Certification

Security Fundamentals
100%
Course Summary
Threats, Attacks, and VulnerabilitiesCourse Introduction
Indicators of Compromise
Critical Security Controls
Security Posture Assessment Tools
Incident Response
Identity and Access ManagementCryptography
Public Key Infrastructure
Identification and Authentication
Identity and Access Services
Account Management
Architecture and Design 1 Secure Network Design
Firewalls and Load Balancers
IDS and SIEM
Secure Wireless Access
Physical Security Controls
Architecture and Design 2 Secure Protocols and Services
Secure Remote Access
Secure Systems Design
Secure Mobile Device Services
Secure Virtualization and Cloud Services
Risk Management Forensics
Disaster Recovery and Resiliency
Risk Management 455
Secure Application Development
Organizational Security
Course Summary
Threats, Attacks, and Vulnerabilities
- Table of Contents
- About This Course
- About CompTIA Certifications
Indicators of Compromise
- Why is Security Important?
- Security Policy
- Threat Actor Types
- The Kill Chain
- Social Engineering
- Phishing
- Malware Types
- Trojans and Spyware
- Open Source Intelligence
Critical Security Controls
- Security Control Types
- Defense in Depth
- Frameworks and Compliance
- Vulnerability Scanning and Pen Tests
- Security Assessment Techniques
- Pen Testing Concepts
- Vulnerability Scanning Concepts
- Exploitation Frameworks
Security Posture Assessment Tools
- Topology Discovery
- Service Discovery
- Packet Capture
- Packet Capture Tools
- Remote Access Trojans
- Honeypots and Honeynets
Incident Response
- Incident Response Procedures
- Preparation Phase
- Identification Phase
- Containment Phase
- Eradication and Recovery Phases
Identity and Access Management
- Uses of Cryptography
- Cryptographic Terminology and Ciphers
- Cryptographic Products
- Hashing Algorithms
- Symmetric Algorithms
- Asymmetric Algorithms
- Diffie-Hellman and Elliptic Curve
- Transport Encryption
- Cryptographic Attacks
Public Key Infrastructure
- PKI Standards
- Digital Certificates
- Certificate Authorities
- Types of Certificate
- Implementing PKI
- Storing and Distributing Keys
- Key Status and Revocation
- PKI Trust Models
- PGP / GPG
Identification and Authentication
- Access Control Systems
- Identification
- Authentication
- LAN Manager / NTLM
- Kerberos
- PAP, CHAP, and MS-CHAP
- Password Attacks
- Token-based Authentication
- Biometric Authentication
- Common Access Card
Identity and Access Services
- Authorization
- Directory Services
- RADIUS and TACACS+
- Federation and Trusts
- Federated Identity Protocols
Account Management
- Formal Access Control Models
- Account Types
- Windows Active Directory
- Creating and Managing Accounts
- Account Policy Enforcement
- Credential Management Policies
- Account Restrictions
- Accounting and Auditing
Architecture and Design 1 Secure Network Design
- Network Zones and Segments
- Subnetting
- Switching Infrastructure
- Switching Attacks and Hardening
- Endpoint Security
- Network Access Control
- Routing Infrastructure
- Network Address Translation
- Software Defined Networking
Firewalls and Load Balancers
- Basic Firewalls
- Stateful Firewalls
- Implementing a Firewall or Gateway
- Web Application Firewalls
- Proxies and Gateways
- Denial of Service Attacks
- Load Balancers
IDS and SIEM
- Intrusion Detection Systems
- Configuring IDS
- Log Review and SIEM
- Data Loss Prevention
- Malware and Intrusion Response
Secure Wireless Access
- Wireless LANs
- WEP and WPA
- Wi-Fi Authentication
- Extensible Authentication Protocol
- Additional Wi-Fi Security Settings
- Wi-Fi Site Security
- Personal Area Networks
Physical Security Controls
- Site Layout and Access
- Gateways and Locks
- Alarm Systems
- Surveillance
- Hardware Security
- Environmental Controls
Architecture and Design 2 Secure Protocols and Services
- DHCP Security
- DNS Security
- Network Management Protocols
- HTTP and Web Servers
- SSL / TLS and HTTPS
- Web Security Gateways
- EmailServices
- S/MIME
- File Transfer
- Voice and Video Services
- Voice over IP (VoIP)
Secure Remote Access
- Remote Access Architecture
- Virtual Private Networks
- IPsec and IKE
- Remote Access Servers
- Remote Administration Tools
- Hardening Remote Access Infrastructure
Secure Systems Design
- Trusted Computing
- Hardware / Firmware Security
- Peripheral Device Security
- Secure Configurations
- OS Hardening
- Patch Management
- Embedded Systems
- Security for Embedded Systems
Secure Mobile Device Services
- Mobile Device Deployments
- Mobile Connection Methods
- Mobile Access Control Systems
- Enforcement and Monitoring
Secure Virtualization and Cloud Services
- Virtualization Technologies
- Virtualization Security Best Practices
- Cloud Computing
- Cloud Security Best Practices
Risk Management Forensics
- Forensic Procedures
- Collecting Evidence
- Capturing System Images
- Handling and Analyzing Evidence
Disaster Recovery and Resiliency
- Continuity of Operations Planning
- Disaster Recovery Planning
- Resiliency Strategies
- Recovery Sites
- Backup Plans and Policies
- Resiliency and Automation Strategies
Risk Management 455
- Business Impact Analysis
- Identification of Critical Systems
- Risk Assessment
- Risk Mitigation
Secure Application Development
- Application Vulnerabilities
- Application Exploits
- Web Browser Exploits
- Secure Application Design
- Secure Coding Concepts
- Auditing Applications
- Secure DevOps
Organizational Security
- Corporate Security Policy
- Personnel Management Policies
- Interoperability Agreements
- Data Roles
- Data Sensitivity Labeling and Handling
- Data Wiping and Disposal
- Privacy and Employee Conduct Policies
- Security Policy Training