• Home
  • Courses
  • Certification
  • Blog
  • Youtube Channel
  • Contact

Have any question?

[email protected]
Login
Free4arab
  • Home
  • Courses
  • Certification
  • Blog
  • Youtube Channel
  • Contact

CompTIA

  • Home
  • All courses
  • CompTIA
  • CompTIA Security+ SY0-601

CompTIA Security+ SY0-601

User Avatar
Ahmed Sultan
CompTIA
(0 review)
Free
CompTIA-Security+-SY0-601—ahmed-sultan—free4arab
  • Curriculum
  • Instructor
  • Reviews
CoursesCompTIACompTIA Security+ SY0-601
  • CompTIA Security+ SY0-601 | Eng-Ahmed Sultan | Arabic
    52
    • Lecture1.1
      Security+ (SY0-601) Course Introduction 41 min
    • Lecture1.2
      Comparing Security Roles and Security Controls 38 min
    • Lecture1.3
      Explaining Threat Actors and Threat Intelligence 58 min
    • Lecture1.4
      Performing Security Assessments – Part 1 01 hour
    • Lecture1.5
      Performing Security Assessments – Part 2 (Exploring the Lab Environment Lab) 30 min
    • Lecture1.6
      Performing Security Assessments – Part 3 (Scanning and Identifying Network Nodes Lab) 33 min
    • Lecture1.7
      Performing Security Assessments – Part 4 34 min
    • Lecture1.8
      Performing Security Assessments – Part 5 (Intercepting and Interpreting Network Traffic Lab) 31 min
    • Lecture1.9
      Performing Security Assessments – Part 6 01 hour
    • Lecture1.10
      Performing Security Assessments – Part 7 ( Credentialed Vulnerability Scan Lab) 26 min
    • Lecture1.11
      Identifying Social Engineering and Malware – Part 1 47 min
    • Lecture1.12
      Identifying Social Engineering and Malware – Part 2 56 min
    • Lecture1.13
      Identifying Social Engineering and Malware – Part 3 (Malware-based Backdoor Lab) 28 min
    • Lecture1.14
      Summarizing Basic Cryptographic Concepts 01 hour 41 min
    • Lecture1.15
      Implementing Public Key Infrastructure – Part 1 01 hour 03 min
    • Lecture1.16
      Implementing Public Key Infrastructure – Part 2 (Managing the Lifecycle of a Certificate Lab) 33 min
    • Lecture1.17
      Implementing Authentication Controls – Part 1 01 hour 22 min
    • Lecture1.18
      Implementing Authentication Controls – Part 2 (Password Cracking Lab) 36 min
    • Lecture1.19
      Implementing Identity and Account Management Controls – Part 1 01 hour 19 min
    • Lecture1.20
      Implementing Authentication Controls – Part 3 (Managing Centralized Authentication Lab) 31 min
    • Lecture1.21
      Implementing Identity and Account Management Controls – Part 2 (Access Controls Lab) 34 min
    • Lecture1.22
      Implementing Identity and Account Management Controls – Part 3 (Auditing Policies Lab) 34 min
    • Lecture1.23
      Implementing Identity and Account Management Controls – Part 4 (Access Controls in Linux Lab) 36 min
    • Lecture1.24
      Implementing Secure Network Designs – Part 1 58 min
    • Lecture1.25
      Implementing Secure Network Designs – Part 2 01 hour 21 min
    • Lecture1.26
      Implementing Secure Network Designs – Part 3 (Implementing a Secure Network Design Lab) 32 min
    • Lecture1.27
      Implementing Network Security Appliances – Part 1 01 hour 07 min
    • Lecture1.28
      Implementing Network Security Appliances – Part 2 (Configuring a Firewall Lab) 23 min
    • Lecture1.29
      Implementing Network Security Appliances – Part 3 (Intrusion Detection System Lab) 36 min
    • Lecture1.30
      Implementing Secure Network Protocols – Part 1 01 hour 05 min
    • Lecture1.31
      Implementing Secure Network Protocols – Part 2 (Secure Network Addressing Services Lab) 26 min
    • Lecture1.32
      Implementing Secure Network Protocols – Part 3 (Implementing a Virtual Private Network Lab) 22 min
    • Lecture1.33
      Implementing Secure Network Protocols – Part 4 (Implementing a Secure SSH Server Lab) 42 min
    • Lecture1.34
      Implementing Host Security Solutions – Part 1 18 min
    • Lecture1.35
      Implementing Host Security Solutions – Part 2 (Implementing Endpoint Protection Lab) 23 min
    • Lecture1.36
      Implementing Secure Mobile Solutions 26 min
    • Lecture1.37
      Summarizing Secure Application Concepts – Part 1 56 min
    • Lecture1.38
      Summarizing Secure Application Concepts – Part 2 (Application Attack Indicators Lab) 30 min
    • Lecture1.39
      Summarizing Secure Application Concepts – Part 3 (Identifying a Browser Attack Lab) 35 min
    • Lecture1.40
      Summarizing Secure Application Concepts – Part 4 (Implementing PowerShell Security Lab) 34 min
    • Lecture1.41
      Summarizing Secure Application Concepts – Part 5 (Identifying Malicious Code Lab) 25 min
    • Lecture1.42
      Implementing Secure Cloud Solutions 50 min
    • Lecture1.43
      Explaining Data Privacy and Protection Concepts 25 min
    • Lecture1.44
      Performing Incident Response – Part 1 01 hour
    • Lecture1.45
      Performing Incident Response – Part 2 (Managing Data Sources for Incident Response Lab) 42 min
    • Lecture1.46
      Performing Incident Response – Part 3 (Configuring Mitigation Controls Lab) 19 min
    • Lecture1.47
      Explaining Digital Forensics – Part 1 12 min
    • Lecture1.48
      Explaining Digital Forensics – Part 2 (Acquiring Digital Forensics Evidence Lab) 35 min
    • Lecture1.49
      Summarizing Risk Management Concepts 44 min
    • Lecture1.50
      Implementing Cybersecurity Resilience – Part 1 12 min
    • Lecture1.51
      Implementing Cybersecurity Resilience – Part 2 (Backing Up Data in Windows and Linux Lab) 24 min
    • Lecture1.52
      Explaining Physical Security 17 min
author avatar
Ahmed Sultan

