Free CompTIA Security+ SY0-701 Certification Course : Master Cybersecurity Concepts - ITU Online

Free CompTIA Security+ SY0-701 Certification Course : Master Cybersecurity Concepts

$0.00

Sale!
Free CompTIA Security+ SY0-701 Certification Course : Master Cybersecurity Concepts
 
192 Training Hours
1,071 On-demand Videos
91  Topics
1,478 Prep Questions

Course Description

Start today and Get 30 days of Full Access to our CompTIA Security+ SY0-701 Course

Your access begins immediately upon registration. Not credit card is required. You are under no obligation to purchase any course or continue the course during or past the initial no-cost 30 days. When signing up, you are agreeing to our Privacy Policy related to the use and collection of user data.

Dive into the evolving world of cybersecurity with our 30 day free CompTIA Security+ SY0-701 course. This program is meticulously crafted to align with the latest cybersecurity trends and techniques, ensuring learners grasp the core concepts and skills necessary in today’s dynamic IT security landscape. Ideal for aspiring security specialists, network administrators, and IT auditors, this course is a stepping stone to mastering essential cybersecurity principles and practices.

Course Modules and Highlights

The CompTIA Security+ SY0-701 exam is a globally recognized certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. The objectives of the SY0-701 exam reflect the latest trends and technologies in risk management, risk mitigation, threat management, and intrusion detection. Here is an overview of the core objectives for the SY0-701 exam, along with a brief description of what is covered in each objective:

  1. Attacks, Threats, and Vulnerabilities
    • This objective covers the identification of various types of cybersecurity threats and attacks, understanding threat actors and their attributes, the importance of threat intelligence, and vulnerability management processes. It includes topics such as malware, phishing, social engineering, and application and network-based vulnerabilities.
  2. Architecture and Design
    • This section focuses on enterprise security architecture and design, including concepts related to secure network architecture design, secure system design, cloud and virtualization technologies, and the importance of implementing secure network architecture concepts. It addresses the principles of secure network design and the secure integration of systems into a network environment.
  3. Implementation
    • This objective covers the practical aspects of implementing secure network and system configurations. Topics include secure deployment of network components, secure application development, deployment, and automation concepts, as well as cryptographic techniques and products. It emphasizes the hands-on skills required to secure environments, including the configuration of wireless security settings, firewalls, and VPNs.
  4. Operations and Incident Response
    • This section delves into the procedures and operations necessary to manage and protect organizational security. It includes identifying and using security controls, understanding the importance of policies, laws, and regulations, and the steps involved in incident response and forensics. Topics also cover disaster recovery and business continuity planning.
  5. Governance, Risk, and Compliance
    • This objective focuses on the importance of adhering to legal and regulatory requirements regarding information security. It covers risk management concepts and the importance of understanding and complying with laws, regulations, and privacy principles. It also includes an overview of risk assessment and mitigation strategies and the importance of security policies and procedures.

Each of these objectives is designed to ensure that candidates have a well-rounded understanding of cybersecurity principles and practices. The SY0-701 exam aims to equip individuals with the knowledge and skills necessary to address current security concerns and to adapt to the evolving landscape of cybersecurity threats and defenses.

Who Should Enroll?

This course is designed for individuals aiming to start or advance their careers in cybersecurity. It’s particularly beneficial for entry-level cybersecurity professionals, security engineers, and system administrators.

Enhanced Features for Better Learning

  • Course structured around the latest CompTIA Security+ SY0-701 exam domains.
  • Emphasis on vendor-neutral certification, making the skills learned applicable across various technologies and platforms.
  • Inclusion of current trends in cybersecurity, ensuring the content is up-to-date and relevant.

Key Term Knowledge Base: Key Terms Related to CompTIA Security+ SY0-701

Understanding key terms is crucial in effectively grasping the concepts and principles of cybersecurity, especially when preparing for certifications like the CompTIA Security+ SY0-701. This certification covers a broad range of cybersecurity topics, so familiarizing yourself with its terminology can greatly aid in comprehension and application in real-world scenarios.

TermDefinition
Access ControlThe selective restriction of access to data and resources.
Advanced Persistent Threat (APT)A prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period.
CryptographyThe practice of securing information by transforming it into an unreadable format.
CybersecurityThe practice of protecting systems, networks, and programs from digital attacks.
Data BreachAn incident where information is stolen or taken from a system without the knowledge or authorization of the system’s owner.
Denial of Service (DoS)An attack that aims to shut down a machine or network, making it inaccessible to its intended users.
EncryptionThe process of converting information or data into a code to prevent unauthorized access.
FirewallA network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Intrusion Detection System (IDS)A device or software application that monitors a network or systems for malicious activity or policy violations.
MalwareSoftware designed to disrupt, damage, or gain unauthorized access to a computer system.
Network SecurityMeasures taken to protect the integrity, confidentiality, and accessibility of computer networks and data.
Penetration TestingA simulated cyber attack against your computer system to check for exploitable vulnerabilities.
PhishingA type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
Risk ManagementThe process of identifying, assessing, and controlling threats to an organization’s capital and earnings.
Secure Socket Layer (SSL)A standard security technology for establishing an encrypted link between a server and a client.
Security Information and Event Management (SIEM)Software that provides real-time analysis of security alerts generated by applications and network hardware.
Social EngineeringThe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Two-Factor AuthenticationA security process in which the user provides two different authentication factors to verify themselves.
Virtual Private Network (VPN)A service that allows you to connect to the internet via a server run by a VPN provider, enhancing your online privacy and security.
Zero-Day AttackA cyber attack that occurs on the same day a weakness is discovered in software, before a fix becomes available.

These terms provide a foundational understanding for anyone studying for the CompTIA Security+ SY0-701 certification or interested in the field of cybersecurity.

Frequently Asked Questions Related to CompTIA Security+ 701

What is the CompTIA Security+ SY0-701 Certification?

The CompTIA Security+ SY0-701 is the latest version of the Security+ certification, a globally recognized credential validating foundational IT security knowledge and skills. It focuses on practical security skills and principles, keeping pace with the evolving cybersecurity landscape.

How does the SY0-701 version differ from its predecessors?

The SY0-701 version of Security+ has been updated to include the latest cybersecurity trends and techniques, emphasizing areas like risk assessment, incident response, enterprise networks, hybrid/cloud operations, and security controls. It reflects a more focused approach to cybersecurity, aligning with the current industry needs.

Who should take the CompTIA Security+ SY0-701 exam?

This certification is ideal for security specialists, network administrators, IT auditors, security consultants, security engineers, system administrators, and entry-level cybersecurity professionals. It is particularly beneficial for those seeking to establish or advance their careers in the field of IT security.

Are there prerequisites for the SY0-701 exam?

While there are no strict prerequisites, it is recommended that candidates have a solid background of at least two years in a security or systems administrator job role. Familiarity with general IT concepts and practices is also beneficial for understanding the course material.

What topics are covered in the SY0-701 exam?

The SY0-701 exam covers five main domains: General Security Concepts, Threats, Vulnerabilities, and Mitigations, Security Architecture, Security Operations, and Security Program Management and Oversight. These domains include a range of topics from cybersecurity controls and risk management to incident response and cloud security.

Your Training Instructors

Chrys Thorsen

Chrys Thorsen

Education and Technology Expert

Chrys Thorsen is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered over 50 IT Certifications including CISSP, CISA, CEHv12, PenTest+, CompTIA CNVP, Cisco CCSI/CCNP, Microsoft Cloud and on-premises technologies, VMware vSphere, and many more. She has also authored 40 published certification textbooks, and over 35 full-length IT certification video courses.

When not working in the United States, Chrys spends her time abroad capacity-building IT literacy in developing nations in Sub-Saharan Africa. Her client list has included: the US Federal Government, the Republic of Zambia Ministry of Health, Cavendish University Zambia, Accenture, JP Morgan Chase, the US Centers for Disease Control and Prevention, the Elizabeth Glaser Pediatric AIDS Foundation (EGPAF), Hughes Aircraft, Microsoft, and many more.

Chrys lives by, and is fond of repeating, her professional creed:

“The only true measure of success for any project or training is results on the ground. Everything else is just noise.” “I teach what I deploy; I deploy what I teach.”

