Training Video Course

SY0-701: CompTIA Security+

PDFs and exam guides are not so efficient, right? Prepare for your CompTIA examination with our training course. The SY0-701 course contains a complete batch of videos that will provide you with profound and thorough knowledge related to CompTIA certification exam. Pass the CompTIA SY0-701 test with flying colors.

Rating
4.55rating
Students
112
Duration
19:19:02 h
$16.49
$14.99

Curriculum for SY0-701 Certification Video Course

Name of Video Time
Play Video: Introduction to the CompTIA Security+ (SY0-701) Exam Prep Course
1. Introduction to the CompTIA Security+ (SY0-701) Exam Prep Course
2:42
Play Video: About the CompTIA Security+ (SY0-701) Exam
2. About the CompTIA Security+ (SY0-701) Exam
7:54
Play Video: How to Take Your CompTIA Security+ (SY0-701) Exam
3. How to Take Your CompTIA Security+ (SY0-701) Exam
8:38
Name of Video Time
Play Video: Defining Business Risk
1. Defining Business Risk
5:06
Play Video: Threat Actors, Part 1
2. Threat Actors, Part 1
4:31
Play Video: Threat Actors, Part 2
3. Threat Actors, Part 2
2:22
Play Video: Threat Intelligence
4. Threat Intelligence
9:33
Play Video: Risk Management Concepts
5. Risk Management Concepts
7:12
Play Video: Security Controls
6. Security Controls
9:07
Play Video: Risk Assessments and Treatments
7. Risk Assessments and Treatments
5:32
Play Video: Quantitative Risk Assessments
8. Quantitative Risk Assessments
6:25
Play Video: Qualitative Risk Assessments
9. Qualitative Risk Assessments
3:43
Play Video: Security and the Information Life Cycle
10. Security and the Information Life Cycle
8:52
Play Video: Data Destruction
11. Data Destruction
5:52
Play Video: Chapter 1 Exam Question Review
12. Chapter 1 Exam Question Review
1:40
Play Video: Wiping Disks with the dd Command Lab
13. Wiping Disks with the dd Command Lab
5:39
Name of Video Time
Play Video: Cryptography Basics
1. Cryptography Basics
15:39
Play Video: Hashing
2. Hashing
8:25
Play Video: Cryptographic Attacks
3. Cryptographic Attacks
5:06
Play Video: Password Cracking
4. Password Cracking
9:56
Play Video: Password Cracking Demo
5. Password Cracking Demo
6:09
Play Video: Chapter 2 Exam Question Review
6. Chapter 2 Exam Question Review
2:27
Play Video: SSH Public Key Authentication Lab
7. SSH Public Key Authentication Lab
9:04
Name of Video Time
Play Video: Physical Security
1. Physical Security
9:42
Play Video: Keylogger Demo
2. Keylogger Demo
4:45
Play Video: Environmental Controls
3. Environmental Controls
5:16
Play Video: Chapter 3 Exam Question Review
4. Chapter 3 Exam Question Review
2:25
Play Video: Physical Security Lab
5. Physical Security Lab
2:54
Name of Video Time
Play Video: Identification, Authentication, and Authorization
1. Identification, Authentication, and Authorization
7:48
Play Video: Enabling Multifactor Authentication
2. Enabling Multifactor Authentication
4:36
Play Video: Authorization
3. Authorization
4:42
Play Video: Accounting
4. Accounting
5:15
Play Video: Authentication Methods
5. Authentication Methods
13:54
Play Video: Access Control Schemes
6. Access Control Schemes
6:39
Play Video: Account Management
7. Account Management
12:57
Play Video: Network Authentication
8. Network Authentication
8:50
Play Video: Identity Management Systems
9. Identity Management Systems
5:45
Play Video: Chapter 4 Exam Question Review
10. Chapter 4 Exam Question Review
2:16
Play Video: Creating Linux Users and Groups Lab
11. Creating Linux Users and Groups Lab
5:45
Name of Video Time
Play Video: Touring the CLI
1. Touring the CLI
15:02
Play Video: Shells
2. Shells
5:54
Play Video: The Windows Command Line
3. The Windows Command Line
4:24
Play Video: Microsoft PowerShell
4. Microsoft PowerShell
12:16
Play Video: Linux Shells
5. Linux Shells
10:51
Play Video: Network Scanners
6. Network Scanners
5:01
Play Video: Network Scanning with Nmap
7. Network Scanning with Nmap
8:51
Play Video: Network Protocol Analyzers
8. Network Protocol Analyzers
7:42
Play Video: Using Wireshark to Analyze Network Traffic
9. Using Wireshark to Analyze Network Traffic
8:12
Play Video: Using tcpdump to Analyze Network Traffic
10. Using tcpdump to Analyze Network Traffic
8:09
Play Video: Log Files
11. Log Files
8:27
Play Video: Centralized Logging
