.9 Demonstration - Deploy SQL DemoBench
- 1.10 What is Column Database
- 1.11 Data Structures, Files and Types
- 1.12 Module Summary Review
- 1.13 Module Review Questions
- 2.1 Module 2 Overview
- 2.2 Data Acquisition and Integration
- 2.3 Demonstration - Data Integration Techniques
- 2.4 API Fundamentals
- 2.5 Demonstration - Google Vision API
- 2.6 Data Profiling and Cleansing
- 2.7 Data Collection Method Options
- 2.8 Data Outliers
- 2.9 Understanding ETL and ELT
- 2.10 Query Optimization
- 2.11 Understanding Data Manipulation Techniques
- 2.12 Module Summary Review
- 2.13 Module Review Questions
- 3.1 Module Overview
- 3.2 Descriptive Statistical Methods
- 3.3 Measures of Tendency and Dispersion
- 3.4 Understanding Percentages
- 3.5 Inferential Statistical Methods
- 3.6 Hypothesis Testing with Excel
- 3.7 Whiteboard - Linear Regression and Correlation
- 3.8 Whiteboard - Analysis Testing
- 3.9 Module Summary Review
- 3.10 Module Review Questions
- 4.10 Module Review Questions
- 4.1 Module Overview
- 4.2 Translate Business Requirements to Reports
- 4.3 Whiteboard - Translate Business Requirements
- 4.4 Dashboard Fundamentals
- 4.5 Demonstration - Dashboard Components
- 4.6 Data Sources and Attributes
- 4.7 Understanding Chart and Graphs
- 4.8 Reports Type and Elements
- 4.9 Module Summary Review
- 5.1 Module Overview
- 5.2 Introduction to Data Governance
- 5.3 The Data Lifecycle
- 5.4 Determining Data Classification
- 5.5 Data Ownership
- 5.6 Data Storage Access
- 5.7 Data Privacy and Frameworks
- 5.8 Information Rights Management (IRM) and Data Loss Prevention (DLP)
- 5.9 Demonstration - Google Cloud DLP
- 5.10 Setting Data Quality Control
- 5.11 Methods to Validate Quality
- 5.12 Data Transformation Tools
- 5.13 Data Security Fundamentals
- 5.14 Master Data Management (MDM)
- 5.15 Module Summary Review
- 5.16 Module Review Questions
- 6.1 Module Overview
- 6.2 Course Summary Review
- 6.3 Data Plus Exam Experience
- 6.4 Certification CEU Requirements
- 6.5 Practice Exams-Additional Resources
- 6.6 Course Closeout
- 1.1 Pre Engagement Activities
- 1.2 Collaboration and Communication Activities
- 1.3 Testing Frameworks and Methodologies
- 1.3.1 Examining MITRE ATT&CK
- 1.4 Engagement Management Review
- 2.1 Passive Reconnaissance
- 2.1.1 Google Hacking
- 2.2 Active Reconnaissance
- 2.2.1 Port Scanning and Fingerprinting
- 2.2.2 Tracing a Network Path with Traceroute
- 2.2.3 Intercepting Data with Wireshark
- 2.2.4 Web Scraping
- 2.3 Enumeration Techniques
- 2.3.1 Directory Enumeration
- 2.3.2 Email Enumeration
- 2.4 Reconnaissance and Enumeration Scripts
- 2.4.1 Using Scripts
- 2.5 Reconnaissance and Enumeration Tools
- 2.5.1 Perform OSINT with Recon ng
- 2.5.2 Adding an API Key to Recon ng
- 2.5.3 Discovering IoT with Shodan
- 2.5.4 Performing WHOIS Lookups
- 2.5.5 Performing DNS Lookups
- 2.5.6 Using NMAP Scripts
- 2.5.7 Performing OSINT with theHarvester
- 2.6 Reconnaissance and Enumeration Review
- 3.1 Vulnerability Discovery
- 3.1.1 Performing a Vulnerability Scan with OpenVAS
- 3.1.2 Performing Static Code Analysis
- 3.2 Reconnaissance, Scanning and Enumeration Output Analysis
- 3.3 Physical Security
- 3.3.1 Cloning an RFID Badge
- 3.3.2 Cloning NFC with Flipper Zero
- 3.4 Vulnerability Discover and Analysis Review
- 4.1 Prioritize and Prepare Attacks
- 4.2 Network Attacks
- 4.2.1 Performing an On Path Attack
- 4.2.2 Executing a Network Attack with Metasploit
- 4.2.3 Migrating Meterpreter to Another Process
- 4.2.4 Creating a Malware Dropper with Msfvenom
- 4.2.5 Using Netcat
- 4.2.6 Capturing Files with Wireshark
- 4.3 Authentication Attacks
- 4.3.1 Brute Forcing with Medusa
- 4.3.2 Pass the Hash
- 4.3.3 Password Spraying with Hydra
- 4.3.4 Pass the Token Attack
- 4.3.5 Spoofing Authentication with Responder
- 4.3.6 Cracking Linux Passwords with John the Ripper
- 4.3.7 Hashcat Password Cracking
- 4.4 Host Based Attacks
- 4.4.1 Privilege Escalation with Eternal Blue
- 4.4.2 Log Tampering
- 4.4.3 Pwn a Linux Target from Start to Finish
- 4.5 Web Application Attacks
- 4.5.1 Performing Directory Traversal
- 4.5.2 Grabbing Passwords with SQL Injection
- 4.5.3 SQLi on a Live Website Part 1
- 4.5.4 SQLi on a Live Website Part 2
- 4.5.5 Command Injection
- 4.5.6 Injecting an iFrame with Stored XSS
- 4.5.7 Busting the DOM
- 4.5.8 IDOR Abuse with Burp Suite
- 4.5.9 Web Session Hijacking
- 4.5.10 Parameter Tampering with Burp Suite
- 4.5.11-XSS Credential Theft
- 4.6 Cloud Based Attacks
- 4.6.1 Hacking S3 Buckets
- 4.7 Wireless Attacks
- 4.7.1 WiFi Pumpkin Evil Twin
- 4.7.2 WPA2 Crack Attack
- 4.8 Social Engineering Attacks
- 4.8.1 Phishing for Credentials
- 4.8.2 OMG Cable Baiting
- 4.9 Specialized System Attacks
- 4.9.1 Pwn a Mobile Device
- 4.10 Automated Script Attacks
- 4.11 Attacks and Exploits Review
- 5.1 Establishing and Maintaining Persistence
- 5.1.1 Creating a Persistent Netcat Back Door
- 5.1.2 Exfiltrating Data with a Scheduled Task
- 5.2 Lateral Movement
- 5.2.1 Preparing to Pivot
- 5.2.2 Lateral Movement through Pivoting
- 5.3 Staging and Exfiltration
- 5.3.1 Hiding Data with Steganography
- 5.3.2 Automatically Exfiltrating Data
- 5.4 Cleanup and Restoration
- 5.5 Post-Exploitation and Lateral Movement Review
- 6.1 Penetration Test Report Components
- 6.2 Report Findings and Recommendations
- 6.2.1 Examining Pentest Reports
- 6.3 Deliverables Review
- 6.4 Course Conclusion
- 1.1 Introduction to Linux XK0-005
- 1.2 Instructor Introduction
- 1.3 Course Introduction
- 1.4 Identify the Linux Design Philosophy
- 1.5 Enter Shell Commands
- 1.6 Shell Commands Activity
- 1.7 Get Help with Linux
- 2.1 Assume Superuser Privileges
- 2.2 Create, Modify, and Delete Users
- 2.3 Create, Modify, and Delete Groups
- 2.4 Query Users and Groups
- 2.5 Configure Account Profiles
- 3.1 Modify File and Directory Permissions
- 3.2 Modify File and Directory Ownership
- 3.3 Configure Special Permissions and Attributes
- 3.4 Troubleshoot Permissions Issues
- 4.1 Create Partitions
- 4.2 Manage Logical Volumes
- 4.3 Mount File Systems
- 4.4 Manage File Systems
- 4.5 Navigate the Linux Directory Structure
- 4.6 Troubleshoot Storage Issues
- 4.7 Container Storage Management
- 4.8 Advanced Data Management and Security for Containers
- 5.1 Create and Edit Text Files
- 5.2 Search for Files
- 5.3 Perform Operations on Files and Directories
- 5.4 Process Text Files
- 5.5 Manipulate File Output
- 6.1 Explore the Linux Kernel
- 6.2 Install and Configure Kernel Modules
- 6.3 Monitor Kernel Modules
- 7.1 Configure Linux Boot Components
- 7.2 Configure GRUB
- 8.1 Configure Localization Options
- 8.2 Configure GUIs
- 8.3 Manage Services
- 8.4 Troubleshoot Process Issues
- 8.5 Troubleshoot CPU and Memory Issues
- 8.6 - Troubleshooting With systemd
- 9.1 Identify the Types of Linux Devices
- 9.2 Configure Devices
- 9.3 Monitor Devices
- 9.4 Troubleshoot Hardware Issues
- 10.1 Identify TCP-IP Fundamentals
- 10.2 Identify Linux Server Roles
- 10.3 Connect to a Network
- 10.4 Configure DHCP and DNS Client Services
- 10.5 Configure Cloud and Virtualization Technologies
- 10.6 Troubleshoot Networking Issues
- 11.1 Identify Package Managers
- 11.2 Manage RPM Packages with YUM
- 11.3 Manage Debian Packages with APT
- 11.4 Configure Repositories
- 11.5 Acquire Software
- 11.6 Build Software from Source Code
- 11.7 Troubleshoot Software Dependency Issues
- 12.1 Implement Cybersecurity Best Practices
- 12.2 Implement Identity and Access Management Methods
- 12.3 Configure SELinux or AppArmor
- 12.4 Configure Firewalls
- 12.5 Implement Logging Services
- 12.6 Back Up, Restore, and Verify Data
- 12.7 NFTables - Setting Up Advanced Firewalls
- 13.1 Customize the Bash Shell Environment
- 13.2 Identify Scripting and Programming Fundamentals
- 13.3 Write and Execute a Simple Bash Script
- 13.4 Incorporate Control Statements in Bash Scripts
- 14.1 Schedule Jobs
- 14.2 Implement Version Control Using Git
- 14.3 Identify Orchestration Concepts
- 15.1 Prepare for Linux Installation
- 15.2 Perform the Installation
- 16.1 - Infrastruture As Code (IAC)
- 16.2 - Containers, Cloud, and Orchestration Concepts
- 16.3 - Container Management
- 16.4 - Container and Cloud Networking Basics
- 1.1 Networking Overview
- 1.1.1-Activity-Creating a Network
- 1.2 OSI and DOD Model
- 1.2.1-Activity-Examining the OSI Layers