Frank Schmidt

Frank Schmidt

Linux Subject Matter Expert | Course Author

Frank has over 35 years of IT experience after graduating with honors with a B.S. in Computer Science from the University of Southern Mississippi. After a software development position with Shell Oil, he has worked in IT training and workforce development for over 30 years. Frank has worked with UNIX and Linux operating systems since the 1990s and has taught over 1000 training events during this time. He is also a course author and subject matter expert for the creation of multiple UNIX and Linux classes from the introductory level through advanced system administration. He has taught the exam preparation course for the CompTIA Linux+ exam and currently holds the Linux+ certification.

Anthony Santucci

Anthony Santucci

Technology Professional and Instructor

Anton Santucci is a seasoned IT instructor with over 20 years of experience in the field. He is currently serving as an ITU instructor for the A+ Certification Course and teaching both online and in-person computer training at Hillsborough Community College (HCC) in Florida. Anton holds an Associate's Degree in Information Systems Management and is skilled in delivering complex IT information to students in a way that is easy to understand and enjoy.

He started his career as a Microsoft Certified Trainer (MCT) and has since gained expertise in CompTIA certifications such as A+, Net+, and Security+. He also holds the CEH (Certified Ethical Hacker) certification. With five years as a Network Administrator for a career college in Florida and global experience as a corporate trainer, Anton brings a wealth of knowledge and experience to his classes.

With a belief that training can be both informative and entertaining, Anton uses humor, mnemonic devices, and questions to engage his students and ensure they retain the skills they need to succeed in the workplace. In his personal life, Anton is a passionate traveler and a fan of the Giants. He looks forward to helping you achieve your certification goals while getting to know you along the way.

