2:19
CompTIA Security+ SY0 601 Introduction
Hans IT Academy
1:40
Domain 1: Threats, Attacks, and Vulnerabilities: Domain Overview - CompTIA Security+ SY0 601
10:01
Domain 1.1: Social Engineering - CompTIA Security+ SY0 601
8:16
Domain 1.2: Malware - CompTIA Security+ SY0 601
4:01
Domain 1.3: Password Attacks - CompTIA Security+ SY0 601
2:15
Domain 1.4: Physical Attacks - CompTIA Security+ SY0 601
1:13
Domain 1.5: Adversarial artificial intelligence - CompTIA Security+ SY0 601
1:33
Domain 1.6: Supply chain attack - CompTIA Security+ SY0 601
1:15
Domain 1.7: Cloud-based vs. on-premises attacks - CompTIA Security+ SY0 601
2:49
Domain 1.8: Cryptographic attacks - CompTIA Security+ SY0 601
1:49
Domain 1.9: Privilege escalation - CompTIA Security+ SY0 601
1:19
Domain 1.10: Cross Site Scripting - CompTIA Security+ SY0 601
5:02
Domain 1.11: Injection attacks - CompTIA Security+ SY0 601
1:12
Domain 1.12: Pointer/object dereference - CompTIA Security+ SY0 601
1:00
Domain 1.13: Directory Traversal - CompTIA Security+ SY0 601
1:38
Domain 1.14: Buffer overflows - CompTIA Security+ SY0 601
1:18
Domain 1.15: Race conditions Time of check/time of use - CompTIA Security+ SY0 601
1:29
Domain 1.16-1.17: Error handling & Improper input handling - CompTIA Security+ SY0 601
2:33
Domain 1.18: Replay attacks - CompTIA Security+ SY0 601
Domain 1.19: Integer overflow - CompTIA Security+ SY0 601
Domain 1.20: Request forgeries - CompTIA Security+ SY0 601
1:58
Domain 1.21: Application Programming Interface (API) attacks - CompTIA Security+ SY0 601
0:49
Domain 1.22: Resource exhaustion- CompTIA Security+ SY0 601
0:51
Domain 1.23: Memory Leak - CompTIA Security+ SY0 601
Domain 1.24: SSL stripping - CompTIA Security+ SY0 601
0:56
Domain 1.25: Driver manipulation - CompTIA Security+ SY0 601
1:16
Domain 1.26: Pass the hash - CompTIA Security+ SY0 601
5:59
Domain 1.27: Wireless Attacks - CompTIA Security+ SY0 601
0:47
Domain 1.28: On-path attack (man-in-the-middle attack) - CompTIA Security+ SY0 601
2:56
Domain 1.29: Layer 2 attacks - CompTIA Security+ SY0 601
2:16
Domain 1.30: DNS (Domain name system) attacks - CompTIA Security+ SY0 601
2:12
Domain 1.31: Distributed denial-of-service (DDoS) - CompTIA Security+ SY0 601
2:50
Domain 1.32: Malicious code or script execution - CompTIA Security+ SY0 601
3:56
Domain 1.33: Actors and Threats - CompTIA Security+ SY0 601
Domain 1.34: Attributes of actors - CompTIA Security+ SY0 601
2:07
Domain 1.35: Vectors - CompTIA Security+ SY0 601
4:59
Domain 1.36: Threat intelligence sources - CompTIA Security+ SY0 601
2:22
Domain 1.37: Research sources - CompTIA Security+ SY0 601
2:31
Domain 1.38: Cloud-based vs. on-premises vulnerabilities - CompTIA Security+ SY0 601
1:06
Domain 1.39: Zero-day - CompTIA Security+ SY0 601
2:38
Domain 1.40: Weak configurations - CompTIA Security+ SY0 601
2:44
Domain 1.41: Third-party risks - CompTIA Security+ SY0 601
1:37
Domain 1.42: Improper or weak patch management - CompTIA Security+ SY0 601
1:10
