This course is a complete CompTIA Security+ Exam Cram session covering all 5 domains of the exam, updated in 2022, including EVERY item in CompTIA's official Exam Objectives. Also includes exam prep study materials strategy guidance, details on the exam format and what you can expect on exam day.
TABLE OF CONTENTS
00:01:27 Recommended Study Plan
08:36 DOMAIN 1: Attacks, Threats and Vulnerabilities
00:05:56 1.1 Social Engineering Techniques
00:21:39 1.2 Indicators and Types of Attacks
00:45:44 1.3 Indicators of Application Attacks
01:04:23 1.4 Indicators of Network Attacks
01:24:50 1.5 Threat actors, vectors, and intelligence sources
01:34:52 1.6 Types of vulnerabilities
01:51:57 1.7 Security assessment techniques
02:09:56 1.8 Penetration testing techniques
02:19:00 DOMAIN 2: Architecture and Design
02:19:14 2.1 Enterprise security concepts
02:45:25 2.2 Virtualization and cloud computing concepts
03:08:18 2.3 Application development, automation, and deployment
03:20:45 2.4 Authentication and authorization design concepts
03:36:16 2.5 Implement cybersecurity resilience
03:56:24 2.6 Implications of embedded and specialized systems
04:17:51 2.7 Importance of physical security controls
04:46:50 2.8 Cryptographic concepts
05:11:55 DOMAIN 3: Implementation
05:12:21 3.1 Implement secure protocols
05:15:10 3.2 Implement host or application security solutions
05:58:33 3.3 Implement secure network designs
06:15:30 3.4 Install and configure wireless security settings
06:26:06 3.5 Implement secure mobile solutions
06:48:26 3.6 Apply cybersecurity solutions to the cloud
07:13:29 3.7 Implement identity and account management controls
07:26:19 3.8 Implement authentication and authorization solutions
07:42:02 3.9 Implement public key infrastructure.
08:01:12 DOMAIN 4:
Operations and Incident Response
08:01:35 4.1 Tools to assess organizational security
08:22:20 4.2 Policies, processes, and procedures for incident response
08:37:29 4.3 Utilize data sources to support an investigation
08:52:52 4.4 Incident mitigation techniques or controls
09:24:42 4.5 Key aspects of digital forensics.
09:24:19 DOMAIN 5: Governance, Risk, and Compliance
09:02:31 5.1 Types of security controls
09:30:34 5.2 Regs, standards, or frameworks that impact security posture
09:44:46 5.3 Importance of policies to organizational security
10:09:03 5.4 Risk management processes and concepts
10:31:20 5.5 Privacy and sensitive data concepts in relation to security
Write a public review