Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99/24.99
Lectures |
---|
1. SY0-501 vs- 1m |
2. Exam Information- 6m |
3. Building a lab- 8m |
Lectures |
---|
1. CIA Triade- 5m |
2. IAAA- 5m |
3. Basic security controls- 2m |
Lectures |
---|
1. Phishing, Smishing, Vishing, Spear phishing, Whaling- 11m |
2. Dumpster diving and Shoulder surfing- 5m |
3. Eliciting information and the principles of social engineering- 9m |
4. Pharming- 7m |
5. Spam- 4m |
6. Tailgating- 3m |
7. Other types Social Engineer techniques- 15m |
Lectures |
---|
1. Introduction to Malware- 2m |
2. Ransomeware and Cryptomalware- 7m |
3. Trojans and RAT's- 6m |
4. Bot and Command and control- 4m |
5. Fileless Virus, Logic bombs, spyware, rootkit, backdoor- 5m |
6. Adversarial artificial intelligence (AI)- 6m |
7. Malicious USB cables, drives and Card Cloning- 4m |
8. Supply chain attacks- 4m |
9. Keyloggers- 16m |
10. How passwords are stored- 5m |
11. Using hashcat to crack passwords- 7m |
12. Using a brute force and rainbow tables to attack passwords- 11m |
Lectures |
---|
1. Privilege escalation, (SSL) stripping, Pass the hash- 11m |
2. Cross-site scripting (XSS) and Injections- 16m |
3. Pointer Dereference, directory traversal, buffer overflows, and tocttou- 12m |
4. Replay attacks- 4m |
5. Request forgeries- 9m |
6. API Attacks- 7m |
7. Driver manipulation- 5m |
8. Integer overflow, Resource exhaustion, Memory leak- 6m |
Lectures |
---|
1. Evil Twin and Rouge Access Point- 6m |
2. Bluesnarfing and Bluejacking- 3m |
3. Cracking WEP- 10m |
4. Disassociation and Jamming- 7m |
5. Man in the Middle, browser, and APR Poisoning- 19m |
6. IV, RFID, NFC Attacks- 6m |
7. MAC Flooding and Cloning- 6m |
8. DDOS Attacks- 8m |
9. Malicious Code- 4m |
Lectures |
---|
1. Actors and threats- 13m |
2. Threat intelligence sources- 17m |
3. Research sources- 11m |
Lectures |
---|
1. Cloud-based vs- 10m |
2. Weak configurations- 9m |
3. Third-party risks, Improper or weak patch, legacy platforms- 10m |
4. Impacts- 6m |
Lectures |
---|
1. Threat hunting- 4m |
2. Vulnerability scans- 18m |
3. SIEM and SOAR- 13m |
Lectures |
---|
1. Penetration testing- 14m |
2. Passive and active reconnaissance- 4m |
3. Exercise types- 4m |
Lectures |
---|
1. Configuration management- 12m |
2. Data Sovereignty and Protection- 12m |
3. Other Security Consideration- 13m |
4. Site Resiliency, Hot, Warm, Cold- 6m |
5. Deception and disruption- 6m |
Lectures |
---|
1. IaaS- 11m |
2. PaaS- 5m |
3. SaaS, XaaS- 5m |
4. Cloud Deployment- 2m |
5. Cloud Application terms- 21m |
6. IaC- 13m |
7. Virtualization Issues- 5m |
Lectures |
---|
1. Software Development Environment- 3m |
2. Secure Coding Techniques- 19m |
3. DevOps and Automation- 9m |
Lectures |
---|
1. Authentication methods- 11m |
2. Biometrics- 9m |
3. MFA- 5m |
4. Authentication, authorization, and accounting- 3m |
Lectures |
---|
1. Redundancy- 9m |
2. Replication and storages- 9m |
3. Backup Types- 14m |
4. Non-persistence, high availability, diversity- 6m |
5. RAID- 16m |
Lectures |
---|
1. Embedded Systems- 4m |
2. Industrial control system- 4m |
3. IoT- 4m |
4. IoT Communication and considerations- 7m |
Lectures |
---|
1. Physical Security Controls- 9m |
2. Other physical security controls- 7m |
3. Locks and Fencings- 7m |
4. Fire Suppression- 3m |
5. Secure data destruction- 6m |
Lectures |
---|
1. Introduction to cryptography- 4m |
2. Goals of cryptography- 6m |
3. Algorithm and Keys- 20m |
4. Block and stream ciphers- 4m |
5. Symmetric Ciphers- 9m |
6. Asymmetric Ciphers- 10m |
7. Hashing- 13m |
8. Hybrid cryptography- 9m |
9. Digital signatures- 6m |
10. Block Chain- 7m |
11. Steganography- 8m |