Domain 1.43: Legacy platforms - CompTIA Security+ SY0 601
2:04
Domain 1.44: Impacts - CompTIA Security+ SY0 601
1:56
Domain 1.45: Threat hunting- CompTIA Security+ SY0 601
4:22
Domain 1.46: Vulnerability scans - CompTIA Security+ SY0 601
3:49
Domain 1.47: Syslog/Security information and event management (SIEM) - CompTIA Security+ SY0 601
1:07
Domain 1.48: Security orchestration, automation, and response (SOAR) - CompTIA Security+ SY0 601
3:18
Domain 1.49: Penetration testing - CompTIA Security+ SY0 601
1:43
Domain 1.50: Passive and active reconnaissance - CompTIA Security+ SY0 601
Domain 1.51: Exercise types - CompTIA Security+ SY0 601
Domain 2.1: Configuration management - CompTIA Security+ SY0 601
2:28
Domain 2.2: Data sovereignty - CompTIA Security+ SY0 601
3:37
Domain 2.3: Data protection - CompTIA Security+ SY0 601
2:06
Domain 2.4: Geographical considerations - CompTIA Security+ SY0 601
Domain 2.5: Response and recovery controls - CompTIA Security+ SY0 601
1:44
Domain 2.6: SSL/TLS (HTTPS) inspection- CompTIA Security+ SY0 601
2:23
Domain 2.7: Hashing - CompTIA Security+ SY0 601
1:31
Domain 2.8: API considerations - CompTIA Security+ SY0 601
Domain 2.9: Site resiliency/Recovery sites - CompTIA Security+ SY0 601
3:28
Domain 2.10: Deception and disruption - CompTIA Security+ SY0 601
4:30
Domain 2.11: Different Cloud models - CompTIA Security+ SY0 601
Domain 2.12: Cloud service providers - CompTIA Security+ SY0 601
1:08
Domain 2.13: MSP & MSSP - CompTIA Security+ SY0 601
1:57
Domain 2.14: Cloud monitoring solutions on and off premises - CompTIA Security+ SY0 601
1:59
Domain 2.15: Fog computing - CompTIA Security+ SY0 601
1:39
Domain 2.16: Edge computing - CompTIA Security+ SY0 601
1:21
Domain 2.17: Thin client - CompTIA Security+ SY0 601
2:34
Domain 2.18: Containers - CompTIA Security+ SY0 601
1:34
Domain 2.19: Microservices/API - CompTIA Security+ SY0 601
3:15
Domain 2.20: Infrastructure as code - CompTIA Security+ SY0 601
Domain 2.21: Serverless architecture - CompTIA Security+ SY0 601
1:26
Domain 2.22: Services integration - CompTIA Security+ SY0 601
Domain 2.23: Resource policies - CompTIA Security+ SY0 601
Domain 2.24: Transit gateway - CompTIA Security+ SY0 601
4:02
Domain 2.25: VM sprawl avoidance and VM escape protection - CompTIA Security+ SY0 601
2:39
Domain 2.26: Application development environment - CompTIA Security+ SY0 601
2:35
Domain 2.27: Provisioning and deprovisioning - CompTIA Security+ SY0 601
Domain 2.28: Integrity measurement - CompTIA Security+ SY0 601
4:08
Domain 2.29: Secure coding techniques - CompTIA Security+ SY0 601
6:22
Domain 2.30: Open Web Application Security Project (OWASP)/Top10 - CompTIA Security+ SY0 601
Domain 2.31: Software diversity - CompTIA Security+ SY0 601
3:01
Domain 2.32: Automation/Scripting - CompTIA Security+ SY0 601
1:02
Domain 2.33: Elasticity - CompTIA Security+ SY0 601
Domain 2.34: Scalability - CompTIA Security+ SY0 601
1:46
Domain 2.35: Version control - CompTIA Security+ SY0 601
5:33
Domain 2.36: Authentication methods - CompTIA Security+ SY0 601
