Comptia Security+ Sy0-007 - 2025 (Labs Pending)

Posted By: ELK1nG

Comptia Security+ Sy0-007 - 2025 (Labs Pending)
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.06 GB | Duration: 13h 41m

Over 380 bite-sized lectures to help YOU pass the Security+ exam!

What you'll learn

Prepare for the CompTIA Security+ Exam

Learn cybersecurity theory

(Pending) Learn common cybersecurity defensive techniques

(Pending) Learn common cybersecurity hacking techniques

Requirements

CompTIA A+ and CompTIA Network+ recommended, but not required

Description

So you want a career in cybersecurity, and you've found yourself at the Security+ exam. Perhaps you're studying for a degree, a job requirement, or just out of curiosityRegardless, you've come to the right place!The CompTIA Security+ exam covers the fundamentals of cybersecurity - both defensive and offensive security skills - that start all the way at the Help Desk level and will stay with you your entire cybersecurity journeyThis course possesses over 380 lectures (almost 14 hours of content) and is constantly being updated with new cybersecurity labs to help YOU pass your Security+ exam!With the IT Cert Doctor you will learn all of the CompTIA Security+ SYO-701 objectives, including:Simple diagrams demonstrating essential cybersecurity conceptsFundamental cybersecurity conceptsThe differences between defensive and offensive cybersecurity skillsFundamental concepts in Risk Management security advisoryFundamental skills in cryptographyHow to identify threat actors, threat vectors, and vulnerabilitiesHow to mitigate common threatsHow to recognize common Indicators of CompromiseFundamental best practices for implementing cybersecurity architectureFundamental best practices for implementing networking security architectureFundamental concepts for security operationsFundamental skills in Linux administrationFundamental skills in Windows administrationFundamental skills in Virtualization softwareFundamental skills in networking administration

Overview

Section 1: Introduction & Prerequisites

Lecture 1 LABS IN PROGRESS

Lecture 2 [PPT] Knowledge Pre-Requisites

Lecture 3 [PPT] About This Security+ Course

Lecture 4 [PPT] [LAB] Security+ PBQ (Performance Based Questions) Tips

Lecture 5 [PPT] COURSE WARNING!

Lecture 6 [PPT] Security+ Exam Tips

Lecture 7 [PPT] What is Heuristics?

Section 2: Course Prerequisites: VirtualBox

Lecture 8 VirtualBox labs in progress

Section 3: Course Prerequisites: Misc. Software

Lecture 9 [LAB] How to Install Putty

Lecture 10 [LAB] How to Install Filezilla

Lecture 11 [LAB] How to Install Wireshark on Windows

Lecture 12 [LAB] How to Install Wireshark on Linux

Lecture 13 [LAB] Using AI to Study for Free!!!

Section 4: Course Prerequisites: SOHO Router

Lecture 14 Purchasing a SOHO Router

Lecture 15 [LAB] SOHO Router: Unboxing

Lecture 16 [LAB] SOHO Router: Physical Setup

Lecture 17 [LAB] SOHO Router: Initial Configuration

Lecture 18 [LAB] SOHO Router: Factory Reset

Section 5: Course Prerequisites: Cisco's Packet Tracer & Cisco IOS

Lecture 19 Cisco Packet Tracer labs coming soon!

Section 6: Course Prerequisites: A+ Crash Course

Lecture 20 [PPT] Computing Hardware

Lecture 21 [PPT] Computing Devices

Lecture 22 [PPT] Cable Types

Lecture 23 [PPT] Virtualization & Cloud

Lecture 24 [PPT] Operating Systems Overview

Lecture 25 [PPT] Windows In-Depth

Lecture 26 [PPT] Windows CLI

Lecture 27 [PPT] Linux CLI

Section 7: Course Prerequisites: Network+ Crash Course

Lecture 28 [PPT] What is an Interface?

