Introduction
Important - Download These First - Working Files
0101 What To Expect From This Course
0103 Course Overview
0104 About The Security+ Exams
0105 How To Access Your Working Files
Understanding The Risks
0201 Risk Assessment
0202 Risk Calculation
0203 Policies Standards And Guidelines
0204 Understanding Control Types
0205 Risk Management
Three A Concept
0301 Understanding The Three A Concept
0302 Authentication
0303 Access Control
0304 Access Control Methods
0305 Authentication Issues
0306 Authentication Protocols
0307 Authentication Services - Part 1
0308 Authentication Services - Part 2
0309 Best Practices
0310 Trusted OS
0311 Setting Permissions
Network Devices
0401 Understanding TCP/IP
0402 Protocols And Services - Part 1
0403 Protocols And Services - Part 2
0404 Firewalls - Part 1
0405 Firewalls - Part 2
0406 Routers And Switches
0407 Load Balancing
0408 Proxy Servers
0409 IDS Versus IPS
0410 UTM Devices
0411 Protocol Analyzers
0412 Using A Network Monitor
Network Design Elements
0501 Layering For Security
0502 DMZ
0503 VLANs
0504 NAT
Security Threats
0601 Understanding Malware
0602 Viruses
0603 Virus Types - Part 1
0604 Virus Types - Part 2
0605 Antivirus Software
0606 Attack Types - Part 1
0607 Attack Types - Part 2
0608 Common Attacks
0609 Application Attacks - Part 1
0610 Application Attacks - Part 2
Wireless Networks
0701 Wireless Network Basics
0702 Wireless Protocols
0703 Encryption Options
0704 WAP Basics
0705 Extensible Authentication Protocol
0706 Wireless Vulnerabilities
Application Security
0801 Application Hardening
0802 Databases
0803 Patches And Updates
0804 Secure Coding
Host Security
0901 Host Security Basics
0902 ACLs And Permissions
0903 Software Baselining
0904 Email And Web Server Security
0905 DHCP Security
0906 DNS Security
0907 Authorizing A DHCP Server
Data Security
1001 Fault Tolerance Basics
1002 RAID
1003 Clustering
1004 The Backup Plan - Part 1
1005 The Backup Plan - Part 2
Security In The Cloud
1101 Understanding Cloud Computing
1102 Four Cloud Types
1103 Saas, PaaS And IaaS
1104 Security In The Cloud
Social Engineering And Physical Security
1201 Understanding Social Engineering
1202 Social Engineering Types
1203 Dealing With Social Engineering
1204 Physical Security - Part 1
1205 Physical Security - Part 2
Cryptography
1301 Cryptography Basics
1302 PKI Basics
1303 X.509
1304 Viewing Certificates
1305 CAs And RAs
1306 SSL And TLS
1307 Hard And Soft Encryption
1308 Encrypting Files
1309 Web Server Certificate Request
Monitoring Networks
1401 Network Monitoring Basics
1402 Event Viewer
1403 Hardening Basics - Part 1
1404 Hardening Basics - Part 2
1405 Detection Versus Prevention
1406 Security Monitoring
Security Administration
1501 Security Awareness
1502 Information Classification
1503 Information Access
1504 Security Regulation Compliance
1505 Third Party Security
1506 Mobile Devices
1507 BYOD
Disaster Recovery
1601 Disaster Recovery Plans
1602 Incident Response Policies
1603 Working With Vendors
1604 Security Testing