Training Video Course

SY0-601: CompTIA Security+

PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The SY0-601 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA SY0-601 test with flying colors.

Rating
4.31rating
Students
91
Duration
23:58:00 h
$16.49
$14.99

Curriculum for SY0-601 Certification Video Course

Name of Video Time
Play Video: SY0-501 vs. SY0-601
1. SY0-501 vs. SY0-601
1:00
Play Video: Exam Information
2. Exam Information
6:00
Play Video: Building a lab
3. Building a lab
8:00
Name of Video Time
Play Video: CIA Triade
1. CIA Triade
5:00
Play Video: IAAA
2. IAAA
5:00
Play Video: Basic security controls
3. Basic security controls
2:00
Name of Video Time
Play Video: Phishing, Smishing, Vishing, Spear phishing, Whaling
1. Phishing, Smishing, Vishing, Spear phishing, Whaling
11:00
Play Video: Dumpster diving and Shoulder surfing
2. Dumpster diving and Shoulder surfing
5:00
Play Video: Eliciting information and the principles of social engineering
3. Eliciting information and the principles of social engineering
9:00
Play Video: Pharming
4. Pharming
7:00
Play Video: Spam
5. Spam
4:00
Play Video: Tailgating
6. Tailgating
3:00
Play Video: Other types Social Engineer techniques
7. Other types Social Engineer techniques
15:00
Name of Video Time
Play Video: Introduction to Malware
1. Introduction to Malware
2:00
Play Video: Ransomeware and Cryptomalware
2. Ransomeware and Cryptomalware
7:00
Play Video: Trojans and RAT's
3. Trojans and RAT's
6:00
Play Video: Bot and Command and control
4. Bot and Command and control
4:00
Play Video: Fileless Virus, Logic bombs, spyware, rootkit, backdoor
5. Fileless Virus, Logic bombs, spyware, rootkit, backdoor
5:00
Play Video: Adversarial artificial intelligence (AI)
6. Adversarial artificial intelligence (AI)
6:00
Play Video: Malicious USB cables, drives and Card Cloning
7. Malicious USB cables, drives and Card Cloning
4:00
Play Video: Supply chain attacks
8. Supply chain attacks
4:00
Play Video: Keyloggers
9. Keyloggers
16:00
Play Video: How passwords are stored
10. How passwords are stored
5:00
Play Video: Using hashcat to crack passwords
11. Using hashcat to crack passwords
7:00
Play Video: Using a brute force and rainbow tables to attack passwords
12. Using a brute force and rainbow tables to attack passwords
11:00
Name of Video Time
Play Video: Privilege escalation, (SSL) stripping, Pass the hash
1. Privilege escalation, (SSL) stripping, Pass the hash
11:00
Play Video: Cross-site scripting (XSS) and Injections
2. Cross-site scripting (XSS) and Injections
16:00
Play Video: Pointer Dereference, directory traversal, buffer overflows, and tocttou
3. Pointer Dereference, directory traversal, buffer overflows, and tocttou
12:00
Play Video: Replay attacks
4. Replay attacks
4:00
Play Video: Request forgeries
5. Request forgeries
9:00
Play Video: API Attacks
6. API Attacks
7:00
Play Video: Driver manipulation
7. Driver manipulation
5:00
Play Video: Integer overflow, Resource exhaustion, Memory leak
8. Integer overflow, Resource exhaustion, Memory leak
6:00
Name of Video Time
Play Video: Evil Twin and Rouge Access Point
1. Evil Twin and Rouge Access Point
6:00
Play Video: Bluesnarfing and Bluejacking
2. Bluesnarfing and Bluejacking
3:00
Play Video: Cracking WEP
3. Cracking WEP
10:00
Play Video: Disassociation and Jamming
4. Disassociation and Jamming
7:00
Play Video: Man in the Middle, browser, and APR Poisoning
5. Man in the Middle, browser, and APR Poisoning
19:00
Play Video: IV, RFID, NFC Attacks
6. IV, RFID, NFC Attacks
6:00
Play Video: MAC Flooding and Cloning
7. MAC Flooding and Cloning
6:00
Play Video: DDOS Attacks
8. DDOS Attacks
8:00
Play Video: Malicious Code
9. Malicious Code
4:00
Name of Video Time
Play Video: Actors and threats
1. Actors and threats
13:00
Play Video: Threat intelligence sources
2. Threat intelligence sources
17:00
Play Video: Research sources
3. Research sources
11:00
Name of Video Time
Play Video: Cloud-based vs. on-premises, Zero Day