Lecture 29 [PPT] OSI Model

Lecture 30 [PPT] Common Networking Devices

Lecture 31 [PPT] Common Ports and Protocols

Lecture 32 [PPT] Common Cables & Connectors

Lecture 33 [PPT] VLANs

Lecture 34 [PPT] Subnetting

Lecture 35 [PPT] Wireless

Lecture 36 [PPT] DHCP

Lecture 37 [PPT] DNS

Lecture 38 [PPT] Remote Connection Methods

Section 8: 1.1 Security Controls

Lecture 39 [PPT] Controls Overview

Lecture 40 [PPT] Categories: Technical Controls

Lecture 41 [PPT] Categories: Managerial Controls

Lecture 42 [PPT] Categories: Operational Controls

Lecture 43 [PPT] Categories: Physical Controls

Lecture 44 [PPT] Control Types: Preventive

Lecture 45 [PPT] Control Types: Deterrent

Lecture 46 [PPT] Control Types: Detective

Lecture 47 [PPT] Control Types: Corrective

Lecture 48 [PPT] Control Types: Compensating

Lecture 49 [PPT] Control Types: Directive

Lecture 50 [PPT] Control Categories + Control Types Matrix

Section 9: 1.2 Fundamental Security Concepts

Lecture 51 [PPT] CIA

Lecture 52 [PPT] Non-Repudiation

Lecture 53 [PPT] AAA

Lecture 54 [PPT] Authenticating People vs Authenticating Systems

Lecture 55 [PPT] Authorization Models

Lecture 56 [PPT] Gap Analysis

Lecture 57 [PPT] Zero Trust Introduction

Lecture 58 [PPT] Zero Trust: Control Plane

Lecture 59 [PPT] Zero Trust: Data Plane

Lecture 60 [PPT] Physical Security: Bollards

Lecture 61 [PPT] Physical Security: Access Control Vestibule (formerly Mantrap)

Lecture 62 [PPT] Physical Security: Fencing

Lecture 63 [PPT] Physical Security: Video Surveillance

Lecture 64 [PPT] Physical Security: Security Guard

Lecture 65 [PPT] Physical Security: Access Badge

Lecture 66 [PPT] Physical Security: Lighting

Lecture 67 [PPT] Physical Security: Sensors

Lecture 68 [PPT] Honey *stuff

Lecture 69 [PPT] What is a token?

Section 10: 1.3 Change Management Processes

Lecture 70 [PPT] Change Management

Lecture 71 [PPT] Approval Process

Lecture 72 [PPT] Ownership

Lecture 73 [PPT] Stakeholders

Lecture 74 [PPT] Impact Analysis

Lecture 75 [PPT] Backout Plan

Lecture 76 [PPT] Maintenance Window

Lecture 77 [PPT] SOP (Standard Operating Procedure)

Lecture 78 [PPT] Allow Lists/Deny Lists

Lecture 79 [PPT] Restricted Activities

Lecture 80 [PPT] Downtime

Lecture 81 [PPT] Service & Application Restarts

Lecture 82 [PPT] Legacy Applications

Lecture 83 [PPT] Technical Implications: Dependencies

Lecture 84 [PPT] Updating Documentation

Lecture 85 [PPT & LAB] Version Control

Section 11: 1.4 Cryptography

Lecture 86 [PPT] What is Encryption?

Lecture 87 [PPT] Symmetric Encryption

Lecture 88 [PPT] Asymmetric Encryption: Public & Private Keys

Lecture 89 [PPT] Hashing

Lecture 90 [PPT] PKI (Public Key Infrastructure)

Lecture 91 [PPT] Escrow

Lecture 92 [PPT] Different Encryption Levels

Lecture 93 [PPT] Encryption: Transport/Communication

Lecture 94 [PPT] Key Exchange Overview

Lecture 95 [PPT] Key Exchange: RSA and the Digital Envelope

Lecture 96 [PPT] Key Exchange: Diffie-Hellman

Lecture 97 [PPT] Encryption: Key Length

Lecture 98 [PPT] Encryption Tools: TPM

Lecture 99 [PPT] Encryption Tools: HSM

Lecture 100 [PPT] Encryption Tools: Key Management System

Lecture 101 [PPT] Encryption Tools: Secure Enclave

Lecture 102 [PPT] Obfuscation: Steganography

Lecture 103 [PPT] Obfuscation: Data Masking & Tokenization

Lecture 104 [PPT] Salting & Rainbow Tables

Lecture 105 [PPT] Digital Signatures

Lecture 106 [PPT] Key Stretching

Lecture 107 [PPT] Blockchain

Lecture 108 [PPT] Open Public Ledger

Lecture 109 [PPT] Digital Certificate Overview

Lecture 110 [PPT] Certificate Authorities

Lecture 111 [PPT] Certificates: CRL

Lecture 112 [PPT] Certificates: OSCP

Lecture 113 [PPT] Certificates: Self-Signed

Lecture 114 [PPT] Certificates: Third Party

Lecture 115 [PPT] Certificates: Root of Trust

Lecture 116 [PPT] Certificates: CSR

Lecture 117 [PPT] Certificates: Wildcard

Section 12: 2.1 Threat Actors and Motivations

Lecture 118 [PPT] Threat Actor Types

Lecture 119 [PPT] Attributes of Threat Actors

Lecture 120 [PPT] Threat Actor Motivations

Section 13: 2.2 Threat Vectors and Attack Surfaces

Lecture 121 [PPT] Threat Vectors: Email

Lecture 122 [PPT] Threat Vectors: SMS

Lecture 123 [PPT] Threat Vectors: IM (Instant Messaging)

