Security+ Outline

  1. 0.0 Introduction
    • 0.1 Security Overview
      • 0.1.1 Security Challenges (8:22)
      • 0.1.2 Security Roles and Concepts (5:37)
      • 0.1.3 Threat Agent Types (8:20)
      • 0.1.4 Security Introduction
      • 0.1.5 General Attack Strategy (8:51)
      • 0.1.6 General Defense Strategy (18:25)
      • 0.1.7 Attack and Defense Strategy Overview
      • 0.1.8 Exam Questions – Section 0.1
    • 0.2 Windows Networking
      • 0.2.1 Active Directory Introduction (9:21)
      • 0.2.2 Active Directory Structure (9:25)
      • 0.2.3 Viewing Active Directory (3:59)
      • 0.2.4 Active Directory Facts
      • 0.2.5 Group Policy Overview (8:41)
      • 0.2.6 Viewing Group Policy (7:47)
      • 0.2.7 Group Policy Facts
      • 0.2.8 Create and Link a GPO
  2. 1.0 Access Control
    • 1.1 Access Control Models
      • 1.1.1 Access Control Models (3:42)
      • 1.1.2 Access Control Models Facts
      • 1.1.3 Implementing Discretionary Access Control (1:34)
      • 1.1.4 Exam Questions – Section 1.1
    • 1.2 Authentication
      • 1.2.1 Authentication (11:19)
      • 1.2.2 Authentication Facts
      • 1.2.3 Using a Biometric Scanner (3:49)
      • 1.2.4 Single Sign-on Facts
      • 1.2.5 Using Single Sign-on (1:16)
      • 1.2.6 Exam Questions – Section 1.2
    • 1.3 User Accounts and Passwords
      • 1.3.1 User Accounts and Passwords (5:40)
      • 1.3.2 User Account and Password Facts
      • 1.3.3 Configuring User and Password Restrictions (4:29)
      • 1.3.4 Configure User Account Restrictions
      • 1.3.5 Configure Account Policies
      • 1.3.6 Exam Questions – Section 1.3
    • 1.4 Authorization
      • 1.4.1 Authorization (5:15)
      • 1.4.2 Cumulative Access (9:34)
      • 1.4.3 Authorization Facts
      • 1.4.4 Examining the Access Token (4:26)
      • 1.4.5 Create a Group
      • 1.4.6 Exam Questions – Section 1.4
    • 1.5 Physical Security
      • 1.5.1 Physical Security (2:57)
      • 1.5.2 Physical Security Facts
      • 1.5.3 Exam Questions – Section 1.5
    • 1.6 Access Control Best Practices
      • 1.6.1 Access Control Best Practices (3:11)
      • 1.6.2 Best Practices Facts
      • 1.6.3 Viewing Implicit Deny (3:26)
      • 1.6.4 Exam Questions – Section 1.6
  3. 2.0 Cryptography
    • 2.1 Cryptography
      • 2.1.1 Cryptography Concepts (4:30)
      • 2.1.2 Cryptography Facts
      • 2.1.3 Exam Questions – Section 2.1
    • 2.2 Hashing
      • 2.2.1 Hashing (11:31)
      • 2.2.2 Hashing Facts
      • 2.2.3 Using Hashes (7:43)
      • 2.2.4 Exam Questions – Section 2.2
    • 2.3 Symmetric Encryption
      • 2.3.1 Symmetric Encryption (5:27)
      • 2.3.2 HMAC (6:13)
      • 2.3.3 Symmetric Encryption Facts
      • 2.3.4 Cracking a Symmetric Encryption Key (4:11)
      • 2.3.5 Exam Questions – Section 2.3
    • 2.4 Asymmetric Encryption
      • 2.4.1 Asymmetric Encryption (8:56)
      • 2.4.2 Asymmetric Encryption Facts
      • 2.4.3 Exam Questions – Section 2.4
    • 2.5 Public Key Infrastructure (PKI)
      • 2.5.1 Certificates (11:02)
      • 2.5.2 Managing Certificates (8:43)
      • 2.5.3 Manage Certificates
      • 2.5.4 Certificate Lifecycle Facts
      • 2.5.5 CA Implementation (5:16)
      • 2.5.6 Configuring a Subordinate CA (8:29)
      • 2.5.7 PKI Management Facts
      • 2.5.8 Exam Questions – Section 2.5
    • 2.6 Cryptography Implementations
      • 2.6.1 Combining Cryptographic Methods (10:30)