- 1.3 Networking Appliances, Applications and Functions
- 1.3.1-Activity-Using Online Proxies
- 1.4 Cloud Concepts and Connectivity
- 1.4.1-Activity-Creating Cloud Resources
- 1.5 Ports, Protocols, Services and Traffic Types
- 1.5.1-Activity-Examining ARP and ICMP
- 1.5.2-Activity-Examining DNS and Ports
- 1.6 Wireless Transmission Media
- 1.6.1-Activity-Configuring-WiFi
- 1.7 Wired Transmission Media and Transceivers
- 1.8 Network Topologies, Architectures and Types
- 1.9a IPv4 Network Addressing - Part 1
- 1.9b IPv4 Network Addressing - Part 2
- 1.9.1-Activity-Configuring Client IP Settings
- 1.9.2-Activity-Subnetting - Delta 128
- 1.9.3-Activity-Subnetting-Delta-64
- 1.9.4-Activity-Subnetting WAN Links
- 1.10a Modern Network Environments - Part 1
- 1.10b Modern Network Environments - Part 2
- 2.1 Implementing Routing Technologies
- 2.1.1-Activity-Setting Up Basic Routing
- 2.1.2-Activity-Adding Static Routes
- 2.1.3-Activity- Configuring Routing Protocols
- 2.1.4-Activity-Configuring Port Address Translation
- 2.2 Configuring Switching Technologies and Features
- 2.2.1-Activity-Connecting Devices with a Switch
- 2.2.2-Activity-Creating VLANs
- 2.2.3-Activity-Voice and Data VLANs
- 2.2.4-Activity-VLAN-Trunking
- 2.2.5-Activity-VLAN Routing
- 2.3 Selecting and Configuring Wireless Devices and Technologies
- 2.3.1-Activity-Creating a WLAN
- 2.4 Physical Installations
- 2.4.1-Activity-Managing Cable
- 2.4.2-Activity-Punching Down Twisted Pair
- 3.1 Organizational Processes and Procedures
- 3.2 Network Monitoring Technologies
- 3.2.1-Activity-Exploring SNMP
- 3.3 Disaster Recovery (DR)
- 3.4 IPv4 and IPv6 Network Services
- 3.4.1-Activity-Implementing a DHCP Relay Agent
- 3.4.2-Activity-DHCP Relay Agent
- 3.4.3-Activity-DNS-Part 1
- 3.4.4-Activity-DNS-Part 2
- 3.5 Network Access and Management
- 4.1a Network Security Concepts - Part 1
- 4.1b Network Security Concepts - Part 2
- 4.1.1-Activity-Exploring Encryption
- 4.1.2-Activity-Applying Authorization
- 4.1.3-Activity-Testing a Honeypot
- 4.2 Network Attacks
- 4.2.1-Activity-Launching a Denial of Service Attack
- 4.2.2-Activity-Phishing for Credentials
- 4.2.3-Activity-Deploying a Malicious Charging Cable
- 4.3 Network Defense
- 4.3.1-Activity-Implementing ACLs
- 5.1 Troubleshooting Methodology
- 5.2 Common Cabling and Physical Interface Issues
- 5.2.1-Activity-Selecting the Right Cable
- 5.2.2-Activity-Crimping an RJ-45 End on a Cable
- 5.3 Network Service Issues
- 5.3.1-Activity-Troubleshooting a Routed Network
- 5.4 Performance Issues
- 5.5 Troubleshooting Tools and Protocols
- 5.5.1-Activity-Using Command Line Commands
- 5.5.2-Activity-Using NSLOOKUP and DIG
- 5.5.3-Activity-Using NMAP
- 5.5.4-Activity-Troubleshooting Using CDP and LLDP
- 5.5.5-Activity-Testing a cable
- 5.5.6-Activity-Toning a cable
- 5.5.7-Activity-Using a Spectrum Analyzer
- 5.5.8-Activity-Testing a Fiber Optic Cable
- 5.5.9-Activity-Using Network Device Commands
- 5.6 Course Closeout
- CompTIA Security (CAS-005) Course Intro
- 1.1 Security Program Management and Documentation
- 1.2 Governance Risk and Compliance
- 1.3 Change and Configuration Management
- 1.4 Data Governance in Staging Environments
- 1.5 Risk Assessment and Management
- 1.6 Risk Considerations
- 1.7 Industry Information Security Standards
- 1.8 Security and Reporting Frameworks
- 1.9 Privacy Regulations
- 1.10 Cross-Jurisdictional Compliance Requirements
- 1.11 Threat Actors and Characteristics
- 1.12 Attack Frameworks and Models
- 1.13 Attack Surface Determination
- 1.14 Security Challenges with Artificial Intelligence
- 2.1 Resilient System Design
- 2.2 Software and Hardware Assurance Methods
- 2.3 Continuous Integration-Continuous Deployment
- 2.4 Secure Architecture Design
- 2.5 Access Control Technologies
- 2.6 Access Control Models
- 2.7 Public Key Infrastructure
- 2.8 Implementing Secure Cloud Capabilities
- 2.9 Cloud Data Security Considerations
- 2.10 Cloud Shared Responsibility Model
- 2.11 Cloud Control Strategies
- 2.12 Integrating Zero Trust in Secure Architecture
- 3.1 Subject Access Control
- 3.2 Secrets Management
- 3.3 Conditional Access
- 3.4 Identity and Access Management Components
- 3.5 Endpoint and Server Security
- 3.6 Network Infrastructure Security Issues
- 3.7 Network Misconfigurations
- 3.8 IDS and IPS Issues
- 3.9 Domain Name Security
- 3.10 Email Security
- 3.11 Hardware Security Technologies and Techniques
- 3.12 Securing Specialized and Legacy Systems
- 3.13 Using Automation to Implement Security in the Enterprise
- 3.14 Security Content Automation Protocol
- 3.15 Examining Advanced Cryptographic Concepts
- 3.16 Identifying Cryptographic Use Cases
- 3.17 Applying Cryptographic Techniques
- 4.1 Security Information and Event Management
- 4.2 Data Aggregation Analysis
- 4.3 Behavior Baselines and Analytics
- 4.4 Incorporating Data Sources
- 4.5 Alerting, Reporting and Metrics
- 4.6 Attacks and Vulnerabilities
- 4.7 Mitigating Attacks and Vulnerabilities
- 4.8 Threat-hunting and Threat Intelligence
- 4.9 Threat Intelligence Sources
- 4.10 Analyzing Data and Artifacts
- 4.11 Malware Analysis
- 4.12 CompTIA SecurityX (CAS-005) Course Outro
- 1.1 - Introduction to Tech+
- 1.2 - Understanding Notational Systems
- 1.3 - The Basics of Computing
- 1.4 - Comparing Units of Measure
- 1.5 - Troubleshooting Methodology, Cases and Tips
- 2.1 - Introduction to Infrastructure
- 2.2 - Types of Computing Devices
- 2.3 - Internal Components of A Computer
- 2.4 - Types of Storage
- 2.5 - Peripheral Devices and Installation
- 2.6 - Virtualization and Cloud Technologies
- 2.7 - Common Internet Service Types
- 3.1 - Introduction to Networking
- 3.2 - Core Principles of Computer Networking
- 3.3 - Network Ports
- 3.4 - Network Addresses and Identifiers
- 3.5 - Network Models and Types
- 3.6 - Networking Devices and Connectors
- 3.7 - Small Wireless Networks
- 4.1 Introduction to Operating Systems (OS)
- 4.2 - What is an Operating System_
- 4.3 - Drivers, Applications, Tasks and System Services
- 4.4 - File and Disk Management
- 4.5 - Backup and Recovery
- 5.1 - Common Software Applications
- 5.2 - Productivity Software
- 5.3 - Business and Enterprise Software
- 5.4 - Manging Software
- 5.5 - Trusted Software Sources
- 6.1 - Introduction To Web Browsing
- 6.2 - Browser Settings, Configuration and Maintenance
- 6.3 - Secure Web Browsing
- 6.4 - Protecting Your Privacy
- 7.1 - Introduction to Programming
- 7.2 - Programming Tools
- 7.3 - Programming Organization and Logic Flows
- 7.4 - Understanding Programming Language Categories
- 7.5 - Code Maintenance – Version Control Systems and Branching
- 7.6 - Fundamental Data Types and Their Characteristics
- 8.1 - Introduction to Databases and the Value of Data
- 8.2 - Database Concepts and Structures
- 8.3 - Working with Relational Databases
- 8.4 - Database Operations and Access
- 8.5 - Database Backup and Recovery
- 9.1 - Basic Security Concepts and Strategies
- 9.2 - Identifying Common Security Threats
- 9.3 - Securing Devices and Networks
- 9.4 - Security Tools and Software
- 9.5 - Encryption and Data Protection
- 10.1 - The Impact and Use of AI
- 10.2 - Course Closeout
- 1.0 Introduction to the Course
- 1.1 Fundamental Security Concepts
- 1.2 Zero Trust
- 1.3 Deception and Disruption
- 1.3.1 ACTIVITY - Testing a Honeypot
- 1.4 Security Controls
- 1.5 Change Management and Security
- 1.6 Cryptography Basics
- 1.6.1 ACTIVITY - Examining Symmetric Encryption
- 1.7 Asymmetric Encryption
- 1.7.1 ACTIVITY - Exploring Asymmetric Encryption
- 1.8 Hashing
- 1.8.1 ACTIVITY - Verifying Integrity with Hashing
- 1.9 Digital Certificates
- 1.10 Public Key Infrastructure
- 1.11 Data and Keys
- 1.12 Crypto Implementations
- 1.13 Blockchain
- 1.14 Non-Cryptographic Data Protection
- 2.1 Threat Actors and Motivations
- 2.2 Threat Vectors
- 2.2.1 ACTIVITY - O.MG Cable Baiting
- 2.3 Social Engineering
- 2.4 Operating System Vulnerabilities and Attacks
- 2.5 Application Vulnerabilities and Attacks
- 2.5.1 ACTIVITY - Performing a Buffer Overflow
- 2.6 Web-based Vulnerabilities and Attacks
- 2.6.1 ACTIVITY - Abusing Unsanitized Input
- 2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection
- 2.6.3 ACTIVITY - Swiping a Token with XSS
- 2.7 Other Vulnerabilities
- 2.8 Common Malicious Activity Indicators
