Security+ Recertification
Buy now
Learn more
Resources
About this Course
Prerequisites
Access
Cancellation Policy
Introduction
Friendly Notice
Friendly Reminder
Introduction
Study Notes
Lesson 1
Lesson 1A: Comparing Security Roles and Security Controls
Extra Resources: What is the CIA Triad 01
Extra Resources: What is the CIA Triad 02
Lesson 1B: Compare and Contrast Security Control and Framework Types
Lesson 2
Lesson 2A: Explaining Threat Actors and Threat Intelligence
Extra Resources: What is a Vulnerability?
Lesson 2B: Explain Threat Intelligence Sources
Recap: Lesson 2
Lesson 3
Lesson 3A: Performing Security Assessments
Extra Resources: Ping vs Traceroute
Extra Resources: What is NMAP?
Extra Resources: IPCONFIG vs IFCONFIG
Extra Resources: What is Nslookup?
Extra Resources: What is MSFvenom?
Lesson 3B: Explain Security Concerns with General Vulnerability Types
Lesson 3C: Summarize Vulnerability Scanning Techniques
Extra Resources: What is Nessus?
Lesson 3D: Explain Penetration Testing Concepts
Recap: Lesson 3
Lesson 4
Lesson 4A: Identifying Social Engineering and Malware
Lesson 4B: Analyze Indicators of Malware-based Attacks
Extra Resources: What is Malware?
Recap: Lesson 4
Lesson 5
Lesson 5A: Summarizing Basic Cryptographic Concepts
Lesson 5B: Summarize Cryptographic Modes of Operation
Lesson 5C: Summarize Cryptographic Use Cases and Weaknesses
Lesson 5D: Summarize Other Cryptographic Technologies
Recap: Lesson 5
Extra Resources: What is a hash?
Lesson 6
Lesson 6A: Implementing Public Key Infrastructure
Lesson 6B: Implement PKI Management
Recap: Lesson 6
Lesson 7
Lesson 7A: Implementing Authentication Controls
Lesson 7B: Implement Knowledge-based Authentication
Lesson 7C: Implement Authentication Technologies
Lesson 7D: Summarize Biometrics Authentication Concepts
Recap: Lesson 7
Lesson 8
Lesson 8A: Implementing Identity and Account Management Controls
Lesson 8B: Implement Account Policies
Lesson 8C: Implement Authorization Solutions
Lesson 8D: Explain the Importance of Personnel Policies
Recap: Lesson 8
Lesson 9
Lesson 9A: Implementing Secure Network Designs
Extra Resources: What is an Application Server?
Lesson 9B: Implement Secure Switching and Routing
Lesson 9C: Implement Secure Wireless Infrastructure
Lesson 9D: Implement Load Balancers
Lesson: Recap 9
Extra Resources: OSI Model
Extra Resources: DNS Amplification
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Extra Resources: TCP vs UDP
Lesson 10
Lesson 10A: Implementing Network Security Appliances
Lesson 10B: Implement Network Security Monitoring
Lesson 10C: Summarize the Use of SIEM
Recap: Lesson 10
Extra Resources: Splunk (SIEM Tool)
Lesson 11
Lesson 11A: Implementing Secure Network Protocols
Lab: Implementing Secure Network Addressing Services
Lesson 11B: Implement Secure Application Protocols
Lesson 11C: Implement Secure Remote Access Protocols
Recap: Lesson 11
Lesson 12
Lesson 12A: Implementing Host Security Solutions
Lesson 12B: Implement Endpoint Security
Lesson 12C: Explain Embedded System Security Implications
Recap: Lesson 12
Lesson 13
Lesson 13A: Implementing Secure Mobile Solutions
Lesson 13B: Implement Secure Mobile Device Connections
Recap: Lesson 13
Lesson 14
Lesson 14A: Summarizing Secure Application Concepts
Lesson 14B: Analyze Indicators of Web Application Attacks
Extra Resources: Buffer Overflow Attack
Extra Resources: What is Cross Site Scripting?
Extra Resources: Command Injections
Extra Resources: CSRF Attack
Lesson 14C: Summarize Secure Coding Practices
Lesson 14D: Implement Secure Script Environments
Lesson 14E: Summarize Deployment and Automation Concepts
Recap: Lesson 14
Lesson 15
Lesson 15A: Implementing Secure Cloud Solutions
Lesson 15B: Apply Cloud Security Solutions
Lesson 15C: Summarize Infrastructure as Code Concepts
Recap: Lesson 15
Lesson 16
Lesson 16A: Explaining Data Privacy and Protection Concepts
Lesson 16B: Explain Privacy and Data Protection Controls
Recap: Lesson 16
Lesson 17
Lesson 17A: Performing Incident Response
Lesson 17B: Utilize Appropriate Data Sources for Incident Response
Lesson 17C: Apply Mitigation Controls
Recap: Lesson 17
Lesson 18
Lesson 18A: Explaining Digital Forensics
Lesson 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
Recap: Lesson 18
Lesson 19
Lesson 19A: Summarizing Risk Management Concepts
Lesson 19B: Explain Business Impact Analysis Concepts
Recap: Lesson 19
Lesson 20
Lesson 20A: Implementing Cybersecurity Resilience
Lesson 20B: Implement Backup Strategies
Lesson 20C: Implement Cybersecurity Resiliency Strategies
Recap: Lesson 20
Lesson 21
Lesson 21: Physical Security
Conclusion
Conclusion
O-Line Certificate of Completion
Products
Course
Section
Lesson
Recap: Lesson 17
Recap: Lesson 17
Security+ Recertification
Buy now
Learn more
Resources
About this Course
Prerequisites
Access
Cancellation Policy
Introduction
Friendly Notice
Friendly Reminder
Introduction
Study Notes
Lesson 1
Lesson 1A: Comparing Security Roles and Security Controls
Extra Resources: What is the CIA Triad 01
Extra Resources: What is the CIA Triad 02
Lesson 1B: Compare and Contrast Security Control and Framework Types
Lesson 2
Lesson 2A: Explaining Threat Actors and Threat Intelligence
Extra Resources: What is a Vulnerability?