Course Outline

CompTIA Security+ SY0-701 Course Content

Module 1 - SY0-701 General Security Concepts

  •    1.0 Introduction to the Course

  •    1.1 Fundamental Security Concepts

  •    1.2 Zero Trust

  •    1.3 Deception and Disruption

  •    1.3.1 ACTIVITY - Testing a Honeypot

  •    1.4 Security Controls

  •    1.5 Change Management and Security

  •    1.6 Cryptography Basics

  •    1.6.1 ACTIVITY - Examining Symmetric Encryption

  •    1.7 Asymmetric Encryption

  •    1.7.1 ACTIVITY - Exploring Asymmetric Encryption

  •    1.8 Hashing

  •    1.8.1 ACTIVITY - Verifying Integrity with Hashing

  •    1.9 Digital Certificates

  •    1.10 Public Key Infrastructure

  •    1.11 Data and Keys

  •    1.12 Crypto Implementations

  •    1.13 Blockchain

  •    1.14 Non-Cryptographic Data Protection

Module 2 - SY0-701 Threats, Vulnerabilities, and Mitigations

  •    2.1 Threat Actors and Motivations

  •    2.2 Threat Vectors

  •    2.2.1 ACTIVITY - O.MG Cable Baiting

  •    2.2.2 O.MG-No Cable

  •    2.3 Social Engineering

  •    2.4 Operating System Vulnerabilities and Attacks

  •    2.5 Application Vulnerabilities and Attacks

  •    2.5.1 ACTIVITY - Performing a Buffer Overflow

  •    2.6 Web-based Vulnerabilities and Attacks

  •    2.6.1 ACTIVITY - Abusing Unsanitized Input

  •    2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection

  •    2.6.3 ACTIVITY - Swiping a Token with XSS

  •    2.7 Other Vulnerabilities

  •    2.8 Common Malicious Activity Indicators

  •    2.9 Insider Threat Indicators

  •    2.10 Social Engineering Indicators

  •    2.10.1 ACTIVITY - Capturing Credentials through Social Engineering

  •    2.11 Malware Activity Indicators

  •    2.12 Operating System Attack Indicators

  •    2.13 Application Attack Indicators

  •    2.13.1 ACTIVITY - Recognizing Directory Traversal

  •    2.14 Physical Attack Indicators

  •    2.14.1 ACTIVITY - Quickly Cloning an RFID Badge

  •    2.15 Network Attack Indicators

  •    2.15.1 ACTIVITY - Crashing a Target with DoS

  •    2.16 Cryptographic Attack Indicators

  •    2.17 Password Attack Indicators

  •    2.17.1 ACTIVITY - Password Cracking

  •    2.18 Network Segmentation

  •    2.19 Access Control

  •    2.20 Enterprise Device Hardening

Module 3 - SY0-701 Security Architecture

  •    3.1 Network Segmentation

  •    3.1.1 ACTIVITY - Segementing a Network

  •    3.2 High Availability

  •    3.3 Virtualization

  •    3.3.1 ACTIVITY - Deploying Docker Containers

  •    3.4 Cloud

  •    3.5 Serverless Computing

  •    3.6 IoT

  •    3.7 ICS SCADA

  •    3.7.1 ACTIVITY - Operating a SCADA System

  •    3.8 RTOS and Embedded Systems

  •    3.9 Reducing the Attack Surface

  •    3.10 Firewalls

  •    3.11 IDS IPS.mp4

  •    3.12 Secure Communications - Access

  •    3.13 Port Security

  •    3.14 SD-WAN and SASE

  •    3.15 Data Classifications

  •    3.16 Protecting Data Types

  •    3.17 Data Considerations

  •    3.18 Redundancy

  •    3.19 Alternate Sites

  •    3.20 Multiple Platforms

  •    3.21 Business Continuity

Module 4 - SY0-701 Security Operations

  •    4.1 Secure Baselines

  •    4.2 Attack Surface Reduction

  •    4.3 Wireless Installation

  •    4.4 Wireless Security Settings

  •    4.5 Mobile Solutions

  •    4.5.1 ACTIVITY - Pwning a Mobile Device

  •    4.6 Application Security Management

  •    4.7 Asset Management

  •    4.8 Vulnerability Management

  •    4.9 Monitoring Activities

  •    4.10 Monitoring Tools

  •    4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities

  •    4.11 Firewall Configuration

  •    4.11.1 ACTIVITY - Configuring Firewall Rules

  •    4.12 Intrusion Detection Configuration

  •    4.13 Web Traffic Filtering

  •    4.14 Operating System Policy

  •    4.14.1 ACTIVITY - Examining Windows Group Policy

  •    4.15 Network Service Security

  •    4.16 Data Loss Protection

  •    4.16.1 ACTIVITY - Checking File Integrity

  •    4.17 Network Access Control

  •    4.17.1 ACTIVITY - Require Multifactor Authentication

  •    4.18 Identity Management

  •    4.19 Access Management

  •    4.19.1 ACTIVITY - Implementing Access Control

  •    4.20 Security Automation

  •    4.21 Incident Response

  •    4.22 Digital Forensics

Module 5 - SY0-701 Security Program Management and Oversight

  •    5.1 Elements of Effective Security Governance

  •    5.2 Elements of the Risk Management Process

  •    5.3 Third Party Risk Assessment and Management

  •    5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure

  •    5.4 Effective Security Compliance

  •    5.5 Audits and Assessments

  •    5.5.1 ACTIVITY - Conducting OSINT

  •    5.5.2 ACTIVITY - Performing Active Reconnaissance

  •    5.6 Security Awareness Practices

  •    5.7 Course Outro

CompTIA Cybersecurity Analyst CySA+ (CS0-003) Course Content

Module 1 - CompTIA CySA+ CS0-003 Basics

  •    1.1 Course Introduction

  •    1.2 Instructor Introduction

  •    1.3 What is CySA

  •    1.4 Exam Objectives

  •    1.5 Cybersecurity Pathway

  •    1.6 DoD Baseline Certfication

Module 2 - CompTIA CySA+ CS0-003 Domain 1 - Security Operations

  •    2.1 Domain 1 - Security Operations Overview

  •    2.2 System and Network Architecture Concepts in Security Operations

  •    2.3 Log Files

  •    2.4 Operating Systems

  •    2.5 Infrastructure Concepts

  •    2.6 Network Architecture

  •    2.7 Software Defined Networking

  •    2.8 Whiteboard Discussion - Network Architectures

  •    2.9 Identity and Access Management IAM Basics

  •    2.10 Demonstration - IAM

  •    2.11 Encryption

  •    2.12 Sensitive Data

  •    2.13 1.2 Analyze Indicators of Potentially Malicious Activity

  •    2.14 Network Attack

  •    2.15 Host Attacks

  •    2.16 Application Related Attacks

  •    2.17 Social Attacks

  •    2.18 Tools or Techniques to Determine Malicious Activity Overview

  •    2.19 Tools and Toolsets For Identifying Malicious Activity

  •    2.20 Common Techniques

  •    2.21 Programming Concerns

  •    2.22 Threat-Intelligence and Threat-Hunting Concepts Overview

  •    2.23 Threat Actors

  •    2.24 Tactics, Techniques and Procedures

  •    2.25 Confidence Levels IOC

  •    2.26 Collection Sources

  •    2.27 Threat Intelligence

  •    2.28 Cyber Response Teams

  •    2.29 Security Operations

  •    2.30 Standardized Processes and Operations

  •    2.31 Security Operations Tools and Toolsets

  •    2.32 Module 2 Review

Module 3 - CompTIA CySA+ CS0-003 Domain 2 - Vulnerability Management

  •    3.1 Domain 2 - Vulnerability Management Overview

  •    3.2 Vulnerability Discovery and Scanning

  •    3.3 Asset Discovery and Scanning

  •    3.4 Industry Frameworks

  •    3.5 Mitigating Attacks

  •    3.6 CVSS and CVE

  •    3.7 Common Vulnerability Scoring System (CVSS) interpretation

  •    3.8 CVE Databases

  •    3.9 Cross Site Scripting (XSS)

  •    3.10 Vulnerability Response, Handling, and Management

  •    3.11 Control Types (Defense in Depth, Zero Trust)

  •    3.12 Patching and Configurations

  •    3.13 Attack Surface Management

  •    3.14 Risk Management Principles

  •    3.15 Threat Modeling

  •    3.16 Threat Models

  •    3.17 Secure Coding and Development (SDLC)

  •    3.18 Module 3 Review

Module 4 - CompTIA CySA+ CS0-003 Domain 3 - Incident Response and Management

  •    4.1 Domain 3 - Incident Response and Management Overview

  •    4.2 Attack Methodology Frameworks

  •    4.3 Cyber Kill Chain

  •    4.4 Frameworks to Know

  •    4.5 Incident Response and Post Reponse

  •    4.6 Detection and Analysis

  •    4.7 Post Incident Activities

  •    4.8 Containment, Eradication and Recovery

  •    4.9 Module 4 Review

Module 5 - CompTIA CySA+ CS0-003 Domain 4 - Reporting and Communication

  •    5.1 Domain 4 - Reporting and Communication Overview

  •    5.2 Reporting Vulnerabilities Overview

  •    5.2.1 Vulnerability Reporting

  •    5.3 Compliance Reports

  •    5.4 Inhibitors to Remediation

  •    5.5 Metrics and KPI's

  •    5.6 Incident Response Reporting and Communications Overview

  •    5.7 Incident Declaration

  •    5.8 Communication with Stakeholders

  •    5.9 Root Cause Analysis

  •    5.10 Lessons Learned and Incident Closure

  •    5.11 Module 5 Review

Module 6 - CompTIA CySA+ CS0-003 - Course Closeout

  •    6.1 Course Closeout Overview

  •    6.2 Practice Questions

  •    6.3 Exam Process

  •    6.4 Continuing Education

  •    6.5 Course Closeout

CompTIA Cloud+ (CV0-003) Course Content

Module 1 - CompTIA Cloud+ CV0-003 Course Overview

  •    1.0 Course Trailer

  •    1.1 Course Overview

  •    1.2 What is the Cloud + Exam

  •    1.3 Cloud + Domain Obectives Overview

  •    1.4 CompTIA Certification Pathways

  •    1.5 DoD and ISO Requirements

Module 2 - General Cloud Knowledge

  •    2.1 Domain Overview

  •    2.2 Compare and Contrast Cloud Models

  •    2.3 Cloud Computing Defined

  •    2.4 Deployment Models

  •    2.5 Service Models

  •    2.6 Cloud Characteristics

  •    2.7 Cloud Roles

  •    2.8 Evaluate Cloud Providers and Services

  •    2.9 Regions and Zones

  •    2.10 Shared Responsibility Model

  •    2.11 Demonstration - AWS Shared Security Model

  •    2.12 Comparing Cloud to Virtualization

  •    2.13 Comparing Cloud to On Premises

  •    2.14 What is a Virtual Machine

  •    2.15 Demonstration - Deploy a Cloud VM (AWS EC2)

  •    2.16 What is an API

  •    2.17 Capacity Planning Factors

  •    2.18 Licensing, Factors, Requirements and Planning

  •    2.19 Capacity Planning

  •    2.20 Demonstration - AWS Trusted Advisor

  •    2.21 HA and Scaling

  •    2.22 High Availability and Disaster Recovery

  •    2.23 Virtual, System and Communication Protection

  •    2.24 Hypervisor Affinity

  •    2.25 Analyze the solution design

  •    2.26 Business Requirements

  •    2.27 Business Enablers

  •    2.28 Demonstration -AWS Well Architected Tool

  •    2.29 Testing Techniques

  •    2.30 Testing Success Factors

  •    2.31 Module Review Questions

  •    2.32 Module Summary Review

Module 3 - Cloud Security

  •    3.1 Domain Overview

  •    3.2 Configure Identity and Access Management

  •    3.3 Identification and Authorization Management (IAM)

  •    3.4 SDLC

  •    3.5 Directory Services

  •    3.6 Security and Access Controls

  •    3.7 Federation

  •    3.8 SSO and MFA

  •    3.9 Certificates and Key Management

  •    3.10 Secure a Network in a Cloud Environment

  •    3.11 Networking Devices and Segmentation

  •    3.12 Firewalls and Proxies

  •    3.13 NAT and PAT

  •    3.14 Secure Network Configurations (Tunnelling and Encryption)

  •    3.15 Demo Hardening and Configuration Changes

  •    3.16 OS Application Controls and Security Credentials

  •    3.17 Policies and Permissions

  •    3.18 Host and Network Protections (HIDSIPS)

  •    3.19 Virtualization Security

  •    3.20 Monitoring

  •    3.21 Data Security and Compliance Controls in Cloud Environments

  •    3.22 Structured, Unstructured and Semi Structured Data

  •    3.23 Data Classification and Labeling

  •    3.24 Data Loss Prevention

  •    3.25 Demonstration - Google Cloud DLP

  •    3.26 Chain of Custody and Non-Repudiation

  •    3.27 Discussion - CASB

  •    3.28 Module Summary Review

  •    3.29 Module Review Questions

Module 4 - Cloud Deployment

  •    4.1 Domain Overview

  •    4.2 Integrate Components into Cloud Solutions

  •    4.3 Subscription Services

  •    4.4 Demonstration - Provision VM

  •    4.5 Cloud Infrastructure Components

  •    4.6 Whiteboard - Design a Resilent AWS Cloud Architecture

  •    4.7 Containers

  •    4.8 Microservices

  •    4.9 Demonstration - Deploy Containers

  •    4.10 Scaling

  •    4.11 Provision Storage

  •    4.12 Cloud Storage Protocols

  •    4.13 Storage Features

  •    4.14 Storage Cost Considerations

  •    4.15 Storage Performance

  •    4.16 RAID and Tiering

  •    4.17 Demonstration - AWS S3

  •    4.18 Deploy Cloud Networking Solutions

  •    4.19 Connecting to The Cloud

  •    4.20 Network Protocols

  •    4.21 VPNS, VPC and Connectivity

  •    4.22 Whiteboard - AWS VPC Connectivity

  •    4.23 Demonstration - AWS VPC

  •    4.24 Software Defined Networking (SDN)

  •    4.25 Compute Sizing

  •    4.26 Virtualization Considerations

  •    4.27 Resource Rightsizing (CPU, Memory, etc)

