You are on page 1of 6

WEEK 1 Social Engineering Techniques 45 min.

Introduction to Social Engineering 2 min.


Phishing and Related Attacks 5 min.
Low Tech Attacks 5 min.
Security+ Online Why Social Engineering Works 4 min.
The Top Social Engineering Tool 7 min.
Training Identifying a Phishing Email 10 min.
Social Engineering Toolkit 7 min.
(SY0-601) Review Quiz 5 min.

This foundational CompTIA Security+ training prepares Cyber Attack Techniques 47 min.
learners to take the SY0-601 exam, which is the one Introduction to Cyber Attack Techniques 1 min.
required exam to earn the Security+ certification. Malware 8 min.
Password Attacks 6 min.
CBT Nuggets course material Password Attack Example 10 min.
Cyber Physical Components 5 min.
Adversarial AI 4 min.
Supply Chain Security 2 min.
Cryptographic Attacks 4 min.
Review Quiz 7 min.

Application Attacks 47 min.


Introduction to Application Attacks 1 min.
Injection Attacks 3 min.
Cross Site Scripting 2 min.
Poorly Written Apps 5 min.
Overflow Attack Demo 8 min.
Poorly Written App Attack 4 min.
Impersonation 3 min.
Error Handling Attack 7 min.
Additional Application Attacks 4 min.
Password Recovery Fail 4 min.
STUDY PLAN Review Quiz 6 min.
WEEK 2 Network Attacks 44 min. Network Scan Demonstration 8 min.
Introduction to Network Attacks 1 min. Positive and Negative Scan Results 3 min.
Wireless Attacks 6 min. CVE and CVSS 5 min.
In-line / On-path Attacks 6 min. Security information and event management (SIEM) 5 min.
Layer 2 attacks 7 min. Threat hunting 2 min.
Domain name system (DNS) 5 min. Security orchestration, automation, and response (SOAR) 2 min.
Distributed denial-of-service (DDoS) 4 min. Security Assessment Review Quiz 11 min.
Malicious code or script execution 2 min.
Remediation Options 5 min. Penetration Testing Techniques 51 min.
Review Quiz 8 min. Introduction to Penetration Testing 1 min.
Pen Testing Overview 10 min.
Threat Actors and Intelligence Sources 45 min. OSSTMM 3 min.
Introduction to Actors, Vectors, and Intelligence Sources 1 min. Resources from NIST 4 min.
Threat Actors 6 min. Penetration Testing Execution Standard 4 min.
Attack Vectors 7 min. Pen Testing Demo 14 min.
Threat Intelligence Sources 9 min. OWASP 4 min.
Threat Maps 12 min. Security Team Exercises 2 min.
Additional Sources for Research 4 min. Pen Testing Review Quiz 9 min.
Review / Quiz 6 min.
Security Concepts for the Enterprise 42 min.
Vulnerabilities and Security Risks 43 min. Introduction to Security Concepts for the Enterprise 1 min.
Introduction to Vulnerabilities and Security Risks 1 min. Configuration management 5 min.
Cloud vs. On-prem Vulnerabilities 2 min. Data protection 5 min.
Zero-day Attacks 3 min. Hashing 10 min.
Weak Configurations 9 min. Deception and Disruption 6 min.
Telnet with IPsec Demonstration 9 min. SSL/TLS Inspection 4 min.
Third-Party Risks 2 min. Site Resiliency 3 min.
Patch Management 4 min. API Considerations 4 min.
Vulnerabilities Review Quiz 13 min. Quiz and Review 4 min.

