O-Line Security/Security+ Recertification

  • $99.99

Security+ Recertification

Refresh your knowledge and ace your Security+ recertification with this 30 day Security Fundamentals course. Cover essential security concepts, from threats and vulnerabilities to network security, cryptography, and risk management. This course is designed to reinforce key topics, provide exam-focused insights, and help you confidently pass the Security+ exam with ease. Perfect for IT pros looking to stay certified.

Table of contents

Resources

About this Course
Preview
Prerequisites
Preview
Access
Preview
Cancellation Policy
Preview

Introduction

Friendly Notice
Friendly Reminder
Introduction
Study Notes

Lesson 1

Lesson 1A: Comparing Security Roles and Security Controls
Extra Resources: What is the CIA Triad 01
Extra Resources: What is the CIA Triad 02
Lesson 1B: Compare and Contrast Security Control and Framework Types

Lesson 2

Lesson 2A: Explaining Threat Actors and Threat Intelligence
Extra Resources: What is a Vulnerability?
Lesson 2B: Explain Threat Intelligence Sources
Recap: Lesson 2

Lesson 3

Lesson 3A: Performing Security Assessments
Extra Resources: Ping vs Traceroute
Extra Resources: What is NMAP?
Extra Resources: IPCONFIG vs IFCONFIG
Extra Resources: What is Nslookup?
Extra Resources: What is MSFvenom?
Lesson 3B: Explain Security Concerns with General Vulnerability Types
Lesson 3C: Summarize Vulnerability Scanning Techniques
Extra Resources: What is Nessus?
Lesson 3D: Explain Penetration Testing Concepts
Recap: Lesson 3

Lesson 4

Lesson 4A: Identifying Social Engineering and Malware
Lesson 4B: Analyze Indicators of Malware-based Attacks
Extra Resources: What is Malware?
Recap: Lesson 4

Lesson 5

Lesson 5A: Summarizing Basic Cryptographic Concepts
Lesson 5B: Summarize Cryptographic Modes of Operation
Lesson 5C: Summarize Cryptographic Use Cases and Weaknesses
Lesson 5D: Summarize Other Cryptographic Technologies
Recap: Lesson 5
Extra Resources: What is a hash?

Lesson 6

Lesson 6A: Implementing Public Key Infrastructure
Lesson 6B: Implement PKI Management
Recap: Lesson 6

Lesson 7

Lesson 7A: Implementing Authentication Controls
Lesson 7B: Implement Knowledge-based Authentication
Lesson 7C: Implement Authentication Technologies
Lesson 7D: Summarize Biometrics Authentication Concepts
Recap: Lesson 7

Lesson 8

Lesson 8A: Implementing Identity and Account Management Controls
Lesson 8B: Implement Account Policies
Lesson 8C: Implement Authorization Solutions
Lesson 8D: Explain the Importance of Personnel Policies
Recap: Lesson 8

Lesson 9

Lesson 9A: Implementing Secure Network Designs
Extra Resources: What is an Application Server?
Lesson 9B: Implement Secure Switching and Routing
Lesson 9C: Implement Secure Wireless Infrastructure
Lesson 9D: Implement Load Balancers
Lesson: Recap 9
Extra Resources: OSI Model
Extra Resources: DNS Amplification
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Extra Resources: TCP vs UDP

Lesson 10

Lesson 10A: Implementing Network Security Appliances
Lesson 10B: Implement Network Security Monitoring
Lesson 10C: Summarize the Use of SIEM
Preview
Recap: Lesson 10
Extra Resources: Splunk (SIEM Tool)

Lesson 11

Lesson 11A: Implementing Secure Network Protocols
Lab: Implementing Secure Network Addressing Services
Lesson 11B: Implement Secure Application Protocols
Lesson 11C: Implement Secure Remote Access Protocols
Recap: Lesson 11

Lesson 12

Lesson 12A: Implementing Host Security Solutions
Lesson 12B: Implement Endpoint Security
Lesson 12C: Explain Embedded System Security Implications
Recap: Lesson 12

Lesson 13

Lesson 13A: Implementing Secure Mobile Solutions
Lesson 13B: Implement Secure Mobile Device Connections
Recap: Lesson 13

Lesson 14

Lesson 14A: Summarizing Secure Application Concepts
Lesson 14B: Analyze Indicators of Web Application Attacks
Extra Resources: Buffer Overflow Attack
Extra Resources: What is Cross Site Scripting?
Extra Resources: Command Injections
Extra Resources: CSRF Attack
Lesson 14C: Summarize Secure Coding Practices
Lesson 14D: Implement Secure Script Environments
Lesson 14E: Summarize Deployment and Automation Concepts
Recap: Lesson 14

Lesson 15

Lesson 15A: Implementing Secure Cloud Solutions
Lesson 15B: Apply Cloud Security Solutions
Lesson 15C: Summarize Infrastructure as Code Concepts
Recap: Lesson 15

Lesson 16

Lesson 16A: Explaining Data Privacy and Protection Concepts
Lesson 16B: Explain Privacy and Data Protection Controls
Recap: Lesson 16

Lesson 17

Lesson 17A: Performing Incident Response
Lesson 17B: Utilize Appropriate Data Sources for Incident Response
Lesson 17C: Apply Mitigation Controls
Recap: Lesson 17
Preview

Lesson 18

Lesson 18A: Explaining Digital Forensics
Lesson 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
Recap: Lesson 18

Lesson 19

Lesson 19A: Summarizing Risk Management Concepts
Lesson 19B: Explain Business Impact Analysis Concepts
Recap: Lesson 19

Lesson 20

Lesson 20A: Implementing Cybersecurity Resilience
Lesson 20B: Implement Backup Strategies
Lesson 20C: Implement Cybersecurity Resiliency Strategies
Recap: Lesson 20

Lesson 21

Lesson 21: Physical Security

Conclusion

Conclusion
O-Line Certificate of Completion