Comptia Security+ Sy0-007 - 2025 (Labs Pending)
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.06 GB | Duration: 13h 41m
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.06 GB | Duration: 13h 41m
Over 380 bite-sized lectures to help YOU pass the Security+ exam!
What you'll learn
Prepare for the CompTIA Security+ Exam
Learn cybersecurity theory
(Pending) Learn common cybersecurity defensive techniques
(Pending) Learn common cybersecurity hacking techniques
Requirements
CompTIA A+ and CompTIA Network+ recommended, but not required
Description
So you want a career in cybersecurity, and you've found yourself at the Security+ exam. Perhaps you're studying for a degree, a job requirement, or just out of curiosityRegardless, you've come to the right place!The CompTIA Security+ exam covers the fundamentals of cybersecurity - both defensive and offensive security skills - that start all the way at the Help Desk level and will stay with you your entire cybersecurity journeyThis course possesses over 380 lectures (almost 14 hours of content) and is constantly being updated with new cybersecurity labs to help YOU pass your Security+ exam!With the IT Cert Doctor you will learn all of the CompTIA Security+ SYO-701 objectives, including:Simple diagrams demonstrating essential cybersecurity conceptsFundamental cybersecurity conceptsThe differences between defensive and offensive cybersecurity skillsFundamental concepts in Risk Management security advisoryFundamental skills in cryptographyHow to identify threat actors, threat vectors, and vulnerabilitiesHow to mitigate common threatsHow to recognize common Indicators of CompromiseFundamental best practices for implementing cybersecurity architectureFundamental best practices for implementing networking security architectureFundamental concepts for security operationsFundamental skills in Linux administrationFundamental skills in Windows administrationFundamental skills in Virtualization softwareFundamental skills in networking administration
Overview
Section 1: Introduction & Prerequisites
Lecture 1 LABS IN PROGRESS
Lecture 2 [PPT] Knowledge Pre-Requisites
Lecture 3 [PPT] About This Security+ Course
Lecture 4 [PPT] [LAB] Security+ PBQ (Performance Based Questions) Tips
Lecture 5 [PPT] COURSE WARNING!
Lecture 6 [PPT] Security+ Exam Tips
Lecture 7 [PPT] What is Heuristics?
Section 2: Course Prerequisites: VirtualBox
Lecture 8 VirtualBox labs in progress
Section 3: Course Prerequisites: Misc. Software
Lecture 9 [LAB] How to Install Putty
Lecture 10 [LAB] How to Install Filezilla
Lecture 11 [LAB] How to Install Wireshark on Windows
Lecture 12 [LAB] How to Install Wireshark on Linux
Lecture 13 [LAB] Using AI to Study for Free!!!
Section 4: Course Prerequisites: SOHO Router
Lecture 14 Purchasing a SOHO Router
Lecture 15 [LAB] SOHO Router: Unboxing
Lecture 16 [LAB] SOHO Router: Physical Setup
Lecture 17 [LAB] SOHO Router: Initial Configuration
Lecture 18 [LAB] SOHO Router: Factory Reset
Section 5: Course Prerequisites: Cisco's Packet Tracer & Cisco IOS
Lecture 19 Cisco Packet Tracer labs coming soon!
Section 6: Course Prerequisites: A+ Crash Course
Lecture 20 [PPT] Computing Hardware
Lecture 21 [PPT] Computing Devices
Lecture 22 [PPT] Cable Types
Lecture 23 [PPT] Virtualization & Cloud
Lecture 24 [PPT] Operating Systems Overview
Lecture 25 [PPT] Windows In-Depth
Lecture 26 [PPT] Windows CLI
Lecture 27 [PPT] Linux CLI
Section 7: Course Prerequisites: Network+ Crash Course
Lecture 28 [PPT] What is an Interface?
