1. Comparing Security Roles and Security Controls
Comparing Security Roles and Security Controls00:23:25
2. Explaining Threat Actors and Threat Intelligence
The first few lessons in the course pursue the general theme of assessment. This lesson covers threat awareness and research. As with most areas of IT, it is vital to keep up to date with the latest news and trends in cybersecurity.
Explain threat actor types and attack vectors.
Explain threat intelligence sources.
2.A Explain Threat Actor Types and Attack Vectors00:23:25
2.B Explain Threat Intelligence Sources00:25:38
3.Performing Security Assessments
3A-3B Assess Organizational Security with Network Reconnaissance Tools and security concerns with vulnerability types1:11:58
3.C Summarize Vulnerability Scanning Techniques00:15:54
3.D Explain Penetration Testing Concepts00:13:22
4.Identifying Social Engineering and Malware
4.A Compare and Contrast Social Engineering Techniques00:48:28
4.B Analyze Indicators of Malware-based Attacks00:59:34
5. Summarizing Basic Cryptographic Concepts
6.Implementing Public Key Infrastructure
This lesson focuses on the practical side of implementing cryptographic infrastructure. You will be returning to the actual systems that use cryptography (authentication, SSL/TLS, VPN, WPA, and so on) throughout the rest of the course.
Implement certificates and certificate authorities.
Implement PKI management.
6.A Implement Certificates and Certificate Authorities00:19:57
6.B Implement PKI Management00:15:24
7.Implementing Authentication Controls
Continuing the protect function theme, this lesson and the following one cover identity and access management (IAM). This lesson focuses on authentication mechanisms, whereas Lesson 8 covers identity management, account management, and authorization management.
Summarize authentication design concepts.
Implement knowledge-based authentication.
Implement authentication technologies.
Summarize biometrics authentication concepts.
7A-7B. Summarize Authentication Design Concepts & Implement Knowledge-based Authentication00:32:42
7C-7D. Implement Authentication Technologies & Biometrics Authentication Concepts00:22:32
8.Implementing Identity and Account Management Controls
Implementing Identity and Account Management Controls
This lesson collects the objectives and content examples for identity management, privilege/personnel policies, and permissions/access control.
Implement identity and account types.
Implement account policies.
Implement authorization solutions.
Explain the importance of personnel policies.
8A. Implement Identity and Account Types00:45:37
8B. Implement Account Policies00:13:01
8C. Implement Authorization Solutions00:27:57
8D Explain the Importance of Personnel Policies00:13:01
9.Implementing Secure Network Designs
9A.Implement Secure Network Designs00:37:13
9B.Implement Secure Switching and Routing00:18:29
9C.Implement Secure Wireless Infrastructure00:22:49
9D.Implement Load Balancers00:19:10
10. Implementing Network Security Appliances
Implementing Network Security Appliances
10A.Implementing Network Security Appliances00:52:59
10B.Implement Network Security Monitoring00:26:09
10C.Summarize the Use of SIEM00:38:48
11. Implementing Secure Network Protocols
11.A Implement Secure Network Operations Protocols00:33:11
11.B Implement Secure Application Protocols00:31:32
11.C Implement Secure Remote Access Protocols00:38:13
12.Implementing Host Security Solutions
Implementing Host Security Solutions
12A.Implement Secure Firmware00:25:25
12B.Implement Endpoint Security00:14:00
12C.Explain Embedded System Security Implications00:20:07
13. Implementing Secure Mobile Solutions
This lesson follows on from host security by looking specifically at mobile devices. While there are a lot of content examples to cover, this subject area is well-established at A+ level.
Implement mobile device management.
Implement secure mobile device connections.
13.A Implement Mobile Device Management00:33:52
13.B Implement Secure Mobile Device Connections00:24:02
15.Implementing Secure Cloud Solutions
15A.Summarize Secure Cloud and Virtualization Services00:24:25
15B.Apply Cloud Security Solutions00:28:08
15C.Summarize Infrastructure as Code Concepts00:14:35
17.Performing Incident Response
17A Summarize Incident Response Procedures00:31:15
17B.Utilize Appropriate Data Sources for Incident Response00:23:58
17C.Apply Mitigation Controls00:21:39
19.Summarizing Risk Management Concepts
19A.Explain Risk Management Processes and Concepts00:25:07
19B.Explain Business Impact Analysis Concepts00:16:12
21.Explaining Physical Security
21A.Explain the Importance of Physical Site Security Controls00:12:14
21B.Explain the Importance of Physical Host Security Controls00:9:35
Revision de los quices
Security+ Quiz Lecciones 1 y 21:51:29
Security+ Quiz Lecciones 3 y 42:00:07
Security+ Quiz Lecciones 5 y 62:10:00
Retos de carrera en ciberseguridad2:00:00
Creando mi CV2:00:00