12. Centralized Logging
8:41
Play Video: Cybersecurity Benchmark Tools
13. Cybersecurity Benchmark Tools
4:43
Play Video: Configuring Linux Log Forwarding
14. Configuring Linux Log Forwarding
8:14
Play Video: Chapter 5 Exam Question Review
15. Chapter 5 Exam Question Review
2:57
Play Video: Linux Shell Script Lab
16. Linux Shell Script Lab
7:10
Play Video: Nmap Lab
17. Nmap Lab
4:32
Name of Video Time
Play Video: Malware
1. Malware
13:12
Play Video: Weak Configurations
2. Weak Configurations
11:22
Play Video: Common Attacks
3. Common Attacks
8:54
Play Video: Overflow Attacks
4. Overflow Attacks
5:28
Play Video: Password Attacks
5. Password Attacks
7:52
Play Video: Bots and Botnets
6. Bots and Botnets
6:03
Play Video: Disk RAID Levels
7. Disk RAID Levels
10:01
Play Video: Securing Hardware
8. Securing Hardware
10:50
Play Video: Securing Endpoints
9. Securing Endpoints
8:46
Play Video: Securing Data with Encryption
10. Securing Data with Encryption
6:22
Play Video: Chapter 6 Exam Question Review
11. Chapter 6 Exam Question Review
2:20
Play Video: Linux Software RAID Lab
12. Linux Software RAID Lab
7:32
Play Video: Secure Enclave Lab in macOS
13. Secure Enclave Lab in macOS
3:30
Name of Video Time
Play Video: Data Protection
1. Data Protection
9:23
Play Video: Cryptographic Methods
2. Cryptographic Methods
7:04
Play Video: Symmetric Cryptosystems
3. Symmetric Cryptosystems
12:29
Play Video: Symmetric Block Modes
4. Symmetric Block Modes
7:56
Play Video: Asymmetric Cryptosystems
5. Asymmetric Cryptosystems
12:35
Play Video: Understanding Digital Certificates
6. Understanding Digital Certificates
7:09
Play Video: Trust Models
7. Trust Models
4:36
Play Video: Public Key Infrastructure
8. Public Key Infrastructure
3:22
Play Video: Certificate Types
9. Certificate Types
12:03
Play Video: Touring Certificates
10. Touring Certificates
7:52
Play Video: Network Architecture Planning
11. Network Architecture Planning
3:32
Play Video: The OSI Model
12. The OSI Model
12:31
Play Video: ARP Cache Poisoning
13. ARP Cache Poisoning
8:31
Play Video: Other Layer 2 Attacks
14. Other Layer 2 Attacks
5:07
Play Video: Network Planning
15. Network Planning
6:54
Play Video: Zero Trust Network Access (ZTNA) 2.0
16. Zero Trust Network Access (ZTNA) 2.0
9:32
Play Video: Load Balancing
17. Load Balancing
6:02
Play Video: Securing Network Access
18. Securing Network Access
6:08
Play Video: Honeypots
19. Honeypots
5:52
Play Video: Static and Dynamic Code Analysis
20. Static and Dynamic Code Analysis
4:35
Play Video: Firewalls
21. Firewalls
11:09
Play Video: Proxy Servers
22. Proxy Servers
6:04
Play Video: Web Filtering
23. Web Filtering
5:07
Play Video: Network and Port Address Translation
24. Network and Port Address Translation
6:38
Play Video: IP Security (IPsec)
25. IP Security (IPsec)
8:41
Play Video: SD-WAN and SASE
26. SD-WAN and SASE
2:59
Play Video: Virtual Private Networks (VPNs)
27. Virtual Private Networks (VPNs)
9:49
Play Video: Intrusion Detection and Prevention Systems (IDS/IPS)
28. Intrusion Detection and Prevention Systems (IDS/IPS)
12:50
Play Video: Chapter 7 Exam Question Review
29. Chapter 7 Exam Question Review
3:25
Play Video: Linux Snort IDS Lab
30. Linux Snort IDS Lab
7:21
Name of Video Time
Play Video: Wi-Fi Encryption Standards
1. Wi-Fi Encryption Standards
9:25
Play Video: RFID, NFC, and Bluetooth
2. RFID, NFC, and Bluetooth
6:34
Play Video: Wi-Fi Coverage and Performance
3. Wi-Fi Coverage and Performance
8:06
Play Video: Wi-Fi Discovery and Attacks
4. Wi-Fi Discovery and Attacks
11:57
Play Video: Cracking WPA2
5. Cracking WPA2
10:13
Play Video: Wi-Fi Hardening
6. Wi-Fi Hardening
10:15
Play Video: Chapter 8 Exam Question Review
7. Chapter 8 Exam Question Review
01:42
Play Video: WPA2 Cracking Lab
8. WPA2 Cracking Lab
6:29
Name of Video Time
Play Video: Defending a Public Server
1. Defending a Public Server
0:45
Play Video: Common Attacks and Mitigations
2. Common Attacks and Mitigations
9:36
Play Video: DDoS Attacks in the Real World
3. DDoS Attacks in the Real World
2:34
Play Video: Containers and Software-Defined Networking
4. Containers and Software-Defined Networking
11:17
Play Video: Hypervisors and Virtual Machines
5. Hypervisors and Virtual Machines
8:13
