Curriculum
- 1 Section
- 52 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- CompTIA Security+ SY0-601 | Eng-Ahmed Sultan | Arabic52
- 2.1Security+ (SY0-601) Course Introduction41 Minutes
- 2.2Comparing Security Roles and Security Controls38 Minutes
- 2.3Explaining Threat Actors and Threat Intelligence58 Minutes
- 2.4Performing Security Assessments – Part 160 Minutes
- 2.5Performing Security Assessments – Part 2 (Exploring the Lab Environment Lab)30 Minutes
- 2.6Performing Security Assessments – Part 3 (Scanning and Identifying Network Nodes Lab)33 Minutes
- 2.7Performing Security Assessments – Part 434 Minutes
- 2.8Performing Security Assessments – Part 5 (Intercepting and Interpreting Network Traffic Lab)31 Minutes
- 2.9Performing Security Assessments – Part 660 Minutes
- 2.10Performing Security Assessments – Part 7 ( Credentialed Vulnerability Scan Lab)26 Minutes
- 2.11Identifying Social Engineering and Malware – Part 147 Minutes
- 2.12Identifying Social Engineering and Malware – Part 256 Minutes
- 2.13Identifying Social Engineering and Malware – Part 3 (Malware-based Backdoor Lab)28 Minutes
- 2.14Summarizing Basic Cryptographic Concepts101 Minutes
- 2.15Implementing Public Key Infrastructure – Part 163 Minutes
- 2.16Implementing Public Key Infrastructure – Part 2 (Managing the Lifecycle of a Certificate Lab)33 Minutes
- 2.17Implementing Authentication Controls – Part 182 Minutes
- 2.18Implementing Authentication Controls – Part 2 (Password Cracking Lab)36 Minutes
- 2.19Implementing Identity and Account Management Controls – Part 179 Minutes
- 2.20Implementing Authentication Controls – Part 3 (Managing Centralized Authentication Lab)31 Minutes
- 2.21Implementing Identity and Account Management Controls – Part 2 (Access Controls Lab)34 Minutes
- 2.22Implementing Identity and Account Management Controls – Part 3 (Auditing Policies Lab)34 Minutes
- 2.23Implementing Identity and Account Management Controls – Part 4 (Access Controls in Linux Lab)36 Minutes
- 2.24Implementing Secure Network Designs – Part 158 Minutes
- 2.25Implementing Secure Network Designs – Part 281 Minutes
- 2.26Implementing Secure Network Designs – Part 3 (Implementing a Secure Network Design Lab)32 Minutes
- 2.27Implementing Network Security Appliances – Part 167 Minutes
- 2.28Implementing Network Security Appliances – Part 2 (Configuring a Firewall Lab)23 Minutes
- 2.29Implementing Network Security Appliances – Part 3 (Intrusion Detection System Lab)36 Minutes
- 2.30Implementing Secure Network Protocols – Part 165 Minutes
- 2.31Implementing Secure Network Protocols – Part 2 (Secure Network Addressing Services Lab)26 Minutes
- 2.32Implementing Secure Network Protocols – Part 3 (Implementing a Virtual Private Network Lab)22 Minutes
- 2.33Implementing Secure Network Protocols – Part 4 (Implementing a Secure SSH Server Lab)42 Minutes
- 2.34Implementing Host Security Solutions – Part 118 Minutes
- 2.35Implementing Host Security Solutions – Part 2 (Implementing Endpoint Protection Lab)23 Minutes
- 2.36Implementing Secure Mobile Solutions26 Minutes
- 2.37Summarizing Secure Application Concepts – Part 156 Minutes
- 2.38Summarizing Secure Application Concepts – Part 2 (Application Attack Indicators Lab)30 Minutes
- 2.39Summarizing Secure Application Concepts – Part 3 (Identifying a Browser Attack Lab)35 Minutes
- 2.40Summarizing Secure Application Concepts – Part 4 (Implementing PowerShell Security Lab)34 Minutes
- 2.41Summarizing Secure Application Concepts – Part 5 (Identifying Malicious Code Lab)25 Minutes
- 2.42Implementing Secure Cloud Solutions50 Minutes
- 2.43Explaining Data Privacy and Protection Concepts25 Minutes
- 2.44Performing Incident Response – Part 160 Minutes
- 2.45Performing Incident Response – Part 2 (Managing Data Sources for Incident Response Lab)42 Minutes
- 2.46Performing Incident Response – Part 3 (Configuring Mitigation Controls Lab)19 Minutes
- 2.47Explaining Digital Forensics – Part 112 Minutes
- 2.48Explaining Digital Forensics – Part 2 (Acquiring Digital Forensics Evidence Lab)35 Minutes
- 2.49Summarizing Risk Management Concepts44 Minutes
- 2.50Implementing Cybersecurity Resilience – Part 112 Minutes
- 2.51Implementing Cybersecurity Resilience – Part 2 (Backing Up Data in Windows and Linux Lab)24 Minutes
- 2.52Explaining Physical Security17 Minutes
Course Features
- Lectures 52
- Quiz 0
- Duration 50 hours
- Skill level All levels
- Language English
- Students 276
- Assessments Yes