Lecture 124 [PPT] Threat Vectors: Images

Lecture 125 [PPT] Threat Vectors: Files

Lecture 126 [PPT] Threat Vectors: Removable Devices

Lecture 127 [PPT] Threat Vectors: Vulnerable Software

Lecture 128 [PPT] Threat Vectors: Unsupported Systems and Applications

Lecture 129 [PPT] Insecure Networks Overview: Wireless, Wired, & Bluetooth

Lecture 130 [PPT] Threat Vectors: Open Service Ports

Lecture 131 [PPT] Threat Vectors: Default Credentials

Lecture 132 [PPT] Threat Vectors: Supply Chain

Lecture 133 [PPT] Threat Vectors: Social Engineering Techniques

Section 14: 2.3 Vulnerabilities

Lecture 134 [PPT] Application: Memory Injection

Lecture 135 [PPT] Race Conditions & TOCTOU

Lecture 136 [PPT] Malicious Updates

Lecture 137 [PPT] Common OS-based Vulnerabilities

Lecture 138 [PPT] Web-based: SQLi

Lecture 139 [PPT] Web-based: XSS

Lecture 140 [PPT] Common Hardware Vulnerabilities

Lecture 141 [PPT] Virtualization: VM Escaping

Lecture 142 [PPT] Virtualization: Resource Reuse

Lecture 143 [PPT] Common Cloud-specific Vulnerabilities

Lecture 144 [PPT] Common Supply Chain Vulnerabilities

Lecture 145 [PPT] Common Cryptographic Vulnerabilities

Lecture 146 [PPT] Vulnerabilities due to Misconfiguration

Lecture 147 [PPT] Common Mobile Device Vulnerabilities

Lecture 148 [PPT] Zero Day Attack

Section 15: 2.4 Common Attacks & Indicators of Compromise

Lecture 149 [PPT] Introduction to Malware

Lecture 150 [PPT] Ransomware

Lecture 151 [PPT] Trojan

Lecture 152 [PPT] Worm

Lecture 153 [PPT] Spyware

Lecture 154 [PPT] Bloatware

Lecture 155 [PPT] Virus

Lecture 156 [PPT] Keylogger

Lecture 157 [PPT] Logic Bomb

Lecture 158 [PPT] Rootkit

Lecture 159 [PPT] Physical Attack Types

Lecture 160 [PPT] DDoS

Lecture 161 [PPT] DNS Spoofing

Lecture 162 [PPT] Common Wireless Attacks

Lecture 163 [PPT] On-Path Attack (MitM)

Lecture 164 [PPT] Credential Replay

Lecture 165 [PPT] Malicious Code

Lecture 166 [PPT] Injection attack

Lecture 167 [PPT] Buffer Overflow

Lecture 168 [PPT] Privilege Escalation

Lecture 169 [PPT] CSRF (Cross Site Request Forgery)

Lecture 170 [PPT] SSRF (Server Side Request Forgery)