Play Video: Cloud Deployment Models
6. Cloud Deployment Models
8:35
Play Video: Cloud Service Models
7. Cloud Service Models
8:16
Play Video: Securing the Cloud
8. Securing the Cloud
10:06
Play Video: Chapter 9 Exam Question Review
9. Chapter 9 Exam Question Review
02:11
Play Video: Docker Container Lab
10. Docker Container Lab
4:08
Name of Video Time
Play Video: Industrial Control System (ICS)
1. Industrial Control System (ICS)
6:32
Play Video: Internet of Things (IoT) Devices
2. Internet of Things (IoT) Devices
9:54
Play Video: Connecting to Dedicated and Mobile Systems
3. Connecting to Dedicated and Mobile Systems
10:39
Play Video: Security Constraints for Dedicated Systems
4. Security Constraints for Dedicated Systems
4:58
Play Video: Mobile Device Deployment and Hardening
5. Mobile Device Deployment and Hardening
10:53
Play Video: Chapter 10 Exam Question Review
6. Chapter 10 Exam Question Review
2:33
Play Video: Smartphone Hardening Lab
7. Smartphone Hardening Lab
2:32
Play Video: Embedded Systems
8. Embedded Systems
12:53
Name of Video Time
Play Video: FTP Packet Capture
1. FTP Packet Capture
0:48
Play Video: Secure Web and E-mail
2. Secure Web and E-mail
3:19
Play Video: Request Forgery Attacks
3. Request Forgery Attacks
11:31
Play Video: Cross-Site Scripting Attacks
4. Cross-Site Scripting Attacks
4:41
Play Video: DNS Security
5. DNS Security
6:58
Play Video: Web Application Security
6. Web Application Security
5:09
Play Video: OWASP Top 10
7. OWASP Top 10
11:39
Play Video: Web App Vulnerability Scanning
8. Web App Vulnerability Scanning
5:44
Play Video: Chapter 11 Exam Question Review
9. Chapter 11 Exam Question Review
3:09
Play Video: OWASP ZAP Web App Scan Lab
10. OWASP ZAP Web App Scan Lab
4:23
Name of Video Time
Play Video: Testing Infrastructure Overview
1. Testing Infrastructure Overview
4:31
Play Video: Social Engineering Attacks
2. Social Engineering Attacks
5:24
Play Video: Vulnerability Assessments
3. Vulnerability Assessments
8:43
Play Video: Penetration Testing
4. Penetration Testing
9:29
Play Video: The Metasploit Framework
5. The Metasploit Framework
7:52
Play Video: Chapter 12 Exam Question Review
6. Chapter 12 Exam Question Review
1:46
Name of Video Time
Play Video: Introduction to Business Security
1. Introduction to Business Security
5:54
Play Video: Business Impact Analysis
2. Business Impact Analysis
9:05
Play Video: Data Types and Roles
3. Data Types and Roles
11:16
Play Video: Personnel Risk and Policies
4. Personnel Risk and Policies
10:11
Play Video: Attestation
5. Attestation
3:13
Play Video: Internal Audits and Assessments
6. Internal Audits and Assessments
5:19
Play Video: External Audits and Assessments
7. External Audits and Assessments
6:13
Play Video: Third-Party Risk Management
8. Third-Party Risk Management
8:16
Play Video: Agreement Types
9. Agreement Types
6:15
Play Video: Change Management
10. Change Management
4:01
Play Video: Technical Change Management
11. Technical Change Management
6:57
Play Video: What Is Automation and Orchestration?
12. What Is Automation and Orchestration?
3:34
Play Video: Benefits of Automation and Orchestration
13. Benefits of Automation and Orchestration
2:47
Play Video: Use Cases of Automation and Orchestration
14. Use Cases of Automation and Orchestration
7:25
Play Video: Other Considerations of Automation and Orchestration
15. Other Considerations of Automation and Orchestration
5:22
Play Video: Putting It All Together
16. Putting It All Together
6:00
Play Video: Exploring the NIST Frameworks
17. Exploring the NIST Frameworks
7:30
Name of Video Time
Play Video: Incident Response Overview
1. Incident Response Overview
2:22
Play Video: Incident Response Plans (IRPs)
2. Incident Response Plans (IRPs)
5:46
Play Video: IRP Testing
3. IRP Testing
5:40
Play Video: Threat Analysis and Mitigating Actions
4. Threat Analysis and Mitigating Actions
7:27
Play Video: Digital Forensics
5. Digital Forensics
4:59
Play Video: Business Continuity and Alternate Sites
6. Business Continuity and Alternate Sites
6:02
Play Video: Data Backup
7. Data Backup
9:31
Play Video: Chapter 14 Exam Question Review
8. Chapter 14 Exam Question Review
1:00
Play Video: Autopsy Forensic Browser Lab
9. Autopsy Forensic Browser Lab
4:58

