Master CompTIA Security+ & CompTIA Pentest + Certification
4.5 (17 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
131 students enrolled

Master CompTIA Security+ & CompTIA Pentest + Certification

Become a master in securing your environment and clear the CompTIA Security+ and Pentest+ Certification Exams
4.5 (17 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
131 students enrolled
Created by Packt Publishing
Last updated 3/2019
English
English [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 14 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Learn penetration testing methodology to conduct information gathering and vulnerability analysis
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery
  • Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them
  • Prepare a report and communicate your findings
  • Quick questions to pass the CompTIA Pentest+ (PT0-001) & CompTIA Security+ Certification (SY0-501) certification exam
  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
  • Understand the principles of organizational security and the elements of effective security policies.
Requirements
  • Taking up this Learning Path doesn't need you to be an expert in security. Any IT professional, security enthusiast, pentester, security professional, and administrator who is willing to secure their environment using various penetration testing tools will feel perfectly comfortable in understanding the topics presented.
Description

Video Learning Path Overview

A Learning Path is a specially tailored course that brings together two or more different topics that lead you to achieve an end goal. Much thought goes into the selection of the assets for a Learning Path, and this is done through a complete understanding of the requirements to achieve a goal.

CompTIA certifications help individuals ​build exceptional careers in information technology and ​enable organizations to form a skilled and confident staff, Employee, Educators, and IT Professionals. ​So get certified and be ​ready for today's and tomorrow's IT challenges!

This Learning Path is architected to help you not only learn about the threats and safeguarding network, websites but also learn how to penetrate and gain access into the targets system. Beginning with Security+ you will learn various tools used for security such as vulnerability scanning, protocol analysis & much more. Then you also learn to install and configure network- and host-based security technologies. Once you are comfortable with Security +, you'll explore CompTIA’s one more popular certification which is Pentest +. Here, you will gain practical knowledge to test devices in new environments such as the cloud and mobile. Moving on, you'll also be able to analyze data, identify vulnerability using tools such as OWASP, Burpsuite and much more.

This two-piece-Learning-Path is a practical approach with step by step guide to understanding various real-world security issues & also clear CompTIA Pentest+ & Security+ Certification with an aim to provide complete coverage of every CompTIA Security+ Certification.

Key Features

● Discover the features of CompTIA and Robust pentesting training to troubleshoot and solve system risks.

● Master extensive exercises and practice sessions to understand real-world security issues.

● Dive into robust training to troubleshoot and solve system risks.

About the Author

Sunil Gupta is a Certified Ethical Hacker. Currently, He teaches over 50,000+ students in 170+ countries online. He is a specialist in Ethical Hacking. His strengths include Vulnerability Assessment, Penetration Testing, Bug bounty hunting, Intrusion detection, Risk identification, Data analysis, Reports, and briefing.

Who this course is for:
  • Ethical hackers, penetration testers, cybersecurity professionals, network engineers, web security specialists, application security experts, information security professionals, and administrators will find this course useful. They’re usually performing threat analysis, responding with appropriate mitigation techniques & operate with an awareness of applicable policies, laws, and regulations.
Course content
Expand all 148 lectures 13:58:21
+ CompTIA Pentest+ Certification (PT0-001)
67 lectures 07:41:46

This video provides an overview of the entire course.

Preview 01:43

In this video, you will learn about Comptia Pentest+ Exam and Certification.

  • About the Comptia Pentest+ course

  • Exam details

  • Course features

CompTIA Pentest+ (PT0-001) Certification Information
05:02

This video will give you information about the course.

  • Learn more about the course details

  • Get basic information about the course

How to Get the Most Out of This Course?
01:31

In this video, you will learn the advantages of Pentest+ examination.

  • Learn Pentest+ certification’s basic details

  • Explore Compatia Pentest+ certification advantages

  • Compare other certifications

Advantages of CompTIA Pentest+ Certification
02:28

In this video, you will learn about the installation of virtual machine.

  • Learn about virtual machines

  • Download a virtual machine

  • Install a virtual machine

Lab Setup – Virtual Machine Installation
06:17

In this video, you will download Windows and Kali Linux.

