SY0-501: CompTIA Security+

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

What’s included

  • 222 : Lectures
  • 14h 34m 26s : Duration
video-file-formats

$14.99/24.99


Lectures
1. Overview of Security- 2m 55s
2. CIA Triad- 3m 54s
3. AAA of Security- 3m 5s
4. Security Threats- 2m 57s
5. Mitigating Threats- 2m 28s
6. Hackers- 4m 53s
7. Threat Actors- 3m 12s

Lectures
1. Malware- 39s
2. Viruses- 6m 21s
3. Worms- 2m 9s
4. Trojans- 2m 48s
5. Demo: Viruses and Trojans- 6m 16s
6. Ransomware- 2m 30s
7. Spyware- 2m 39s
8. Rootkits- 3m 29s
9. Spam- 2m 56s
10. Summary of Malware- 2m 2s

Lectures
1. Malware Infections- 4m 12s
2. Common Delivery Methods- 3m 23s
3. Botnets and Zombies- 3m 30s
4. Active Interception and Privilege Escalation- 2m 28s
5. Demo: Privilege Escalation- 5m 41s
6. Backdoors and Logic Bombs- 3m 48s
7. Symptoms of Infection- 4m 10s
8. Removing Malware- 5m 1s
9. Preventing Malware- 5m 56s

Lectures
1. Security Applications and Devices- 33s
2. Software Firewalls- 4m 16s
3. Demo: Software Firewalls- 6m 44s
4. IDS- 5m 3s
5. Pop-up Blockers- 3m 9s
6. Data Loss Prevention (DLP)- 3m 43s
7. Securing the BIOS- 3m 56s
8. Securing Storage Devices- 3m 26s
9. Disk Encryption- 4m 51s

Lectures
1. Mobile Device Security- 1m 14s
2. Securing Wireless Devices- 1m 30s
3. Mobile Malware- 6m 19s
4. SIM Cloning & ID Theft- 4m
5. Bluetooth Attacks- 2m 8s
6. Mobile Device Theft- 3m 10s
7. Security of Apps- 5m 6s
8. BYOD- 4m 56s
9. Hardening Mobile Devices- 3m 51s

Lectures
1. Hardening- 1m 47s
2. Unnecessary Applications- 3m 10s
3. Restricting Applications- 2m 56s
4. Demo: Unnecessary Services- 5m 35s
5. Trusted Operating System- 1m 57s
6. Updates and Patches- 3m 26s
7. Patch Management- 3m 49s
8. Group Policies- 2m 33s
9. Demo: Group Policies- 4m 6s
10. File Systems and Hard Drives- 3m 18s

Lectures
1. Virtualization- 2m 7s
2. Hypervisors- 2m 37s
3. Demo: How to create a VM- 4m 39s
4. Threats to VMs- 3m 43s
5. Securing VMs- 3m 47s
6. Demo: Securing VMs- 4m 41s

Lectures
1. Application Security- 1m 43s
2. Web Browser Security- 6m 39s
3. Web Browser Concerns- 3m 19s
4. Demo: Web Browser Configuration- 5m 20s
5. Securing Applications- 4m 49s

Lectures
1. Software Development- 8m 34s
2. SDLC Principles- 6m 22s
3. Testing Methods- 6m 59s
4. Software Vulnerabilities and Exploits- 2m 28s
5. Buffer Overflows- 6m 15s
6. Demo: Buffer Overflow Attack- 6m 25s
7. XSS and XSRF- 3m 7s
8. SQL Injection- 6m 25s
9. Demo: SQL Injection- 7m 13s

Lectures
1. Network Security- 44s
2. The OSI Model- 6m
3. Switches- 3m 32s
4. Routers- 2m 27s
5. Network Zones- 3m 26s
6. Network Access Control- 2m 40s
7. VLANs- 1m 30s
8. Subnetting- 1m 51s
9. Network Address Translation- 2m 26s
10. Telephony- 5m 58s

Lectures
1. Perimeter Security- 46s
2. Firewalls- 8m 1s
3. Demo: SOHO Firewall- 4m 4s
4. Proxy Servers- 4m 12s
5. Honeypots and Honeynets- 1m 22s
6. Data Loss Prevention- 1m 35s
7. NIDS and NIPS- 4m 11s
8. Unified Threat Management- 1m 52s

Lectures
1. Cloud Computing- 3m 29s
2. Cloud Types- 2m 51s
3. As a Service- 7m 4s
4. Cloud Security- 2m 25s
5. Defending Servers- 4m 32s

Lectures
1. Network Attacks- 38s
2. Ports and Protocols- 54s
3. Memorization of Ports- 11m 30s
4. Unnecessary Ports- 3m 21s
5. Denial of Service- 7m 56s
6. DDoS- 1m 36s
7. Stopping a DDoS- 2m 27s
8. Spoofing- 1m 16s
9. Hijacking- 3m 45s
10. Replay Attack- 1m 27s
11. Demo: Null Sessions- 2m 24s
12. Transitive Attacks- 1m 24s
13. DNS Attacks- 4m 33s
14. ARP Poisoning- 1m 30s