1. Cloud-based vs. on-premises, Zero Day
10:00
Play Video: Weak configurations
2. Weak configurations
9:00
Play Video: Third-party risks, Improper or weak patch, legacy platforms
3. Third-party risks, Improper or weak patch, legacy platforms
10:00
Play Video: Impacts
4. Impacts
6:00
Name of Video Time
Play Video: Threat hunting
1. Threat hunting
4:00
Play Video: Vulnerability scans
2. Vulnerability scans
18:00
Play Video: SIEM and SOAR
3. SIEM and SOAR
13:00
Name of Video Time
Play Video: Penetration testing
1. Penetration testing
14:00
Play Video: Passive and active reconnaissance
2. Passive and active reconnaissance
4:00
Play Video: Exercise types
3. Exercise types
4:00
Name of Video Time
Play Video: Configuration management
1. Configuration management
12:00
Play Video: Data Sovereignty and Protection
2. Data Sovereignty and Protection
12:00
Play Video: Other Security Consideration
3. Other Security Consideration
13:00
Play Video: Site Resiliency, Hot, Warm, Cold
4. Site Resiliency, Hot, Warm, Cold
6:00
Play Video: Deception and disruption
5. Deception and disruption
6:00
Name of Video Time
Play Video: IaaS
1. IaaS
11:00
Play Video: PaaS
2. PaaS
5:00
Play Video: SaaS, XaaS
3. SaaS, XaaS
5:00
Play Video: Cloud Deployment
4. Cloud Deployment
2:00
Play Video: Cloud Application terms
5. Cloud Application terms
21:00
Play Video: IaC
6. IaC
13:00
Play Video: Virtualization Issues
7. Virtualization Issues
5:00
Name of Video Time
Play Video: Software Development Environment
1. Software Development Environment
3:00
Play Video: Secure Coding Techniques
2. Secure Coding Techniques
19:00
Play Video: DevOps and Automation
3. DevOps and Automation
9:00
Name of Video Time
Play Video: Authentication methods
1. Authentication methods
11:00
Play Video: Biometrics
2. Biometrics
9:00
Play Video: MFA
3. MFA
5:00
Play Video: Authentication, authorization, and accounting
4. Authentication, authorization, and accounting
3:00
Name of Video Time
Play Video: Redundancy
1. Redundancy
9:00
Play Video: Replication and storages
2. Replication and storages
9:00
Play Video: Backup Types
3. Backup Types
14:00
Play Video: Non-persistence, high availability, diversity
4. Non-persistence, high availability, diversity
6:00
Play Video: RAID
5. RAID
16:00
Name of Video Time
Play Video: Embedded Systems
1. Embedded Systems
4:00
Play Video: Industrial control system
2. Industrial control system
4:00
Play Video: IoT
3. IoT
4:00
Play Video: IoT Communication and considerations
4. IoT Communication and considerations
7:00
Name of Video Time
Play Video: Physical Security Controls
1. Physical Security Controls
9:00
Play Video: Other physical security controls
2. Other physical security controls
7:00
Play Video: Locks and Fencings
3. Locks and Fencings
7:00
Play Video: Fire Suppression
4. Fire Suppression
3:00
Play Video: Secure data destruction
5. Secure data destruction
6:00
Name of Video Time
Play Video: Introduction to cryptography
1. Introduction to cryptography
4:00
Play Video: Goals of cryptography
2. Goals of cryptography
6:00
Play Video: Algorithm and Keys
3. Algorithm and Keys
20:00
Play Video: Block and stream ciphers
4. Block and stream ciphers
4:00
Play Video: Symmetric Ciphers
5. Symmetric Ciphers
9:00
Play Video: Asymmetric Ciphers
6. Asymmetric Ciphers
10:00
Play Video: Hashing
7. Hashing
13:00
Play Video: Hybrid cryptography
8. Hybrid cryptography
9:00
Play Video: Digital signatures
9. Digital signatures
6:00
Play Video: Block Chain
10. Block Chain
7:00
Play Video: Steganography
11. Steganography
8:00
Play Video: Key stretching
12. Key stretching
2:00
Play Video: Salting
13. Salting
6:00
Play Video: Quantum
14. Quantum
3:00
Play Video: Ephemeral, PFS, Homomorphic
15. Ephemeral, PFS, Homomorphic
3:00
Play Video: Cipher Modes
16. Cipher Modes
5:00
Play Video: Lightweight cryptography
17. Lightweight cryptography
3:00
Play Video: Elliptic-curve cryptography
18. Elliptic-curve cryptography
3:00
Play Video: Cipher suites
19. Cipher suites
2:00
Play Video: Common use cases
