2:19
CompTIA Security+ SY0 601 Introduction
Hans IT Academy
1:40
Domain 1: Threats, Attacks, and Vulnerabilities: Domain Overview - CompTIA Security+ SY0 601
10:01
Domain 1.1: Social Engineering - CompTIA Security+ SY0 601
8:16
Domain 1.2: Malware - CompTIA Security+ SY0 601
4:01
Domain 1.3: Password Attacks - CompTIA Security+ SY0 601
2:15
Domain 1.4: Physical Attacks - CompTIA Security+ SY0 601
1:13
Domain 1.5: Adversarial artificial intelligence - CompTIA Security+ SY0 601
1:33
Domain 1.6: Supply chain attack - CompTIA Security+ SY0 601
1:15
Domain 1.7: Cloud-based vs. on-premises attacks - CompTIA Security+ SY0 601
2:49
Domain 1.8: Cryptographic attacks - CompTIA Security+ SY0 601
1:49
Domain 1.9: Privilege escalation - CompTIA Security+ SY0 601
1:19
Domain 1.10: Cross Site Scripting - CompTIA Security+ SY0 601
5:02
Domain 1.11: Injection attacks - CompTIA Security+ SY0 601
1:12
Domain 1.12: Pointer/object dereference - CompTIA Security+ SY0 601
1:00
Domain 1.13: Directory Traversal - CompTIA Security+ SY0 601
1:38
Domain 1.14: Buffer overflows - CompTIA Security+ SY0 601
1:18
Domain 1.15: Race conditions Time of check/time of use - CompTIA Security+ SY0 601
1:29
Domain 1.16-1.17: Error handling & Improper input handling - CompTIA Security+ SY0 601
2:33
Domain 1.18: Replay attacks - CompTIA Security+ SY0 601
Domain 1.19: Integer overflow - CompTIA Security+ SY0 601
Domain 1.20: Request forgeries - CompTIA Security+ SY0 601
1:58
Domain 1.21: Application Programming Interface (API) attacks - CompTIA Security+ SY0 601
0:49
Domain 1.22: Resource exhaustion- CompTIA Security+ SY0 601
0:51
Domain 1.23: Memory Leak - CompTIA Security+ SY0 601
Domain 1.24: SSL stripping - CompTIA Security+ SY0 601
0:56
Domain 1.25: Driver manipulation - CompTIA Security+ SY0 601
1:16
Domain 1.26: Pass the hash - CompTIA Security+ SY0 601
5:59
Domain 1.27: Wireless Attacks - CompTIA Security+ SY0 601
0:47
Domain 1.28: On-path attack (man-in-the-middle attack) - CompTIA Security+ SY0 601
2:56
Domain 1.29: Layer 2 attacks - CompTIA Security+ SY0 601
2:16
Domain 1.30: DNS (Domain name system) attacks - CompTIA Security+ SY0 601
2:12
Domain 1.31: Distributed denial-of-service (DDoS) - CompTIA Security+ SY0 601
2:50
Domain 1.32: Malicious code or script execution - CompTIA Security+ SY0 601
3:56
Domain 1.33: Actors and Threats - CompTIA Security+ SY0 601
Domain 1.34: Attributes of actors - CompTIA Security+ SY0 601
2:07
Domain 1.35: Vectors - CompTIA Security+ SY0 601
4:59
Domain 1.36: Threat intelligence sources - CompTIA Security+ SY0 601
2:22
Domain 1.37: Research sources - CompTIA Security+ SY0 601
2:31
Domain 1.38: Cloud-based vs. on-premises vulnerabilities - CompTIA Security+ SY0 601
1:06
Domain 1.39: Zero-day - CompTIA Security+ SY0 601
2:38
Domain 1.40: Weak configurations - CompTIA Security+ SY0 601
2:44
Domain 1.41: Third-party risks - CompTIA Security+ SY0 601
1:37
Domain 1.42: Improper or weak patch management - CompTIA Security+ SY0 601
1:10
Domain 1.43: Legacy platforms - CompTIA Security+ SY0 601
2:04
Domain 1.44: Impacts - CompTIA Security+ SY0 601
1:56
Domain 1.45: Threat hunting- CompTIA Security+ SY0 601
4:22
Domain 1.46: Vulnerability scans - CompTIA Security+ SY0 601
3:49
Domain 1.47: Syslog/Security information and event management (SIEM) - CompTIA Security+ SY0 601
1:07
Domain 1.48: Security orchestration, automation, and response (SOAR) - CompTIA Security+ SY0 601
3:18