- 2.9 Insider Threat Indicators
- 2.10 Social Engineering Indicators
- 2.10.1 ACTIVITY - Capturing Credentials through Social Engineering
- 2.11 Malware Activity Indicators
- 2.12 Operating System Attack Indicators
- 2.13 Application Attack Indicators
- 2.13.1 ACTIVITY - Recognizing Directory Traversal
- 2.14 Physical Attack Indicators
- 2.14.1 ACTIVITY - Quickly Cloning an RFID Badge
- 2.15 Network Attack Indicators
- 2.15.1 ACTIVITY - Crashing a Target with DoS
- 2.16 Cryptographic Attack Indicators
- 2.17 Password Attack Indicators
- 2.17.1 ACTIVITY - Password Cracking
- 2.18 Network Segmentation
- 2.19 Access Control
- 2.20 Enterprise Device Hardening
- 3.1 Network Segmentation
- 3.1.1 ACTIVITY - Segementing a Network
- 3.2 High Availability
- 3.3 Virtualization
- 3.3.1 ACTIVITY - Deploying Docker Containers
- 3.4 Cloud
- 3.5 Serverless Computing
- 3.6 IoT
- 3.7 ICS SCADA
- 3.7.1 ACTIVITY - Operating a SCADA System
- 3.8 RTOS and Embedded Systems
- 3.9 Reducing the Attack Surface
- 3.10 Firewalls
- 3.11 IDS IPS.mp4
- 3.12 Secure Communications - Access
- 3.13 Port Security
- 3.14 SD-WAN and SASE
- 3.15 Data Classifications
- 3.16 Protecting Data Types
- 3.17 Data Considerations
- 3.18 Redundancy
- 3.19 Alternate Sites
- 3.20 Multiple Platforms
- 3.21 Business Continuity
- 4.1 Secure Baselines
- 4.2 Attack Surface Reduction
- 4.3 Wireless Installation
- 4.4 Wireless Security Settings
- 4.5 Mobile Solutions
- 4.5.1 ACTIVITY - Pwning a Mobile Device
- 4.6 Application Security Management
- 4.7 Asset Management
- 4.8 Vulnerability Management
- 4.9 Monitoring Activities
- 4.10 Monitoring Tools
- 4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities
- 4.11 Firewall Configuration
- 4.11.1 ACTIVITY - Configuring Firewall Rules
- 4.12 Intrusion Detection Configuration
- 4.13 Web Traffic Filtering
- 4.14 Operating System Policy
- 4.14.1 ACTIVITY - Examining Windows Group Policy
- 4.15 Network Service Security
- 4.16 Data Loss Protection
- 4.16.1 ACTIVITY - Checking File Integrity
- 4.17 Network Access Control
- 4.17.1 ACTIVITY - Require Multifactor Authentication
- 4.18 Identity Management
- 4.19 Access Management
- 4.19.1 ACTIVITY - Implementing Access Control
- 4.20 Security Automation
- 4.21 Incident Response
- 4.22 Digital Forensics
- 5.1 Elements of Effective Security Governance
- 5.2 Elements of the Risk Management Process
- 5.3 Third Party Risk Assessment and Management
- 5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure
- 5.4 Effective Security Compliance
- 5.5 Audits and Assessments
- 5.5.1 ACTIVITY - Conducting OSINT
- 5.5.2 ACTIVITY - Performing Active Reconnaissance
- 5.6 Security Awareness Practices
- 5.7 Course Outro
- 1.1 Course Introduction
- 1.2 Instructor Introduction
- 1.3 What is CySA
- 1.4 Exam Objectives
- 1.5 Cybersecurity Pathway
- 1.6 DoD Baseline Certification
- 2.1 Domain 1 - Security Operations Overview
- 2.2 System and Network Architecture Concepts in Security Operations
- 2.3 Log Files
- 2.4 Operating Systems
- 2.5 Infrastructure Concepts
- 2.6 Network Architecture
- 2.7 Software Defined Networking
- 2.8 Whiteboard Discussion - Network Architectures
- 2.9 Identity and Access Management IAM Basics
- 2.10 Demonstration - IAM
- 2.11 Encryption
- 2.12 Sensitive Data
- 2.13 1.2 Analyze Indicators of Potentially Malicious Activity
- 2.14 Network Attack
- 2.15 Host Attacks
- 2.16 Application Related Attacks
- 2.17 Social Attacks
- 2.18 Tools or Techniques to Determine Malicious Activity Overview
- 2.19 Tools and Toolsets For Identifying Malicious Activity
- 2.20 Common Techniques
- 2.21 Programming Concerns
- 2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
- 2.23 Threat Actors
- 2.24 Tactics, Techniques and Procedures
- 2.25 Confidence Levels IOC
- 2.26 Collection Sources
- 2.27 Threat Intelligence
- 2.28 Cyber Response Teams
- 2.29 Security Operations
- 2.30 Standardized Processes and Operations
- 2.31 Security Operations Tools and Toolsets
- 2.32 Module 2 Review
- 3.1 Domain 2 - Vulnerability Management Overview
- 3.2 Vulnerability Discovery and Scanning
- 3.3 Asset Discovery and Scanning
- 3.4 Industry Frameworks
- 3.5 Mitigating Attacks
- 3.6 CVSS and CVE
- 3.7 Common Vulnerability Scoring System (CVSS) interpretation
- 3.8 CVE Databases
- 3.9 Cross Site Scripting (XSS)
- 3.10 Vulnerability Response, Handling, and Management
- 3.11 Control Types (Defense in Depth, Zero Trust)
- 3.12 Patching and Configurations
- 3.13 Attack Surface Management
- 3.14 Risk Management Principles
- 3.15 Threat Modeling
- 3.16 Threat Models
- 3.17 Secure Coding and Development (SDLC)
- 3.18 Module 3 Review
- 4.1 Domain 3 - Incident Response and Management Overview
- 4.2 Attack Methodology Frameworks
- 4.3 Cyber Kill Chain
- 4.4 Frameworks to Know
- 4.5 Incident Response and Post Response
- 4.6 Detection and Analysis
- 4.7 Post-Incident Activities
- 4.8 Containment, Eradication, and Recovery
- 4.9 Module 4 Review
- 5.1 Domain 4 - Reporting and Communication Overview
- 5.2 Reporting Vulnerabilities Overview
- 5.2.1 Vulnerability Reporting
- 5.3 Compliance Reports
- 5.4 Inhibitors to Remediation
- 5.5 Metrics and KPIs
- 5.6 Incident Response Reporting and Communications Overview
- 5.7 Incident Declaration
- 5.8 Communication with Stakeholders
- 5.9 Root Cause Analysis
- 5.10 Lessons Learned and Incident Closure
- 5.11 Module 5 Review
- 6.1 Course Closeout Overview
- 6.2 Practice Questions
- 6.3 Exam Process
- 6.4 Continuing Education
- 6.5 Course Closeout
• Compare and contrast common operating system types and their purposes
• Compare and contrast features of Microsoft Windows versions
• Summarize general OS installation considerations and upgrade methods
• Given a scenario, use appropriate Microsoft command line tools
• Given a scenario, use Microsoft operating system features and tools
• Given a scenario, use Microsoft Windows Control Panel utilities
• Summarize application installation and configuration concepts
• Given a scenario, configure Microsoft Windows networking on a client/desktop
• Given a scenario, use features and tools of the Mac OS and Linux client/desktop operating
systems
• Summarize the importance of physical security measures
• Explain logical security concepts
• Compare and contrast wireless security protocols and authentication methods
• Given a scenario, detect, remove, and prevent malware using appropriate tools and methods
• Compare and contrast social engineering, threats, and vulnerabilities
• Compare and contrast the differences of basic Microsoft Windows OS security settings
• Given a scenario, implement security best practices to secure a workstation
• Given a scenario, implement methods for securing mobile devices
• Given a scenario, implement appropriate data destruction and disposal methods
• Given a scenario, configure security on SOHO wireless and wired networks
•Given a scenario, troubleshoot Microsoft Windows OS problems
• Given a scenario, troubleshoot and resolve PC security issues
• Given a scenario, use best practice procedures for malware removal
• Given a scenario, troubleshoot mobile OS and application issues
• Given a scenario, troubleshoot mobile OS and application security issues
•Compare and contrast best practices associated with types of documentation
• Given a scenario, implement basic change management best practices
• Given a scenario, implement basic disaster prevention and recovery methods
• Explain common safety procedures • Explain environmental impacts and appropriate controls
• Explain the processes for addressing prohibited content/activity, and privacy, licensing, and
policy concepts
• Given a scenario, use proper communication techniques and professionalism
• Identify the basics of scripting • Given a scenario, use remote access technologies
- Total Course Video Hours: 14 Hrs 52 Min
- Total Videos: 60
- Module 1 Workbook
- 0.1 Intro to A+ Core1 Instructor
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Devices Part 1
- 1.1 Mobile Devices Part 2
- 1.1 Mobile Devices Part 3
- 1.2 Installing Components in Laptop
- 1.3 Laptop Features Part 1
- 1.3 Laptop Features Part 2
- 1.4 Compare and Contrast Types of Mobile Devices
- 1.5 Accessories and Ports of Other Mobile Devices Part 1
- 1.5 Accessories and Ports of Other Mobile Devices Part 2
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