CompTIA SY0-701 Exam Dumps, Practice Test Questions

100% Latest & Updated CompTIA SY0-701 Practice Test Questions, Exam Dumps & Verified Answers!
30 Days Free Updates, Instant Download!

CompTIA SY0-701 Premium Bundle
$69.97
$49.99

SY0-701 Premium Bundle

  • Premium File: 318 Questions & Answers. Last update: Sep 24, 2024
  • Training Course: 167 Video Lectures
  • Study Guide: 1003 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates

SY0-701 Premium Bundle

CompTIA SY0-701 Premium Bundle
  • Premium File: 318 Questions & Answers. Last update: Sep 24, 2024
  • Training Course: 167 Video Lectures
  • Study Guide: 1003 Pages
  • Latest Questions
  • 100% Accurate Answers
  • Fast Exam Updates
$69.97
$49.99

Free SY0-701 Exam Questions & SY0-701 Dumps

File Name Size Votes
File Name
comptia.selftestengine.sy0-701.v2024-08-10.by.aaron.7q.vce
Size
13.14 KB
Votes
1

CompTIA SY0-701 Training Course

Want verified and proven knowledge for CompTIA Security+? Believe it's easy when you have ExamSnap's CompTIA Security+ certification video training course by your side which along with our CompTIA SY0-701 Exam Dumps & Practice Test questions provide a complete solution to pass your exam Read More.

Prepared by Top Experts, the top IT Trainers ensure that when it comes to your IT exam prep and you can count on ExamSnap CompTIA Security+ certification video training course that goes in line with the corresponding CompTIA SY0-701 exam dumps, study guide, and practice test questions & answers.

Comments (0)

Add Comment

Please post your comments about SY0-701 Exams. Don't share your email address asking for SY0-701 braindumps or SY0-701 exam pdf files.

Add Comment

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

UP

LIMITED OFFER: GET 30% Discount

This is ONE TIME OFFER

ExamSnap Discount Offer
Enter Your Email Address to Receive Your 30% Discount Code

A confirmation link will be sent to this email address to verify your login. *We value your privacy. We will not rent or sell your email address.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

Free Demo Limits: In the demo version you will be able to access only first 5 questions from exam.