      • 2.6.2 Hardware Based Encryption Devices (7:14)
      • 2.6.3 BitLocker and Database Encryption (13:02)
      • 2.6.4 PGP and GPG (4:34)
      • 2.6.5 Cryptographic Implementation Facts
      • 2.6.6 Securing Files using EFS (5:01)
      • 2.6.7 Encrypt Files
      • 2.6.8 Configuring BitLocker (6:19)
      • 2.6.9 Encrypting Files with GPG (4:58)
      • 2.6.10 Exam Questions – Section 2.6
    • 2.7 Secure Protocols
      • 2.7.1 Secure Protocols (10:33)
      • 2.7.2 Secure Protocols Facts
      • 2.7.3 Adding SSL to a Web Site (5:23)
      • 2.7.4 Allow SSL Connections
      • 2.7.5 IPSec (5:14)
      • 2.7.6 IPSec Facts
      • 2.7.7 Requiring IPSec for Communications (7:16)
      • 2.7.8 Exam Questions – Section 2.7
  4. 3.0 Network Infrastructure
    • 3.1 OSI Model Review
      • 3.1.1 OSI Model (4:18)
      • 3.1.2 OSI Model Facts
    • 3.2 Protocols and Ports
      • 3.2.1 Network Protocols (4:45)
      • 3.2.2 Network Protocol Facts
      • 3.2.3 Analyzing a TCP Three-way Handshake (2:14)
      • 3.2.4 TCP and UDP Ports (9:04)
      • 3.2.5 Common Ports
      • 3.2.6 Scanning for Open Ports (3:52)
      • 3.2.7 Exam Questions – Section 3.2
    • 3.3 IP Addressing
      • 3.3.1 IP Addressing (17:23)
      • 3.3.2 IP Address Facts
      • 3.3.3 Configuring a NAT Router (6:13)
      • 3.3.4 Configure NAT
      • 3.3.5 Configuring IPv6 (2:39)
      • 3.3.6 IP Subnetting (12:35)
      • 3.3.7 Subnetting Facts
      • 3.3.8 Configuring Subnetting (8:07)
      • 3.3.9 Exam Questions – Section 3.3
    • 3.4 Network Devices
      • 3.4.1 Network Devices (5:50)
      • 3.4.2 Network Device Facts
      • 3.4.3 Exam Questions – Section 3.4
    • 3.5 Network Authentication
      • 3.5.1 Network Authentication Protocols (14:09)
      • 3.5.2 Network Authentication via LDAP (10:31)
      • 3.5.3 Network Authentication Facts
      • 3.5.4 Controlling the Authentication Method (3:51)
      • 3.5.5 Configure Kerberos Policy Settings
      • 3.5.6 Browsing a Directory Tree via LDAP (6:38)
      • 3.5.7 Trusts and Transitive Access (5:33)
      • 3.5.8 Trusts and Transitive Access Facts
      • 3.5.9 Exam Questions – Section 3.5
    • 3.6 Remote Access
      • 3.6.1 Remote Access (8:45)
      • 3.6.2 Remote Access Facts
      • 3.6.3 Configuring a Remote Access Server (9:31)
      • 3.6.4 Configure a Remote Access Server
      • 3.6.5 Creating a Remote Access Connection (5:08)
      • 3.6.6 Configure a Remote Access Connection
      • 3.6.7 VPN Protocol Facts
      • 3.6.8 Configuring a VPN Connection (5:52)
      • 3.6.9 Configure a VPN Connection
      • 3.6.10 Exam Questions – Section 3.6
    • 3.7 RADIUS and TACACS+
      • 3.7.1 RADIUS and TACACS+ (7:05)
      • 3.7.2 RADIUS and TACACS+ Facts
      • 3.7.3 Configuring a RADIUS Solution (6:52)
      • 3.7.4 Configure a RADIUS Server
      • 3.7.5 Configure a RADIUS Client
      • 3.7.6 Exam Questions – Section 3.7
    • 3.8 Wireless Networking
      • 3.8.1 Wireless Networking Overview (5:35)
      • 3.8.2 Wireless Security Considerations (13:17)
      • 3.8.3 Wireless Security Consideration Facts
      • 3.8.4 Wireless Encryption (6:45)
      • 3.8.5 Wireless Authentication (4:41)
      • 3.8.6 Wireless Authentication and Encryption Facts
      • 3.8.7 Configuring a Wireless Access Point (8:14)
      • 3.8.8 Configuring a Wireless Connection (6:47)
      • 3.8.9 Configure a Wireless Profile