- 1.7 Use Methods to Perform Mobile Device Synchronization
- 1.8 Laptop Disassemble and Assemble
- Module 2 Workbook
- 2.1 Networking Part 1
- 2.1 Networking Part 2
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
- 2.3 Setting Up a Wireless Router
- 2.4 Compare and Contrast Wireless Networking Protocols
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
- 2.6 Explain Common Network Configuration Concepts Part 1
- 2.6 Explain Common Network Configuration Concepts Part 2
- 2.7 Compare and Contrast Internet Connection Types Network Types and Features
- 2.8 Given a Scenario Using Appropriate Networking Tools
- Module 3 Workbook
- 3.1 Hardware Part 1
- 3.1 Hardware Part 2
- 3.1 Hardware Part 3
- 3.2 Identify Common Connector Types
- 3.3 Scenario Install RAM Types
- 3.4 Scenario Select Install and Configure Storage Devices
- 3.4 Scenario Select Install and Configure Storage Devices Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
- 3.5 Install Disassemble and Assemble a Desktop
- 3.6 Purposes for Peripherals and Types
- 3.7 Summarize Power Supplies
- 3.8 Scenario Select and Configure Appropriate Components for Customers PCs
- 3.9 Scenario Installand Configure Common Devices
- 3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
- 3.11 Scenario Install and Maintain Various Print Technologies Part 1
- 3.11 Scenario Install and Maintain Various Print Technologies Part 2
- 3.11 Scenario Install and Maintain Various Print Technologies Part 3
- Module 4 Workbook
- 4.1 Virtualization Part 1
- 4.1 Virtualization Part 2
- 4.2 Scenario Setup and Configure Client-side Virtualization
- Module 5 Workbook
- 5.1 Hardware and Networking Troubleshooting
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
- 5.3 Troubleshoot Hard Drives and RAID Arrays
- 5.4 Troubleshoot Video and Display Issues
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
- 5.6 Troubleshoot Printers
- 5.7 Troubleshoot Common Wired and Wireless Network Problems
- Total Course Video Hours: 20 Hrs 40 Min
- Total Videos: 61
- Module 1 Notes
- Intro CASP
- CASP Introduction
- Mod 1.1 Exploring Cloud Services Act
- Mod 1.1 Acquisition Merger Demerger
- Mod 1.1 Acquisition Merger Demerger Part2
- Mod 1.2 Compare and Contrast
- Mod 1.3 Given Scenario Execute Risk
- Mod 1.3 Given Scenario Execute Risk Part2
- Mod 1.3 Continuing Terminology IT Governance
- Mod 1.4 Analyze Security Solution Metrics and Attributes
- Mod 1.4 Analyze Risk
- Mod 1.4 Trend Analysis Act
- Module 2 Notes
- Mod 2 Enterprise Security Architecture
- Mod 2.1 Network Device Security Act
- Mod 2.1 Application and Protocol
- Mod 2.1 Advanced Network Security Act
- Mod 2.1 Complex Network Security Solution
- Mod 2.1 Implementing VLANs Switchport Sec Act
- Mod 2.1 Implementing VLANs Switchport Sec Act Part2
- Mod 2.1 Distributed Denial of Service
- Mod 2.1 Exploring DoS Attacks Act
- Mod 2.1 Security Zones
- Mod 2.1 Network Access Control
- Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
- Mod 2.2 Analyze a Scenario Integrate Security
- Mod 2.2 Configuring Windows Firewall Act
- Mod 2.2 Log Monitoring and Auditing
- Mod 2.2 Group Policy Act
- Mod 2.2 Patch Management
- Mod 2.2 Management Interface
- Mod 2.2 Measured Launch
- Mod 2.3 Analyze a Scenario to Integrate Security Controls
- Mod 2.3 Security Implications Privacy
- Mod 2.3 Baseband
- Mod 2.4 Given Software Vulnerabilty Scenarios
- Mod 2.4 SQL Injection Act
- Mod 2.4 Improper Error and Exception Handling
- Mod 2.4 Buffer Overflows Act
- Mod 2.4 Memory Leaks
- Mod 2.4 Researching Vulnerabilities Exploits Act
- Module 3 Notes
- Mod 3 Enterprise Security Operations
- Mod 3 Runtime Debugging
- Mod 3.1 Fingerprinting an OS Services Act
- Mod 3.1 Code Review
- Mod 3.1 Conducting OSINT Act
- Mod 3.1 Types
- Mod 3.1 Conducting a Vulnerability Assessment Act
- Mod 3.2 Analyze a Scenario Output
- Mod 3.2 Network Sniffing Act
- Mod 3.2 Security Content Automation
- Mod 3.2 Using a SCAP Scanner Act
- Mod 3.2 Network Enumerator
- Mod 3.2 Password Cracking Act
- Mod 3.2 Host Vulnerability Scanner
- Mod 3.2 Using Command Line Tools Act
- Mod 3.2 OpenSSL
- Mod 3.2 Scanning for Heartbleed Act
- Mod 3.2 Local Exploitation Tools
- Mod 3.2 Verifying File Integrity with SFC Act
- Mod 3.2 Log Analysis Tools
- Mod 3.3 Given Scenario Implement Incident
- Mod 3.3 Facilitate Incident Detection Response
- Mod 3.3 Using Incident Response Support Tools Act
- Mod 3.3 Severity of Incident Detection Breach
- Module 4 Notes
- Mod 4 Technical Integration of Enterprise
- Mod 4 Technical Integration of Enterprise Part2
- Mod 4.1 DataSecurity Considerations
- Mod 4.1 Examing Network Diagrams Act
- Mod 4.1 Security and Privacy Considerations of Storage integration
- Mod 4.1 Exploring Directory Services and DNS Act
- Mod 4.2 Given Scenario Integrate Cloud and Virtualization
- Mod 4.2 Taking Another Look at Cloud Services Act
- Mod 4.2 Security Advantages and Disadvanatges of Virtualization
- Mod 4.2 Using Virtualization Act
- Mod 4.2 Cloud Augmented Security
- Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
- Mod 4.4 Given Scenario Cryptographic
- Mod 4.4 Cryptographic Part2
- Mod 4.4 Mobile Device Encryption
- Mod 4.4 Cryptography Act
- Mod 4.5 Select the Appropriate Control
- Mod 4.5 Phising Act
- Mod 4.5 Telephony VoIP Integration
- Module 5 Notes
- Mod 5 Research Methods to Determine Industry Trends
- Mod 5.1 Practicing Threat Intelligence Act
- Mod 5.2 Scenario Implememt Security Activities Across
- Mod 5.2 Static Testing
- Mod 5.3 Explain the Importance of Interaction
- CASP Conclusion
- Total Course Video Hours: 28 Hrs 22 Min
- Total Videos: 89
- Overview
- History
- The Three Delivery Model Architecture
- SaaS
- Justification For Cloud
- Confidentiality And Availability
- Concepts From NIST
- On Demand Self-Service
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Reasons For Cloud-Agility-Part1
- Reasons For Cloud-Agility-Part2
- New Business Opportunities
- Technical Perspectives Cloud Types
- Sources
- Security Risk
- Technical Risk And Solutions
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
- Information Security Management System-Part1
- Information Security Management System-Part2
- Information Management And Security-Part1
- Information Management And Security-Part2
- The Data Security LifeCycle
- Governance
- Data Loss Prevention-Part1
- Data Loss Prevention-Part2
- Protecting Data
- Risk Management-Part1
- Risk Management-Part2
- Risk Management-Part3
- Risk Management-Part4
- Risk Management-Part5
- Recommendations-Part1
- Recommendations-Part2
- IT Governance
- Audit
- Recommendations For Audit-Part1
- Recommendations For Audit-Part2
- Total Course Video Hours: 5 Hrs 28 Min
- Total Videos: 42
- Total Course Video Hours: 13 Hrs 55 Min
- Total Videos: 151
- Introduction
- Models-Part 1
- Models-Part 2
- Service And Delivery Models
- Terms And Characteristics
- Objects Storage Concepts
- Virtualization
- Install Configure Manage VM And Devices
- Backups
- Virtual Disks
- Virtual Switches
- Virtual Resource Migration
- Benefits Of Virtualization In A Cloud Environment
- Compare And Contrast Virtua lEnvironment
- Infrastructure
- Different Access Protocols
- Explain Storage Configuration
- File Systems Types
- Executing Storage Provisioning
- Network Share Demo
- Implement Appropriate Network Configurations
- Importance Of Network Optimization
- Troubleshoot Basic Network Configuration-Part 1
- Troubleshoot Basic Network Configuration-Part 2
- Troubleshoot Commands-Part 1
- Troubleshoot Commands-Part 2
- Troubleshoot Commands-Part 3
- Explain Common Network Protocols
- Common Hardware Resources
- Resource Management-Part 1
- Resource Management-Part 2
- Establishing Baselines And Thresholds
- Appropriately Allocate Physical Host Resources-Part 1
- Appropriately Allocate Physical Host Resources-Part 2
- Appropriately Allocate Virtual Guest Resources-Part 1
- Appropriately Allocate Virtual Guest Resources-Part 2
- Use Appropriate Tools For Remote Access
- Security-Part 1
- Security-Part 2
- Storage Security Concepts And Methods
- Different Encryption Technologies
- Identify Access Control Methods
- Systems Management-Part 1
- Systems Management-Part 2
- Diagnose Remediate And Optimize-Part 1
- Diagnose Remediate And Optimize-Part 2