  •    4.28 Module Summary Review

  •    4.29 Module Review Questions

Module 5 - Operations and Support

  •    5.1 Domain Overview

  •    5.2 Logging Monitoring and Alerting

  •    5.3 Logging, Storage and Analysis of Data Events

  •    5.4 Monitoring Cloud Resources

  •    5.5 Service Level Agreements

  •    5.6 Demonstration - SLAs in AWS

  •    5.7 Maintain Efficient Operations of a Cloud Environment

  •    5.8 Lifecycle Management

  •    5.9 Change and Asset Management

  •    5.10 SOP, Patching and Upgrades

  •    5.11 Orchestration and Automation

  •    5.12 Orchestration or Automation

  •    5.13 DevOps, IaC and CICD Pipelines

  •    5.14 Playbooks and Templates

  •    5.15 Backup and Restore Operations

  •    5.16 Backup Types, Objects, Targets

  •    5.17 Restore and Recovery

  •    5.18 Module Summary Review

  •    5.19 Module Review Questions

Module 6 - Troubleshooting

  •    6.1 Domain Overview

  •    6.2 Troubleshooting Methodology Intro

  •    6.3 Troubleshooting Methodology

  •    6.4 Troubleshoot Security Issues

  •    6.5 Cloud Attacks

  •    6.6 Security Groups and NACLS

  •    6.7 Troubleshoot Deployment Issues

  •    6.8 Discussion Site Connectivity Issues

  •    6.9 Discussion - Capacity Issues

  •    6.10 Connectivity Issues

  •    6.11 Connectivity Troubleshooting Tools

  •    6.12 Demonstration - GCP AWS Azure Latency Test

  •    6.13 Module Summary Review

  •    6.14 Module Review Questions

Module 7 - Course Closeout

  •    7.1 Exam Preparation

  •    7.2 Course Closeout

CompTIA A+ 220-1101 (Core 1) Course Content

Module 1 - Devices, Setups, and Installs

  •    1.1 Introduction to the Course, Meet the Instructor

  •    1.2 Appropriate Safety Procedures

  •    1.3 PC Components

  •    1.4 Guidlines for PC Disassembly

  •    1.5 Motherboards

  •    1.6 CPU Sockets

  •    1.7 PCI Bus

  •    1.8 Storage Bus (SATA and IDE)

  •    1.9 Discussing PC Components

  •    1.10 Common Connection Interfaces

  •    1.11 Wired and Wireless Connection Standards

  •    1.12 Install Peripheral Devices

  •    1.13 Guidlines and Discussion for Installing Peripheral Devices

Module 2 - Displays and Multimedia Devices

  •    2.1 Displays and Multimedia

  •    2.2 Display Device Connections and Cables

  •    2.3 Discussing Display Device Installation and Configuration

  •    2.4 Troubleshoot Display Devices

  •    2.5 Guidelines for Troubleshooting Display Devices

  •    2.6 Discussing Display Device Troubleshooting

  •    2.7 Install and Configure Multimedia Devices

  •    2.8 Discussing Multimedia Device Installation and Configuration

Module 3 - Supporting Multiple Drive Types

  •    3.1 Supporting Multiple Drive Types and Memory

  •    3.2 Memory Types

  •    3.3 RAM Types

  •    3.4 Memory Modules

  •    3.5 DIMM and SO-DIMM Technologies

  •    3.6 Parity and ECC RAM

  •    3.7 Memory Compatibility Issues

  •    3.8 Discussing System Memory Installation

  •    3.9 Install and Configure Mass Storage Devices

  •    3.10 Storage Adapters and Cables

  •    3.11 Solid State Drives

  •    3.12 Guidlines for Installing Mass Storage Devices

  •    3.13 Discussing Mass Storage Device Installation and Configuration

  •    3.14 Install and Configure Removable Storage

  •    3.15 Discussing Removable Storage Device Istallation and Configuration

  •    3.16 Configure RAID

  •    3.17 RAID Configuration Options

  •    3.18 Discussing RAID Configuration

  •    3.19 Troubleshoot Storage Devices

  •    3.20 Boot Failures

  •    3.21 Discussing Storage Device Troubleshooting

Module 4 - Accounting for CPUs and Internal Components

  •    4.1 Install Upgrade CPUs

  •    4.2 Multiprocessing and Multicore Processors

  •    4.3 Discussing CPU Upgrades

  •    4.4 Configure and Update BIOS UEFI

  •    4.5 Discussing BOIS-UEFI Configuration and Updates

  •    4.6 Install Power Supplies

  •    4.7 Discussing Power Supply Installation

  •    4.8 Troubleshoot Internal System Components

  •    4.9 POST and Boot Problems

  •    4.10 Boot Troubleshooting and Log Entries

  •    4.11 Motherboard Component Problems

  •    4.12 Discussing System Component Troubleshooting

Module 5 - All About Network Theories

  •    5.1 Wired Networks

  •    5.2 Common Ethernet Network Implementations

  •    5.3 Taps and Mirrors

  •    5.4 Discussing Wired Networks

  •    5.5 Network Hardware Devices

  •    5.6 Switches

  •    5.7 Power Over Ethernet

  •    5.8 Discussing Network Hardware Devices

  •    5.9 Wireless Networks

  •    5.10 Access Points and Wireless Network Modes

  •    5.11 Discussing Wireless Networks

  •    5.12 Internet Connection Types

  •    5.13 Wireless Internet Service Providers WISP

  •    5.14 Discussing Internet Connection Types

  •    5.15 Network Configuration Concepts

  •    5.16 The TCIP-IP Protocol Suite

  •    5.17 Internet Protocol and IP Addressing

  •    5.18 Public and Private IP Addresses

  •    5.19 IPv6

  •    5.20 Discussing Network Configuration Concepts

  •    5.21 Network Services

  •    5.22 DNS

  •    5.23 Dynamic and Static IP Configurations

  •    5.24 DNS Records MX and A

  •    5.25 Web Servers and HTTP-HTTPS

  •    5.26 Discussing Network Services

Module 6 - Network Operations and Diagnostics

  •    6.1 Configuring and Troubleshooting Networks

  •    6.2 Network Connections in Windows

  •    6.3 Install and Configure SOHO Networks

  •    6.4 Configure SOHO Network Security

  •    6.5 Firewalls

  •    6.6 Port Fowarding and Port Triggering

  •    6.7 Windows Firewall

  •    6.8 Network Security and Embedded Appliances

  •    6.9 Configure Remote Access

  •    6.10 Discussing Remote Access Configuration

  •    6.11 Troubleshoot Network Connections

  •    6.12 IP Configuration Issues

  •    6.13 Routing Issues

  •    6.14 Discussing Network Connection Troubleshooting

Module 7 - Cloud and Virtualization Computing

  •    7.1 Configure Client-Side Virtulaization

  •    7.2 Hypervisors

  •    7.3 Processor Support and Resource Requirements

  •    7.4 Virtual Networks

  •    7.5 Client-Side Virtualization

  •    7.6 Cloud Computing Concepts

  •    7.7 Internal and External Shared Resources

  •    7.8 Cloud Service Options

  •    7.9 Virtual Desktops

  •    7.10 Software-Defined Networking (SDN)

