CompTIA Security+ SY0-601
Free

-
CompTIA Security+ SY0-601 | Eng-Ahmed Sultan | Arabic
- Security+ (SY0-601) Course Introduction
- Comparing Security Roles and Security Controls
- Explaining Threat Actors and Threat Intelligence
- Performing Security Assessments – Part 1
- Performing Security Assessments – Part 2 (Exploring the Lab Environment Lab)
- Performing Security Assessments – Part 3 (Scanning and Identifying Network Nodes Lab)
- Performing Security Assessments – Part 4
- Performing Security Assessments – Part 5 (Intercepting and Interpreting Network Traffic Lab)
- Performing Security Assessments – Part 6
- Performing Security Assessments – Part 7 ( Credentialed Vulnerability Scan Lab)
- Identifying Social Engineering and Malware – Part 1
- Identifying Social Engineering and Malware – Part 2
- Identifying Social Engineering and Malware – Part 3 (Malware-based Backdoor Lab)
- Summarizing Basic Cryptographic Concepts
- Implementing Public Key Infrastructure – Part 1
- Implementing Public Key Infrastructure – Part 2 (Managing the Lifecycle of a Certificate Lab)
- Implementing Authentication Controls – Part 1
- Implementing Authentication Controls – Part 2 (Password Cracking Lab)
- Implementing Identity and Account Management Controls – Part 1
- Implementing Authentication Controls – Part 3 (Managing Centralized Authentication Lab)
- Implementing Identity and Account Management Controls – Part 2 (Access Controls Lab)
- Implementing Identity and Account Management Controls – Part 3 (Auditing Policies Lab)
- Implementing Identity and Account Management Controls – Part 4 (Access Controls in Linux Lab)
- Implementing Secure Network Designs – Part 1
- Implementing Secure Network Designs – Part 2
- Implementing Secure Network Designs – Part 3 (Implementing a Secure Network Design Lab)
- Implementing Network Security Appliances – Part 1
- Implementing Network Security Appliances – Part 2 (Configuring a Firewall Lab)
- Implementing Network Security Appliances – Part 3 (Intrusion Detection System Lab)
- Implementing Secure Network Protocols – Part 1
- Implementing Secure Network Protocols – Part 2 (Secure Network Addressing Services Lab)
- Implementing Secure Network Protocols – Part 3 (Implementing a Virtual Private Network Lab)
- Implementing Secure Network Protocols – Part 4 (Implementing a Secure SSH Server Lab)
- Implementing Host Security Solutions – Part 1
- Implementing Host Security Solutions – Part 2 (Implementing Endpoint Protection Lab)
- Implementing Secure Mobile Solutions
- Summarizing Secure Application Concepts – Part 1
- Summarizing Secure Application Concepts – Part 2 (Application Attack Indicators Lab)
- Summarizing Secure Application Concepts – Part 3 (Identifying a Browser Attack Lab)
- Summarizing Secure Application Concepts – Part 4 (Implementing PowerShell Security Lab)
- Summarizing Secure Application Concepts – Part 5 (Identifying Malicious Code Lab)
- Implementing Secure Cloud Solutions
- Explaining Data Privacy and Protection Concepts
- Performing Incident Response – Part 1
- Performing Incident Response – Part 2 (Managing Data Sources for Incident Response Lab)
- Performing Incident Response – Part 3 (Configuring Mitigation Controls Lab)
- Explaining Digital Forensics – Part 1
- Explaining Digital Forensics – Part 2 (Acquiring Digital Forensics Evidence Lab)
- Summarizing Risk Management Concepts
- Implementing Cybersecurity Resilience – Part 1
- Implementing Cybersecurity Resilience – Part 2 (Backing Up Data in Windows and Linux Lab)
- Explaining Physical Security