Lecture 29 [PPT] OSI Model
Lecture 30 [PPT] Common Networking Devices
Lecture 31 [PPT] Common Ports and Protocols
Lecture 32 [PPT] Common Cables & Connectors
Lecture 33 [PPT] VLANs
Lecture 34 [PPT] Subnetting
Lecture 35 [PPT] Wireless
Lecture 36 [PPT] DHCP
Lecture 37 [PPT] DNS
Lecture 38 [PPT] Remote Connection Methods
Section 8: 1.1 Security Controls
Lecture 39 [PPT] Controls Overview
Lecture 40 [PPT] Categories: Technical Controls
Lecture 41 [PPT] Categories: Managerial Controls
Lecture 42 [PPT] Categories: Operational Controls
Lecture 43 [PPT] Categories: Physical Controls
Lecture 44 [PPT] Control Types: Preventive
Lecture 45 [PPT] Control Types: Deterrent
Lecture 46 [PPT] Control Types: Detective
Lecture 47 [PPT] Control Types: Corrective
Lecture 48 [PPT] Control Types: Compensating
Lecture 49 [PPT] Control Types: Directive
Lecture 50 [PPT] Control Categories + Control Types Matrix
Section 9: 1.2 Fundamental Security Concepts
Lecture 51 [PPT] CIA
Lecture 52 [PPT] Non-Repudiation
Lecture 53 [PPT] AAA
Lecture 54 [PPT] Authenticating People vs Authenticating Systems
Lecture 55 [PPT] Authorization Models
Lecture 56 [PPT] Gap Analysis
Lecture 57 [PPT] Zero Trust Introduction
Lecture 58 [PPT] Zero Trust: Control Plane
Lecture 59 [PPT] Zero Trust: Data Plane
Lecture 60 [PPT] Physical Security: Bollards
Lecture 61 [PPT] Physical Security: Access Control Vestibule (formerly Mantrap)
Lecture 62 [PPT] Physical Security: Fencing
Lecture 63 [PPT] Physical Security: Video Surveillance
Lecture 64 [PPT] Physical Security: Security Guard
Lecture 65 [PPT] Physical Security: Access Badge
Lecture 66 [PPT] Physical Security: Lighting
Lecture 67 [PPT] Physical Security: Sensors
Lecture 68 [PPT] Honey *stuff
Lecture 69 [PPT] What is a token?
Section 10: 1.3 Change Management Processes
Lecture 70 [PPT] Change Management
Lecture 71 [PPT] Approval Process
Lecture 72 [PPT] Ownership
Lecture 73 [PPT] Stakeholders
Lecture 74 [PPT] Impact Analysis
Lecture 75 [PPT] Backout Plan
Lecture 76 [PPT] Maintenance Window
Lecture 77 [PPT] SOP (Standard Operating Procedure)
Lecture 78 [PPT] Allow Lists/Deny Lists
Lecture 79 [PPT] Restricted Activities
Lecture 80 [PPT] Downtime
Lecture 81 [PPT] Service & Application Restarts
Lecture 82 [PPT] Legacy Applications
Lecture 83 [PPT] Technical Implications: Dependencies
Lecture 84 [PPT] Updating Documentation
Lecture 85 [PPT & LAB] Version Control
Section 11: 1.4 Cryptography
Lecture 86 [PPT] What is Encryption?
Lecture 87 [PPT] Symmetric Encryption
Lecture 88 [PPT] Asymmetric Encryption: Public & Private Keys
Lecture 89 [PPT] Hashing
Lecture 90 [PPT] PKI (Public Key Infrastructure)
Lecture 91 [PPT] Escrow
Lecture 92 [PPT] Different Encryption Levels
Lecture 93 [PPT] Encryption: Transport/Communication
Lecture 94 [PPT] Key Exchange Overview
Lecture 95 [PPT] Key Exchange: RSA and the Digital Envelope
Lecture 96 [PPT] Key Exchange: Diffie-Hellman
Lecture 97 [PPT] Encryption: Key Length
Lecture 98 [PPT] Encryption Tools: TPM
Lecture 99 [PPT] Encryption Tools: HSM
Lecture 100 [PPT] Encryption Tools: Key Management System
Lecture 101 [PPT] Encryption Tools: Secure Enclave
Lecture 102 [PPT] Obfuscation: Steganography
Lecture 103 [PPT] Obfuscation: Data Masking & Tokenization
Lecture 104 [PPT] Salting & Rainbow Tables
Lecture 105 [PPT] Digital Signatures
Lecture 106 [PPT] Key Stretching
Lecture 107 [PPT] Blockchain