  •    7.11 Discussing Cloud Computing Concepts

Module 8 - Laptop Features and Troubleshooting

  •    8.1 Use Laptop Features

  •    8.2 Expansion Options

  •    8.3 Discussing Laptop Features

  •    8.4 Install and Configure Laptop Hardware

  •    8.5 Discussing Laptop Hardware Installation and Configuration

  •    8.6 Troubleshoot Common Laptop Issues

  •    8.7 Discussing Troubleshooting Common laptop Issues

Module 9 - Syncing and Setup of Mobile Devices

  •    9.1 Syncing and Setup of Mobile Devices

  •    9.2 Connect and Configure Mobile Devices

  •    9.3 Configure Mobile Device Network Connectivity

  •    9.4 Mobile VPN Configuration

  •    9.5 Email Configuration Options

  •    9.6 Discussing Mobile Device Network Connectivity Configuration

  •    9.7 Support Mobile Apps

  •    9.8 Discussing Mobile App Support

Module 10 - All Things Printing

  •    10.1 All Things Printing

  •    10.2 Discussing Laser Printer Maintenance

  •    10.3 Maintain Inkjet Printers

  •    10.4 Discussing Inkjet Printer Maintenance

  •    10.5 Maintain Impact, Thermal, and 3D Printers

  •    10.6 Discussing Impact, Thermal, and 3D Printer Maintenance

  •    10.7 Install and Configure Printers

  •    10.8 Discussing Printer Installation and Configuration

  •    10.9 Troubleshoot Print Device Issues

  •    10.10 Install and Configure Imaging Devices

  •    10.11 Discussing Device Installation and Configuration

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing

  •    11.2 Resources and Testing

  •    11.3 Joining a Domain with Windows 10

  •    11.4 Boot Order and BIOS

  •    11.5 Virtual Machine Install & Configure

  •    11.6 PC Teardown

  •    11.7 Exploring the Laptop

  •    11.8 Install Windows 10 Demonstration

CompTIA A+ 220-1102 (Core 2) Course Content

Module 1 - Operating System Management

  •    1.1 Introduction to the Course, Meet the Instructor

  •    1.2 Identify Common Operating Systems

  •    1.3 Microsoft Windows

  •    1.4 Work and Education Features

  •    1.5 Windows System Limits

  •    1.6 Apple Operating Systems

  •    1.7 Linux Disk and File Management

  •    1.8 Discussing OS Types

  •    1.9 Use Windows Features and Tools

  •    1.10 Administrative Tools

  •    1.11 Manage Files in Windows

  •    1.12 System Hierarchies

  •    1.13 File Attributes

  •    1.14 Discussing Windows Features and Tools

  •    1.15 Manage Disks in Windows

  •    1.16 Discussing File Management in Windows

  •    1.17 The Windows Disk Management Console

  •    1.18 Discussing Windows Disk Management

  •    1.19 Manage Devices in Windows

  •    1.20 Device Manager

  •    1.21 Discussing Windows Device Manager

Module 2 - Configuring and installing the OS

  •    2.1 Configuring and Installing the OS

  •    2.2 Installation Boot Methods

  •    2.3 Disk Formatting and Partitioning

  •    2.4 Networking Considerations

  •    2.5 Post Installation Tasks

  •    2.6 OS Installation Types

  •    2.7 Unattended Installations

  •    2.8 Maintain OSs

  •    2.9 OS Updates

  •    2.10 Anti-Malware Updates

  •    2.11 Scheduled Backups

  •    2.12 Task Schedulers part 1

  •    2.13 Task Schedulers part 2

  •    2.14 Install Windows 10 Demonstration

  •    2.15 Discussing OS Maintenance

Module 3 - Tools to Troubleshoot and Maintain the OS

  •    3.1 Install and Manage Windows Applications

  •    3.2 Windows OS Tools

  •    3.3 Application and Print Services

  •    3.4 Task Manager

  •    3.5 Manage Windows Performance

  •    3.6 Windows Performance Management Tools

  •    3.7 Troubleshoot Windows

  •    3.8 Event Viewer

  •    3.9 The System Configuration Utility

  •    3.10 Troubleshooting Tips Boot Process

  •    3.11 Troubleshooting Tips for Windows System Issues

  •    3.12 Blue Screens and Spontaneous Shutdowns

  •    3.13 Troubleshooting Tips for File and Memory Corruption

  •    3.14 Safe Boot

  •    3.15 System Repair Disc

  •    3.16 System Restore

  •    3.17 Guidelines for Troubleshooting Windows Issues

Module 4 - Network Management Tools

  •    4.1 Network Management Tools

  •    4.2 Network Connectivity

  •    4.3 IP Addressing and Connection Types

  •    4.4 Proxy Settings

  •    4.5 Windows Client Configuration

  •    4.6 Location Services

  •    4.7 Firewalls

  •    4.8 Network Troubleshooting

  •    4.9 Remote Desktop Tools

  •    4.10 Desktop Management and Remote Monitoring Tools

  •    4.11 Disscussion Topics

Module 5 - Sharing Resources and Wrights Management

  •    5.1 Sharing Resources and Wrights Management

  •    5.2 User Group Accounts

  •    5.3 Local Secutity Policy

  •    5.4 SSO and Credential Manager

  •    5.5 Workgroups and Homegroups

  •    5.6 Network and Sharing Center

  •    5.7 Network Share Configuration

  •    5.8 NTSF File and Folder Permissions

  •    5.9 Configure Active Directory Accounts and Policies

  •    5.10 Domain Membership and Group Policy Objects

  •    5.11 Basic AD Functions

  •    5.12 Account Locks and Password Resets

Module 6 - Threats and Security Measures

  •    6.1 Threats and Security Measures

  •    6.2 Logical Security Concepts

  •    6.3 Encryption

  •    6.4 PKI and Certificates

  •    6.5 Execution Control

  •    6.6 NAC

  •    6.7 Discussing Logical Decurity Concepts

  •    6.8 Threats and Vulnerablilities

  •    6.9 Types of Password Attacks

  •    6.10 Discussing Threats and Vulnerabilities

  •    6.11 Physical Security Controls

  •    6.12 Discussing Physical Security Measures

Module 7 - Policies to Protect Data

  •    7.1 Policies to Protect Data

  •    7.2 Implement Security Best Practices

  •    7.3 Guidlines for Implementing Security Best Practices

  •    7.4 Discussing Security Best Practices Implementation

  •    7.5 Implement Data Protection Policies

  •    7.6 ACLs and Directory Permissions

  •    7.7 Full Disk Encryption

  •    7.8 Guildlines for Implementing Data Protection Policies

  •    7.9 Discussing Data Protection Policies

  •    7.10 Protect Data During Incident Response

  •    7.11 Discussing Data Protection During Incident Response

Module 8 - Prevent Malware and Security Threats

  •    8.1 Prevent Malware and Security Threats

  •    8.2 Detect, Remove, and Prevent Malware

  •    8.3 Trojan Horses and Spyware

  •    8.4 Sources of Malware Infection

  •    8.5 Best Practices for Malware Removal

  •    8.6 Discussing Detecting, Removing, and Preventing Malware Infections

  •    8.7 Troubleshoot Common Workstation Security Issues

  •    8.8 Discussing Troubleshoot Common Workstation Security Issues

Module 9 - Supporting and Troubleshooting Mobile Devices

  •    9.1 Supporting and Troubleshooting Mobile Devices

  •    9.2 Secure Mobile Devices

  •    9.3 IOT Internet of Things

  •    9.4 Discussing Mobile Device Security

  •    9.5 Troubleshoot Mobile Device Issues

  •    9.6 Mobile Device Security Troubleshooting

  •    9.7 Discussing Troubleshooting Mobile Devices

Module 10 - Implementing Operational Procedures

  •    10.1 Implementing Operational Procedures

  •    10.2 Environmental Impacts and Controls

  •    10.3 Discussing Environmental Impact and Controls

  •    10.4 Create and Maintain Documentation

  •    10.5 Discussing Documentation Creation and Maintenance

  •    10.6 Use Basic Change Management Best Practices

  •    10.7 Discussing Change Management Best Practices

  •    10.8 Implement Disaster Prevention and Recovery Methods

  •    10.9 Discussing Implement Disaster Prevention and Recovery Methods

  •    10.10 Basic Scripting Concepts

  •    10.11 Discussing Scripting

  •    10.12 Professionalism and Communication

  •    10.13 Discussing Professionalism and Communication Skills

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing

  •    11.2 Resources and Testing

  •    11.3 Joining a Domain with Windows 10

  •    11.4 Boot Order and BIOS

  •    11.5 Virtual Machine Install & Configure

  •    11.6 PC Teardown

  •    11.7 Exploring the Laptop

  •    11.8 Install Windows 10 Demonstration

CompTIA Network+ N10-008 Course Content

Module 0 - Course introduction

  •    0.1 Instructor Intro

  •    0.2 Course Overview

Module 1 - Networking Fundamentals

  •    1.1 Intro to Networking

  •    1.1.1 Activity: Creating a Network

  •    1.2 Common Terminology

  •    1.2.1 Activity: Examining Ports and Sockets

  •    1.3 OSI Model

  •    1.4 DoD Model

  •    1.4.1 Activity: Examining Network Layers

  •    1.5 TCP, UDP, IP

  •    1.5.1 Activity: Examining TCP

  •    1.5.2 Activity: Examining UDP

  •    1.5.3 Activity: Examining IP

  •    1.6 ICMP, IGMP, ARP

  •    1.6.1 Activity: Examining ICMP

  •    1.6.2 Activity: Examining ARP

  •    1.6.3 Activity: Examining IGMP

  •    1.7 Network Topologies

  •    1.8 Network Types

  •    1.9 Part 1: Network Characteristics

  •    1.9 Part 2: Network Characteristics

  •    1.10 Module 1 outro

Module 2 - Cables and Connectors

  •    2.1 Ethernet Standards

  •    2.2 Copper Cable Types

  •    2.3 Fiber Optic Cable Types

  •    2.4 Connector Types

  •    2.4.1 Activity: Selecting the Right Cable

  •    2.5 Media Converters and Transceivers

  •    2.6 Cable Management

  •    2.7 Module 2 Outro

Module 3 - Internet Protocol (IP)

