Comienza Ya. Es Gratis
ó regístrate con tu dirección de correo electrónico
SEC + por Mind Map: SEC +

1. Cybrary - CompTIA Security+ (SY0-601)

1.1. VIDEO

1.1.1. Introduction CompTIA Security+ 2021

1.1.2. Risk Management and Security Basics

1.1.3. Risk Management Overview

1.1.4. Use and Misuse Cases

1.1.5. Risk Assessment

1.1.6. Risk Mitigation

1.1.7. Risk Monitoring

1.1.8. Security Principles - Confidentiality

1.1.9. Integrity and Availability Threats and Mitigation

1.1.10. Security Principles Wrap-Up

1.1.11. Understanding Attacks

1.1.12. Social Engineering

1.1.13. Malware

1.1.14. Network-Based Attacks.

1.1.15. Spoofing and Redirection

1.1.16. DNS Service

1.1.17. Passwords

1.1.18. Wireless Security Part 1

1.1.18.1. Wireless Security Part 2

1.1.19. Application Attacks

1.1.20. Code Injection and Cross Site Scripting

1.1.21. XSRF Race Conditions and Memory Issues

1.1.22. Cryptography Introduction and Services

1.1.23. Cryptography Definitions - Initialization Vectors

1.1.24. Algorithms and Keys

1.1.25. Desirable Qualities of Algorithms and Keys

1.1.26. Symmetric Cryptography

1.1.27. Symmetric Ciphers Stream and Block.

1.1.28. Asymmetric Cryptography

1.1.29. Hashing for Integrity

1.1.30. MAC Message Authentication Code

1.1.31. Hybrid Cryptography SSL and TLS

1.1.32. SSL, TLS and PKI Introduction

1.1.33. PKI Continued

1.1.34. PGP and SMIME

1.1.35. Networking Concepts

1.1.35.1. Network Connectivity

1.1.35.2. Network Services Continued - DHCP and IPAM

1.1.35.3. OSI Model Introduction and Encapsulation

1.1.35.3.1. OSI Layers 1 and 2

1.1.35.3.2. OSI Layers 3 and 4

1.1.35.3.3. OSI Layers 5, 6, 7 and Summary

1.1.35.4. Ports and Protocols Introduction

1.1.35.4.1. Protocols of the TCPIP Suite Part 1

1.1.35.5. Network Services DNS

1.1.35.6. Network Storage

1.1.35.7. Remote Access

1.1.35.8. Tunneling and IPSec Part 1

1.1.35.8.1. Tunneling and IPSec Part 2

1.1.35.9. Network Connectivity Devices Part 1.

1.1.35.9.1. Network Connectivity Devices Part 2.

1.1.35.10. Switch and VLAN Configuration Part 1

1.1.35.10.1. Switch and VLAN Configuration Part 2

1.1.35.11. Routing

1.1.35.12. Network Address Translation

1.1.35.13. Firewalls

1.1.35.13.1. Firewall Best Practices

1.1.35.13.2. Intrusion Detection and Prevention

1.1.35.13.3. Introduction and Policy.

1.1.35.13.4. Scanning, Monitoring and Patching

1.1.35.13.5. Patch Lifecycle Baselines and Traffic Analysis

1.1.35.14. Fault Management.

1.1.35.15. RAID and Data Backups

1.1.35.16. Business Continuity and Disaster Recovery Part 1

1.1.35.16.1. Business Continuity and Disaster Recovery Part 2

1.1.35.17. Virtualization

1.1.35.17.1. Virtualization Part 2

1.1.35.18. Cloud Computing

1.1.35.19. Cloud Services

1.1.35.20. Cloud Deployment Models and Cloud Wrap-Up

1.1.35.21. IoT Introduction

1.1.35.21.1. OWASP IoT and Wrap-Up

1.1.35.22. Hardening the System Part 1

1.1.35.22.1. Hardening the System Part 2

1.1.35.23. Vulnerability Assessments and Penetration Tests

1.1.35.24. Incident Response

1.1.35.25. Forensic Investigations

1.1.36. Identity and Access Management Introduction

1.1.36.1. Authentication

1.1.36.2. Single Sign-On Kerberos Part 1

1.1.36.2.1. Single Sign-On Kerberos Part 2

1.1.36.3. Single Sign-On with Federated Services Part 1

1.1.36.3.1. Single Sign-On with Federated Services Part 2

1.1.36.4. Network Access Control and Authentication Wrap-Up

1.1.36.5. Authorization

1.1.36.6. Auditing and Wrap-Up

2. Udemy Prime - TOTAL - Mike Meyers - CompTIA Security+ Certification (SY0-601)

2.1. Introduction

2.2. Risk Management

2.2.1. Defining Risk

2.2.2. Threats and Vulnerabilities

2.2.3. Threat Intelligence

2.2.4. Risk Management Concepts

2.2.5. Security Controls

2.2.6. Risk Assessments and Treatments

2.2.7. Quantitative Risk Assessments

2.2.7.1. Qualitative Risk Assessments

2.2.8. Business Imapct Analysis

2.2.9. Data Types and Roles

2.2.10. Security and the Information Life Cycle

2.2.11. Data Destruction

2.2.12. Personnel Risk and Policies