  • Learn about operating systems

  • Download Kali Linux

  • Download Windows

Download Windows and Kali Linux
07:40

In this video, you will see how to install Windows and Kali Linux OSes.

  • Explore the Procedures to install OSes

  • Installation of Windows

  • Installation of Kali Linux

Installation of Windows and Kali Linux
05:33

In this video, you will see the install process of VMware.

  • Learn about VMware

  • Download VMware

  • Install VMware

Preview 03:09

In this video, you will download and install Kali Linux.

  • Learn about the Kali Linux OS

  • Download Kali Linux

  • Install Kali Linux

Penetration Testing Methodology
04:14

This video will help you download and install Windows.

  • Learn about the Windows OS

  • Download a Windows machine

  • Install a Windows machine

Planning a Penetration Test
03:53

In this video, you will learn about resources and budgets.

  • Learn the basics of planning

  • Learn to manage resources

  • Learn to manage budgets

Resources and Budgets
04:05

In this video, you will learn about impact and constraints.

  • Explore the factors in a pentesting project

  • Learn the impact of a pentesting project

  • Learn the constraints in a pentesting project

Impacts and Constraints
03:13

This video will give you Information about Rules of Engagement.

  • Explore the basics of Rules of Engagement

  • Learn about various legal conditions between client and pentesting team

Rules of Engagement
03:34

This video will give you information about pentesting strategies.

  • Learn about pentesting strategies

  • Explore the List of strategies

  • Explanation

Penetration Testing Strategies
03:56

In this video, you will get information about various assessments.

  • Learn about pentesting assessments

  • Explore list of assessments

  • Explanation

Types of Assessments
04:00

In this video, you will get information about threat actors.

  • Learn about pentesting threat actors

  • Explore the list of threat actors

  • Explanation

Threat Actors
03:22

In this video, you will learn about pentesting terminologies.

  • Explore the list of terminologies

  • Explanation

Penetration Testing Terminologies
04:17

In this video, you will learn about legal information in pentesting projects.

  • Explore list of legal points

  • Explanation

Legal Information
03:20

In this video, you will learn information gathering.

  • Learn about information gathering

  • Explore web information gathering technique

  • Learn about network information gathering technique

Preview 01:50

This video will help you learn IP scanning in network.

  • Explore IP address scanning

  • Learn about the Netsdiscover tool

  • Explore IP scanning process

Discover Active Machines in the Network
07:59

This video will help you learn port scanning using Nmap.

  • Learn about Nmap tool

  • Explore port scanning commands

  • Perform port scanning

Discover Open Ports in the Network Using Nmap
06:55

This video will help you learn about Nmap and Zenmap.

  • learn various Nmap commands

  • Explore Zenmap

  • Learn various Zenmap commands

Various Nmap Commands
13:11

In this video, you will get information about frontend and backend.

  • Learn about website frontend

  • Learn about website backend

  • Gather info about website frontend and backend

Discover Website Frontend and Backend Information
05:21

This video will help you gather info about subdomains of a website.

  • Learn about the tool

  • Explore website subdomains

  • Gather information

Discover Subdomains of a Website
08:44

In this video, you will gather info about website folders.

  • Learn about the tool

  • Learn about website folders

  • Download websites offline

Download Website Folders Offline
08:59

This video will help you gather information about a person.

  • Learn about the tool

  • Gather info about a person

  • Gather social networking accounts

Discover Social Networking Accounts Associated with a Person
09:06

In this video, you will gather information about the target’s friends.

  • Learn about the target’s friends

  • Gather information about the friends

  • Gather information about the friends’ email IDs

Discover Emails of the Target’s Friends
07:21

In this video, you will gather Information about organizations.

  • Learn about the target organization

  • Gather Information about it

  • Find organizations connected with the target organization

Discover Relations between Organizations
04:14

In this video, you will cover vulnerability assessment.

  • About vulnerability assessment

  • Types of vulnerability assessment

  • Explanation

Vulnerability Assessment Basics
01:38

In this video, you will learn about the Nessus network scanner.

  • About Nessus

  • Download Nessus

  • Installation

Nessus – Network Vulnerability Scanner Installation
10:16

In this video, you will learn the network scanning process.