- Common Performance Concepts-Part 1
- Common Performance Concepts-Part 2
- Testing Techniques
- Business Continuity In Cloud-Part 1
- Business Continuity In Cloud-Part 2
- Solutions To Meet Availability Requirements
- Conclusion
- Total Course Video Hours: 9 Hrs 52 Min
- Total Videos: 53
- Introduction
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 1
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 2
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 3
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 4
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 5
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 6
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 7
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 8
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes Part 9
- Given a scenario, analyze the results of a network reconnaissance Part 1
- Given a scenario, analyze the results of a network reconnaissance Part 2
- Given a scenario, analyze the results of a network reconnaissance Part 3
- Given a scenario, analyze the results of a network reconnaissance Part 4
- Given a scenario, analyze the results of a network reconnaissance Part 5
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 1
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 2
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 3
- Given a network-based threat, implement or recommend the appropriate response and countermeasure Part 4
- Explain the purpose of practices used to secure a corporate environment Part 1
- Explain the purpose of practices used to secure a corporate environment Part 2
- Explain the purpose of practices used to secure a corporate environment Part 3
- Explain the purpose of practices used to secure a corporate environment Part 4
- Given a scenario, implement an information security vulnerability management process Part 1
- Given a scenario, implement an information security vulnerability management process Part 2
- Given a scenario, implement an information security vulnerability management process Part 3
- Given a scenario, implement an information security vulnerability management process Part 4
- Given a scenario, implement an information security vulnerability management process Part 5
- Given a scenario, implement an information security vulnerability management process Part 6
- Given a scenario, implement an information security vulnerability management process Part 7
- Given a scenario, analyze the output resulting from a vulnerability scan Part 1
- Given a scenario, analyze the output resulting from a vulnerability scan Part 2
- Compare and contrast common vulnerabilities found in the following targets within an organization Part 1
- Compare and contrast common vulnerabilities found in the following targets within an organization Part 2
- Compare and contrast common vulnerabilities found in the following targets within an organization Part 3
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 1
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 2
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident Part 3
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 1
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 2
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 3
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 4
- Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation Part 5
- Explain the importance of communications during the incident response process
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 1
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 2
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 3
- Given a scenario, analyze common symptoms to select the best course of action to support incident response Part 4
- Summarize the incident recovery and post-incident response process Part 1
- Summarize the incident recovery and post-incident response process Part 2
- Summarize the incident recovery and post-incident response process Part 3
- Summarize the incident recovery and post-incident response process Part 4
- Explain the relationship between frameworks, common policies, controls, and procedures Part 1
- Explain the relationship between frameworks, common policies, controls, and procedures Part 2
- Explain the relationship between frameworks, common policies, controls, and procedures Part 3
- Explain the relationship between frameworks, common policies, controls, and procedures Part 4
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 1
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 2
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 3
- Given a scenario, use data to recommend remediation of security issues related to identity and access management Part 4
- Given a scenario, review security architecture and make recommendations to implement compensating controls Part 1
- Given a scenario, review security architecture and make recommendations to implement compensating controls Part 2
- Given a scenario, review security architecture and make recommendations to implement compensating controls Part 3
- Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 1
- Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) Part 2
- Overview
- Conclusion
- Total Course Video Hours: 17 Hrs 55 Min
- Total Videos: 67
- Instructor Intro
- About the Exam
- Test Taking Tips and Techniques
- Explain the importance of threat data and intelligence
- Given a scenario, utilize threat intelligence to support organizational security
- Given a scenario, perform vulnerability management activities Pt 1
- Given a scenario, perform vulnerability management activities Pt 2
- Given a scenario, analyze the output from common vulnerability assessment tools
- Explain the threats and vulnerabilities associated with specialized technology
- Explain the threats and vulnerabilities associated with operating in the Cloud
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
- Outline
- Given a scenario, apply security solutions for infrastructure management Pt 1
- Given a scenario, apply security solutions for infrastructure management Pt 2
- Flashcards
- Given a scenario, apply security solutions for infrastructure management Pt 3
- Explain software assurance best practices
- Scatter
- Explain hardware assurance best practices
- Learn
- Speller
- Workbook
- Given a scenario, analyze data as part of security monitoring activities Pt 1
- Given a scenario, analyze data as part of security monitoring activities Pt 2
- Given a scenario, analyze data as part of security monitoring activities Pt 3
- Given a scenario, implement configuration changes to existing controls to improve security Pt 1
- Given a scenario, implement configuration changes to existing controls to improve security Pt 2
- Explain the importance of proactive threat hunting
- Compare and contrast automation concepts and technologies
- Explain the importance of the incident response process
- Given a scenario, apply the appropriate the incident response procedure
- Given an incident, analyze potential indicators of compromise
- Given a scenario, utilize basic digital forensic techniques
- Understand the importance of data privacy and protection
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
- Explain the importance of frameworks, policies, procedures, and controls Pt 1
- Explain the importance of frameworks, policies, procedures, and controls Pt 2
- Recap
- Review Questions
- Before the Exam
- Total Course Video Hours: 14 Hrs 34 Min
- Total Videos: 36
- 0.1 Instructor Intro
- 1.1 Compare and Contrast Notational Systems
- 1.1 Compare and Contrast Notational Systems Demo
- 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
- 1.3 Illustrate the Basics of Computing and Processing
- 1.4 Explain the Value of Data and Information
- 1.5 Compare and Contrast Common Units of Measures
- 1.5 Compare and Contrast Common Units of Measures Demo
- 1.6 Explain the Troubleshooting Methodology
- 2.1 Classify Common Types of Input-Output Device Interfaces
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
- 2.3 Explain the Purpose of Common Internal Computing Components
- 2.4 Compare & Contrast Common Internet Service Types-
- 2.5 Compare & Contrast Storage Types
- 2.6 Compare & Contrast Common Computing Devices & Their Purposes
- 2.7 Explain Basic Networking Concepts