  •    3.1 IPv4 Basics

  •    3.2 IP Packet and Interface Types

  •    3.2.1 Activity: Configuring Client IP Settings

  •    3.3 Binary Numbering System

  •    3.4 Classful and Classless Addressing

  •    3.5 Understanding CIDR Notation

  •    3.6 IPv4 Subnetting Method

  •    3.7 Verifying with Binary

  •    3.8 Finding Subnet IDs

  •    3.8.1 Activity: Subnetting a Class C Network

  •    3.9 The Delta in Action

  •    3.9.1 Activity: Subnetting With the Delta

  •    3.10 Subnetting Based on Hosts

  •    3.11 Subnetting in Other Octets

  •    3.12 Supernetting

  •    3.12.1 Activity: Supernetting

  •    3.13 IPv6

  •    3.14 IPv4 - IPv6 Transition Mechanisms

  •    3.15 Module 3 Outro

Module 4 - Layer 7 Protocols

  •    4.1 Remote Control Protocols

  •    4.2 File Sharing Protocols

  •    4.3 Web Protcols

  •    4.4 Email Protocols

  •    4.5 Database Protocols

  •    4.6 Voice Protocols

  •    4.7 Security Protocols

  •    4.8 Management Protocols

  •    4.9 Module 4 Outro

Module 5 - Network Services

  •    5.1 DHCP

  •    5.1.1 Activity: Configuring DHCP

  •    5.1.2 Activity: Configuring a DHCP Relay Agent

  •    5.2 DNS

  •    5.2.1 Activity: Configuring DNS - Part 1

  •    5.2.2 Activity: Configuring DNS - Part 2

  •    5.3 NTP

  •    5.4 Corporate and Datacenter Network Architecture

  •    5.5 Cloud Concepts and Connectivity Options

  •    5.6 Module 5 Outro

Module 6 - Networking Devices

  •    6.1 Introductory Concepts

  •    6.2 Repeaters and Hubs

  •    6.2.1 Activity: Connecting Devices with a Hub

  •    6.3 Bridges and Switches

  •    6.3.1 Activity: Connecting Devices with a Switch

  •    6.4 Routers and Multilayer Switches

  •    6.5 Security Devices

  •    6.6 Modems

  •    6.7 Module 6 Outro

Module 7 - Networked Devices

  •    7.1 IP Devices

  •    7.2 IoT

  •    7.2.1 Activity - Programming IoT Devices

  •    7.3 ICS/SCADA

  •    7.4 Module 7 Outro

Module 8 - Routing and Bandwidth Management

  •    8.1 Routing Basics

  •    8.1.1 Activity: Configuring Static Routes

  •    8.2 Packet Delivery on the Same Network

  •    8.3 IP Routing Across a Single Router

  •    8.4 IP Routing Across Multiple Hops

  •    8.4.1 Activity: Static Routes - CHALLENGE

  •    8.5 Route Selection

  •    8.6 RIP

  •    8.6.1 Activity: Configuring RIP - CHALLENGE

  •    8.7 OSPF

  •    8.8 EIGRP

  •    8.9 BGP

  •    8.10 NAT/PAT

  •    8.11 Bandwidth Management (with Module 8 Outro)

Module 9 - Ethernet Switching

  •    9.1 Ethernet Basics

  •    9.2 Switching Overview

  •    9.2.1 Activity: Examining a MAC Table

  •    9.3 VLANs

  •    9.3.1 Activity: Creating VLANs

  •    9.4 VLAN Trunking

  •    9.4.1 Activity: Configuring VLAN Trunking

  •    9.5 VLAN Routing

  •    9.5.1 Activity: Configuring VLAN Routing

  •    9.6 Contention Management

  •    9.7 Switchport Configuration (with Module 9 Outro)

Module 10 - Wireless Technologies

  •    10.1 Wireless Overview

  •    10.2 Radio Basics

  •    10.3 Modulation

  •    10.4 Wi-Fi Standards

  •    10.5 Antennas

  •    10.6 Wi-Fi Service Sets

  •    10.7 Wi-Fi Security

  •    10.8 Cellular

Module 11 Network Performance

  •    11.1 Monitoring Performance

  •    11.2 Common Metrics

  •    11.2.1 Activity: Examining Interface Statistics

  •    11.3 SNMP

  •    11.4 Netflow

  •    11.5 Network Security Monitoring (with Module 11 Outro)

Module 12 High Availability and Disaster Recovery

  •    12.1 HA and DR Concepts

  •    12.2 High Availability Mechanisms

  •    12.3 Disaster Recovery Mechanisms

  •    12.4 Facility and Infrastructure Support (with Module 12 Outro)

Module 13 Organizational Documents

  •    13.1 Plans and Procedures

  •    13.2 Security Policies

  •    13.3 Loss Prevention

  •    13.4 Common Agreements

  •    13.5 Common Documentation

  •    13.6 Structured Cabling - MDF and IDF

  •    13.7 Horizontal and Vertical Cabling

  •    13.7.1 Activity - Implementing Cable Management

  •    13.8 Labeling

  •    13.9 Surveys and Assessments (with Module 13 Outro)

Module 14 Network Security

  •    14.1 Common Security Concepts

  •    14.2 Common Attack Types

  •    14.3 Spoofing-based Attacks

  •    14.4 Hijacking and MITM

  •    14.5 Social Engineering

  •    14.6 Network Segmentation

  •    14.7 Private VLANs

  •    14.8 Single Organization Authentication

  •    14.9 Extending Authentication

  •    14.10 Authorization

  •    14.11 Network Device Hardening

  •    14.12 Wireless Security

  •    14.13 Remote Access Security

  •    14.14 IoT Security

  •    14.15 Physical Security (with Module 14 Outro)

Module 15 Network Troubleshooting

  •    15.1 Troubleshooting Methodology

  •    15.2 Physical Connectivity Issues

  •    15.3 Hardware Testing Tools

  •    15.3.1 Activity - Testing an Ethernet Cable

  •    15.3.2 Activity - Crimping on an RJ-45 Connector

  •    15.3.3 Activity - Punching Down Twisted Pair

  •    15.3.4 Activity - Using a Telephone Toner

  •    15.4 Understanding Electricity

  •    15.4.1 Activity - Checking Cable Continuity

  •    15.4.2 Activity - Testing DC Voltage

  •    15.4.3 Activity - Testing AC Voltage

  •    15.5 Twisted Pair Pinout Problems

  •    15.6 Twisted Pair Termination Problems

  •    15.7 Repairing Damaged Twisted Pair Cable

  •    15.8 Fiber Optic Connectivity Issues

  •    15.8.1 Activity - Testing a Fiber Optic Cable

  •    15.9 Common Port Problems

  •    15.9.1 Working with Ports and Their Devices

  •    15.10 Common Software Testing Tools

  •    15.10.1 Activity - Scanning for Open Ports

  •    15.11 Common Command Line Utilities

  •    15.12 Troubleshooting Basic IP Networking Issues

  •    15.13 Common Switching Issues

  •    15.14 Switching Test Tools and Techniques

  •    15.15 Common IP Routing Issues

  •    15.16 Wi-Fi Access Point Issues

  •    15.17 Wirelss Interference

  •    15.17.1 Activity - Using a Spectrum Analyzer

  •    15.18 Wireless Antenna Issues

  •    15.18.1 Activity - Configuring a Wi-Fi Router

  •    15.19 WAP Placement Strategies

  •    15.20 Infrastructure Service Issues (DHCP)