  • Learn about the scanning process

  • Create a project in Nessus

  • Scan entire network

Network Scanning and Report Generation
11:13

This video will help you learn about Acunetix web vulnerability scanner.

  • Explore Acunetix scanner

  • Download Acunetix

  • Installation

Acunetix – Web Vulnerability Scanner Installation
10:06

This video will help you learn about scan and report generation process.

  • Create a project in Acunetix

  • Scan a website

  • Report generation

Website Scanning and Report Generation
10:39

In this video, you will learn about OWASP ZAP tool.

  • About ZAP tool

  • Scan a website with ZAP

  • Report generation

OWASP ZAP Web Vulnerability Scanner
11:16

In this video, you will learn about Burp Suite tool.

  • Explore Burp Suite tool

  • Analyze a website

  • Gather information about vulnerabilities

Burp Suite Web Analyzer
11:09

In this video, you will explore WordPress website scanning.

  • About WPScan tool

  • Scan a WordPress website

  • Find information

WPScan WordPress Analyzer
06:06

In this video, you will learn about pentesting tools and attacks.

  • Explore pentesting basics

  • Learn about various types of attacks

  • Explanation

Penetration Testing Tools Overview
01:37

In this video, you will explore database-based attack.

  • Learn about database attack

  • Explore database attack tools

  • Examples

Database Attack Tools
12:44

In this video, you will learn about password-based attack.

  • Explore password attack

  • Learn about password attack tools

  • Examples

Password Attack Tools
11:47

In this video, you will learn about wireless-based attack.

  • Explore wireless attack

  • Learn about wireless attack tools

  • Examples

Wireless Attack Tools
11:07

In this video, you will learn about social-engineering-based attack.

  • Explore social engineering attack

  • Learn more about social engineering attack tools

  • Examples

Social Engineering Tools
13:52

In this video, you will learn about sniffing attack.

  • Explore sniffing attack

  • Learn more about sniffing attack tools

  • Examples

Sniffing Tools
12:38

This video will help you learn about exploitation attack.

  • About exploitation attack

  • Explore exploitation attack tools

  • Examples

Exploitation Tools
07:57

This video will help you learn about post exploitation attack.

  • About post exploitation attack

  • Post exploitation attack tools

  • Examples

Post Exploitation Tools
03:25

In this video, you will learn about attacks and exploits.

  • Information about various attacks

  • Explanation about attacks

  • Information about exploits

Attacks and Exploits Overview
02:27

In this video, you will learn about database attack using sqlmap.

  • Learn about sqlmap tool

  • Explore database Attack using sqlmap

  • Explanation about process

Database Attack Using sqlmap Tool
15:56

This video will help you explore database attack using jsql.

  • Learn about jsql tool

  • Learn about database attack using jsql

  • Process explanation

Database Attack Using jSQL Tool
07:31

In this video, you will learn about password cracking using hydra.

  • Explore Hydra tool

  • Setup lab

  • Perform brute force

Password Attack Using Hydra Tool
10:00

This video will help you learn about password cracking using Medusa.

  • Explore about Medusa tool

  • Explore password attack using Medusa

  • Process explanation

Password Attack Using Medusa Tool
04:48

In this video, you will learn about password cracking using Metasploit.

  • Explore about Metasploit

  • Find exploits

  • Perform password cracking using Metasploit

Exploitation Attack Using Metasploit Framework
10:33

This video will help you perform an exploitation attack using BeEF tool.

  • Learn about BeEF tool

  • Exploitation attack using BeEF

  • Process explanation

Exploitation Attack Using BeEF Framework
14:50

In this video, you will learn about wireless attack setup.

  • Explore the basics of wireless attack

  • Set up wireless adapter

  • Information about wireless attack tools

Wireless Exploitation Setup
07:50

In this video, you will learn about wireless attacks using fern.

  • About fern

  • Wifi attack process

  • Explanation

Wireless Attack Using Fern Wi-Fi Cracker
09:28

In this video, you will learn about shell and Python scripts.