      • 3.8.10 Exam Questions – Section 3.8
    • 3.9 Cloud Computing
      • 3.9.1 Cloud Computing Introduction (15:59)
      • 3.9.2 Cloud Computing Security Issues (6:32)
      • 3.9.3 Cloud Computing Facts
      • 3.9.4 Exam Questions – Section 3.9
  5. 4.0 Network Attacks
    • 4.1 Reconnaissance
      • 4.1.1 Reconnaissance (2:40)
      • 4.1.2 Reconnaissance Facts
      • 4.1.3 Performing Reconnaissance (9:01)
      • 4.1.4 Exam Questions – Section 4.1
    • 4.2 Denial of Service (DoS)
      • 4.2.1 Denial of Service (DoS) (7:49)
      • 4.2.2 Xmas Tree Attacks (3:23)
      • 4.2.3 DoS Attack Facts
      • 4.2.4 Performing a UDP Flood Attack (3:54)
      • 4.2.5 Exam Questions – Section 4.2
    • 4.3 Session and Spoofing Attacks
      • 4.3.1 Session and Spoofing Attacks (6:41)
      • 4.3.2 Session Based Attack Facts
      • 4.3.3 Performing ARP Poisoning (4:24)
      • 4.3.4 Spoofing Facts
      • 4.3.5 Exam Questions – Section 4.3
    • 4.4 DNS Attacks
      • 4.4.1 DNS Attacks (4:30)
      • 4.4.2 DNS Attack Facts
      • 4.4.3 Examining DNS Attacks (11:12)
      • 4.4.4 Exam Questions – Section 4.4
    • 4.5 Switch Attacks
      • 4.5.1 Switch Attacks (5:04)
      • 4.5.2 Switch Attack Facts
      • 4.5.3 Exam Questions – Section 4.5
    • 4.6 Wireless Attacks
      • 4.6.1 Wireless Attacks (13:28)
      • 4.6.2 Wireless Attack Facts
      • 4.6.3 Using Wireless Attack Tools (9:06)
      • 4.6.4 Exam Questions – Section 4.6
    • 4.7 Network Device Vulnerabilities
      • 4.7.1 Device Vulnerabilities (1:47)
      • 4.7.2 Device Vulnerability Facts
      • 4.7.3 Searching Defaultpasswords.com (1:30)
      • 4.7.4 Exam Questions – Section 4.7
  6. 5.0 Network Security
    • 5.1 Firewalls
      • 5.1.1 Firewalls (5:32)
      • 5.1.2 Firewall Facts
      • 5.1.3 Configuring Windows Firewall (8:18)
      • 5.1.4 Configure Windows Firewall
      • 5.1.5 Exam Questions – Section 5.1
    • 5.2 Security Zones
      • 5.2.1 Security Zones (5:31)
      • 5.2.2 Security Zone Facts
      • 5.2.3 Exam Questions – Section 5.2
    • 5.3 Intrusion Detection
      • 5.3.1 Intrusion Detection (7:13)
      • 5.3.2 Detection vs. Prevention Controls (7:50)
      • 5.3.3 IDS Facts
      • 5.3.4 Implementing Intrusion Monitoring (3:33)
      • 5.3.5 Exam Questions – Section 5.3
    • 5.4 Router and Switch Security
      • 5.4.1 Router Security (8:57)
      • 5.4.2 Router Security Facts
      • 5.4.3 Switch Security (13:01)
      • 5.4.4 Switch Loop Protection (10:46)
      • 5.4.5 Switch Security Facts
      • 5.4.6 Configuring VLANs (4:35)
      • 5.4.7 Exploring VLANs
      • 5.4.8 Exam Questions – Section 5.4
    • 5.5 Security Solutions
      • 5.5.1 Security Solutions (4:16)
      • 5.5.2 All-In-One Security Appliances (4:30)
      • 5.5.3 Security Solution Facts
      • 5.5.4 Configuring Parental Controls (8:46)
      • 5.5.5 Configure Parental Controls
      • 5.5.6 Implementing Content Filtering (2:45)
      • 5.5.7 Implementing NAP with DHCP Enforcement (15:56)
      • 5.5.8 Exam Questions – Section 5.5
    • 5.6 Mobile Devices
      • 5.6.1 Mobile Device Security (7:34)
      • 5.6.2 Mobile Device Security Facts
      • 5.6.3 Exam Questions – Section 5.6
    • 5.7 Telephony
      • 5.7.1 Telephony (5:48)
      • 5.7.2 Telephony Security Facts
      • 5.7.3 Exam Questions – Section 5.7
  7. 6.0 System Security
    • 6.1 Malware
      • 6.1.1 Malware (9:28)
