Welcome to the CompTIA Security+ Certification; SY0-401. The Total Course from Mike Meyers and Total Seminars.
This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-401 Exam. The first goal of the course is to make you a good IT security tech and in the process make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.
The course covers all the CompTIA Security+ SY0-401 Objective Domains:
1.0 Network Security 20%
2.0 Compliance and Operational Security 18%
3.0 Threats and Vulnerabilities 20%
4.0 Application, Data and Host Security 15%
5.0 Access Control and Identity Management 15%
6.0 Cryptography 12%
· Risk management.
· Authentication and authorization.
· Host, LAN, and application security.
· Wireless, cloud and mobile security.
· Environmental and personnel security and controls.
This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.
In this introduction to the CompTIA Security+ exam, Mike explains what the exam is all about and the focus of IT security.
Download the CompTIA Security+ objectives attached to this lecture.
In this episode, Mike describes the CompTIA Security+ exam objectives and explains in broad terms what is covered in each of them.
In this episode, Mike outlines a study strategy for success on the CompTIA Security+ exam.
In this episode, Mike discusses the CIA goals of security: confidentiality, integrity, and availability.
In this episode, Mike explains the three categories of security controls.
In this episode, Mike discusses other related security controls.
In this episode, Mike explains the concept of security governance: policies, standards, and procedures.
In this episode, Mike addresses various examples of security policies.
In this episode, Mike explains risk and related concepts.
In this episode, Mike explains the terms and processes to manage risk.
In this episode, Mike looks at the impact of risk.
In this episode, Mike presents the concept of basic cryptography methods.
In this episode, Mike shows how a hash provides integrity to data.
In this episode, Mike explains how hashing can improve message security.
In this episode, Mike describes encrypting and decrypting data with the same key.
In this episode, Mike shows that encrypting and decrypting can be done with different keys.
In this episode, Mike looks at Internet processes that have built-in encryption.
In this episode, Mike illustrates that information can be hidden within other data.
In this episode Mike explains certificates and how they are used to establish trust.
In this episode, Mike discusses the public key infrastructure (PKI), used to enable commerce and other secure activities over the Internet.
In this episode, Mike explains the issues of proving that you are who you are.
In this episode, Mike explores methods used for authorization, enabling clients to do stuff with resources properly.
In this episode, Mike discusses common protocols used to identify proper users, such as PAP, CHAP, Kerberos, LDAP, and more.
In this episode, Mike explores two common methods used for AAA, RADIUS and TACACS+.
In this episode, Mike looks at how to control access to files in a Linux system.
In this episode, Mike describes how to log in to one computer and gain access to many.
In this episode, Mike shows methods to keep passwords secure.
In this episode, Mike discusses the security of user accounts.
In this episode, Mike looks at some of the things that threaten computers and users.
In this episode, Mike talks about types of malware and what they do.
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.
In this episode, Mike shows attacks where bad actors function between encrypting hosts.
In this episode, Mike discusses attacks that prevents servers from providing their essential services.
In this episode, Mike talks about techniques to protect a host computer from threats.
In this episode, Mike looks at the conceptual structure of networks.
In this episode, Mike discusses the elements of TCP/IP networking.
In this episode, Mike reviews common applications, protocols, and port numbers.
In this episode, Mike presents the elements of Transport Layer Security.
In this episode, Mike addresses IPsec, the first standardized Internet encryption.
In this episode, Mike discusses secure methods to save and access data on a network device.
In this episode, Mike explores using multiple disks to improve reliability and performance.
In this episode, Mike explains how to ensure that stored data is safe from physical loss.
In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.
In this episode, Mike looks at network-aware devices, appliances, and industrial systems.
In this episode, Mike reviews elements of local area networks.
In this episode, Mike discusses how to govern access to resources.
In this episode, Mike presents the functions of proxy servers.
In this episode, Mike addresses the difference between detecting network intruders and preventing intrusions.
|In this episode Mike talks about WEP wireless security attacks and methods for cracking WEP passwords.|
|In this episode Mike talks about WPA and WPA2 wireless security attachs and methods for cracking WPA passwords.|
In this episode, Mike discusses types and the importance third-party agreements and how they affect IT security
In this episode, Mike explores devices and purposes involved in IaaS.
In this episode, Mike describes the purpose of devices used to set up PaaS infrastructures.
In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.
In this episode, Mike goes through the various device and application level management that can take place on mobile devices
Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.
Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars web site.
Mike Meyers, affectionately called the "Alpha Geek", is the Industry's leading authority on CompTIA Certifications. He is the President and co-founder of Total Seminars, LLC, a provider of PC and network repair seminars, books, videos and courseware for thousands of organizations throughout the world. Mike has been involved in the computer and network repair industry since 1987 as a technician, instructor, author, consultant, and speaker.
Author of numerous popular PC books and videos, including the best-selling CompTIA A+ Certification All-in-One Exam Guide and CompTIA Network+ Certification All-in-One Exam Guide. Mike is also the series editor for the highly successful Mike Meyers' Certification Passport series and the Mike Meyers' Guide to series, all published by McGraw-Hill. Mike has sold over a million IT and certification books.
As well as writing Mike has personally taught thousands of students, including U.S. senators, U.S. Supreme Court Justices, members of the United Nation, every branch of the U.S. Armed Forces, many branches of the Department of Justice, hundreds of corporate clients and academic students at every level.
Mike's humorous and easy to follow approach to teaching comes through in his video training courses as well as his classroom instructor led courses. Making IT concepts easy to understand and fun to learn helps students stay engaged and retain the information.
Mike brings his unique style of video training to Udemy with the launch of his CompTIA A+ Certification, Network+ Certification and Security+ Certification courses. Check out the first few lessons which are available free and you will quickly see what is different about Mike's approach to learning.