20. Common use cases
3:00
Play Video: Limitations of encryptions
21. Limitations of encryptions
4:00
Name of Video Time
Play Video: DNSSEC
1. DNSSEC
4:00
Play Video: Email security with S/MIME and PMP
2. Email security with S/MIME and PMP
5:00
Play Video: Installing Wireshark on Windows 10
3. Installing Wireshark on Windows 10
8:00
Play Video: Install and setup an FTP Server and Client
4. Install and setup an FTP Server and Client
10:00
Play Video: Using Wireshark to capture an FTP Password and securing FTP Server
5. Using Wireshark to capture an FTP Password and securing FTP Server
9:00
Play Video: Lightweight Directory Access Protocol Over SSL
6. Lightweight Directory Access Protocol Over SSL
5:00
Play Video: SRPT, FTPS, SFTP, SNMP, IMAP
7. SRPT, FTPS, SFTP, SNMP, IMAP
6:00
Play Video: SSH
8. SSH
5:00
Play Video: VPN and IPSEC
9. VPN and IPSEC
21:00
Play Video: Use Cases for secure protocols
10. Use Cases for secure protocols
5:00
Name of Video Time
Play Video: Endpoint Protection
1. Endpoint Protection
5:00
Play Video: Boot integrity
2. Boot integrity
3:00
Play Video: Databases
3. Databases
2:00
Play Video: Application Security
4. Application Security
10:00
Play Video: Hardening systems
5. Hardening systems
6:00
Play Video: Drive Encryption and sandboxing
6. Drive Encryption and sandboxing
9:00
Name of Video Time
Play Video: Load Balancing
1. Load Balancing
7:00
Play Video: Network segmentation
2. Network segmentation
7:00
Play Video: How to download and install packet tracer
3. How to download and install packet tracer
9:00
Play Video: VLAN's and Port Security
4. VLAN's and Port Security
18:00
Play Video: Firewalls
5. Firewalls
13:00
Play Video: Configuring firewall rules
6. Configuring firewall rules
11:00
Play Video: Jump and Proxy servers
7. Jump and Proxy servers
4:00
Play Video: IDS and IPS
8. IDS and IPS
9:00
Play Video: Other network secure concepts
9. Other network secure concepts
8:00
Name of Video Time
Play Video: Wireless Security
1. Wireless Security
17:00
Play Video: Wireless Installation Considerations
2. Wireless Installation Considerations
5:00
Name of Video Time
Play Video: Mobile Connection methods and receivers
1. Mobile Connection methods and receivers
3:00
Play Video: Mobile device management (MDM)
2. Mobile device management (MDM)
5:00
Play Video: UEM and MAM
3. UEM and MAM
4:00
Play Video: Enforcement and monitoring of mobile devices
4. Enforcement and monitoring of mobile devices
7:00
Play Video: Mobile Deployment Models
5. Mobile Deployment Models
4:00
Name of Video Time
Play Video: Cloud Solutions controls
1. Cloud Solutions controls
3:00
Play Video: Cloud Network and computing
2. Cloud Network and computing
5:00
Play Video: Cloud Security terms
3. Cloud Security terms
7:00
Name of Video Time
Play Video: Identity and account types
1. Identity and account types
5:00
Play Video: Account policies
2. Account policies
12:00
Name of Video Time
Play Video: Authentication management
1. Authentication management
4:00
Play Video: Authentication Protocols
2. Authentication Protocols
19:00
Play Video: Access control schemes
3. Access control schemes
14:00
Name of Video Time
Play Video: Introduction to PKI
1. Introduction to PKI
5:00
Play Video: Process of getting a certificate
2. Process of getting a certificate
7:00
Play Video: PKI Setup
3. PKI Setup
16:00
Play Video: Fields on a certificate
4. Fields on a certificate
7:00
Play Video: Certificate formats
5. Certificate formats
2:00
Play Video: Certificate types
6. Certificate types
6:00
Name of Video Time
Play Video: Introductions to commands
1. Introductions to commands
2:00
Play Video: ARP and Route
2. ARP and Route
3:00
Play Video: hping
3. hping
6:00
Play Video: Curl
4. Curl
4:00
Play Video: IP scanner
5. IP scanner
3:00
Play Video: ipconfig, ping, tracert
6. ipconfig, ping, tracert
4:00
Play Video: Linux file manipulation, head, tail, cat
7. Linux file manipulation, head, tail, cat
5:00
Play Video: Log
8. Log
3:00
Play Video: Cuckoo