      • 6.1.2 Malware Facts
      • 6.1.3 Malware Protection Facts
      • 6.1.4 Implementing Malware Protections (10:47)
      • 6.1.5 Using Windows Defender (3:16)
      • 6.1.6 Configure Windows Defender
      • 6.1.7 Exam Questions – Section 6.1
    • 6.2 Password Attacks
      • 6.2.1 Password Attacks (2:04)
      • 6.2.2 Password Attack Facts
      • 6.2.3 Using Rainbow Tables (4:48)
      • 6.2.4 Capturing Passwords (5:41)
      • 6.2.5 Exam Questions – Section 6.2
    • 6.3 Operating System Hardening
      • 6.3.1 Operating System Hardening (5:13)
      • 6.3.2 Hardening Facts
      • 6.3.3 Hardening an Operating System (6:41)
      • 6.3.4 Using Security Templates and Group Policy (6:53)
      • 6.3.5 Managing Automatic Updates (4:41)
      • 6.3.6 Configure Automatic Updates
      • 6.3.7 Exam Questions – Section 6.3
    • 6.4 Hardware Security
      • 6.4.1 Hardware Security Guidelines (7:50)
      • 6.4.2 Hardware Security Facts
      • 6.4.3 Exam Questions – Section 6.4
    • 6.5 File Security
      • 6.5.1 File Server Security (7:57)
      • 6.5.2 File System Security Facts
      • 6.5.3 File Permission Facts
      • 6.5.4 Configuring NTFS Permissions (7:09)
      • 6.5.5 Configure NTFS Permissions
      • 6.5.6 Exam Questions – Section 6.5
  8. 7.0 Application Security
    • 7.1 Web Application Attacks
      • 7.1.1 Web Application Attacks (2:48)
      • 7.1.2 Cross-site Request Forgery (XSRF) Attack (10:51)
      • 7.1.3 Injection Attacks (14:14)
      • 7.1.4 Header Manipulation (9:01)
      • 7.1.5 Zero Day Application Attacks (6:59)
      • 7.1.6 Client Side Attacks (6:22)
      • 7.1.7 Web Application Attack Facts
      • 7.1.8 Preventing Cross-site Scripting (4:05)
      • 7.1.9 Exam Questions – Section 7.1
    • 7.2 Internet Explorer
      • 7.2.1 Managing Security Zones and Add-ons (6:17)
      • 7.2.2 Configuring IE Enhanced Security (1:59)
      • 7.2.3 Customize IE Security Zones
      • 7.2.4 Managing Cookies (7:20)
      • 7.2.5 Configure Cookie Handling
      • 7.2.6 Clearing the Browser Cache (2:59)
      • 7.2.7 Clear the Browser Cache
      • 7.2.8 Implementing Popup Blockers (2:04)
      • 7.2.9 Configure IE Popup Blocker
      • 7.2.10 Internet Explorer Security Facts
      • 7.2.11 Exam Questions – Section 7.2
    • 7.3 E-mail
      • 7.3.1 E-mail Security (4:42)
      • 7.3.2 E-mail Security Facts
      • 7.3.3 Protecting a Client from Spam (6:45)
      • 7.3.4 Securing an E-mail Server (2:45)
      • 7.3.5 Configure E-mail Filters
      • 7.3.6 Exam Questions – Section 7.3
    • 7.4 Network Applications
      • 7.4.1 Network Application Security (2:19)
      • 7.4.2 Spim (3:43)
      • 7.4.3 Network Application Facts
      • 7.4.4 Using Peer-to-peer Software (3:04)
      • 7.4.5 Securing Windows Messenger (2:48)
      • 7.4.6 Exam Questions – Section 7.4
    • 7.5 Virtualization
      • 7.5.1 Virtualization Introduction (4:01)
      • 7.5.2 Virtualization Benefits (3:08)
      • 7.5.3 Load Balancing with Virtualization (10:39)
      • 7.5.4 Virtualization Facts
      • 7.5.5 Managing Virtual Machines (3:40)
      • 7.5.6 Exam Questions – Section 7.5
    • 7.6 Application Development
      • 7.6.1 Secure Coding Concepts (16:19)
      • 7.6.2 Application Hardening (11:02)
      • 7.6.3 Application Development Security Facts
      • 7.6.4 Hardening Applications (4:26)
      • 7.6.5 Exam Questions – Section 7.6
