0.1 – Introduction
How to Pass Your SY0-701 Security+ Exam
CompTIA’s Security+ certification is one of the most popular entry-level certifications for Information Technology professionals. In this video, you’ll learn about the certification requirements and the best methods for studying for the Security+ exam.
1.1 – Security Controls
Security Controls
We rely on security controls to monitor, alert, and recover from attacks. In this video, you’ll learn about the categories of common security controls.
1.2 – Security Concepts
The CIA Triad
The CIA triad describes the foundational goals of IT security. In this video, you’ll learn more about confidentiality, integrity, and availability.
Non-repudiation
Non-repudiation is an important function of cryptography. In this video, you’ll learn about hashing, digital signatures, and non-repudiation.
Authentication, Authorization, and Accounting
The AAA process is an important part of network security. In this video, you’ll learn more about authentication, authorization, and accounting.
Gap Analysis
There’s always room to improve your security posture. In this video, you’ll learn how a security gap analysis can be used to make your network even more secure.
Zero Trust
The strategy of zero-trust can be a effective way to increase the security of an organization’s data. In this video, you’ll learn more about best practices regarding zero-trust.
Physical Security
Security tools in the physical world can be effectively used to protect our computing systems. In this video, you’ll learn about physical security devices and techniques.
Deception and Disruption
There are many ways to fool an attacker into disclosing important information about their methods and techniques. In this video, you’ll learn how to use deception and disruption to protect your network.
1.3 – Change Management
Change Management
As IT professionals, we are constantly updating, modifying, and changing the devices we manage. In this video, you’ll learn how we manage this process with change management.
Technical Change Management
A technician is ultimately responsible for putting the change management process into action. In this video, you’ll learn about the technical change management process.
1.4 – Cryptographic Solutions
Public Key Infrastructure
Public key infrastructure technologies are the foundation of our modern encryption. In this video, you’ll learn about symmetric encryption, asymmetric encryption, key pair generation, and more.
Encrypting Data
We use many different encryption techniques to keep our data secure. In this video, you’ll learn about database encryption, transport encryption, cryptographic keys, and more.
Key Exchange
A secure key exchange method is critical for real-time encryption. In this video, you’ll learn how a symmetric key can be derived from a public and private key pair.
Encryption Technologies
Encryption technologies provide secure key storage, cryptographic functions, and data privacy. In this video, you’ll learn about HSMs, TPMs, secure enclave, and more.
Obfuscation
Obfuscation can be used in IT security to hide information in unique ways. In this video, you’ll learn about steganography, tokenization, and data masking.
Hashing and Digital Signatures
The hashing process can provide integrity, authentication, and non-repudiation. In this video, you’ll learn how hashes are created and how to use digital signatures.
Blockchain Technology
Blockchain technology is the foundation of cryptocurrency, but it can also be used for many other purposes. In this video, you’ll learn how blockchain technology works behind the scenes.
Certificates
We use certificates to provide trust when accessing other devices or services. In this video, you’ll learn about digital certificates, certificate signing requests, key revocation, OCSP stapling, and more.