- 2.7 Explain Basic Networking Concepts Demo
- 2.7 Explain Basic Networking Concepts Part 2
- 2.7 Explain Basic Networking Concepts Part 3
- 2.7 Explain Basic Networking Concepts Part 4
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
- 3.1 Explain the Purpose of Operating Systems
- 3.1 Explain the Purpose of Operating Systems Demo
- 3.2 Compare & Contrast Components of an Operating System
- 3.2 Compare & Contrast Components of an Operating System Demo
- 3.3 Explain the Purpose & Proper Use of Software
- 3.4 Explain Methods of Application Architecture & Delivery Models
- 3.5 Given a Scenario Configure & Use Web Browsers
- 3.5 Given a Scenario Configure & Use Web Browsers FireFox
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
- 3.6 Compare & Contrast General Application Concepts & Uses
- 4.1 Compare & Contrast Programming Language Categories-
- 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
- 4.3 Explain the Purpose & Use of Programming Concepts-
- 4.3 HTML Demo
- 5.1 Explain Database Concepts and the Purpose of Databases
- 5.2 Compare and Contrast Various Database Structures
- 5.3 Summarize Methods Used to Interface with Databases
- 5.3 Summarize Methods Used to Interface with Databases Demo
- 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
- 6.2 Explain Methods to Secure Devices and Best Practices
- 6.3 Summarize Behavioral Security Concepts
- 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
- 6.5 Explain Password Best Practices
- 6.6 Explain Common Uses of Encryption
- 6.7 Explain Business Continuity Concepts
- 6.8 Takeaways-
- 6.9 ITF Fundamentals Conclusion
- Total Course Video Hours: 9 Hrs 5 Min Total Videos: 51
- Instructor Introduction
- Course Introduction
- Identify The Linux Design Philosophy
- Enter Shell Commands
- Shell Commands Activity
- Get Help with Linux
- Assume Superuser and Groups
- Create, Modify, and Delete Users
- Create, Modify, and Delete Groups
- Query Users and Groups
- Configure Account Profiles
- Modify File and Directory Permissions
- Modify File and Directory Ownership
- Configure Special Permissions and Attributes
- Troubleshoot Permissions Issues
- Create Partitions
- Manage Logical Volumes
- Mount File Systems
- Manage File Systems
- Navigate the Linux Directory Structure
- Troubleshoot Storage Issues
- Create and Edit Text Files
- Search for Files
- Perform Operations on Files and Directories
- Process Text Files
- Manipulate File Output
- Explore the Linux Kernel
- Install and Configure Kernel Modules
- Monitor Kernel Modules
- Configure Linux Boot Components
- Configure GRUB
- Configure Localization Options
- Configure GUIs
- Manage Services
- Troubleshoot Process Issues
- Troubleshoot CPU and Memory Issues
- Identify the Types of Linux
- Configure Devices
- Monitor Devices
- Troubleshoot Hardware Issues
- Identify TCP/IP Fundamentals
- Identify Linux Server Roles
- Connect to a Network
- Configure DHCP and DNS Client Services
- Configure Cloud and Virtualization Technologies
- Troubleshoot Networking Issues
- Identify Package Managers
- Manage RPM Packages with YUM
- Manage Debian Packages with APT
- Configure Repositories
- Acquire Software
- Build Software from Source Code
- Troubleshoot Software Dependency Issues
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
- Schedule Jobs
- Implement Version Control Using Git
- Identify Orchestration Concepts
- Prepare for Linux Installation
- Perform the Installation
- Total Course Video Hours: 24 Hrs 34 Min
- Total Videos: 68
- Introduction
- Introduction To Building Labs
- Things You Need To Do
- Install Demo Virtual Box
- Navigation
- Commands With LabDemo
- Internal And External Commands
- Overview Of Shell Commands Tricks
- Exploring Shell Configuration
- Stream Redirection
- Overview Of Processing Text Using Filters
- Overview File-Viewing Commands
- Overview Using Grep
- Sed Syntax And Summary
- Overview Of Exam Essentials
- Managing Software
- Managing Software
- Overview Using RPM
- RPM-Part 2
- Overview Using Cpio
- Overview Using Debian And Apt Cache
- Using Apt-get
- Debian Tools
- Managing Shared Libraries
- Overview Locating Library Files
- Foreground and Background Processes
- Managing Software Summary
- Configuring Hardware
- Configuring Devices
- Configuring USB
- Configuring Hard Disk
- Designing Hard Disk Layout
- Logical Volume Management
- Overview Using Fdisk
- Overview Common File System Types
- Creating Filesystem
- Overview Maintaining File System Health
- Configuring Hardware Summary
- Managing Files
- File Archiving Commands
- Managing Files Ownership
- Managing Disk Quotas
- Directories And Content
- Overview Tools For Locating Files
- Overview Of Exam Essentials
- Booting Linux And Editing Files
- Boot And Reboot
- Understanding The Boot Process
- Run Levels Process
- Managing Run Level Services
- Editing With Vi
- Booting Summary
- X Windows Systems
- X Configuration Options
- X Configuration Options-Part 2
- Untitled Media
- Configuring X Featuring Fonts
- Overview Managing GUI Logins
- Using X For Remote Access
- X Accessibility
- Addition Assistive Technologies
- Configuring Localization And Internationalization
- Querying And Setting Your Locale
- Configuring Printing-Part 1
- Configuring Printing-Part 2
- Using Web-Based CUPS Utilities
- Administering
- Directly Modifying Account Configuration
- Components Of Account
- Adding Groups
- Tuning User And System Environments
- Reviewing Log File Contents
- Maintaining System Time
- Admin Summary
- Basic Networking
- Network Addressing-Part 1
- Network Addressing-Part 2
- DNS Data Flow Zone And Resolution
- Network Ports
- Connections
- Testing Connectivity
- Wireshark Demo
- Basic Networking Summary
- Scripts E-mail And Databases
- Writing Scripts-Part 1
- Writing Scripts-Part 2
- Managing E-mail
- Managing Data With SQL
- Advantages Of Database
- Scripts Summary
- Security
- Configuring Xinetd
- Uninstalling Or Reconfiguring Servers
- Tools For Managing Passwords
- Configuring SSH
- SSH Keys
- Controlling SSH Access
- Using GPG
- Security Summary
- Total Course Video Hours: 9 Hrs 5 Min
- Total Videos: 51
- Introduction
- Over-The-Air-Technologies
- Wireless Technologies-Part 1
- Wireless Technologies-Part 2
- Radio Frequency
- RF Power Fun
- Antennas
- Issues With RF
- NON Wireless
- Governing Bodies And Regulations
- Network Foundations-Part 1
- Network Foundations-Part 2
- Network Foundations-Part 3
- Network Foundations-Part 4
- OSI Model Review
- Wireless Terms And Terminology-Part 1
- Wireless Terms And Terminology-Part 2
- Wireless Media And Communication
- Unified Wireless Architecture
- SSIDs And VLANs
- Mobile Device Management-Part 1
- Profiles And Polices-Part 1
- Profiles And Polices-Part 2
- Enterprise Mail And Messaging
- Wireless Site Survey-Part 1
- Wireless Site Survey-Part 2
- Wireless Site Survey-Part 3
- Wireless Site Survey-Part 4
- Wireless Device Management-Part 1
- Wireless Device Management-Part 2
- Mobile Device Security
- Network Security 101
- Security Protocols-Part 1
- Security Protocols-Part 2
- Security Protocols-Part 3
- EAP Overview
- Encryption Overview-Part 1
- Encryption Overview-Part 2
- Common Security Troubleshooting
- Wireless Risks-Part 1
- Wireless Risks-Part 2
- Other Risks
- Wireless Troubleshooting-Part 1
- Wireless Troubleshooting-Part 2
- Wireless Troubleshooting-Part 3
- Conclusion
- Total Course Video Hours: 7 Hrs 41 Min
- Total Videos: 46
- Module 1 Workbook
- Intro Network Plus N10 007
- Basic Networking
- Activity Basic Networking
- OSI Model
- Exploring the OSI Model- Act
- Protocol and Ports
- Activity Examining Protocols and Ports
- Connection-oriented vs. connectionless
- Activity Comparing TCP and UDP
- Internet Protocol (IP)
- Activity Examining the Lower Layer Protocols
- Layer 7 Remote Control Protocols
- Layer 7 File Transfer Protocols
- Layer 7 Messaging Protocols
- Activity Examining Messaging Protocols
- Layer 7 Web Traffic Protocols
- Layer 7 Streaming Media Protocols
- Layer 7 Infrastructure Management Protocols
- Switching
- Activity Creating Collision and Broadcast Domains
- Interface Properties and Segmentation
- Activity Creating a Basic Network Segment
- Switching prt 2
- Activity Switching
- Switching Loop Management
- Activity Managing Switching Loops
- VLANs