Lecture 171 [PPT] Directory Traversal

Lecture 172 [PPT] Downgrade Attack

Lecture 173 [PPT] Birthday & Collision Attacks

Lecture 174 [PPT] Password Spraying

Lecture 175 [PPT] [Hacking! LAB] Password Brute Force

Lecture 176 [PPT] Indicators of Compromise

Section 16: 2.5 Enterprise Mitigation Techniques

Lecture 177 [PPT] Segmentation

Lecture 178 [PPT] Access Control Lists

Lecture 179 [PPT] Application Allow List

Lecture 180 [PPT] Isolation

Lecture 181 [PPT] Patching

Lecture 182 [PPT] Monitoring

Lecture 183 [PPT] Principle of Least Privilege

Lecture 184 [PPT] Configuration Enforcement

Lecture 185 [PPT] Endpoint Protection

Lecture 186 [PPT] Host-based Firewall

Lecture 187 [PPT] HIPS

Lecture 188 [PPT] Disabling ports/protocols

Lecture 189 [PPT] Removal of Unnecessary Software

Section 17: 3.1 Architecture Models

Lecture 190 [PPT] Cloud: Responsibility Matrix

Lecture 191 [PPT] Cloud: Hybrid Considerations

Lecture 192 [PPT] Cloud: Third-party Vendors

Lecture 193 [PPT] IaC

Lecture 194 [PPT] Serverless

Lecture 195 [PPT] Microservices

Lecture 196 [PPT] Air Gap

Lecture 197 [PPT] Logical Segmentation

Lecture 198 [PPT] On-Premises

Lecture 199 [PPT] Centralized vs Decentralized

Lecture 200 [PPT] Virtualization & Containerization

Lecture 201 [PPT] IoT

Lecture 202 [PPT] ICS/SCADA

Lecture 203 [PPT] RTOS

Lecture 204 [PPT] Embedded Systems

Lecture 205 [PPT] Architecture Considerations

Section 18: 3.2 Security Principles to Secure Enterprise Architecture

Lecture 206 [PPT] Device Placement

Lecture 207 [PPT] Security Zones

Lecture 208 [PPT] Attack Surface

Lecture 209 [PPT] Failure Modes: Fail-open & Fail-closed

Lecture 210 [PPT] Inline vs TAP

Lecture 211 [PPT] Jump Server

Lecture 212 [PPT] Proxy Server

Lecture 213 [PPT] Load Balancer

Lecture 214 [PPT] Sensors

Lecture 215 [PPT] Port Security: 802.1X & EAP

Lecture 216 [PPT] WAF

Lecture 217 [PPT] UTM vs NGFW

Lecture 218 [PPT] Layer 4 Firewalls

Lecture 219 [PPT] VPN

Lecture 220 [PPT] Remote Access

Lecture 221 [PPT] IPSec Tunneling

Lecture 222 [PPT] SDN vs SD-WAN

Lecture 223 [PPT] SASE

Section 19: 3.3 Data Protection Strategies

Lecture 224 [PPT] Data Types

Lecture 225 [PPT] Data Classifications

Lecture 226 [PPT] General Data Considerations

Lecture 227 [PPT] Methods to Secure Data

Section 20: 3.4 Resilience and Recovery in Security Architecture

Lecture 228 [PPT] High Availability

Lecture 229 [PPT] Site Considerations: Hot, Cold, Warm, & Geographic Dispersion

Lecture 230 [PPT] Platform Diversity

Lecture 231 [PPT] Multi-Cloud Systems

Lecture 232 [PPT] Continuity of Operations

Lecture 233 [PPT] Capacity Planning: People, Technology, & Infrastructure

Lecture 234 [PPT] Testing

Lecture 235 [PPT] Backups

Lecture 236 [PPT] [LAB] Power: Generators & UPS

Section 21: 4.1 Common Security Techniques

Lecture 237 [PPT] Secure Baselines

Lecture 238 [PPT] Hardening Targets: Mobile Devices

Lecture 239 [PPT] Hardening Targets: Workstations

Lecture 240 [PPT] Hardening Targets: Switches

Lecture 241 [PPT] Hardening Targets: Routers

Lecture 242 [PPT] Hardening Targets: Cloud Infrastructure

Lecture 243 [PPT] Hardening Targets: Servers

Lecture 244 [PPT] Hardening Specialized Targets: IoT, Embedded, etc

Lecture 245 [PPT] Wireless: Site Surveys & Heat Maps

Lecture 246 [PPT] MDM (Mobile Device Management)