WEEK 3 Techniques Used in Security Assessments 43 min. Cloud Computing and Virtualization 47 min.
Introduction to Security Assessments 1 min. Introduction to Cloud Computing and Virtualization 1 min.
Vulnerability Scan Overview 6 min. Virtualization Overview 6 min.
Cloud Models 4 min. Snapshots 4 min.
MSPs and MSSPs 4 min. Redundancy 4 min.
Desktop Virtualization 5 min. RAID 8 min.
Deploy a VM 7 min. High Availability 5 min.
Modifying a VM 8 min. Non-Persistence 3 min.
Containers and Microservices 3 min. Diversity 4 min.
Infrastructure as Code and SDN 4 min. Review Quiz 9 min.
Quiz and Review 5 min.
WEEK 5 Security for Embedded and Specialized Systems 45 min.
WEEK 4 Summarize App Development, Deployment, and 43 min. Intro to Security for Embedded & Specialized Systems 1 min.
Automation Embedded Systems 3 min.
Intro to App Development, Deployment, and Automation 1 min. SCADA and ICS 5 min.
Development Environments 8 min. Internet of Things (IoT) 9 min.
Separation of Duties 5 min. IoT Security Risks 6 min.
Secure Coding Techniques 9 min. Critical Systems 9 min.
OWASP BWA 8 min. System on a Chip (SoC) 2 min.
Automation and Scripting 4 min. Embedded System Considerations 7 min.
Improving Integrity 3 min. Quiz and Review 3 min.
Review Quiz 5 min.
Physical Security Controls 46 min.
Authentication and Authorization Design 42 min. Intro to Physical Security Controls 1 min.
Concepts Perimeter Physical Security 5 min.
Intro to Authentication and Authorization Concepts 1 min. Internal Physical Security 6 min.
AAA Overview 5 min. Equipment Physical Security 2 min.
Authentication Methods 14 min. Infrastructure Controls 5 min.
Biometrics 4 min. Bonus Chat on Physical Security 14 min.
Multifactor Authentication (MFA) 7 min. Fire suppression 3 min.
Quiz Review 11 min. Secure Data Destruction 5 min.
Quiz / Review 5 min.
Cybersecurity Resilience 50 min.
Intro to Cybersecurity Resilience 1 min. Cryptography Fundamentals 48 min.
Backups Overview 6 min. Intro to Cryptography Fundamentals 1 min.
Classic Backup Types 6 min. Cryptography Overview 8 min.
Symmetric Encryption 4 min. Network Segmentation 11 min.
Asymmetric Encryption 7 min. Network Firewalls 8 min.
Hashing 4 min. ACL Case Study 12 min.
Key Exchange 5 min. Load Balancing 7 min.
Digital Signatures 5 min. Virtual private network (VPN) 6 min.
Hiding Data with Steganography 4 min. Layer 2 Security 8 min.
Crypto Considerations 3 min. Network-based IDS/IPS 7 min.
Quiz & Review 7 min. Quiz and Review 9 min.

WEEK 6 Secure Protocols 74 min. Wireless Security 60 min.