Lesson 2B: Explain Threat Intelligence Sources
Recap: Lesson 2
Lesson 3
Lesson 3A: Performing Security Assessments
Extra Resources: Ping vs Traceroute
Extra Resources: What is NMAP?
Extra Resources: IPCONFIG vs IFCONFIG
Extra Resources: What is Nslookup?
Extra Resources: What is MSFvenom?
Lesson 3B: Explain Security Concerns with General Vulnerability Types
Lesson 3C: Summarize Vulnerability Scanning Techniques
Extra Resources: What is Nessus?
Lesson 3D: Explain Penetration Testing Concepts
Recap: Lesson 3
Lesson 4
Lesson 4A: Identifying Social Engineering and Malware
Lesson 4B: Analyze Indicators of Malware-based Attacks
Extra Resources: What is Malware?
Recap: Lesson 4
Lesson 5
Lesson 5A: Summarizing Basic Cryptographic Concepts
Lesson 5B: Summarize Cryptographic Modes of Operation
Lesson 5C: Summarize Cryptographic Use Cases and Weaknesses
Lesson 5D: Summarize Other Cryptographic Technologies
Recap: Lesson 5
Extra Resources: What is a hash?
Lesson 6
Lesson 6A: Implementing Public Key Infrastructure
Lesson 6B: Implement PKI Management
Recap: Lesson 6
Lesson 7
Lesson 7A: Implementing Authentication Controls
Lesson 7B: Implement Knowledge-based Authentication
Lesson 7C: Implement Authentication Technologies
Lesson 7D: Summarize Biometrics Authentication Concepts
Recap: Lesson 7
Lesson 8
Lesson 8A: Implementing Identity and Account Management Controls
Lesson 8B: Implement Account Policies
Lesson 8C: Implement Authorization Solutions
Lesson 8D: Explain the Importance of Personnel Policies
Recap: Lesson 8
Lesson 9
Lesson 9A: Implementing Secure Network Designs
Extra Resources: What is an Application Server?
Lesson 9B: Implement Secure Switching and Routing
Lesson 9C: Implement Secure Wireless Infrastructure
Lesson 9D: Implement Load Balancers
Lesson: Recap 9
Extra Resources: OSI Model
Extra Resources: DNS Amplification
Extra Resources: ARP Spoofing 01
Extra Resources: ARP Spoofing 02
Extra Resources: TCP vs UDP
Lesson 10
Lesson 10A: Implementing Network Security Appliances
Lesson 10B: Implement Network Security Monitoring
Lesson 10C: Summarize the Use of SIEM
Recap: Lesson 10
Extra Resources: Splunk (SIEM Tool)
Lesson 11
Lesson 11A: Implementing Secure Network Protocols
Lab: Implementing Secure Network Addressing Services
Lesson 11B: Implement Secure Application Protocols
Lesson 11C: Implement Secure Remote Access Protocols
Recap: Lesson 11
Lesson 12
Lesson 12A: Implementing Host Security Solutions
Lesson 12B: Implement Endpoint Security
Lesson 12C: Explain Embedded System Security Implications
Recap: Lesson 12
Lesson 13
Lesson 13A: Implementing Secure Mobile Solutions
Lesson 13B: Implement Secure Mobile Device Connections
Recap: Lesson 13
Lesson 14
Lesson 14A: Summarizing Secure Application Concepts
Lesson 14B: Analyze Indicators of Web Application Attacks
Extra Resources: Buffer Overflow Attack
Extra Resources: What is Cross Site Scripting?
Extra Resources: Command Injections
Extra Resources: CSRF Attack
Lesson 14C: Summarize Secure Coding Practices
Lesson 14D: Implement Secure Script Environments
Lesson 14E: Summarize Deployment and Automation Concepts
Recap: Lesson 14
Lesson 15
Lesson 15A: Implementing Secure Cloud Solutions
Lesson 15B: Apply Cloud Security Solutions
Lesson 15C: Summarize Infrastructure as Code Concepts
Recap: Lesson 15
Lesson 16
Lesson 16A: Explaining Data Privacy and Protection Concepts
Lesson 16B: Explain Privacy and Data Protection Controls
Recap: Lesson 16
Lesson 17
Lesson 17A: Performing Incident Response
Lesson 17B: Utilize Appropriate Data Sources for Incident Response
Lesson 17C: Apply Mitigation Controls
Recap: Lesson 17
Lesson 18
Lesson 18A: Explaining Digital Forensics
Lesson 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
Recap: Lesson 18
Lesson 19
Lesson 19A: Summarizing Risk Management Concepts
Lesson 19B: Explain Business Impact Analysis Concepts
Recap: Lesson 19
Lesson 20
Lesson 20A: Implementing Cybersecurity Resilience
Lesson 20B: Implement Backup Strategies
Lesson 20C: Implement Cybersecurity Resiliency Strategies
Recap: Lesson 20
Lesson 21
Lesson 21: Physical Security
Conclusion
Conclusion
O-Line Certificate of Completion