Domain 1.49: Penetration testing - CompTIA Security+ SY0 601
1:43
Domain 1.50: Passive and active reconnaissance - CompTIA Security+ SY0 601
Domain 1.51: Exercise types - CompTIA Security+ SY0 601
Domain 2.1: Configuration management - CompTIA Security+ SY0 601
2:28
Domain 2.2: Data sovereignty - CompTIA Security+ SY0 601
3:37
Domain 2.3: Data protection - CompTIA Security+ SY0 601
2:06
Domain 2.4: Geographical considerations - CompTIA Security+ SY0 601
Domain 2.5: Response and recovery controls - CompTIA Security+ SY0 601
1:44
Domain 2.6: SSL/TLS (HTTPS) inspection- CompTIA Security+ SY0 601
2:23
Domain 2.7: Hashing - CompTIA Security+ SY0 601
1:31
Domain 2.8: API considerations - CompTIA Security+ SY0 601
Domain 2.9: Site resiliency/Recovery sites - CompTIA Security+ SY0 601
3:28
Domain 2.10: Deception and disruption - CompTIA Security+ SY0 601
4:30
Domain 2.11: Different Cloud models - CompTIA Security+ SY0 601
Domain 2.12: Cloud service providers - CompTIA Security+ SY0 601
1:08
Domain 2.13: MSP & MSSP - CompTIA Security+ SY0 601
1:57
Domain 2.14: Cloud monitoring solutions on and off premises - CompTIA Security+ SY0 601
1:59
Domain 2.15: Fog computing - CompTIA Security+ SY0 601
1:39
Domain 2.16: Edge computing - CompTIA Security+ SY0 601
1:21
Domain 2.17: Thin client - CompTIA Security+ SY0 601
2:34
Domain 2.18: Containers - CompTIA Security+ SY0 601
1:34
Domain 2.19: Microservices/API - CompTIA Security+ SY0 601
3:15
Domain 2.20: Infrastructure as code - CompTIA Security+ SY0 601
Domain 2.21: Serverless architecture - CompTIA Security+ SY0 601
1:26
Domain 2.22: Services integration - CompTIA Security+ SY0 601
Domain 2.23: Resource policies - CompTIA Security+ SY0 601
Domain 2.24: Transit gateway - CompTIA Security+ SY0 601
4:02
Domain 2.25: VM sprawl avoidance and VM escape protection - CompTIA Security+ SY0 601
2:39
Domain 2.26: Application development environment - CompTIA Security+ SY0 601
2:35
Domain 2.27: Provisioning and deprovisioning - CompTIA Security+ SY0 601
Domain 2.28: Integrity measurement - CompTIA Security+ SY0 601
4:08
Domain 2.29: Secure coding techniques - CompTIA Security+ SY0 601
6:22
Domain 2.30: Open Web Application Security Project (OWASP)/Top10 - CompTIA Security+ SY0 601
Domain 2.31: Software diversity - CompTIA Security+ SY0 601
3:01
Domain 2.32: Automation/Scripting - CompTIA Security+ SY0 601
1:02
Domain 2.33: Elasticity - CompTIA Security+ SY0 601
Domain 2.34: Scalability - CompTIA Security+ SY0 601
1:46
Domain 2.35: Version control - CompTIA Security+ SY0 601
5:33
Domain 2.36: Authentication methods - CompTIA Security+ SY0 601
4:21
Domain 2.37: Biometrics - CompTIA Security+ SY0 601
2:48
Domain 2.38: Multifactor authentication (MFA) factors and attributes - CompTIA Security+ SY0 601
Domain 2.39: Authentication, authorization, and accounting (AAA) - CompTIA Security+ SY0 601
2:13
Domain 2.40: Cloud vs. on-premises for AAA - CompTIA Security+ SY0 601
5:07
Domain 2.41: Redundancy - CompTIA Security+ SY0 601
3:10
Domain 2.42: Replication - CompTIA Security+ SY0 601
1:42
Domain 2.44: On-premises vs. cloud resiliency - CompTIA Security+ SY0 601
4:55
Domain 2.45: Backup types - CompTIA Security+ SY0 601
2:14
Domain 2.46: Non-persistence - CompTIA Security+ SY0 601
Domain 2.47: High availability - CompTIA Security+ SY0 601
1:03
Domain 2.48: Restoration order - CompTIA Security+ SY0 601
1:32
Domain 2.49: Diversity - CompTIA Security+ SY0 601