  • About scripts

  • Download Veil framework

  • Installation

Shell and Python Scripts
07:11

In this video, you will learn about Bypass AV using Veil.

  • Create a payload

  • Take access of the victim machine

  • Meterpreter commands

AV Bypass Using Shell and Python Scripts
10:28

This video covers the basics of reporting.

  • Learn the basics of reporting

  • Understand the report writing procedure

  • Explanation

Reporting and Communication Overview
02:34

In this video, you will learn various report writing steps.

  • Look at the report writing steps

  • Learn about Listing

  • Explanation

Report Writing Steps
02:13

This video will help you get well-versed with Metagoofil reporting.

  • Learn about Metagoofil tool

  • Download documents with metagoofil

  • Reporting with Metagoofil

Metagoofil – Reporting Tool
08:29

In this video, you will learn about Magictree reporting.

  • Learn about Magictree tool

  • Install Magictree

  • Reporting with Magictree

MagicTree – Reporting Tool
09:18

In this video, you will explore reporting using Recordmydesktop.

  • Learn the basics of recordmydesktop

  • Explore Reecordmydesktop commands

  • Report using Recordmydesktop

Recordmydesktop – Reporting Tool
05:39

This video will cover the report summary points.

  • Learn about report summary

  • Demonstration of a final report

Report Summary
02:56

Practice Questions

  • Questions – Part1

  • Answers

  • Explanation

Pentest+ Exam Practice Questions – Part 1
05:47

Practice Questions

  • Questions – Part2

  • Answers

  • Explanation

Pentest+ Exam Practice Questions – Part 2
06:42

Practice Questions

  • Questions – Part3

  • Answers

  • Explanation

Pentest+ Exam Practice Questions – Part 3
07:48

Practice Questions

  • Questions – Part4

  • Answers

  • Explanation

Pentest+ Exam Practice Questions – Part 4
07:27

Practice Questions

  • Questions – Part5

  • Answers

  • Explanation

Pentest+ Exam Practice Questions – Part 5
07:59

Summary

  • Summary of sections

  • Explanation

  • Final Points

Course Summary
01:25
+ CompTIA Security+ Certification (SY0-501)
81 lectures 06:16:35

This video gives an entire overview of the course

Preview 01:57

In this video, you will be given basic information about the course.

  • Learn about course topics

Course Introduction
01:54

This video explores course preparation steps.

  • Learn about preparation steps

  • Explanation on preparation points

How to Get Most Out of this Course?
01:46

In this video, you will learn about installation of VMware workstation.

  • Learn about VMware workstation

  • Download VMware workstation

  • Explore VMware installation

Download and Install VMware Workstation
04:54

In this video, learn how to download Kali Linux and Windows.

  • Learn about Windows and Kali Linux O.S.

  • Download Windows O.S

  • Download Kali Linux O.S

Download Windows and Kali Linux
10:07

This video explores the installation process of Windows and Kali Linux O.S.

  • Explore the installation process of Windows

  • Learn about the installation of Kali Linux O. S

  • Summary

Installation of Windows and Kali Linux in VMware Workstation
06:25

In this video, you will learn about malware and security.

  • Explore the malware creation steps

  • Learn about malware infection

  • Explore system security techniques

Determine Malware and Security in Action
15:46

This video explores the system attacks.

  • Learn about cyber attack

  • Explanation of cyber attacks

  • Take a look at real world example of cyber attacks

Types of Cyber Attacks on a System
07:49

This video explores threat and attributes.

  • Learn about threat

  • Learn about threat types

  • Explanation of threat and threat types

Threat and Its Attributes
01:48

In this video, you will learn about pentesting and types.

  • Learn about pentesting

  • Explores pentesting types

  • Explanation of pentesting types

Pentesting Concepts and Techniques
01:47

This video explores vulnerability and types.

  • Learn About vulnerability

  • Explore vulnerability types

  • Take a look at real world example of vulnerability scanning

Types of Vulnerabilities
12:48

In this video, you will look at the impact of vulnerabilities on systems.

  • Learn about vulnerability Impact

  • Explore the impact types

  • Take a look at real world example of vulnerability impact

Impact of Vulnerabilities
12:49

In this video, you will get information about network scanning techniques.