- Activity Creating VLANs
- routing
- Activity Examining ARP
- IP Addressing Basics
- Activity Configuring IP
- Routers
- Activity Setting Up a Router
- Routing Basics
- Activity Adding Static Routes
- VLAN Routing
- Activity Routing Between VLANs
- NAT/PAT
- Activity Configuring NAT/PAT
- Routing Protocols
- Activity Configuring a Routing Protocol
- Firewalls
- Activity Configuring Firewalls
- Advanced Switching and Routing Concepts
- Activity Exploring IPv6
- Performance Concepts
- IP Addressing
- Subnetting
- Activity Learning to Subnet
- Address Assignments
- Network Types and Topologies
- Wireless Topologies
- Network Types
- Technologies that Facilitate the Internet Of Things (IoT)
- Wireless Technologies
- 802.11 Standards
- Wi-Fi Frequencies
- Wi-Fi Antenna Concepts
- Bluetooth
- Cellular
- Activity Using an RF Spectrum Analyzer
- cloud concepts
- Activity Exploring Cloud Services
- Network Services
- Activity Setting up DNS
- DHCP Service
- Activity Setting Up DHCP
- NTP
- Module 2 Workbook
- Module 2 – Infrastructure
- Activity Testing a Fiber Optic Cable
- Plenum vs. PVC
- Activity Crimping on an RJ-45 Connector
- Transceivers
- Activity Terminating Cable to a 110 Block
- Copper Cable Standards
- Activity Creating a Crossover Cable
- Ethernet Deployment Standards
- Network Device Placement and Installation
- Repeater
- Router
- Modem
- Activity Setting up a WAP
- Firewall
- Media Converter
- Advanced Network Devices
- Wireless Controller
- Proxy Server
- Activity Configuring Proxy Settings
- VPN Concentrator
- Virtual Networking Components
- Network Storage Types
- WAN Technologies
- Transmission Mediums
- Activity Configuring WAN Links
- Termination
- Module 3 Workbook
- Network Operations Documentation
- Standard Operation Procedures
- Logical vs Physical Diagrams
- Rack Diagrams
- Change Management
- Wiring and Ports Locations
- IDF-MDF Documentation
- Labeling
- Using Documentation Act
- Continuity and Disaster
- MTTR Mean Time Repair
- Recovery
- Backing Up Your Data Act
- Event Management
- Metrics
- Scanning Monitoring Patching
- Testing the Network Act
- HTTPS-Management
- Out-of-Band Management
- RDP
- Remote Access Methods
- Remote File Access
- Making Remote Connections Act
- SSH
- VNC
- Policies and Best Practices
- Creating Policies and Procedures Act
- Module 4 Workbook
- Physical Security Devices
- Examining Security Devices Act
- Authentication and Access
- Access Controls Methods Act
- Multifactor Authentication
- Basic Wireless Network Security
- Demonstrating the Need for Wireless Act
- Common Network Attacks
- Conducting a Phishing Campaign Act
- Network Device Hardening
- Supporting Secure Authentication Encryption Act
- Updating Firmware
- Explain Common Mitigation Techniques
- Implementing a Honey Pot Act
- Module 5 Workbook
- Network Troubleshoot
- Using the Appropriate Tools
- Hardware Tools Analyzers
- Troubleshooting With Hardware Tools Act
- Software Tools
- Troubleshooting with Software Tools Act
- Software Tools Command Line
- Troubleshooting with Command Line Tools Act
- Troubleshoot Common Wired Connectivity
- Troubleshooting Signal Problems
- Physical Issues
- Transceiver Issues
- Troubleshooting Transceiver Problems
- Traffic Flow Issues
- Troubleshoot Common Wireless Connectivity
- Latency and Jitter
- Incorrect WAP Types
- Troubleshooting WAP Issues
- Troubleshooting Common Network
- DHCP Issues
- Firewall ACL Issues
- Advanced Network Issues
- Unresponsive Services
- Case Study Troubleshooting
- Outro N10 007
- Total Course Video Hours: 33 Hrs 10 Min
- Total Videos: 162
- Module 1 Notes
- 1.0 PenTest Plus Introduction
- 1.1 PenTest Plus Topics
- 1.2 PenTest Engagement
- 1.3 Threat Modeling
- 1.4 Technical Constraints
- 1.5 PenTest Engagement Review
- 1.6 Examining PenTest Engagement Documents Act
- Module 2 Notes
- 2.1 Passive Reconnaissance part1
- 2.2 WHOIS Act
- 2.3 Passive Reconnaissance part2
- 2.4 Google Hacking Act
- 2.5 Passive Reconnaissance part3
- 2.6 DNS Querying Act
- 2.7 Passive Reconnaissance part4
- 2.8 Email Server Querying Act
- 2.9 SSL-TLS Cerfificates
- 2.10 Shodan Act
- 2.11 The Havester
- 2.12 TheHarvester Act
- 2.13 Recon-ng
- 2.14 Recon-g Act
- 2.14 Recon-ng-Part-2-API-key Act
- 2.15 Maltego
- 2.16 Have I been Pwned
- 2.17 Punked and Owned Pwned Act
- 2.18 Fingerprinting Organization with Collected Archives
- 2.19 FOCA Act
- 2.20 Findings Analysis Weaponization
- 2.21 Chp 2 Review
- Module 3 Notes
- 3.1 Active Reconnaissannce
- 3.2 Discovery Scans Act
- 3.3 Nmap
- 3.4 Nmap Scans Types Act
- 3.5 Nmap Options
- 3.6 Nmap Options Act
- 3.7 Stealth Scans
- 3.8 Nmap Stealth Scans Act
- 3.9 Full Scans
- 3.10 Full Scans Act
- 3.11 Packet Crafting
- 3.12 Packet Crafting Act
- 3.13 Network Mapping
- 3.14 Metasploit
- 3.15 Scanning with Metasploit Act
- 3.16 Enumeration
- 3.17 Banner Grabbing Act
- 3.18 Windows Host Enumeration
- 3.19 Winddows Host Enumeration Act
- 3.20 Linux Host Enumeration
- 3.21 Linux Host Enumeration Act
- 3.22 Service Enumeration
- 3.23 Service Enumeration Act
- 3.24 Network Shares
- 3.25 SMB Share Enumeration Act
- 3.26 NFS Network Share Enumeration
- 3.27 NFS Share Enumeration Act
- 3.28 Null Sessions
- 3.29 Null Sessions Act
- 3.30 Website Enumeration
- 3.31 Website Enumeration Act
- 3.32 Vulnerability Scans
- 3.33 Compliance Scans Act
- 3.34 Credentialed Non-credentialed Scans
- 3.35 Using Credentials in Scans Act
- 3.36 Server Service Vulnerability Scan
- 3.37 Vulnerability Scanning Act
- 3.38 Web Server Database Vulnerability Scan
- 3.39 SQL Vulnerability Scanning Act
- 3.40 Vulnerability Scan Part 2 OpenVAS Act
- 3.41 Web App Vulnerability Scan
- 3.42 Web App Vulnerability Scanning Act
- 3.43 Network Device Vulnerability Scan
- 3.44 Network Device Vuln Scanning Act
- 3.45 Nmap Scripts
- 3.46 Using Nmap Scripts for Vuln Scanning Act
- 3.47 Packet Crafting for Vulnerbility Scans
- 3.48 Firewall Vulnerability Scans
- 3.49 Wireless Access Point Vunerability
- 3.50 Wireless AP Scans Act
- 3.51 WAP Vulnerability Scans
- 3.52 Container Security issues
- 3.53 How to Update Metasploit Pro Expired Trial License
- Module 4 Notes
- 4.1 Physical Security
- 4.2 Badge Cloning Act
- 4.3 Physical Security Review
- Module 5 Notes
- 5.1 Social Engineering
- 5.2 Using Baited USB Stick Act
- 5.3 Using Social Enginnering to Assist Attacks
- 5.4 Phishing Act
- 5.5 Social Engineering Review
- Module 6 Notes
- 6.1 Vulnerbility Scan Analysis
- 6.2 Validating Vulnerability Scan Results Act
- 6.3 Vulnerbility Scan Analysis Review
- Module 7 Notes
- 7.1 Password Cracking
- 7.2 Brute Force Attack Against Network Service Act
- 7.3 Network Authentication Interception Attack
- 7.4 Intercepting Network Authentication Act
- 7.5 Pass the Hash Attacks
- 7.6 Pass the Hash Act
- 7.7 Password Cracking Review
- Module 8 Notes
- 8.1 Penetrating Wired Network
- 8.2 Sniffing Act
- 8.3 Eavesdropping
- 8.4 Eavesdropping Act
- 8.5 ARP Poisoning
- 8.6 ARP Poisoning Act
- 8.7 Man In The Middle
- 8.8 MITM Act
- 8.9 TCP Session HiJacking
- 8.10 Server Message Blocks SMB Exploits
- 8.11 SMB Attack Act
- 8.12 Web Server Attacks
- 8.13 FTP Attacks
- 8.14 Telnet Server Attacks
- 8.15 SSH Server Attacks
- 8.16 Simple Network Mgmt Protocol SNMP
- 8.17 Simple Mail Transfer Protocol SMTP
- 8.18 Domain Name System DNS Cache Poisoning
- 8.19 Denail of Service Attack DoS-DDoS
- 8.20 DoS Attack Act
- 8.21 VLAN Hopping Review
- Module 9 Notes
- 9.1 Penetrating Wireless Networks
- 9.2 Jamming Act
- 9.3 Wireless Sniffing
- 9.4 Replay Attacks
- 9.5 WEP Cracking Act
- 9.6 WPA-WPA2 Cracking
- 9.7 WAP Cracking Act
- 9.8 Evil Twin Attacks
- 9.9 Evil Twin Attack Act
- 9.10 WiFi Protected Setup
- 9.11 Bluetooth Attacks
- 9.12 Penetrating Wireless Networks
- Module 10 Notes
- 10.1 Windows Exploits
- 10.2 Dumping Stored Passwords Act
- 10.3 Dictionary Attacks
- 10.4 Dictionary Attack Against Windows Act
- 10.5 Rainbow Table Attacks
- 10.6 Credential Brute Force Attacks
- 10.7 Keylogging Attack Act
- 10.8 Windows Kernel
- 10.9 Kernel Attack Act
- 10.10 Windows Components
- 10.11 Memory Vulnerabilities
- 10.12 Buffer Overflow Attack Act
- 10.13 Privilegde Escalation in Windows
- 10.14 Windows Accounts
- 10.15 Net and WMIC Commands
- 10.16 Sandboxes
- Module 11 Notes
- 11.1 Linux Exploits
- 11.2 Exploiting Common Linux Features Act