  •    15.21 Infrastructure Service Issues (DNS)

  •    15.22 Infrastructure Service Issues (NTP)

  •    15.23 Fireall / ACL Issues

  •    15.24 VPN Issues

  •    15.25 Additional Network Security Troubleshooting and Tips

  •    15.26 Advanced Networking Issues

  •    15.27 Troubleshooting Server Services (with Module 15 Outro)

  •    CompTIA Network+ N10-008 Course Outro

CompTIA Linux+ (XK0-004) Course Content

Module 1: Intro & Performing Basic Linux Tasks

  •    Instructor Introduction

  •    Course Introduction

  •    Identify The Linux Design Philosophy

  •    Enter Shell Commands

  •    Shell Commands Activity

  •    Get Help with Linux

Module 2: Managing Users and Groups

  •    Assume Superuser and Groups

  •    Create, Modify, and Delete Users

  •    Create, Modify, and Delete Groups

  •    Query Users and Groups

  •    Configure Account Profiles

Module 3: Managing Permissions and Ownership

  •    Modify File and Directory Permissions

  •    Modify File and Directory Ownership

  •    Configure Special Permissions and Attributes

  •    Troubleshoot Permissions Issues

Module 4: Managing Storage

  •    Create Partitions

  •    Manage Logical Volumes

  •    Mount File Systems

  •    Manage File Systems

  •    Navigate the Linux Directory Structure

  •    Troubleshoot Storage Issues

Module 5: Managing Files and Directories

  •    Create and Edit Text Files

  •    Search for Files

  •    Perform Operations on Files and Directories

  •    Process Text Files

  •    Manipulate File Output

Module 6: Managing Kernel Modules

  •    Explore the Linux Kernel

  •    Install and Configure Kernel Modules

  •    Monitor Kernel Modules

Module 7: Managing the Linux Boot Process

  •    Configure Linux Boot Components

  •    Configure GRUB

Module 8: Managing System Components

  •    Configure Localization Options

  •    Configure GUIs

  •    Manage Services

  •    Troubleshoot Process Issues

  •    Troubleshoot CPU and Memory Issues

Module 9: Managing Devices

  •    Identify the Types of Linux

  •    Configure Devices

  •    Monitor Devices

  •    Troubleshoot Hardware Issues

Module 10: Managing Networking

  •    Identify TCP/IP Fundamentals

  •    Identify Linux Server Roles

  •    Connect to a Network

  •    Configure DHCP and DNS Client Services

  •    Configure Cloud and Virtualization Technologies

  •    Troubleshoot Networking Issues

Module 11: Managing Packages and Software

  •    Identify Package Managers

  •    Manage RPM Packages with YUM

  •    Manage Debian Packages with APT

  •    Configure Repositories

  •    Acquire Software

  •    Build Software from Source Code

  •    Troubleshoot Software Dependency Issues

Module 12: Securing Linux Systems

  •    Implement Cybersecurity Best Practices

  •    Implement Identity and Access Management Methods

  •    Configure SELinux or AppArmor

  •    Configure Firewalls

  •    Implement Logging Services

  •    Back Up, Restore, and Verify Data

Module 13: Working with Bash Scripts

  •    Customize the Bash Shell Environment

  •    Identify Scripting and Programming Fundamentals

  •    Write and Execute a Simple Bash Script

  •    Incorporate Control Statements in Bash Scripts

Module 14: Automating Tasks

  •    Schedule Jobs

  •    Implement Version Control Using Git

  •    Identify Orchestration Concepts

Module 15: Installing Linux

  •    Prepare for Linux Installation

  •    Perform the Installation

CompTIA PenTest+ (PT0-001) Course Content

Module 1 - The Pen Test Engagement

  •    Module 1 Notes

  •    1.0 PenTest Plus Introduction

  •    1.1 PenTest Plus Topics

  •    1.2 PenTest Engagement

  •    1.3 Threat Modeling

  •    1.4 Technical Constraints

  •    1.5 PenTest Engagement Review

  •    1.6 Examining PenTest Engagement Documents Act

Module 2 - Passive Reconnaissance

  •    Module 2 Notes

  •    2.1 Passive Reconnaissance part1

  •    2.2 WHOIS Act

  •    2.3 Passive Reconnaissance part2

  •    2.4 Google Hacking Act

  •    2.5 Passive Reconnaissance part3

  •    2.6 DNS Querying Act

  •    2.7 Passive Reconnaissance part4

  •    2.8 Email Server Querying Act

  •    2.9 SSL-TLS Cerfificates

  •    2.10 Shodan Act

  •    2.11 The Havester

  •    2.12 TheHarvester Act

  •    2.13 Recon-ng

  •    2.14 Recon-g Act

  •    2.14 Recon-ng-Part-2-API-key Act

  •    2.15 Maltego

  •    2.16 Have I been Pwned

  •    2.17 Punked and Owned Pwned Act

  •    2.18 Fingerprinting Organization with Collected Archives

  •    2.19 FOCA Act

  •    2.20 Findings Analysis Weaponization

  •    2.21 Chp 2 Review

Module 3 - Active Reconnaissance

  •    Module 3 Notes

  •    3.1 Active Reconnaissannce

  •    3.2 Discovery Scans Act

  •    3.3 Nmap

  •    3.4 Nmap Scans Types Act

  •    3.5 Nmap Options

  •    3.6 Nmap Options Act

  •    3.7 Stealth Scans

  •    3.8 Nmap Stealth Scans Act

  •    3.9 Full Scans

  •    3.10 Full Scans Act

  •    3.11 Packet Crafting

  •    3.12 Packet Crafting Act

  •    3.13 Network Mapping

  •    3.14 Metasploit

  •    3.15 Scanning with Metasploit Act

  •    3.16 Enumeration

  •    3.17 Banner Grabbing Act

  •    3.18 Windows Host Enumeration

  •    3.19 Winddows Host Enumeration Act

  •    3.20 Linux Host Enumeration

  •    3.21 Linux Host Enumeration Act

  •    3.22 Service Enumeration

  •    3.23 Service Enumeration Act

  •    3.24 Network Shares

  •    3.25 SMB Share Enumeration Act

  •    3.26 NFS Network Share Enumeration

  •    3.27 NFS Share Enumeration Act

  •    3.28 Null Sessions

  •    3.29 Null Sessions Act

  •    3.30 Website Enumeration

  •    3.31 Website Enumeration Act

  •    3.32 Vulnerability Scans

  •    3.33 Compliance Scans Act

  •    3.34 Credentialed Non-credentialed Scans

  •    3.35 Using Credentials in Scans Act

  •    3.36 Server Service Vulnerability Scan

  •    3.37 Vulnerability Scanning Act

  •    3.38 Web Server Database Vulnerability Scan

  •    3.39 SQL Vulnerability Scanning Act

  •    3.40 Vulnerability Scan Part 2 OpenVAS Act

  •    3.41 Web App Vulnerability Scan

  •    3.42 Web App Vulnerability Scanning Act

  •    3.43 Network Device Vulnerability Scan

  •    3.44 Network Device Vuln Scanning Act

  •    3.45 Nmap Scripts

  •    3.46 Using Nmap Scripts for Vuln Scanning Act

  •    3.47 Packet Crafting for Vulnerbility Scans

  •    3.48 Firewall Vulnerability Scans

  •    3.49 Wireless Access Point Vunerability

  •    3.50 Wireless AP Scans Act

  •    3.51 WAP Vulnerability Scans

  •    3.52 Container Security issues

  •    3.53 How to Update Metasploit Pro Expired Trial License

Module 4 - Physical Security

  •    Module 4 Notes

  •    4.1 Physical Security

  •    4.2 Badge Cloning Act

  •    4.3 Physical Security Review

Module 5 - Social Engineering

  •    Module 5 Notes

  •    5.1 Social Engineering

  •    5.2 Using Baited USB Stick Act

  •    5.3 Using Social Enginnering to Assist Attacks

  •    5.4 Phishing Act

  •    5.5 Social Engineering Review

Module 6 - Vulnerability Scan Analysis

  •    Module 6 Notes

  •    6.1 Vulnerbility Scan Analysis