2.2.13. Third-Party Risk Management

2.2.14. Agreement Types

2.3. Cryptography

2.3.1. Cryptography Basics

2.3.2. Data Protection

2.3.3. Cryptographic Methods

2.3.4. Symmetric Cryptosystems

2.3.5. Symmetric Block Modes

2.3.6. Asymmetric Cryptosystems

2.3.7. Diffie-Hellman

2.3.8. Hashing

2.3.9. Understanding Digital Certificates

2.3.10. Trust Models

2.3.11. Public Key Infrastructure

2.3.12. Certificate Types

2.3.13. Touring Certificates.

2.3.14. Cryptographic Attacks

2.3.15. Password Cracking

2.3.16. Password Cracking Demo

2.4. Identity and Account Management

2.4.1. . Identification, Authentication, and Authorization

2.4.2. Enabling Multifactor Authentication

2.4.3. Authorization

2.4.4. Accounting

2.4.5. Authentication Methods

2.4.6. Access Control Schemes

2.4.7. Account Management

2.4.8. Network Authentication

2.4.9. Identity Management Systems

2.5. Tools of the Trade

2.5.1. Touring the CLI

2.5.2. Shells

2.5.3. The Windows Command Line

2.5.4. Microsoft PowerShell

2.5.5. Linux Shells

2.5.6. Python Scripts-

2.5.7. Windows Command-Line Tools

2.5.8. Linux Command-Line Tools-

2.5.9. Network Scanners

2.5.10. Network Scanning with Nmap

2.5.11. Network Protocol Analyzers

2.5.12. Using Wireshark to Analyze Network Traffic

2.5.13. Using tcpdump to Analyze Network Traffic.

2.5.14. Log Files

2.5.15. Centralized Logging

2.5.16. Configuring Linux Log Forwarding-

2.6. Securing Individual Systems

2.6.1. Malware

2.6.2. Weak Configurations

2.6.3. Common Attacks-

2.6.4. Driver and Overflow Attacks

2.6.5. Password Attacks

2.6.6. Bots and Botnets

2.6.7. Disk RAID Levels

2.6.8. Securing Hardware-

2.6.9. Securing Endpoints

2.7. The Basic LAN

2.7.1. The OSI Model

2.7.2. ARP Cache Poisoning

2.7.3. Other Layer 2 Attacks-

2.7.4. Network Planning

2.7.5. Load Balancing-

2.7.6. Securing Network Access

2.7.7. Honeypots

2.7.8. Firewalls

2.7.9. Proxy Servers

2.7.10. Network and Port Address Translation

2.7.11. IP Security (IPsec).

2.7.12. Virtual Private Networks (VPNs)

2.7.13. Intrusion Detection and Prevention Systems (IDSIPS)

2.8. Securing Wireless LANs

2.8.1. Wi-Fi Encryption Standards

2.8.2. RFID, NFC, and Bluetooth-

2.8.3. Wi-Fi Coverage and Performance-

2.8.4. Wi-Fi Discovery and Attacks

2.8.5. Cracking WPA2

2.8.6. Wi-Fi Hardening

2.9. Securing Public Servers

2.9.1. Defining a Public Server

2.9.2. Common Attacks and Mitigations

2.9.3. Containers and Software-Defined Networking

2.9.4. Hypervisors and Virtual Machines

2.9.5. Cloud Deployment Models

2.9.6. Cloud Service Models

2.9.7. Securing the Cloud

2.10. Securing Dedicated System

2.10.1. Embedded Systems-

2.10.1.1. Connecting to Dedicated and Mobile Systems

2.10.2. Industrial Control System

2.10.3. Internet of Things (IoT) Devices

2.10.4. Connecting to Dedicated and Mobile Systems

2.10.5. Security Constraints for Dedicated Systems

2.10.6. Mobile Device Deployment and Hardening

2.11. Physical Security

2.11.1. Physical Security Overview

2.11.2. Physical Security

2.11.3. Keylogger Demo

2.11.4. Environmental Controls

2.12. Secure Protocols and Applications

2.12.1. DNS Security

2.12.2. FTP Packet Capture

2.12.3. Secure Web and E-mail

2.12.4. Request Forgery Attacks

2.12.5. Cross-Site Scripting Attacks

2.12.6. Web Application Security

2.12.7. Web App Vulnerability Scanning

2.13. Testing Infrastructure

2.13.1. Testing Infrastructure Overview

2.13.2. Social Engineering

2.13.3. Social Engineering Attacks

2.13.4. Vulnerability Assessments

2.13.5. Penetration Testing

2.13.6. Security Assessment Tools

2.13.7. The Metasploit Framework

2.14. Dealing with Incidents

2.14.1. Incident Response Overview

2.14.2. Incident Response Plans (IRPs)

2.14.3. Threat Analysis and Mitigating Actions-

2.14.4. Digital Forensics

2.14.5. Gathering Digital Evidence

2.14.6. Business Continuity and Alternate Sites

2.14.7. Data Backup

3. ahmed sultan

3.1. video

3.1.1. Security+ (SY0-601) Course Introduction