Lecture 247 [PPT] Mobile Deployment Models: BYOD, COPE, & CYOD

Lecture 248 [PPT] Wireless Connection Methods

Lecture 249 [PPT] Wireless Security Settings

Lecture 250 [PPT] RADIUS & TACACS+

Lecture 251 [PPT] App Security: Input Validation

Lecture 252 [PPT] App Security: Secure Cookies

Lecture 253 [PPT] App Security: Static Code Analysis

Lecture 254 [PPT] App Security: Code Signing

Lecture 255 [PPT] Sandboxing

Section 22: 4.2 Hardware, Software, and Data Asset Management

Lecture 256 [PPT] Procurement/Acquisition Process

Lecture 257 [PPT] Assignment/Accounting

Lecture 258 [PPT] Monitoring/Asset Tracking

Lecture 259 [PPT] Disposal/Decommissioning

Section 23: 4.3 Vulnerability Management

Lecture 260 [PPT] Common Vulnerability Identification Methods

Lecture 261 [PPT] Common Vulnerability Analysis Methods

Lecture 262 [PPT] Common Vulnerability Response and Remediation Methods

Lecture 263 [PPT] Common Vulnerability Validation of Remediation Methods

Lecture 264 [PPT] Vulnerability Reporting

Section 24: 4.4 Security Alerting and Monitoring

Lecture 265 [PPT] Monitoring Computing Resources

Lecture 266 [PPT[ Security Alerting & Monitoring: Activities

Lecture 267 [PPT] SCAP (Security Content Automation Protocol)

Lecture 268 [PPT] Benchmarks

Lecture 269 [PPT] Agent & Agentless Tools

Lecture 270 [PPT] SIEM (Security Information and Event Management)

Lecture 271 [PPT] AntiVirus

Lecture 272 [PPT] [LAB] SNMP

Lecture 273 [PPT] [LAB] NetFlow

Lecture 274 [PPT] Vulnerability Scanners

Section 25: 4.5 Modify Enterprise Capabilities to Enhance Security

Lecture 275 [PPT] Firewall Rules

Lecture 276 [PPT] Firewall: Screened Subnets (formerly DMZ)

Lecture 277 [PPT] IDS & IPS

Lecture 278 [PPT] Web Filtering

Lecture 279 [PPT] Windows Security: Group Policy

Lecture 280 [PPT] Linux Security: SELinux

Lecture 281 [PPT] Implementation of Secure Protocols

Lecture 282 [PPT] DNS Filtering

Lecture 283 [PPT] Email Security: SPF, DKIM, & DMARC

Lecture 284 [PPT] FIM (File Integrity Monitoring)

Lecture 285 [PPT] DLP (Data Loss Prevention)

Lecture 286 [PPT] NAC (Network Access Control)

Lecture 287 [PPT] EDR/XDR

Lecture 288 [PPT] UBA & UEBA

Section 26: 4.6 IAM (Identity and Access Management)

Lecture 289 [PPT] IAM Overview

Lecture 290 [PPT] Provisioning/De-Provisioning User Accounts

Lecture 291 [PPT] Permission Assignments and Implications

Lecture 292 [PPT] Identity Proofing

Lecture 293 [PPT] SSO & Federation

Lecture 294 [PPT] SSO: LDAP (Lightweight Directory Access Protocol)

Lecture 295 [PPT] SSO: OAuth (Open Authorization)

Lecture 296 [PPT] SSO: SAML (Security Assertions Markup Language)

Lecture 297 [PPT] Interoperability

Lecture 298 [PPT] Access Control Types: Mandatory

Lecture 299 [PPT] Access Control Types: Discretionary

Lecture 300 [PPT] Access Control Types: Role-based

Lecture 301 [PPT] Access Control Types: Rule-based

Lecture 302 [PPT] Access Control Types: Attribute-based

Lecture 303 [PPT] MFA: Factors

Lecture 304 [PPT] MFA: Implementations

Lecture 305 [PPT] Password Best Practices

Lecture 306 [PPT] Password Managers

Lecture 307 [PPT] Passwordless

Lecture 308 [PPT] PAM Overview

Lecture 309 [PPT] PAM Tools: Just-in-time Permissions

Lecture 310 [PPT] PAM Tools: Password Vaulting

Lecture 311 [PPT] PAM Tools: Ephemeral Credentials

Section 27: 4.7 Securing Operations through Automation and Orchestration

Lecture 312 [PPT] Automation vs Orchestration

Lecture 313 [PPT] Use Cases of Automation and Scripting

Lecture 314 [PPT] Benefits of Automation

Lecture 315 [PPT] Other Considerations of Automation

Section 28: 4.8 Incident Response Activities

Lecture 316 [PPT] IR Process

Lecture 317 [PPT] IR Training

Lecture 318 [PPT] IR Testing: Tabletop vs Simulation

Lecture 319 [PPT] Root Cause Analysis

Lecture 320 [PPT] Threat Hunting

Lecture 321 [PPT] Digital Forensics

Section 29: 4.9 Use Data Sources to Support an Investigation

Lecture 322 [PPT] Log Data

Lecture 323 [PPT] Data Sources

Section 30: 5.1 Security Governance

Lecture 324 [PPT] What is Governance?