  • Learn about network scanning tools

  • Learn how to use network scanning tool

  • Explanation of scanning process

Network Scanner Tools and Techniques
11:13

This video will give you information about protocol analyzer.

  • Learn about network protocol analyzer

  • Learn how to use of network protocol analyzer

  • Explanation about network analysing technique

Protocol Analyzer Tools and Techniques
10:51

In this video, you will learn about log analysis tools.

  • Learn about logs

  • Explore the process of log analysis

  • Explanation of log analysis

Various Log Analysis Tools
09:22

This video will help you learn about command line utility part 1.

  • Learn about part-1 utilities

  • Learn how to use part- 1 utilities

  • Explanation about part-1 utilities

Command - Line Utilities - Part 1
10:29

This video will help you learn about command line utility part 2.

  • Learn about part-2 utilities

  • Learn how to use of part -2 utilities

  • Explanation about part-2 utilities

Command - Line Utilities - Part 1
14:34

In this video, you will get Information about firewalls, proxies and filters

  • Learn about firewalls, proxies and filters

  • Explore the firewall types

  • Explanation about proxies

Preview 07:47

In this video, you will get information about IDS, IPS and VPNs

  • Learn about IDS and IPS

  • Learn about VPN

  • Take a look at real world example of detection systems

IDS, IPS, and VPNs
08:13

This video explores devices for layer1 and layer2

  • Learn about layer1 and layer2

  • Explanation of layer1 and layer 2

  • Explore layer 1 and layer2 devices

Layer1 and Layer 2 Devices
03:00

This video will get you well-versed with routers, load balancers and access points

  • Learn about routers

  • Learn about load balancers

  • Learn about access points

Routers, Load Balancers, and Access Points
01:46

In this video, you will learn about NAC, DLP and Mail Gateways

  • Learn about NAC

  • Learn about DLP

  • Explore mail gateways

NACs, DLPs, and Mail Gateways
02:56

In this video, you will get information about mobile connection methods.

  • Learn about mobile connection methods

  • Listing of various methods

  • Explanation of the methods

Mobile Connection Methods
02:35

In this video, you will get information about mobile device management.

  • Learn about mobile device management

  • Explore various features

  • Explanation of various features

Mobile Device Management
02:48

In this video, you will get information about mobile device concerns.

  • Learn about mobile device concerns

  • Explore various features

  • Explanation of mobile device concerns

Mobile Device Concerns
02:38

In this video, you will get information about secure communication protocols.

  • Learn about secure communication protocols

  • Explore various types

  • Explanation of communication protocols

Secure Communication Protocols
01:30

In this video, you will get information about secure network and administration protocols.

  • Learn about secure network and administration protocol

  • Listing of protocols

  • Explanation about network protocols

Secure Network and Administration Protocols
02:59

In this video, you will get information about host threats.

  • Learn about host threats

  • Types of host threats

  • Take a look at real world example

Host Threats
10:47

This video will help you learn about physical hardening.

  • Learn about physical hardening

  • Get explanation about physical hardening

  • Take a look at real world example of physical hardening

Physical Hardening
05:41

In this video, you will learn about RFI and example.

  • Learn about RFI and example

  • Learn about EMI and example

  • Learn about ESD

RFI, EMI, and ESD
01:26

This video will help you get information about host hardening.

  • Learn about host hardening

  • Explore various features

  • Get explanation about the features

Host Hardening
02:08

In this video, you will get information about data encryption technique.

  • Learn about data encryption

  • Get explanation of data encryption

  • Take a look at real world example of data encryption

Data Encryption
05:23

In this video, you will get information about firmware security.

  • Learn about firmware security

  • Get examples of firmware security

  • Explanation of firmware security

Firmware Security
01:49

This video will help you learn about IDS and IPS.

  • Learn about IDS

  • Learn about IPS

  • Explore the difference between IDS and IPS

IDS and IPS
02:57

In this video, you will get information about frameworks, best practices and configuration guides.

  • Learn about frameworks

  • Learn about best practices

  • Explanation about frameworks, best practices and configuration guides

Frameworks, Best Practices, and Secure Configuration Guides
02:58

In this video, you will learn about secure network architecture.