Lecture 108 [PPT] Open Public Ledger
Lecture 109 [PPT] Digital Certificate Overview
Lecture 110 [PPT] Certificate Authorities
Lecture 111 [PPT] Certificates: CRL
Lecture 112 [PPT] Certificates: OSCP
Lecture 113 [PPT] Certificates: Self-Signed
Lecture 114 [PPT] Certificates: Third Party
Lecture 115 [PPT] Certificates: Root of Trust
Lecture 116 [PPT] Certificates: CSR
Lecture 117 [PPT] Certificates: Wildcard
Section 12: 2.1 Threat Actors and Motivations
Lecture 118 [PPT] Threat Actor Types
Lecture 119 [PPT] Attributes of Threat Actors
Lecture 120 [PPT] Threat Actor Motivations
Section 13: 2.2 Threat Vectors and Attack Surfaces
Lecture 121 [PPT] Threat Vectors: Email
Lecture 122 [PPT] Threat Vectors: SMS
Lecture 123 [PPT] Threat Vectors: IM (Instant Messaging)
Lecture 124 [PPT] Threat Vectors: Images
Lecture 125 [PPT] Threat Vectors: Files
Lecture 126 [PPT] Threat Vectors: Removable Devices
Lecture 127 [PPT] Threat Vectors: Vulnerable Software
Lecture 128 [PPT] Threat Vectors: Unsupported Systems and Applications
Lecture 129 [PPT] Insecure Networks Overview: Wireless, Wired, & Bluetooth
Lecture 130 [PPT] Threat Vectors: Open Service Ports
Lecture 131 [PPT] Threat Vectors: Default Credentials
Lecture 132 [PPT] Threat Vectors: Supply Chain
Lecture 133 [PPT] Threat Vectors: Social Engineering Techniques
Section 14: 2.3 Vulnerabilities
Lecture 134 [PPT] Application: Memory Injection
Lecture 135 [PPT] Race Conditions & TOCTOU
Lecture 136 [PPT] Malicious Updates
Lecture 137 [PPT] Common OS-based Vulnerabilities
Lecture 138 [PPT] Web-based: SQLi
Lecture 139 [PPT] Web-based: XSS
Lecture 140 [PPT] Common Hardware Vulnerabilities
Lecture 141 [PPT] Virtualization: VM Escaping
Lecture 142 [PPT] Virtualization: Resource Reuse
Lecture 143 [PPT] Common Cloud-specific Vulnerabilities
Lecture 144 [PPT] Common Supply Chain Vulnerabilities
Lecture 145 [PPT] Common Cryptographic Vulnerabilities
Lecture 146 [PPT] Vulnerabilities due to Misconfiguration
Lecture 147 [PPT] Common Mobile Device Vulnerabilities
Lecture 148 [PPT] Zero Day Attack
Section 15: 2.4 Common Attacks & Indicators of Compromise
Lecture 149 [PPT] Introduction to Malware
Lecture 150 [PPT] Ransomware
Lecture 151 [PPT] Trojan
Lecture 152 [PPT] Worm
Lecture 153 [PPT] Spyware
Lecture 154 [PPT] Bloatware
Lecture 155 [PPT] Virus
Lecture 156 [PPT] Keylogger
Lecture 157 [PPT] Logic Bomb
Lecture 158 [PPT] Rootkit
Lecture 159 [PPT] Physical Attack Types
Lecture 160 [PPT] DDoS
Lecture 161 [PPT] DNS Spoofing
Lecture 162 [PPT] Common Wireless Attacks
Lecture 163 [PPT] On-Path Attack (MitM)
Lecture 164 [PPT] Credential Replay
Lecture 165 [PPT] Malicious Code
Lecture 166 [PPT] Injection attack
Lecture 167 [PPT] Buffer Overflow
Lecture 168 [PPT] Privilege Escalation
Lecture 169 [PPT] CSRF (Cross Site Request Forgery)
Lecture 170 [PPT] SSRF (Server Side Request Forgery)
Lecture 171 [PPT] Directory Traversal
Lecture 172 [PPT] Downgrade Attack
Lecture 173 [PPT] Birthday & Collision Attacks
Lecture 174 [PPT] Password Spraying
Lecture 175 [PPT] [Hacking! LAB] Password Brute Force
Lecture 176 [PPT] Indicators of Compromise
Section 16: 2.5 Enterprise Mitigation Techniques
Lecture 177 [PPT] Segmentation
Lecture 178 [PPT] Access Control Lists
Lecture 179 [PPT] Application Allow List
Lecture 180 [PPT] Isolation
Lecture 181 [PPT] Patching
Lecture 182 [PPT] Monitoring