4:21
Domain 2.37: Biometrics - CompTIA Security+ SY0 601
2:48
Domain 2.38: Multifactor authentication (MFA) factors and attributes - CompTIA Security+ SY0 601
Domain 2.39: Authentication, authorization, and accounting (AAA) - CompTIA Security+ SY0 601
2:13
Domain 2.40: Cloud vs. on-premises for AAA - CompTIA Security+ SY0 601
5:07
Domain 2.41: Redundancy - CompTIA Security+ SY0 601
3:10
Domain 2.42: Replication - CompTIA Security+ SY0 601
1:42
Domain 2.44: On-premises vs. cloud resiliency - CompTIA Security+ SY0 601
4:55
Domain 2.45: Backup types - CompTIA Security+ SY0 601
2:14
Domain 2.46: Non-persistence - CompTIA Security+ SY0 601
Domain 2.47: High availability - CompTIA Security+ SY0 601
1:03
Domain 2.48: Restoration order - CompTIA Security+ SY0 601
1:32
Domain 2.49: Diversity - CompTIA Security+ SY0 601
3:38
Domain 2.50: Embedded systems - CompTIA Security+ SY0 601
4:18
Domain 2.51: ICS/SCADA - CompTIA Security+ SY0 601
3:13
Domain 2.52: Internet of Things (IoT) - CompTIA Security+ SY0 601
2:57
Domain 2.53: Specialized systems - CompTIA Security+ SY0 601
1:45
Domain 2.54: Voice over IP (VoIP) - CompTIA Security+ SY0 601
Domain 2.55: Heating, ventilation, air conditioning (HVAC) - CompTIA Security+ SY0 601
1:36
Domain 2.56: Drones - CompTIA Security+ SY0 601
Domain 2.57: Multifunction printer (MFP) - CompTIA Security+ SY0 601
8:55
Internet Protocol Overview (Connectionless/connection oriented) and Tunneling (GRE and IPsec)
3:00
What is ICMP?
What is FTP?
2:10
Teletype Network (Telnet) protocol
What is SSH?
What is SFTP?
2:08
What is SMTP?
3:21
Domain 2.58: Real-time operating systems - CompTIA Security+ SY0 601
2:52
What is POP and IMAP?
Domain 2.59: Surveillance systems - CompTIA Security+ SY0 601
1:41
Domain 2.60: System on chip (SoC) - CompTIA Security+ SY0 601
11:43
What is DNS?
4:11
What is DHCP?
2:02
What is NTP?
What is TFTP?
4:04
Domain 2.61: Communication considerations for embedded systems - CompTIA Security+ SY0 601
Domain 2.62: Embedded system constraints - CompTIA Security+ SY0 601
Domain 2.63: Bollards/Barricades - CompTIA Security+ SY0 601
1:20
Domain 2.64: Access control vestibules - CompTIA Security+ SY0 601
Domain 2.65: Badges - CompTIA Security+ SY0 601
1:05
Domain 2.66: Alarms - CompTIA Security+ SY0 601
0:54
Domain 2.67: Signage - CompTIA Security+ SY0 601
Domain 2.68: Motion and object detection - CompTIA Security+ SY0 601
Domain 2.69: Closed-circuit television (CCTV) - CompTIA Security+ SY0 601
2:05
What is HTTP and HTTPS?
What is SNMP?
What is LDAP and LDAPS?
What is SMB protocol?
0:39
Domain 2.70: Industrial camouflage - CompTIA Security+ SY0 601
Domain 2.71: Physical security personnel - CompTIA Security+ SY0 601
Domain 2.72: Locks - CompTIA Security+ SY0 601
1:53
Domain 2.73: USB data blocker - CompTIA Security+ SY0 601
2:11
What is Syslog?
What is RDP?
What is Session Initiation Protocol (SIP)?
What are SQL protocols
What is Secure/Multipurpose Internet Mail Extensions (S/MIME)
What is RTP/SRTP?
