Risk Management
  • Introduction to the CompTIA Security+ Exam SY0-501
  • The CIA of Security
  • What is Risk?
  • Threat Actors
  • Managing Risk
  • Using Guides for Risk Assessment
  • Security Controls
  • Interesting Security Controls
  • Defense in Depth
  • IT Security Governance
  • Security Policies
  • Frameworks
  • Quantitative Risk Calculations
  • Business Impact Analysis
  • Organizing Data
  • Security Training
  • Third Party Agreements
  • Risk Management Quiz
Cryptography
  • Cryptography Basics
  • Cryptographic Methods
  • Symmetric Cryptosystems
  • Symmetric Block Modes
  • RSA Cryptosystems
  • Diffie-Hellman
  • PGP/GPG
  • Hashing
  • HMAC
  • Steganography
  • Certificates and Trust
  • Public Key Infrastructure
  • Cryptographic Attacks
  • Cryptography Quiz
Identity and Access Management
  • Identification
  • Authorization Concepts
  • Access Control List
  • Password Security
  • Linux File Permissions
  • Windows File Permissions
  • User Account Management
  • AAA
  • Authentication Methods
  • Single Sign-On
  • Identity and Access Management Quiz
Tools of the Trade
  • OS Utilities, Part 1
  • OS Utilities, Part 2
  • Network Scanners
  • Protocol Analyzers
  • SNMP
  • Logs
  • Tools of the Trade Quiz
Securing Individual Systems
  • Denial of Service
  • Host Threats
  • Man-in-the-Middle
  • System Resiliency
  • RAID
  • NAS and SAN
  • Physical Hardening
  • RFI, EMI and ESD
  • Host Hardening
  • Data and System Security
  • Disk Encryption
  • Hardware/Firmware Security
  • Secure OS Types
  • Securing Peripherals
  • Malware
  • Analyzing Output
  • IDS and IPS
  • Automation Strategies
  • Data Destruction
  • Securing Individual Systems Quiz
The Basic LAN
  • LAN Review
  • Network Topologies Review
  • Network Zone Review
  • Network Access Controls
  • The Network Firewall
  • Proxy Servers
  • Honeypots
  • Virtual Private Networks
  • IPSec
  • NIDS/NIPS
  • SIEM
  • The Basic LAN Quiz
Beyond the Basic LAN
  • Wireless Review
  • Living in Open Networks
  • Vulnerabilities with Wireless Access Points
  • Cracking 802.11 – WEP
  • Cracking 802.11 – WPA
  • Cracking 802.11 – WPS
  • Wireless Hardening
  • Wireless Access Points
  • Virtualization Basics
  • Virtual Security
  • Containers