12. Key stretching- 2m |
13. Salting- 6m |
14. Quantum- 3m |
15. Ephemeral, PFS, Homomorphic- 3m |
16. Cipher Modes- 5m |
17. Lightweight cryptography- 3m |
18. Elliptic-curve cryptography- 3m |
19. Cipher suites- 2m |
20. Common use cases- 3m |
21. Limitations of encryptions- 4m |
Lectures |
---|
1. DNSSEC- 4m |
2. Email security with S/MIME and PMP- 5m |
3. Installing Wireshark on Windows 10- 8m |
4. Install and setup an FTP Server and Client- 10m |
5. Using Wireshark to capture an FTP Password and securing FTP Server- 9m |
6. Lightweight Directory Access Protocol Over SSL- 5m |
7. SRPT, FTPS, SFTP, SNMP, IMAP- 6m |
8. SSH- 5m |
9. VPN and IPSEC- 21m |
10. Use Cases for secure protocols- 5m |
Lectures |
---|
1. Endpoint Protection- 5m |
2. Boot integrity- 3m |
3. Databases- 2m |
4. Application Security- 10m |
5. Hardening systems- 6m |
6. Drive Encryption and sandboxing- 9m |
Lectures |
---|
1. Load Balancing- 7m |
2. Network segmentation- 7m |
3. How to download and install packet tracer- 9m |
4. VLAN's and Port Security- 18m |
5. Firewalls- 13m |
6. Configuring firewall rules- 11m |
7. Jump and Proxy servers- 4m |
8. IDS and IPS- 9m |
9. Other network secure concepts- 8m |
Lectures |
---|
1. Wireless Security- 17m |
2. Wireless Installation Considerations- 5m |
Lectures |
---|
1. Mobile Connection methods and receivers- 3m |
2. Mobile device management (MDM)- 5m |
3. UEM and MAM- 4m |
4. Enforcement and monitoring of mobile devices- 7m |
5. Mobile Deployment Models- 4m |
Lectures |
---|
1. Cloud Solutions controls- 3m |
2. Cloud Network and computing- 5m |
3. Cloud Security terms- 7m |
Lectures |
---|
1. Identity and account types- 5m |
2. Account policies- 12m |
Lectures |
---|
1. Authentication management- 4m |
2. Authentication Protocols- 19m |
3. Access control schemes- 14m |
Lectures |
---|
1. Introduction to PKI- 5m |
2. Process of getting a certificate- 7m |
3. PKI Setup- 16m |
4. Fields on a certificate- 7m |
5. Certificate formats- 2m |
6. Certificate types- 6m |
Lectures |
---|
1. Introductions to commands- 2m |
2. ARP and Route- 3m |
3. hping- 6m |
4. Curl- 4m |
5. IP scanner- 3m |
6. ipconfig, ping, tracert- 4m |
7. Linux file manipulation, head, tail, cat- 5m |
8. Log- 3m |
9. Cuckoo- 1m |
10. thehavester- 2m |
11. Nslookup and Dig- 2m |
12. tcpdump- 4m |
13. NetCat- 2m |
14. Sniper- 5m |
15. scanless- 2m |
16. nmap- 4m |
17. Managing Linux Permissions- 16m |
18. Shell and script environments- 2m |
19. Exploitation frameworks- 4m |
20. Forensics tools- 7m |
Lectures |
---|
1. Incident response process- 8m |
2. Attack Frameworks- 5m |
3. Incidents plans and exercises- 6m |
Lectures |
---|
1. Log Files- 7m |
2. Capture log files- 7m |
Lectures |
---|
1. Incident mitigation techniques- 8m |
Lectures |
---|
1. Documentation and evidence- 6m |
Lectures |
---|
1. Control Types and category- 6m |
Lectures |
---|
1. Regulations, standards, and legislation- 5m |
2. Key frameworks- 15m |
3. Secure configuration guides- 2m |
Lectures |
---|
1. Personnel Controls- 15m |
2. Third-party risk management- 6m |
3. Credential and organizations policies- 7m |
Lectures |
---|
1. Risk types, terms, and Process- 12m |
2. Risk management strategies- 6m |
3. Risk Assessments- 9m |
4. Business impact analysis- 8m |
Lectures |
---|
1. Privacy breaches- 4m |
2. Data types- 6m |
3. Privacy technologies and roles- 7m |
Lectures |
---|
1. Performance Based Questions Introduction- 1m |
2. PBQ - Attack Types and Response- 2m |
3. PBQ - Incident Response- 2m |
4. PBQ - Social Engineering- 2m |
5. PBQ - Firewalls- 4m |
PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.
Other Pages
© 2025 All Rights Reserved passqueen.com.