  •    6.2 Validating Vulnerability Scan Results Act

  •    6.3 Vulnerbility Scan Analysis Review

Module 7 - Password Cracking

  •    Module 7 Notes

  •    7.1 Password Cracking

  •    7.2 Brute Force Attack Against Network Service Act

  •    7.3 Network Authentication Interception Attack

  •    7.4 Intercepting Network Authentication Act

  •    7.5 Pass the Hash Attacks

  •    7.6 Pass the Hash Act

  •    7.7 Password Cracking Review

Module 8 - Penetrating Wired Networks

  •    Module 8 Notes

  •    8.1 Penetrating Wired Network

  •    8.2 Sniffing Act

  •    8.3 Eavesdropping

  •    8.4 Eavesdropping Act

  •    8.5 ARP Poisoning

  •    8.6 ARP Poisoning Act

  •    8.7 Man In The Middle

  •    8.8 MITM Act

  •    8.9 TCP Session HiJacking

  •    8.10 Server Message Blocks SMB Exploits

  •    8.11 SMB Attack Act

  •    8.12 Web Server Attacks

  •    8.13 FTP Attacks

  •    8.14 Telnet Server Attacks

  •    8.15 SSH Server Attacks

  •    8.16 Simple Network Mgmt Protocol SNMP

  •    8.17 Simple Mail Transfer Protocol SMTP

  •    8.18 Domain Name System DNS Cache Poisoning

  •    8.19 Denail of Service Attack DoS-DDoS

  •    8.20 DoS Attack Act

  •    8.21 VLAN Hopping Review

Module 9 - Penetrating Wireless Networks

  •    Module 9 Notes

  •    9.1 Penetrating Wireless Networks

  •    9.2 Jamming Act

  •    9.3 Wireless Sniffing

  •    9.4 Replay Attacks

  •    9.5 WEP Cracking Act

  •    9.6 WPA-WPA2 Cracking

  •    9.7 WAP Cracking Act

  •    9.8 Evil Twin Attacks

  •    9.9 Evil Twin Attack Act

  •    9.10 WiFi Protected Setup

  •    9.11 Bluetooth Attacks

  •    9.12 Penetrating Wireless Networks

Module 10 - Windows Exploits

  •    Module 10 Notes

  •    10.1 Windows Exploits

  •    10.2 Dumping Stored Passwords Act

  •    10.3 Dictionary Attacks

  •    10.4 Dictionary Attack Against Windows Act

  •    10.5 Rainbow Table Attacks

  •    10.6 Credential Brute Force Attacks

  •    10.7 Keylogging Attack Act

  •    10.8 Windows Kernel

  •    10.9 Kernel Attack Act

  •    10.10 Windows Components

  •    10.11 Memory Vulnerabilities

  •    10.12 Buffer Overflow Attack Act

  •    10.13 Privilegde Escalation in Windows

  •    10.14 Windows Accounts

  •    10.15 Net and WMIC Commands

  •    10.16 Sandboxes

Module 11 - Linux Exploits

  •    Module 11 Notes

  •    11.1 Linux Exploits

  •    11.2 Exploiting Common Linux Features Act

  •    11.3 Password Cracking in Linux

  •    11.4 Cracking Linux Passwords Act

  •    11.5 Vulnerability Linux

  •    11.6 Priviledge Escalation Linux

  •    11.7 Linux Accounts

  •    11.8 Linux Exploits Review

Module 12 - Mobile Devices

  •    Module 12 Notes

  •    12.1 Mobile Devices

  •    12.2 Hacking Android Act

  •    12.3 Apple Exploits

  •    12.4 Moblie Devices Review

Module 13 - Specialized Systems

  •    Module 13 Notes

  •    13.1 Specialized Systems

  •    13.2 Specialized Systems Review

Module 14 - Scripts

  •    Module 14 Notes

  •    14.1 Scripts

  •    14.2 Powershell

  •    14.3 Python

  •    14.4 Ruby

  •    14.5 Common Scripting Elements

  •    14.6 Scripts Review

  •    14.7 Better Ping Sweep

  •    14.8 Simple Port Scanner2

  •    14.9 Multitarget Port Scanner

  •    14.10 Port Scanner with Nmap

  •    14.11 Scripts Review

Module 15 - Application Testing

  •    Module 15 Notes

  •    15.1 Application Testing

  •    15.2 Reverse Engineering

Module 16 - Web App Exploits

  •    Module 16 Notes

  •    16.1 Webb App Exploits

  •    16.2 Injection Attacks

  •    16.3 HTML Injection

  •    16.4 SQL Hacking - SQLmap Act

  •    16.5 Cross-Site Attacks

  •    16.6 Cross-Site Request Forgery

  •    16.7 Other Web-based Attacks

  •    16.8 File Inclusion Attacks

  •    16.9 Web Shells

  •    16.10 Web Shells Review

Module 17 - Lateral Movement

  •    Module 17 Notes

  •    17.1 Lateral Movement

  •    17.2 Lateral Movement with Remote Mgmt Services

  •    17.3 Process Migration Act

  •    17.4 Passing Control Act

  •    17.5 Pivoting

  •    17.6 Tools the Enable Pivoting

  •    17.7 Lateral Movement Review

Module 18 - Persistence

  •    Module 18 Notes

  •    18.1 Persistence

  •    18.2 Breeding RATS Act

  •    18.3 Bind and Reverse Shells

  •    18.4 Bind Shells Act

  •    18.5 Reverse Shells

  •    18.6 Reverse Shells Act

  •    18.7 Netcat

  •    18.8 Netcat Act

  •    18.9 Scheduled Tasks

  •    18.10 Scheduled Tasks Act

  •    18.11 Services and Domains

  •    18.12 Persistence Review

Module 19 - Cover Your Tracks

  •    Module 19 Notes

  •    19.1 Cover Your Tracks

  •    19.2 Cover Your Tracks - Timestomp Files Act

  •    19.3 Cover Your Tracks - Frame the Administrator Act

  •    19.4 Cover Your Tracks - Clear the Event Log Act

  •    19.5 Cover Your Tracks Review

Module 20 - The Report

  •    Module 20 Notes

  •    20.1 The Report

  •    20.2 The Report Review

Module 21 - Post Engagement Cleanup

  •    Module 21 Notes

  •    21.1 Post Engagement Cleanup_1

  •    21.3 Post Engagement Cleanup Review

  •    21.4 PenTest Plus Conclusion.mp4

security-plus-701
Free CompTIA Security+ SY0-701 Certification Course : Master Cybersecurity Concepts

$0.00

Related Courses

ON SALE 60% OFF
ON SALE 60% OFF
CEH Career Path

$51.60

This advanced training series teaches you the skills needed to detect vulnerabilities and weaknesses in computer systems and networks. 
Add To Cart
ON SALE 40% OFF
ON SALE 40% OFF
Certified Ethical Hacker V11

$47.40

Become a certified ethical hacker with our affordable online course. Learn the skills needed to detect and prevent cyber attacks at ITU Online.

This 3 Course online cyber security ethical hacking program is the first step in becoming an ethical hacker. You will learn advanced hacking concepts how to select the appropriate tools for a cybersecurity penetration test and understand why they work. This class features real-world examples, walkthroughs of scenarios, and hands-on learning opportunities.

Add To Cart

$59.00

Learn how to manage cloud infrastructure with CompTIA Cloud Admin Professional (CCAP) online course. Get certified with ITU Online.

IT professionals with 2-5 years of experience can gain the valuable CompTIA CCAP certification by following their Certification Path. This comprehensive study guide will provide you with all the essential learning materials and advice needed to ace both your CompTIA Network+ and Cloud+ exams, giving you a competitive edge in today’s ever-evolving tech industry.

Add To Cart

$49.00

Become a Microsoft-certified expert in Lync Server with ITU’s 70-336 course. Get the skills you need to build and manage a unified communications solution.

In this Microsoft 70-336: MCSE Core Solutions Lync Server course you will learn how to design, plan, deploy, and maintain solutions for unified communications (UC). You will learn how to be proficient in deploying Lync Server solutions for end users, endpoint devices, telephony, audio/video and web conferences, security, and high availability. This course will also teach you how to monitor and troubleshoot Lync Server using Microsoft tools.

Add To Cart