Intro to Secure Protocols 1 min. Intro to Wireless Security 1 min.
IPsec and VPNs 7 min. Wi-Fi Overview 14 min.
Secure Shell (SSH) 9 min. Installation Considerations 13 min.
Domain Name System (DNS) 12 min. Wi-Fi Cryptography and Vocabulary 9 min.
HTTPS 10 min. Authentication 16 min.
Weak Protocols 8 min. Quiz and Review 7 min.
IP Addressing and Routing 5 min.
Email Protocols 3 min. Mobile Device Security 51 min.
LDAP 2 min. Intro to Mobile Device Security 1 min.
SNMP, NTP, & SRTP 4 min. Mobile Connectivity 12 min.
Quiz and Review 13 min. Mobile Device Management (MDM) Overview 12 min.
Enforcement and Monitoring 12 min.
Host and Application Security 48 min. Deployment Models 8 min.
Intro to Host and App Security 1 min. Review and Quiz 6 min.
Device Hardening 8 min.
Boot integrity 4 min. WEEK 8 Plan for Cybersecurity in the Cloud 89 min.
Local Endpoint Protection 7 min. Plan for Cloud Cybersecurity 1 min.
Network Based Protection 8 min. Security Patterns and Controls 20 min.
Secure Applications 6 min. Cloud Storage Security 18 min.
Quiz and Review 14 min. Cloud Network Security 12 min.
Cloud Compute Security 18 min.
WEEK 7 Secure Network Design 69 min. Cloud Security Solutions 20 min.
Intro to Secure Network Design 1 min.
Account Management Controls 81 min. Public and Private Key Review 3 min.
Intro to Account Mgmt. Controls 1 min. Certificate Types and Uses 11 min.
Shared Accounts 15 min. Certificate Attributes 11 min.
User Accounts 12 min. CA Options 11 min.
Guest Accounts 7 min. CSRs and Certificate Encoding 17 min.
Service Accounts 8 min. Bad Certificates 11 min.
Verifying Identity 8 min. Quiz and Review 7 min.
SSH Authorized Keys 7 min.
Password Policies 7 min. Assessing an Organizations Security 46 min.
Conditional Access 10 min. Network Assessment Tools Pt.1 11 min.
Quiz and Review 6 min. Network Assessment Tools Pt.2 10 min.
Basic NMAP Commands 4 min.
WEEK 9 Authentication and Authorization Solutions 68 min. File Manipulation and Shell Tools 15 min.
Intro to Authentication and Authorization 1 min. Forensic Tools and Data Sanitization 6 min.
Access Control Overview 12 min.
Mandatory Access Control (MAC) 7 min. WEEK 11 Incident Readiness and Frameworks 45 min.
Discretionary Access Control (DAC) 9 min. Exploit Frameworks 6 min.
Authentication Management 10 min. Credential Attacks Pt.1 7 min.
Authentication & Authorization 13 min. Credential Attacks Pt.2 9 min.
Single Sign On (SSO) 9 min. Incident Response Process 9 min.
Quiz and Review 7 min. Attack Frameworks 8 min.
Additional Plans and Considerations 6 min.
Certificates and the PKI 61 min.
Intro to Digital Certificates and the PKI 1 min. Incident Response and Forensic Data Collection 50 min.
Symmetrical vs Asymmetrical Encryption 17 min. Identifying an Incident 16 min.
Digital Certificates Overview 6 min. Containing and Mitigating an Outbreak 10 min.
Digital Signatures 13 min. Forensic Data Collection 11 min.
Creating an HTTPS Session Key 9 min. Forensics In the Cloud 7 min.
Public Key Infrastructure 10 min. Forensic Evidence Management 6 min.
Quiz and Review 5 min.
Standards, Regulations, & Controls 61 min.
WEEK 10 Implement PKI 72 min. Intro to Standards, Regulations, & Controls 1 min.
Intro to Implementing PKI 1 min. Control Types 10 min.
Control Functions 11 min. Quiz and Review 6 min.
Regulations, Standards, and Legislation 12 min.
Key frameworks 8 min.
Benchmarks and Guides for Secure Configuration 12 min.
Quiz and Review 7 min.

WEEK 12 Policies for Security 68 min.


Intro to Policies for Security 1 min.
Policies About Personnel 15 min.
Policies and Culture for Learning 9 min.
Diversity and Security 11 min.
End of Life Policies 7 min.
Data Policies 6 min.
Credential Policies 6 min.
Policies about Change 6 min.
Quiz and Review 7 min.

Risk Management 61 min.


Intro to Risk Management 1 min.
Risk Vocabulary 8 min.
Threat Agents and Types of Risk 7 min.
Risk Management Strategies 13 min.
Risk Assessments & Analysis 15 min.
BIA and Recovery 12 min.
Quiz and Review 5 min.

WEEK 13 Data Privacy 48 min.


Intro to Data Privacy 1 min.
Roles and Responsibilities 4 min.
Consequences of a Breach 14 min.
Data Types 9 min.
Improving Privacy 6 min.
Planning Data Security 8 min.

Last updated 09.19.2022

You might also like