Lecture 183 [PPT] Principle of Least Privilege
Lecture 184 [PPT] Configuration Enforcement
Lecture 185 [PPT] Endpoint Protection
Lecture 186 [PPT] Host-based Firewall
Lecture 187 [PPT] HIPS
Lecture 188 [PPT] Disabling ports/protocols
Lecture 189 [PPT] Removal of Unnecessary Software
Section 17: 3.1 Architecture Models
Lecture 190 [PPT] Cloud: Responsibility Matrix
Lecture 191 [PPT] Cloud: Hybrid Considerations
Lecture 192 [PPT] Cloud: Third-party Vendors
Lecture 193 [PPT] IaC
Lecture 194 [PPT] Serverless
Lecture 195 [PPT] Microservices
Lecture 196 [PPT] Air Gap
Lecture 197 [PPT] Logical Segmentation
Lecture 198 [PPT] On-Premises
Lecture 199 [PPT] Centralized vs Decentralized
Lecture 200 [PPT] Virtualization & Containerization
Lecture 201 [PPT] IoT
Lecture 202 [PPT] ICS/SCADA
Lecture 203 [PPT] RTOS
Lecture 204 [PPT] Embedded Systems
Lecture 205 [PPT] Architecture Considerations
Section 18: 3.2 Security Principles to Secure Enterprise Architecture
Lecture 206 [PPT] Device Placement
Lecture 207 [PPT] Security Zones
Lecture 208 [PPT] Attack Surface
Lecture 209 [PPT] Failure Modes: Fail-open & Fail-closed
Lecture 210 [PPT] Inline vs TAP
Lecture 211 [PPT] Jump Server
Lecture 212 [PPT] Proxy Server
Lecture 213 [PPT] Load Balancer
Lecture 214 [PPT] Sensors
Lecture 215 [PPT] Port Security: 802.1X & EAP
Lecture 216 [PPT] WAF
Lecture 217 [PPT] UTM vs NGFW
Lecture 218 [PPT] Layer 4 Firewalls
Lecture 219 [PPT] VPN
Lecture 220 [PPT] Remote Access
Lecture 221 [PPT] IPSec Tunneling
Lecture 222 [PPT] SDN vs SD-WAN
Lecture 223 [PPT] SASE
Section 19: 3.3 Data Protection Strategies
Lecture 224 [PPT] Data Types
Lecture 225 [PPT] Data Classifications
Lecture 226 [PPT] General Data Considerations
Lecture 227 [PPT] Methods to Secure Data
Section 20: 3.4 Resilience and Recovery in Security Architecture
Lecture 228 [PPT] High Availability
Lecture 229 [PPT] Site Considerations: Hot, Cold, Warm, & Geographic Dispersion
Lecture 230 [PPT] Platform Diversity
Lecture 231 [PPT] Multi-Cloud Systems
Lecture 232 [PPT] Continuity of Operations
Lecture 233 [PPT] Capacity Planning: People, Technology, & Infrastructure
Lecture 234 [PPT] Testing
Lecture 235 [PPT] Backups
Lecture 236 [PPT] [LAB] Power: Generators & UPS
Section 21: 4.1 Common Security Techniques
Lecture 237 [PPT] Secure Baselines
Lecture 238 [PPT] Hardening Targets: Mobile Devices
Lecture 239 [PPT] Hardening Targets: Workstations
Lecture 240 [PPT] Hardening Targets: Switches
Lecture 241 [PPT] Hardening Targets: Routers
Lecture 242 [PPT] Hardening Targets: Cloud Infrastructure
Lecture 243 [PPT] Hardening Targets: Servers
Lecture 244 [PPT] Hardening Specialized Targets: IoT, Embedded, etc
Lecture 245 [PPT] Wireless: Site Surveys & Heat Maps
Lecture 246 [PPT] MDM (Mobile Device Management)
Lecture 247 [PPT] Mobile Deployment Models: BYOD, COPE, & CYOD
Lecture 248 [PPT] Wireless Connection Methods
Lecture 249 [PPT] Wireless Security Settings
Lecture 250 [PPT] RADIUS & TACACS+
Lecture 251 [PPT] App Security: Input Validation
Lecture 252 [PPT] App Security: Secure Cookies
Lecture 253 [PPT] App Security: Static Code Analysis
Lecture 254 [PPT] App Security: Code Signing
Lecture 255 [PPT] Sandboxing
Section 22: 4.2 Hardware, Software, and Data Asset Management
Lecture 256 [PPT] Procurement/Acquisition Process
Lecture 257 [PPT] Assignment/Accounting
Lecture 258 [PPT] Monitoring/Asset Tracking