3.1.2. Comparing Security Roles and Security Controls

3.1.3. Explaining Threat Actors and Threat Intelligence

3.1.4. Performing Security Assessments – Part 1

3.1.4.1. 03.4- Performing Security Assessments – Part 4

3.1.4.1.1. 03.6- Performing Security Assessments – Part 6

3.1.5. 04.1- Identifying Social Engineering and Malware – Part 1

3.1.5.1. 04.2- Identifying Social Engineering and Malware – Part 2

3.1.6. 05- Summarizing Basic Cryptographic Concepts

3.1.7. 06.1- Implementing Public Key Infrastructure – Part 1

3.1.8. 07.1- Implementing Authentication Controls – Part 1

3.1.9. 08.1- Implementing Identity and Account Management Controls – Part 1

3.1.10. 09.1- Implementing Secure Network Designs – Part 1

3.1.10.1. 09.2- Implementing Secure Network Designs – Part 2

3.1.11. 10.1- Implementing Network Security Appliances – Part 1

3.1.11.1. 10.3- Implementing Network Security Appliances – Part 3 (Configuring an Intrusion Detection System Lab)

3.1.12. 11.1- Implementing Secure Network Protocols – Part 1

3.1.13. 12.1- Implementing Host Security Solutions – Part 1

3.1.14. 13- Implementing Secure Mobile Solutions

3.1.15. 14.1- Summarizing Secure Application Concepts – Part 1

3.1.16. 15- Implementing Secure Cloud Solutions

3.1.17. 16- Explaining Data Privacy and Protection Concepts

3.1.18. 17.1- Performing Incident Response – Part 1

3.1.19. 18.1- Explaining Digital Forensics – Part 1

3.1.20. 19- Summarizing Risk Management Concepts

3.1.21. 20.1- Implementing Cybersecurity Resilience – Part 1

3.1.21.1. 20.2- Implementing Cybersecurity Resilience – Part 2

3.1.22. 21- Explaining Physical Security

3.2. labs

3.2.1. 03.2- Performing Security Assessments – Part 2 (Exploring the Lab Environment Lab)

3.2.1.1. 03.3- Performing Security Assessments – Part 3 (Scanning and Identifying Network Nodes Lab)

3.2.1.1.1. 03.5- Performing Security Assessments – Part 5 (Intercepting and Interpreting Network Traffic with Packet Sniffing Tools Lab)

3.2.2. 04.3- Identifying Social Engineering and Malware – Part 3 (Installing, Using, and Blocking a Malware-based Backdoor Lab)

3.2.3. 06.2- Implementing Public Key Infrastructure – Part 2 (Managing the Lifecycle of a Certificate Lab)

3.2.4. 07.2- Implementing Authentication Controls – Part 2 (Auditing Passwords with a Password Cracking Utility Lab)

3.2.4.1. 07.3- Implementing Authentication Controls – Part 3 (Managing Centralized Authentication Lab)

3.2.5. 08.2- Implementing Identity and Account Management Controls – Part 2 (Managing Access Controls in Windows Server Lab)

3.2.5.1. 08.3- Implementing Identity and Account Management Controls – Part 3 (Configuring a System for Auditing Policies Lab)

3.2.5.1.1. 08.4- Implementing Identity and Account Management Controls – Part 4 (Managing Access Controls in Linux Lab)

3.2.6. 09.3- Implementing Secure Network Designs – Part 3 (Implementing a Secure Network Design Lab)

3.2.7. 10.2- Implementing Network Security Appliances – Part 2 (Configuring a Firewall Lab)

3.2.8. 11.2- Implementing Secure Network Protocols – Part 2 (Implementing Secure Network Addressing Services Lab)

3.2.8.1. 11.3- Implementing Secure Network Protocols – Part 3 (Implementing a Virtual Private Network Lab)

3.2.8.1.1. 11.4- Implementing Secure Network Protocols – Part 4 (Implementing a Secure SSH Server Lab)

3.2.9. 12.2- Implementing Host Security Solutions – Part 2 (Implementing Endpoint Protection Lab)

3.2.10. 14.2- Summarizing Secure Application Concepts – Part 2 (Identifying Application Attack Indicators Lab)

3.2.10.1. 14.3- Summarizing Secure Application Concepts – Part 3 (Identifying a Browser Attack Lab)

3.2.10.1.1. 14.4- Summarizing Secure Application Concepts – Part 4 (Implementing PowerShell Security Lab)

3.2.11. 17.2- Performing Incident Response – Part 2 (Managing Data Sources for Incident Response Lab)

3.2.11.1. 17.3- Performing Incident Response – Part 3 (Configuring Mitigation Controls Lab)

3.2.12. 18.2- Explaining Digital Forensics – Part 2 (Acquiring Digital Forensics Evidence Lab)