• Cisco Certified Network Associate (CCNA) Academy / Press
• Cisco Certified Network Associate Security (CCNA Security)
• Cisco Certified Network Associate Wireless (CCNA Wireless)
• Cisco Certified Network Professional Security (CCNP Security)
• Security+
• CCIE Security - Written
• Cisco Iron Port Certified Security Associate - Web
• Cisco Iron Port Certified Security Professional - Web
• Cisco ASA Specialist
• Cisco Firewall Security Specialist
• Cisco IOS Security Specialist
• Cisco IPS Specialist
• Cisco VPN Specialist
• Cisco Advanced Security Field Specialist
• Fortinet 3&4
• F5 CA

WORK SKILLS

Configuring Cisco Routers 800 / 1700/ 1800 / 2600 / 2800 / 3600 / 3800 /7200 series
Configuring Cisco Switches C2950 / C2960 / C3560 / C3750
Implementing Cisco PIX 501 / 506 / 515 / 525 and ASA 5505 / 5510 / 5520 / 5540 firewalls
Configuring Cisco ACS (4.x, 5.x)
Configuring Cisco Wireless Control System – Aironet APs and controllers
Implemented Routing Protocol (OSPF, EIGRP, RIP, IS-IS, BGB), Routed Protocol (TCP/IP)
Implementing VLANs / STP / RSTP / Etherchannel / MST
Securing VLANs, switch access, IDS, IPS
Implementing VPNs – GRE / IPSec / DMVPN / SSL / MPLS
Implementing SNMP on devices to allow for network management.
Implementing traffic filters using Standard and Extended access-lists.
Implementing VTP, STP, SIP, DHCP, DNS, FTP, TFTP, 802.1x.
Implementing Port Security on Cisco Switches.
Implementing Frame-Relay connections in two sites.
Implementing VPN Connections (Site to Site VPN, Remote Access VPN)
Implementing Microsoft Windows Servers 2003 / 2008/2012
Implementing Active Directory Domains and Groups.
Implementing ISA Server 2003/2006.
Configuring Juniper switches EX Series
Deploying VMware ESXI and vSphere (New)
Implementing Microsoft Lync 2013 Services (New)
Configuring Cisco ISE and TrutSec (New)

Reviews

Average Rating

0
0 rating

Detailed Rating

5
0%
4
0%
3
0%
2
0%
1
0%
  • Curriculum
  • Instructor
  • Reviews
Free
  • Share:

You May Like

Malware Analysis & Development Read More
Amr Thabet

Malware Analysis & Development

3
0
Free
Kaspersky Security Cloud for Microsoft Office 365 Read More
Remon Abuelezz

Kaspersky Security Cloud for Microsoft Office 365

7
0
Free
eLearnSecurity Junior Penetration Tester (eJPT) Read More
Ahmed Sultan

eLearnSecurity Junior Penetration Tester (eJPT)

160
0
Free
Computing & Security Essentials Read More
Mostafa Abd ElSalam

Computing & Security Essentials

56
0
Free
Ethical Hacking Read More
Mostafa Abd ElSalam

Ethical Hacking

312
0
Free

Leave A Reply Cancel reply

You must be logged in to post a comment.

All Courses

  • (ISC)²
  • Adobe
  • Amazon
  • Artificial intelligence
  • Cisco
  • CompTIA
  • Digital Marketing
  • EC-Council
  • eLearnSecurity
  • Entrepreneurship
  • Fortinet
  • Graphic
  • ISACA
  • IT Management and governance
  • Java
  • Language
  • Linux
  • Microsoft
  • MikroTik
  • Oracle
  • Other
  • Programming
  • Security
  • Virtualization
  • VMware
  • Web Design and Development

Latest Courses

Certified Ethical Hacker (CEH) v10

Certified Ethical Hacker (CEH) v10

Free
Certified Information Systems Security Professional (CISSP)

Certified Information Systems Security Professional (CISSP)

Free
Python for Beginners

Python for Beginners

Free




Copyright © 2020 Free4arab. All rights reserved.

Login with your site account

Lost your password?

Modal title

Message modal