Lecture 259 [PPT] Disposal/Decommissioning
Section 23: 4.3 Vulnerability Management
Lecture 260 [PPT] Common Vulnerability Identification Methods
Lecture 261 [PPT] Common Vulnerability Analysis Methods
Lecture 262 [PPT] Common Vulnerability Response and Remediation Methods
Lecture 263 [PPT] Common Vulnerability Validation of Remediation Methods
Lecture 264 [PPT] Vulnerability Reporting
Section 24: 4.4 Security Alerting and Monitoring
Lecture 265 [PPT] Monitoring Computing Resources
Lecture 266 [PPT[ Security Alerting & Monitoring: Activities
Lecture 267 [PPT] SCAP (Security Content Automation Protocol)
Lecture 268 [PPT] Benchmarks
Lecture 269 [PPT] Agent & Agentless Tools
Lecture 270 [PPT] SIEM (Security Information and Event Management)
Lecture 271 [PPT] AntiVirus
Lecture 272 [PPT] [LAB] SNMP
Lecture 273 [PPT] [LAB] NetFlow
Lecture 274 [PPT] Vulnerability Scanners
Section 25: 4.5 Modify Enterprise Capabilities to Enhance Security
Lecture 275 [PPT] Firewall Rules
Lecture 276 [PPT] Firewall: Screened Subnets (formerly DMZ)
Lecture 277 [PPT] IDS & IPS
Lecture 278 [PPT] Web Filtering
Lecture 279 [PPT] Windows Security: Group Policy
Lecture 280 [PPT] Linux Security: SELinux
Lecture 281 [PPT] Implementation of Secure Protocols
Lecture 282 [PPT] DNS Filtering
Lecture 283 [PPT] Email Security: SPF, DKIM, & DMARC
Lecture 284 [PPT] FIM (File Integrity Monitoring)
Lecture 285 [PPT] DLP (Data Loss Prevention)
Lecture 286 [PPT] NAC (Network Access Control)
Lecture 287 [PPT] EDR/XDR
Lecture 288 [PPT] UBA & UEBA
Section 26: 4.6 IAM (Identity and Access Management)
Lecture 289 [PPT] IAM Overview
Lecture 290 [PPT] Provisioning/De-Provisioning User Accounts
Lecture 291 [PPT] Permission Assignments and Implications
Lecture 292 [PPT] Identity Proofing
Lecture 293 [PPT] SSO & Federation
Lecture 294 [PPT] SSO: LDAP (Lightweight Directory Access Protocol)
Lecture 295 [PPT] SSO: OAuth (Open Authorization)
Lecture 296 [PPT] SSO: SAML (Security Assertions Markup Language)
Lecture 297 [PPT] Interoperability
Lecture 298 [PPT] Access Control Types: Mandatory
Lecture 299 [PPT] Access Control Types: Discretionary
Lecture 300 [PPT] Access Control Types: Role-based
Lecture 301 [PPT] Access Control Types: Rule-based
Lecture 302 [PPT] Access Control Types: Attribute-based
Lecture 303 [PPT] MFA: Factors
Lecture 304 [PPT] MFA: Implementations
Lecture 305 [PPT] Password Best Practices
Lecture 306 [PPT] Password Managers
Lecture 307 [PPT] Passwordless
Lecture 308 [PPT] PAM Overview
Lecture 309 [PPT] PAM Tools: Just-in-time Permissions
Lecture 310 [PPT] PAM Tools: Password Vaulting
Lecture 311 [PPT] PAM Tools: Ephemeral Credentials
Section 27: 4.7 Securing Operations through Automation and Orchestration
Lecture 312 [PPT] Automation vs Orchestration
Lecture 313 [PPT] Use Cases of Automation and Scripting
Lecture 314 [PPT] Benefits of Automation
Lecture 315 [PPT] Other Considerations of Automation
Section 28: 4.8 Incident Response Activities
Lecture 316 [PPT] IR Process
Lecture 317 [PPT] IR Training
Lecture 318 [PPT] IR Testing: Tabletop vs Simulation
Lecture 319 [PPT] Root Cause Analysis
Lecture 320 [PPT] Threat Hunting
Lecture 321 [PPT] Digital Forensics
Section 29: 4.9 Use Data Sources to Support an Investigation
Lecture 322 [PPT] Log Data
Lecture 323 [PPT] Data Sources
Section 30: 5.1 Security Governance
Lecture 324 [PPT] What is Governance?