  9. 8.0 Organizational Security
    • 8.1 Security Policies
      • 8.1.1 Security Policies (7:23)
      • 8.1.2 Data Privacy Laws (9:42)
      • 8.1.3 Security Policy Facts
      • 8.1.4 Security Documentation Facts
      • 8.1.5 Information Classification (5:40)
      • 8.1.6 Information Classification Facts
      • 8.1.7 Exam Questions – Section 8.1
    • 8.2 Business Continuity
      • 8.2.1 Business Continuity (2:39)
      • 8.2.2 Succession Planning (5:23)
      • 8.2.3 Business Continuity Facts
      • 8.2.4 Exam Questions – Section 8.2
    • 8.3 Redundancy
      • 8.3.1 Redundancy (4:55)
      • 8.3.2 Redundancy Measurement Parameters (5:12)
      • 8.3.3 Redundancy Facts
      • 8.3.4 RAID (7:26)
      • 8.3.5 RAID Facts
      • 8.3.6 Implementing RAID (5:22)
      • 8.3.7 Configure Fault Tolerant Volumes
      • 8.3.8 Clustering (9:06)
      • 8.3.9 Clustering Facts
      • 8.3.10 Exam Questions – Section 8.3
    • 8.4 Backup and Restore
      • 8.4.1 Backup and Restore (7:07)
      • 8.4.2 Backup and Restore Facts
      • 8.4.3 Backup Management Facts
      • 8.4.4 Performing System Backups (2:52)
      • 8.4.5 Schedule an Automatic Backup
      • 8.4.6 Exam Questions – Section 8.4
    • 8.5 Environmental Controls
      • 8.5.1 Environmental Controls (6:00)
      • 8.5.2 Environmental Monitoring (11:33)
      • 8.5.3 Hot and Cold Aisles (5:17)
      • 8.5.4 Environmental Control Facts
      • 8.5.5 Fire Protection Facts
      • 8.5.6 Exam Questions – Section 8.5
    • 8.6 Social Engineering
      • 8.6.1 Social Engineering (4:39)
      • 8.6.2 Phishing Variations (13:04)
      • 8.6.3 Tailgating and Piggybacking (3:28)
      • 8.6.4 Social Engineering Facts
      • 8.6.5 Investigating Social Engineering Attack (9:45)
      • 8.6.6 Exam Questions – Section 8.6
    • 8.7 Incident Response
      • 8.7.1 First Responder (7:17)
      • 8.7.2 Basic Forensic Procedures (18:31)
      • 8.7.3 Incident Response Facts
      • 8.7.4 Using Forensic Tools (6:17)
      • 8.7.5 Exam Questions – Section 8.7
  10. 9.0 Assessments and Audits
    • 9.1 Risk Management
      • 9.1.1 Risk Management (4:04)
      • 9.1.2 Security Controls (3:21)
      • 9.1.3 Risk Management Facts
      • 9.1.4 Exam Questions – Section 9.1
    • 9.2 Vulnerability Assessment
      • 9.2.1 Vulnerability Assessment (4:54)
      • 9.2.2 Vulnerability Assessment Facts
      • 9.2.3 Scanning a Network with Nessus (9:37)
      • 9.2.4 Scanning for Vulnerabilities Using MBSA (4:28)
      • 9.2.5 Performing Port and Ping Scans (2:36)
      • 9.2.6 Checking for Weak Passwords (9:20)
      • 9.2.7 Exam Questions – Section 9.2
    • 9.3 Penetration Testing
      • 9.3.1 Penetration Testing (2:32)
      • 9.3.2 Penetration Testing Facts
      • 9.3.3 Exploring Penetration Testing Tools (7:05)
      • 9.3.4 Exam Questions – Section 9.3
    • 9.4 Protocol Analyzers
      • 9.4.1 Protocol Analyzers (3:07)
      • 9.4.2 Protocol Analyzer Facts
      • 9.4.3 Analyzing Network Traffic (6:50)
      • 9.4.4 Exam Questions – Section 9.4
    • 9.5 Logs and Audits
      • 9.5.1 Logs (3:24)
      • 9.5.2 Log Facts
      • 9.5.3 Logging Events with Event Viewer (3:59)
      • 9.5.4 Audits (3:13)
      • 9.5.5 Audit Facts
      • 9.5.6 Auditing the Windows Security Log (3:17)
      • 9.5.7 Exam Questions – Section 9.5

Leave a Reply

Your email address will not be published. Required fields are marked *

*