Lecture 325 [PPT] Guidelines

Lecture 326 [PPT] AUP (Acceptable Use Policy)

Lecture 327 [PPT] Information Security Policies

Lecture 328 [PPT] BCDR (Business Continuity/Disaster Recovery) Policies

Lecture 329 [PPT] SDLC (Software Development LifeCycle) Policies

Lecture 330 [PPT] Common Password Standards

Lecture 331 [PPT] Common Access Control Standards

Lecture 332 [PPT] Common Encryption Standards

Lecture 333 [PPT] Onboarding/Offboarding procedures

Lecture 334 [PPT] Playbooks

Lecture 335 [PPT] External Considerations for Security Governance

Lecture 336 [PPT] Monitoring and Revising Security Governance

Lecture 337 [PPT] Types of Governance Structures

Lecture 338 [PPT] Security Governance Roles and Responsibilities

Section 31: 5.2 Risk Management

Lecture 339 [PPT] Risk Identification

Lecture 340 [PPT] Risk Assessment

Lecture 341 [PPT] Risk Analysis: Qualitative & Quantitative

Lecture 342 [PPT] Risk Analysis Formula: AV (Asset Value)

Lecture 343 [PPT] Risk Analysis Formula: EF (Exposure Factor)

Lecture 344 [PPT] Risk Analysis Formula: SLE (Single Loss Expectancy)

Lecture 345 [PPT] Risk Analysis Formula: ARO (Annualized Rate of Occurrence)

Lecture 346 [PPT] Risk Analysis Formula: ALE (Annualized Loss Expectancy)

Lecture 347 [PPT] Risk Analysis: Probability & Likelihood

Lecture 348 [PPT] Risk Analysis: Impact

Lecture 349 [PPT] Risk Register

Lecture 350 [PPT] Risk Tolerance & Risk Appetite

Lecture 351 [PPT] Risk Transfer Strategy

Lecture 352 [PPT] Risk Acceptance Strategy

Lecture 353 [PPT] Risk Exception & Exemption Strategies

Lecture 354 [PPT] Risk Avoidance Strategy

Lecture 355 [PPT] Risk Mitigation Strategy

Lecture 356 [PPT] Risk Reporting

Lecture 357 [PPT] Business Impact Analysis

Lecture 358 [PPT] RPO (Recovery Point Objective) & RTO (Recovery Time Objective)

Lecture 359 [PPT] MTTR (Mean Time to Repair) & MTBF (Mean Time Between Failures)

Section 32: 5.3 3rd Party Risk Assessment and Management

Lecture 360 [PPT] Vendor Assessment & Vendor Selection

Lecture 361 [PPT] SLA (Service-Level Agreement)

Lecture 362 [PPT] MOA/MOU (Memorandum of Agreement/Understanding)

Lecture 363 [PPT] MSA (Master Service Agreement)

Lecture 364 [PPT] WO (Work Order)

Lecture 365 [PPT] SOW (Statement of Work)

Lecture 366 [PPT] NDA (Non-Disclosure Agreement)

Lecture 367 [PPT] BPA (Business Partners Agreement)

Lecture 368 [PPT] Vendor Monitoring

Lecture 369 [PPT] Questionnaires

Lecture 370 [PPT] Rules of Engagement

Section 33: 5.4 Security Compliance

Lecture 371 [PPT] Compliance Reporting

Lecture 372 [PPT] Consequences of Non-Compliance

Lecture 373 [PPT] Due Diligence & Due Care

Lecture 374 [PPT] Compliance Monitoring

Lecture 375 [PPT] Privacy

Section 34: 5.5 Types of Audits and Assessments

Lecture 376 [PPT] Attestation

Lecture 377 [PPT] Internal Assessments

Lecture 378 [PPT] External Assessments

Lecture 379 [PPT] Penetration Testing

Section 35: 5.6 Security Awareness Practice

Lecture 380 [PPT] Phishing Campaign

Lecture 381 [PPT] Recognizing a Phishing Attempt

Lecture 382 [PPT] Phishing: Responding to Reported Suspicious Messages

Lecture 383 [PPT] Anomalous Behavior Recognition

Lecture 384 [PPT] User Guidance and Training

Lecture 385 [PPT] Reporting and Monitoring

Lecture 386 [PPT] Development & Execution

Learners who want to pass the CompTIA Security+ exam and learn a few skills along the way