9. Cuckoo
1:00
Play Video: thehavester
10. thehavester
2:00
Play Video: Nslookup and Dig
11. Nslookup and Dig
2:00
Play Video: tcpdump
12. tcpdump
4:00
Play Video: NetCat
13. NetCat
2:00
Play Video: Sniper
14. Sniper
5:00
Play Video: scanless
15. scanless
2:00
Play Video: nmap
16. nmap
4:00
Play Video: Managing Linux Permissions
17. Managing Linux Permissions
16:00
Play Video: Shell and script environments
18. Shell and script environments
2:00
Play Video: Exploitation frameworks
19. Exploitation frameworks
4:00
Play Video: Forensics tools
20. Forensics tools
7:00
Name of Video Time
Play Video: Incident response process
1. Incident response process
8:00
Play Video: Attack Frameworks
2. Attack Frameworks
5:00
Play Video: Incidents plans and exercises
3. Incidents plans and exercises
6:00
Name of Video Time
Play Video: Log Files
1. Log Files
7:00
Play Video: Capture log files
2. Capture log files
7:00
Name of Video Time
Play Video: Incident mitigation techniques
1. Incident mitigation techniques
8:00
Name of Video Time
Play Video: Documentation and evidence
1. Documentation and evidence
6:00
Name of Video Time
Play Video: Control Types and category
1. Control Types and category
6:00
Name of Video Time
Play Video: Regulations, standards, and legislation
1. Regulations, standards, and legislation
5:00
Play Video: Key frameworks
2. Key frameworks
15:00
Play Video: Secure configuration guides
3. Secure configuration guides
2:00
Name of Video Time
Play Video: Personnel Controls
1. Personnel Controls
15:00
Play Video: Third-party risk management
2. Third-party risk management
6:00
Play Video: Credential and organizations policies
3. Credential and organizations policies
7:00
Name of Video Time
Play Video: Risk types, terms, and Process
1. Risk types, terms, and Process
12:00
Play Video: Risk management strategies
2. Risk management strategies
6:00
Play Video: Risk Assessments
3. Risk Assessments
9:00
Play Video: Business impact analysis
4. Business impact analysis
8:00
Name of Video Time
Play Video: Privacy breaches
1. Privacy breaches
4:00
Play Video: Data types
2. Data types
6:00
Play Video: Privacy technologies and roles
3. Privacy technologies and roles
7:00
Name of Video Time
Play Video: Performance Based Questions Introduction
1. Performance Based Questions Introduction
1:00
Play Video: PBQ - Attack Types and Response
2. PBQ - Attack Types and Response
2:00
Play Video: PBQ - Incident Response
3. PBQ - Incident Response
2:00
Play Video: PBQ - Social Engineering
4. PBQ - Social Engineering
2:00
Play Video: PBQ - Firewalls
5. PBQ - Firewalls
4:00

CompTIA Security+ SY0-601 Exam Dumps, Practice Test Questions

100% Latest & Updated CompTIA Security+ SY0-601 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

CompTIA SY0-601  Premium File
$43.99
$39.99

SY0-601 Premium File

  • Premium File: 860 Questions & Answers. Last update: Apr 26, 2025
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

SY0-601 Premium File

CompTIA SY0-601  Premium File
  • Premium File: 860 Questions & Answers. Last update: Apr 26, 2025
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$43.99
$39.99
CompTIA SY0-601  Training Course
$16.49
$14.99

SY0-601 Training Course

  • Training Course: 201 Video Lectures
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

SY0-601 Training Course

CompTIA SY0-601  Training Course
  • Training Course: 201 Video Lectures
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$16.49
$14.99

CompTIA SY0-601 Training Course

Want verified and proven knowledge for CompTIA Security+? Believe it's easy when you have ExamSnap's CompTIA Security+ certification video training course by your side which along with our CompTIA SY0-601 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap CompTIA Security+ certification video training course that goes in line with the corresponding CompTIA SY0-601 exam dumps, study guide, and practice test questions & answers.

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.