  • Learn about the principle of secure network architecture

  • Explanation of secure network architecture

  • Take a look at the example of OSI model

Implement Secure Network Architecture
03:58

This video will help you learn about information about secure staging.

  • Learn about secure staging

  • Explore secure staging cycle

  • Explanation about secure staging cycle parameters

Secure Staging Deployment
02:57

In this video, you will learn about cloud and virtualization.

  • Learn about cloud

  • Learn about virtualization

  • Take a look at a real-world example of cloud

Cloud and Virtualization
05:54

In this video, you will get information about physical security controls.

  • Learn about physical security controls

  • Take a look at examples of physical security

  • Explanation about various physical security controls

Physical Security Controls
03:14

This video explores the installation process of VMware

  • Identify and access management

  • Get explanation about process of identity and access management

  • Take a look at real world example

Introduction
03:54

In this video, you will get information about identification, authentication and authorization

  • Learn about identification and example

  • Learn about authentication and example

  • Learn about authorization and example

Identification versus Authentication versus Authorization
03:16

In this video, you will get information about identification, biometrics and PIV

  • Get explanation about identification

  • Get explanation about biometrics

  • Get explanation about PIV

Identification, Biometrics, and PIV
03:15

In this video, you will learn how to update and upgrade Process

  • Learn about authentication factors

  • Explore various factors

  • Get explanation about authentication factors

Authentication Factors
02:30

In this video, you will get information about single sign on

  • Learn about single sign on

  • Explore the features of single sign on

  • Get explanation about single sign on

Single Sign-on
03:08

This video explores authentication services.

  • Learn about authentication services

  • Explore the function and purpose of authentication services

  • Learn about CIA triangle and explanation

Authentication Services Introduction
03:52

In this video, learn about Radius, Tacacs and Tacacs+.

  • Learn about radius

  • Learn about TACACS and TACACS+

  • Compare TACACS and RADIUS

RADIUS, TACACS, and TACACS+
04:34

In this video, you will learn about Kerberos, LDAP and secure LDAP.

  • Explore Kerberos and working

  • Explore LDAP and working

  • Learn how to secure LDAP

Kerberos, LDAP, and Secure LDAP
04:18

This video will help you learn about SAML, CHAP and NTLM.

  • Explore SAML and its working

  • Explore CHAP and its working

  • Learn about working of NTLM and NTLM v2

SAML, CHAP, MS-CHAP, NTLM/NTLMv2
04:14

In this video, you will get access control and methods.

  • Learn about access control

  • Explore various types of methods

  • Get explanation of access control methods

Access Control Methods
02:06

This video explores the biometric and facial recognition methods.

  • Learn about biometric

  • Explore various types of facial recognition methods

  • Learn about facial recognition

Biometric and Facial Recognition
04:12

In this video, you will learn about port security and 802.1x authentication.