- 11.3 Password Cracking in Linux
- 11.4 Cracking Linux Passwords Act
- 11.5 Vulnerability Linux
- 11.6 Priviledge Escalation Linux
- 11.7 Linux Accounts
- 11.8 Linux Exploits Review
- Module 12 Notes
- 12.1 Mobile Devices
- 12.2 Hacking Android Act
- 12.3 Apple Exploits
- 12.4 Moblie Devices Review
- Module 13 Notes
- 13.1 Specialized Systems
- 13.2 Specialized Systems Review
- Module 14 Notes
- 14.1 Scripts
- 14.2 Powershell
- 14.3 Python
- 14.4 Ruby
- 14.5 Common Scripting Elements
- 14.6 Scripts Review
- 14.7 Better Ping Sweep
- 14.8 Simple Port Scanner2
- 14.9 Multitarget Port Scanner
- 14.10 Port Scanner with Nmap
- 14.11 Scripts Review
- Module 15 Notes
- 15.1 Application Testing
- 15.2 Reverse Engineering
- Module 16 Notes
- 16.1 Webb App Exploits
- 16.2 Injection Attacks
- 16.3 HTML Injection
- 16.4 SQL Hacking – SQLmap Act
- 16.5 Cross-Site Attacks
- 16.6 Cross-Site Request Forgery
- 16.7 Other Web-based Attacks
- 16.8 File Inclusion Attacks
- 16.9 Web Shells
- 16.10 Web Shells Review
- Module 17 Notes
- 17.1 Lateral Movement
- 17.2 Lateral Movement with Remote Mgmt Services
- 17.3 Process Migration Act
- 17.4 Passing Control Act
- 17.5 Pivoting
- 17.6 Tools the Enable Pivoting
- 17.7 Lateral Movement Review
- Module 18 Notes
- 18.1 Persistence
- 18.2 Breeding RATS Act
- 18.3 Bind and Reverse Shells
- 18.4 Bind Shells Act
- 18.5 Reverse Shells
- 18.6 Reverse Shells Act
- 18.7 Netcat
- 18.8 Netcat Act
- 18.9 Scheduled Tasks
- 18.10 Scheduled Tasks Act
- 18.11 Services and Domains
- 18.12 Persistence Review
- Module 19 Notes
- 19.1 Cover Your Tracks
- 19.2 Cover Your Tracks – Timestomp Files Act
- 19.3 Cover Your Tracks – Frame the Administrator Act
- 19.4 Cover Your Tracks – Clear the Event Log Act
- 19.5 Cover Your Tracks Review
- Module 20 Notes
- 20.1 The Report
- 20.2 The Report Review
- Module 21 Notes
- 21.1 Post Engagement Cleanup_1
- 21.3 Post Engagement Cleanup Review
- 21.4 PenTest Plus Conclusion
- Total Course Video Hours: 34 Hrs 22 Min
- Total Videos: 215
- Introduction and Overview
- Compare and Contrast Information Security Roles
- Compare and Contrast Security Control and Framework Types
- Module Summary
- Explain Threat Actor Types and Attack Vectors
- Explain Threat Intelligence Sources
- Module Summary
- Assess Organizational Security with Network Reconnaissance Tools
- Packet Capture and Replay Demo
- Explain Security Concerns with General Vulnerability Types
- Summarize Vulnerability Scanning Techniques
- Explain Penetration Testing Concepts
- Module Summary
- Compare and Contrast Social Engineering Techniques
- Analyze Indicators of Malware-based Attacks
- Fork Bomb Malware Demo
- Module Summary
- Compare and Contrast Cryptographic Ciphers
- Summarize Cryptographic Modes of Operation
- Summarize Cryptographic Use Cases and Weaknesses
- Summarize Other Cryptographic Technologies
- Module Summary
- Implement Certificates and Certificate Authorities
- Implement PKI Management
- Implementing a PKI Demo
- Module Summary
- Summarize Authentication Design Concepts
- Implement Knowledge-based Authentication
- Password Cracker Demo
- Implement Authentication Technologies
- Summarize Biometrics Authentication Concepts
- Module Summary
- Implement Identity and Account Types
- Implement Account Policies
- Account Types and Polices Demo
- Implement Authorization Solutions
- Explain the Importance of Personnel Policies
- Module Summary
- Implement Secure Network Designs
- Implement Secure Switching and Routing
- Various Types of Network Attacks Demo
- Implement Secure Wireless Infrastructure
- Implement Load Balancers
- Module Summary
- Implement Firewalls and Proxy Servers
- Implement Network Security Monitoring
- Summarize the Use of SIEM
- Module Summary
- Implement Secure Network Operations Protocols
- Implement Secure Application Protocols
- Implement Secure Remote Access Protocols
- Module Summary
- Implement Secure Firmware
- Implement Endpoint Security
- Endpoint Protection Demo
- Explain Embedded System Security Implications
- Module Summary
- Implement Mobile Device Management
- Implement Secure Mobile Device Connections
- Module Summary
- Analyze Indicators of Application Attack
- Analyze Indicators of Web Application Attacks
- Summarize Secure Coding Practices
- Implement Secure Script Environments
- Summarize Deployment and Automation Concepts
- Module Summary
- Summarize Secure Cloud and Virtualization Services
- Apply Cloud Security Solutions
- Summarize Infrastructure as Code Concepts
- Module Summary
- Explain Privacy and Data Sensitivity Concepts
- Explain Privacy and Data Protection Controls
- Module Summary
- Summarize Incident Response Procedures
- Utilize Appropriate Data Sources for Incident Response
- Apply Mitigation Controls
- Module Summary
- Explain Key Aspects of Digital Forensics Documentation
- Explain Key Aspects of Digital Forensics Evidence Acquisition
- Module Summary
- Explain Risk Management Processes and Concepts
- Explain Business Impact Analysis Concepts
- Module Summary
- Implement Redundancy Strategies
- Implement Backup Strategies
- Implement Cybersecurity Resiliency Strategies
- Module Summary
- Explain the Importance of Physical Site Controls
- Explain the Importance of Physical Host Security Controls
- Module Summary
- Conclusion and General Exam Tips
- Total Course Video Hours: 14 Hrs 4 Min
- Total Videos: 91
- Total Course Video Hours: 10 Hrs 6 Min
- Total Videos: 70
- Total Course Video Hours: 46 Hrs 25 Min
- Total Videos: 189
- Virtual Box-Part 1
- Virtual Box-Part 2
- Virtual Box-Part 3
- Virtual Box-Part 4
- Virtual Box-Part 5
- Virtual Box-Part 6
- Basic Commands-Part 1
- Basic Commands-Part 2
- Basic Commands-Part 3
- Basic Commands-Part 4
- Basic Commands-Part 5
- Basic Commands-Part 6
- Basic Commands-Part 7
- Basic Commands-Part 8
- Basic Commands-Part 9
- Basic Commands-Part 10
- Special Characters-Part 1
- Special Characters-Part 2
- Special Characters-Part 3
- File Editing-Part 1
- File Editing-Part 2
- File Editing-Part 3
- File Editing-Part 4
- File Editing-Part 5
- File Editing-Part 6
- File Editing-Part 7
- File System Structure-Part 1
- File System Structure-Part 2
- File System Structure-Part 3
- File System Structure-Part 4
- Finding Files-Part 1
- Finding Files-Part 2
- Finding Files-Part 3
- Shell Special Characters-Part 1
- Shell Special Characters-Part 2
- Shell Special Characters-Part 3
- Regular Expressions-Part 1
- Regular Expressions-Part 2
- Regular Expressions-Part 3
- Regular Expressions-Part 4
- Regular Expressions-Part 5
- Regular Expressions-Part 6
- Process Management-Part 1
- Process Management-Part 2
- Process Management-Part 3
- Process Management-Part 4
- Process Management-Part 5
- Process Management-Part 6
- Process Management-Part 7
- Process Management-Part 8
- Job Scheduling-Part 1
- Job Scheduling-Part 2
- Job Scheduling-Part 3
- Job Scheduling-Part 4
- Job Scheduling-Part 5
- Job Scheduling-Part 6
- Customizing Your Account-Part 1
- Customizing Your Account-Part 2
- Customizing Your Account-Part 3
- Customizing Your Account-Part 4
- Customizing Your Account-Part 5
- Customizing Your Account-Part 6
- Unix Printing-Part 1
- Unix Printing-Part 2
- Unix Printing-Part 3
- Unix Printing-Part 4
- Networking-Part 1
- Networking-Part 2
- Networking-Part 3
- Networking-Part 4
- Networking-Part 5
- Networking-Part 6
- Networking-Part 7
- Networking-Part 8
- Networking-Part 9
- Networking-Part 10
- X Windows-Part 1
- X Windows-Part 2
- X Windows-Part 3
- X Windows-Part 4
- X Windows-Part 5
- Back Up And Compression-Part 1
- Back Up And Compression-Part 2
- Back Up And Compression-Part 3
- Back Up And Compression-Part 4
- Text Utility-Part 1
- Text Utility-Part 2
- Text Utility-Part 3
- Text Utility-Part 4
- Text Utility-Part 5
- Shell Scripting-Part 1
- Shell Scripting-Part 2
- Shell Scripting-Part 3
- Shell Scripting-Part 4
- Shell Scripting-Part 5
- Shell Scripting-Part 6
- Shell Scripting-Part 7
- Shell Scripting-Part 8
- Shell Scripting-Part 9
- Shell Scripting-Part 10
- Shell Scripting-Part 11
- System Administration Basics-Part 1
- System Administration Basics-Part 2
- System Administration Basics-Part 3
- System Administration Basics-Part 4
- System Administration Basics-Part 5
- Total Course Video Hours: 13 Hrs 59 Min
- Total Videos: 106