Domain 2.74: Security Lighting - CompTIA Security+ SY0 601
Domain 2.75: Security fencing - CompTIA Security+ SY0 601
1:50
Domain 2.76: Fire suppression - CompTIA Security+ SY0 601
Domain 2.77: Physical security sensors - CompTIA Security+ SY0 601
1:25
Domain 2.78: Drones for physical security - CompTIA Security+ SY0 601
Domain 2.79: Visitor logs - CompTIA Security+ SY0 601
Domain 2.80: Faraday cages - CompTIA Security+ SY0 601
1:22
Domain 2.81: Air gap - CompTIA Security+ SY0 601
Domain 2.82: Screened subnet - CompTIA Security+ SY0 601
1:17
Domain 2.83: Protected cable distribution - CompTIA Security+ SY0 601
2:17
Domain 2.84: Secure areas - CompTIA Security+ SY0 601
Secure data destruction - CompTIA Security+ SY0 601
Domain 2.86: Digital signatures - CompTIA Security+ SY0 601
Domain 2.87: Key length - CompTIA Security+ SY0 601
Salting and key stretching - CompTIA Security+ SY0 601 Domain 2.88-2.89
2:59
Domain 2.90: Hashing - CompTIA Security+ SY0 601
3:02
Domain 2.91: Key exchange/key establishment- CompTIA Security+ SY0 601
Domain 2.92: Elliptic-curve cryptography - CompTIA Security+ SY0 601
Domain 2.93: Perfect forward secrecy - CompTIA Security+ SY0 601
3:11
Quantum computing and post-quantum - CompTIA Security+ SY0 601 Domain 2.94-2.96
0:38
Ephemeral keys - CompTIA Security+ SY0 601 Domain 2.97
3:54
Block and Stream Ciphers - CompTIA Security+ SY0 601 Domain 2.98 + 2.100
Blockchain - CompTIA Security+ SY0 601 Domain 2.99
Symmetric vs. asymmetric - CompTIA Security+ SY0 601 Domain 2.101
Lightweight cryptography - CompTIA Security+ SY0 601 Domain 2.102
Steganography - CompTIA Security+ SY0 601 Domain 2.103
6:39
Endpoint protection - CompTIA Security+ SY0 601 Domain 3.1
2:41
Boot integrity - CompTIA Security+ SY0 601 Domain 3.2
Database security - CompTIA Security+ SY0 601 Domain 3.3
4:13
Application security - CompTIA Security+ SY0 601 Domain 3.4
Sandboxing - CompTIA Security+ SY0 601 Domain 3.8
1:30
Hardware root of trust and Trusted Platform Module - CompTIA Security+ SY0 601 Domain 3.7
1:27
SED/FDE Opal standard - CompTIA Security+ SY0 601 Domain 3.6
Hardening - CompTIA Security+ SY0 601 Domain 3.5
3:14
Homomorphic encryption- CompTIA Security+ SY0 601 Domain 2.104
4:09
Load balancing - CompTIA Security+ SY0 601 Domain 3.9
Network segmentation - CompTIA Security+ SY0 601 Domain 3.10
3:33
Virtual private network (VPN) - CompTIA Security+ SY0 601 Domain 3.11
DNS security - CompTIA Security+ SY0 601 Domain 3.12
1:54
Network access control - CompTIA Security+ SY0 601 Domain 3.13
Out-of-band management - CompTIA Security+ SY0 601 Domain 3.14
3:44
Port security - CompTIA Security+ SY0 601 Domain 3.15
7:17
Network security appliances - CompTIA Security+ SY0 601 Domain 3.16
1:52
Access control list (ACL) - CompTIA Security+ SY0 601 Domain 3.17
Route security - CompTIA Security+ SY0 601 Domain 3.18
Quality of service (QoS) - CompTIA Security+ SY0 601 Domain 3.19
Implications of IPv6 - CompTIA Security+ SY0 601 Domain 3.20
Port spanning/port mirroring - CompTIA Security+ SY0 601 Domain 3.21
Monitoring services - CompTIA Security+ SY0 601 Domain 3.22
File integrity monitors - CompTIA Security+ SY0 601 Domain 3.23
3:30
WEP vs WPA vs WPA2 vs WPA3 - CompTIA Security+ & CompTIA Network+
Authentication protocols - CompTIA Security+ SY0 601 Domain 3.25
Wireless Authentication methods - CompTIA Security+ SY0 601 Domain 3.26
Wireless network installation considerations - CompTIA Security+ SY0 601 Domain 3.27