  • Learn about port security

  • Learn about 802.1x authentication

Securing Ports and 802.1x
02:59

In this video, learn about security cycle and standard procedures

  • Learn about security cycle

  • Get explanation of security cycle parameters

  • Learn about standard operating procedure

Security Cycle and Standard Procedures
03:47

In this video, get Risk information

  • Learn about risk calculation

  • Explore risk management

  • Get explanation of risk management parameters

What Is Risk?
03:22

In this video, you will learn about business impact analysis

  • Learn about identification of critical systems

  • Get explanation of critical systems

Business Impact Analysis
03:00

In this video, you will learn about threat and types

  • Learn about threat

  • Explore threat types

  • Explanation of threat types

What Is Threat?
02:43

This video will help you get information about data security

  • Learn why you should care about data security

  • Explore data destruction techniques

  • Explanation of data destruction techniques

Data Security Practices
03:06

In this video, you will get information about incident and types

  • Learn about incident response

  • Explore incident types

  • Get explanation about incident types

Incident Response Plans
03:37

This video will help you learn about incident response

  • Learn about incident response

  • Explore various parameters

  • Explore incident preparation steps

Incident Response Process
02:58

This video will help you learn about forensics fundamentals

  • Learn about forensics fundamentals

  • Learn from forensics examples

  • Get explanation about forensics

Forensics Fundamentals
01:33

This video will help you learn about data acquisition techniques

  • Explore the data acquisition fundamentals

  • Take a look at the examples of data acquisition

  • Explore the data acquisition process

Data Acquisition Techniques
02:06

In this video, you will learn about recovery and restoration

  • Learn about recovery

  • Learn about restoration

  • Get explanation of data recovery and restoration

Recovery and Restoration
01:23

In this video, you will learn about protection and restoration techniques

  • Explore the data protection techniques

  • Learn about data restoration techniques

  • Get explanation of data protection and restoration

Data Protection and Restoration
01:38

In this video, you will learn about retention and destruction techniques

  • Learn about retention techniques

  • Learn about destruction techniques

  • Get examples of retention and destruction techniques

Data Retention and Destruction
01:45

In this video, learn about the basics of cryptography and steganography

  • Learn about cryptography

  • Learn about steganography

  • Get examples of cryptography and steganography

Cryptography and Steganography
07:31

In this video, learn about various types of encryption

  • Learn about encryption types

  • Learn about symmetric encryption

  • Learn about asymmetric encryption

Types of Encryption
01:20

In this video, you will learn about information about hashing

  • Learn about hashing

  • Learn about hashing algorithms

  • Take a look at hashing example

Hashing
05:21

This video will help you get information about digital signatures

  • Learn about digital signature

  • Learn digital signature example

  • Get explanation of digital signature process

Digital Signatures
01:40

This video will help you learn about digital certificates

  • Learn about digital certificates

  • Learn about digital certificates parameters

  • Take a look at an example of digital certificates parameters

Digital Certificates
01:35

In this video, you will learn about key lifecycle management

  • Learn about keys and encryption

  • Explore key lifecycle management parameters

  • Explanation about key lifecycle parameters

Key Lifecycle Management
01:59

This video will help you learn about wireless protocols

  • Learn about wireless protocols

  • Explore types of wireless protocols

  • Get explanation about protocols

Wireless Cryptography Protocols
01:44

In this video, you will learn about issues in WEP

  • Learn about WEP protocol

  • Explore WEP Issues

  • Explanation about WEP issues

WEP Issues
02:02

In this video, you will explore Issues in WPA

  • Learn about WPA protocol

  • Explore WPA Issues

  • Explanation about WPA issues

WPA Issues
01:40

In this video, you will explore Issues in WPS

  • Learn about WPS protocol

  • Explore WPS issues

  • Explanation about WPS issues

WPS Issues
02:38

In this video, you will attack on WEP

  • Learn about wireless attack tools

  • Explore the process of WEP attack

  • Explanation about WEP attack

Crack 802.11 WEP
08:19

In this video, you will attack on WPA

  • Learn about WPA attack

  • Explore the process of WPA attack

  • Explanation about WPA attack scenario

Crack 802.11 WPA
05:41

In this video, you will learn about CompTIA Security+ SY0-501 Exam

  • Learn about Security+ examination

  • Learn about Security+ Certification

  • Exam Details

About CompTIA Security+ SY0-501 Exam
03:53

In this video, you will take a look at Security+ practice questions part-1

  • Practice questions Part-1

  • Part-1 answers

  • Explanation of answers

Security+ Practice Questions Part – 1
09:04

In this video, you will take a look at Security+ practice questions part-2

  • Practice questions part-2

  • Part-2 answers

  • Explanation of answers

Security+ Practice Questions Part – 2
06:35

In this video, you will take a look at Security+ practice questions part-3

  • Practice questions Part-3

  • Part-3 answers

  • Explanation of answers

Security+ Practice Questions Part – 3
08:45

In this video, you will take a look at Security+ practice questions part-4

  • Practice questions Part-4

  • Part-4 answers

  • Explanation of answers

Security+ Practice Questions Part – 4
07:29

In this video, you will take a look at Security+ practice questions part-5

  • Practice questions part-5

  • Part-5 answers

  • Explanation of answers

Security+ Practice Questions Part – 5
04:20