Lectures
1. Securing Networks- 49s
2. Securing Network Devices- 6m 43s
3. Securing Network Media- 8m 48s
4. Securing WiFi Devices- 4m 22s
5. Wireless Encryption- 5m 30s
6. Wireless Access Points- 6m 11s
7. Wireless Attacks- 4m 15s
8. Demo: Wireless Attack- 6m 58s
9. Other Wireless Technologies- 6m 2s

Lectures
1. Physical Security- 1m 30s
2. Surveillance- 2m 51s
3. Door Locks- 3m 47s
4. Demo: Lock Picking- 1m 36s
5. Biometric Readers- 4m 15s

Lectures
1. Facilities Security- 36s
2. Fire Suppression- 6m 21s
3. HVAC- 2m 23s
4. Shielding- 2m 34s
5. Vehicles- 2m 3s

Lectures
1. Authentication- 5m 53s
2. Authentication Models- 5m 17s
3. 802.1x- 3m 44s
4. LDAP and Kerberos- 2m 26s
5. Remote Desktop Services- 1m 51s
6. Remote Access Service- 2m 3s
7. VPN- 3m 2s
8. RADIUS vs TACACS+- 2m 18s
9. Authentication Summary- 2m 4s

Lectures
1. Access Control- 50s
2. Access Control Models- 8m 14s
3. Best Practices- 5m 44s
4. Users and Groups- 9m 12s
5. Permissions- 3m 41s
6. Usernames and Passwords- 2m 36s
7. Demo: Policies- 4m 34s
8. User Account Control- 1m 53s

Lectures
1. Risk Assessments- 8m 33s
2. Qualitative Risk- 4m 6s
3. Quantitative Risk- 5m 27s
4. Methodologies- 2m 49s
5. Security Controls- 6m 49s
6. Vulnerability Management- 7m 50s
7. Penetration Testing- 4m 26s
8. OVAL- 1m 34s
9. Vulnerability Assessments- 6m 52s
10. Demo: Nmap Scanning- 8m 50s
11. Demo: Vulnerability Scanning- 9m 33s
12. Password Analysis- 5m 54s
13. Demo: Password Cracking- 2m 36s

Lectures
1. Monitoring Types- 2m 54s
2. Performance Baselining- 4m 35s
3. Protocol Analyzers- 2m 58s
4. SNMP- 3m 40s
5. Demo: Analytical Tools- 4m 27s
6. Auditing- 1m 54s
7. Demo: Auditing Files- 3m 53s
8. Logging- 3m 39s
9. Log Files- 5m 14s
10. SIEM- 2m 54s

Lectures
1. Cryptography- 4m 56s
2. Symmetric vs Asymmetric- 6m 12s
3. Symmetric Algorithms- 4m 56s
4. Public Key Cryptography- 3m 9s
5. Asymmetric Algorithms- 3m 44s
6. Pretty Good Privacy- 1m 46s
7. Key Management- 2m 11s
8. One-Time Pad- 4m 18s
9. Hashing- 8m 27s
10. Demo: Hashing- 3m 4s
11. Hashing Attacks- 3m 15s
12. Increasing Hash Security- 1m 26s

Lectures
1. Public Key Infrastructure- 3m 53s
2. Digital Certificates- 6m 42s
3. Demo: Certificates- 3m 31s
4. Certificate Authorities- 4m 12s
5. Web of Trust- 2m 35s

Lectures
1. Security Protocols- 21s
2. S/MIME- 1m 29s
3. SSL and TLS- 5m 48s
4. SSH- 2m 28s
5. VPN Protocols- 6m 37s
6. Demo: Setting up a VPN- 1m 37s

Lectures
1. Planning for the Worst- 2m 9s
2. Redundant Power- 3m 8s
3. Backup Power- 3m 6s
4. Data Redundancy- 4m 39s
5. Demo: RAIDs- 3m 35s
6. Network Redundancy- 2m 4s
7. Server Redundancy- 1m 42s
8. Redundant Sites- 2m 20s
9. Data Backup- 2m 54s
10. Tape Rotation- 3m 52s
11. Disaster Recovery Plan- 5m 38s

Lectures
1. Social Engineering- 52s
2. Demo: Pretexting- 4m 14s
3. Insider Threat- 2m 10s
4. Phishing- 1m 13s
5. More Social Engineering- 4m
6. User Education- 4m 44s

Lectures
1. Policies and Procedures- 5m 53s
2. Data Classifications- 6m 42s
3. PII and PHI- 6m 19s
4. Security Policies- 10m 19s
5. User Education- 4m 2s
6. Vendor Relationships- 7m 52s
7. Disposal Policies- 5m 4s
8. Incident Response Procedures- 4m 36s
9. Data Collection Procedures- 3m 11s
10. Demo: Disk Imaging- 6m 56s
11. IT Security Frameworks- 3m 18s

Lectures
1. Exam Tricks- 4m 9s

PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

Helpful Pages

© 2025 All Rights Reserved passqueen.com.