Lecture 325 [PPT] Guidelines
Lecture 326 [PPT] AUP (Acceptable Use Policy)
Lecture 327 [PPT] Information Security Policies
Lecture 328 [PPT] BCDR (Business Continuity/Disaster Recovery) Policies
Lecture 329 [PPT] SDLC (Software Development LifeCycle) Policies
Lecture 330 [PPT] Common Password Standards
Lecture 331 [PPT] Common Access Control Standards
Lecture 332 [PPT] Common Encryption Standards
Lecture 333 [PPT] Onboarding/Offboarding procedures
Lecture 334 [PPT] Playbooks
Lecture 335 [PPT] External Considerations for Security Governance
Lecture 336 [PPT] Monitoring and Revising Security Governance
Lecture 337 [PPT] Types of Governance Structures
Lecture 338 [PPT] Security Governance Roles and Responsibilities
Section 31: 5.2 Risk Management
Lecture 339 [PPT] Risk Identification
Lecture 340 [PPT] Risk Assessment
Lecture 341 [PPT] Risk Analysis: Qualitative & Quantitative
Lecture 342 [PPT] Risk Analysis Formula: AV (Asset Value)
Lecture 343 [PPT] Risk Analysis Formula: EF (Exposure Factor)
Lecture 344 [PPT] Risk Analysis Formula: SLE (Single Loss Expectancy)
Lecture 345 [PPT] Risk Analysis Formula: ARO (Annualized Rate of Occurrence)
Lecture 346 [PPT] Risk Analysis Formula: ALE (Annualized Loss Expectancy)
Lecture 347 [PPT] Risk Analysis: Probability & Likelihood
Lecture 348 [PPT] Risk Analysis: Impact
Lecture 349 [PPT] Risk Register
Lecture 350 [PPT] Risk Tolerance & Risk Appetite
Lecture 351 [PPT] Risk Transfer Strategy
Lecture 352 [PPT] Risk Acceptance Strategy
Lecture 353 [PPT] Risk Exception & Exemption Strategies
Lecture 354 [PPT] Risk Avoidance Strategy
Lecture 355 [PPT] Risk Mitigation Strategy
Lecture 356 [PPT] Risk Reporting
Lecture 357 [PPT] Business Impact Analysis
Lecture 358 [PPT] RPO (Recovery Point Objective) & RTO (Recovery Time Objective)
Lecture 359 [PPT] MTTR (Mean Time to Repair) & MTBF (Mean Time Between Failures)
Section 32: 5.3 3rd Party Risk Assessment and Management
Lecture 360 [PPT] Vendor Assessment & Vendor Selection
Lecture 361 [PPT] SLA (Service-Level Agreement)
Lecture 362 [PPT] MOA/MOU (Memorandum of Agreement/Understanding)
Lecture 363 [PPT] MSA (Master Service Agreement)
Lecture 364 [PPT] WO (Work Order)
Lecture 365 [PPT] SOW (Statement of Work)
Lecture 366 [PPT] NDA (Non-Disclosure Agreement)
Lecture 367 [PPT] BPA (Business Partners Agreement)
Lecture 368 [PPT] Vendor Monitoring
Lecture 369 [PPT] Questionnaires
Lecture 370 [PPT] Rules of Engagement
Section 33: 5.4 Security Compliance
Lecture 371 [PPT] Compliance Reporting
Lecture 372 [PPT] Consequences of Non-Compliance
Lecture 373 [PPT] Due Diligence & Due Care
Lecture 374 [PPT] Compliance Monitoring
Lecture 375 [PPT] Privacy
Section 34: 5.5 Types of Audits and Assessments
Lecture 376 [PPT] Attestation
Lecture 377 [PPT] Internal Assessments
Lecture 378 [PPT] External Assessments
Lecture 379 [PPT] Penetration Testing
Section 35: 5.6 Security Awareness Practice
Lecture 380 [PPT] Phishing Campaign
Lecture 381 [PPT] Recognizing a Phishing Attempt
Lecture 382 [PPT] Phishing: Responding to Reported Suspicious Messages
Lecture 383 [PPT] Anomalous Behavior Recognition
Lecture 384 [PPT] User Guidance and Training
Lecture 385 [PPT] Reporting and Monitoring
Lecture 386 [PPT] Development & Execution
Learners who want to pass the CompTIA Security+ exam and learn a few skills along the way