![]() | This is the index to my free CompTIA SY0-401 Security+ training course videos. All of our training videos are completely free; watch all of our videos online right now! |
![]() | Click here to see how you can own all of my Security+ notes with my 40-page downloadable PDF Course Notes. |
![]() | For a small cost, I’ll send you a USB flash drive with all of my video, audio, and course notes! |
CompTIA SY0-401 Security+ Training Videos
Section 0: Introduction
![]() | 0.1 – Introduction
|
Section 1: Network Security
Section 2 – Compliance and Operational Security
Section 3 – Threats and Vulnerabilities
Section 4 – Application, Data, and Host Security
![]() | 4.1 – Application Security Controls and Techniques Fuzzing (4:06) | Secure Coding Concepts (4:53) Application Configuration Baselining and Hardening (4:07) Application Patch Management (5:17) | SQL and NoSQL Databases (4:03) Server-side vs. Client-side Validation (3:00)
4.2 – Mobile Security Concepts and Technologies
4.3 – Establishing Host Security OS Security and Settings (2:39) | Anti-Malware (11:00) Patch Management (4:20) | White-Listing vs. Black-Listing Applications (4:20) Trusted OS (3:28) | Host-based Security (5:11) | Hardware Security (4:55) Host Software Baselining (3:27) | Virtualization Security (8:31)
4.4 – Ensuring Data Security Cloud and SAN Storage Data Security (7:17) | Data Encryption (8:46) Hardware-based Encryption (6:34) | States of Data (5:04) Permissions and ACLs (2:39) | Data Policies (5:10)
4.5 – Static Environment Security Embedded System Security (6:10) | Static OS Environments (7:57) Mitigating Risk in Static Environments (5:30)
|
Section 5 – Access Control and Identity Management
![]() | 5.1 – Authentication Services
5.2 – Authentication, Authorization, and Access Control Identification, Authentication, and Authorization (3:22) Authorization and Access Control (3:56) | Single Factor Authentication (4:35) Multi-Factor Authentication (5:37) | One-time Password Algorithms (3:08) CHAP and PAP (7:21) | Single Sign-on (3:23) Federation and Transitive Trust (2:11)
5.3 – Account Security Best Practices Roles and Account Credentials (5:11) | Group Policy (3:02) Managing Password Policies (4:16) | Privileges (4:48) User Access Reviews and Monitoring (4:04)
|
Section 6 – Cryptography
Additional Study: Professor Messer’s Security+ Study Groups
![]() | Security+ Study Group Replays
2018 Replays
2017 Replays December 2017 | November 2017 | October 2017 | September 2017 August 2017 | July 2017 | June 2017 | May 2017 April 2017 | March 2017 | February 2017 | January 2017 December 2016 | November 2016 | October 2016 | September 2016 December 2015 | November 2015 | October 2015 | September 2015
|