Never stop talking " STOP the Gaza Genocide "
  • Lesson.No : 60
  • 00:05:15
  • Configuration Management - SY0-601 CompTIA Security+ : 2.1

  • Play
Loading...

Course Lessons

  1. 1- How to Pass your SY0-601 Security+ Exam
  2. 2- Phishing - SY0-601 CompTIA Security+ : 1.1
  3. 3- Impersonation - CompTIA SY0-601 Security+ : 1.1
  4. 4- Dumpster Diving - SY0-601 CompTIA Security+ : 1.1
  5. 5- Shoulder Surfing - SY0-601 CompTIA Security+ : 1.1
  6. 6- Hoaxes - SY0-601 CompTIA Security+ : 1.1
  7. 7- Watering Hole Attacks - SY0-601 CompTIA Security+ : 1.1
  8. 8- Spam - SY0-601 CompTIA Security+ : 1.1
  9. 9- Influence Campaigns - SY0-601 CompTIA Security+ : 1.1
  10. 10- Other Social Engineering Attacks - SY0-601 CompTIA Security+ : 1.1
  11. 11- Principles of Social Engineering - SY0-601 CompTIA Security+ : 1.1
  12. 12- An Overview of Malware - SY0-601 CompTIA Security+ : 1.2
  13. 13- Viruses and Worms - SY0-601 CompTIA Security+ : 1.2
  14. 14- Ransomware and Crypto-malware - SY0-601 CompTIA Security+ : 1.2
  15. 15- Trojan and RATs - SY0-601 CompTIA Security+ : 1.2
  16. 16- Rootkits - SY0-601 CompTIA Security+ : 1.2
  17. 17- Spyware - SY0-601 CompTIA Security+ : 1.2
  18. 18- Bots and Botnets - SY0-601 CompTIA Security+ : 1.2
  19. 19- Logic Bombs - SY0-601 CompTIA Security+ : 1.2
  20. 20- Password Attacks - SY0-601 CompTIA Security+ : 1.2
  21. 21- Physical Attacks - SY0-601 CompTIA Security+ : 1.2
  22. 22- Adversarial Artificial Intelligence - SY0-601 CompTIA Security+ : 1.2
  23. 23- Supply Chain Attacks - SY0-601 CompTIA Security+ : 1.2
  24. 24- Cloud-based vs. On-Premises Attacks - SY0-601 CompTIA Security+ : 1.2
  25. 25- Cryptographic Attacks - SY0-601 CompTIA Security+ : 1.2
  26. 26- Privilege Escalation - SY0-601 CompTIA Security+ : 1.3
  27. 27- Cross-site Scripting - SY0-601 CompTIA Security+ : 1.3
  28. 28- Injection Attacks - SY0-601 CompTIA Security+ : 1.3
  29. 29- Buffer Overflows - SY0-601 CompTIA Security+ : 1.3
  30. 30- Replay Attacks - SY0-601 CompTIA Security+ : 1.3
  31. 31- Request Forgeries - SY0-601 CompTIA Security+ : 1.3
  32. 32- Driver Manipulation - SY0-601 CompTIA Security+ : 1.3
  33. 33- SSL Stripping - SY0-601 CompTIA Security+ : 1.3
  34. 34- Race Conditions - SY0-601 CompTIA Security+ : 1.3
  35. 35- Other Application Attacks - SY0-601 CompTIA Security+ : 1.3
  36. 36- Rogue Access Points and Evil Twins - SY0-601 CompTIA Security+ : 1.4
  37. 37- Bluejacking and Bluesnarfing - SY0-601 CompTIA Security+ : 1.4
  38. 38- Wireless Disassociation Attacks - SY0-601 CompTIA Security+ : 1.4
  39. 39- Wireless Jamming - SY0-601 CompTIA Security+ : 1.4
  40. 40- RFID and NFC Attacks - SY0-601 CompTIA Security+ : 1.4
  41. 41- Randomizing Cryptography - SY0-601 CompTIA Security+ : 1.4
  42. 42- On-Path Attacks - SY0-601 CompTIA Security+ : 1.4
  43. 43- MAC Flooding and Cloning - SY0-601 CompTIA Security+ : 1.4
  44. 44- DNS Attacks - SY0-601 CompTIA Security+ : 1.4
  45. 45- Denial of Service - SY0-601 CompTIA Security+ : 1.4
  46. 46- Malicious Scripts - SY0-601 CompTIA Security+ : 1.4
  47. 47- Threat Actors - SY0-601 CompTIA Security+ : 1.5
  48. 48- Attack Vectors - SY0-601 CompTIA Security+ : 1.5
  49. 49- Threat Intelligence - SY0-601 CompTIA Security+ : 1.5
  50. 50- Threat Research - SY0-601 CompTIA Security+ : 1.5
  51. 51- Vulnerability Types - SY0-601 CompTIA Security+ : 1.6
  52. 52- Third-party Risks - SY0-601 CompTIA Security+ : 1.6
  53. 53- Vulnerability Impacts - SY0-601 CompTIA Security+ : 1.6
  54. 54- Threat Hunting - SY0-601 CompTIA Security+ : 1.7
  55. 55- Vulnerability Scans - SY0-601 CompTIA Security+ : 1.7
  56. 56- Security Information and Event Management - SY0-601 CompTIA Security+ : 1.7
  57. 57- Penetration Testing - SY0-601 CompTIA Security+ : 1.8
  58. 58- Reconnaissance - SY0-601 CompTIA Security+ : 1.8
  59. 59- Security Teams - SY0-601 CompTIA Security+ : 1.8
  60. 60- Configuration Management - SY0-601 CompTIA Security+ : 2.1
  61. 61- Protecting Data - SY0-601 CompTIA Security+ : 2.1
  62. 62- Data Loss Prevention - SY0-601 CompTIA Security+ : 2.1
  63. 63- Managing Security - SY0-601 CompTIA Security+ : 2.1
  64. 64- Site Resiliency - SY0-601 CompTIA Security+ : 2.1
  65. 65- Honeypots and Deception - SY0-601 CompTIA Security+ : 2.1
  66. 66- Cloud Models - SY0-601 CompTIA Security+ : 2.2
  67. 67- Edge and Fog Computing - SY0-601 CompTIA Security+ : 2.2
  68. 68- Designing the Cloud - SY0-601 CompTIA Security+ : 2.2
  69. 69- Infrastructure as Code - SY0-601 CompTIA Security+ : 2.2
  70. 70- Virtualization Security - SY0-601 CompTIA Security+ : 2.2
  71. 71- Secure Deployments - SY0-601 CompTIA Security+ : 2.3
  72. 72- Provisioning and Deprovisioning - SY0-601 CompTIA Security+ : 2.3
  73. 73- Secure Coding Techniques - SY0-601 CompTIA Security+ : 2.3
  74. 74- Software Diversity - SY0-601 CompTIA Security+ : 2.3
  75. 75- Automation and Scripting - SY0-601 CompTIA Security+ : 2.3
  76. 76- Authentication Methods - SY0-601 CompTIA Security+ : 2.4
  77. 77- Biometrics - SY0-601 CompTIA Security+ : 2.4
  78. 78- Multi-factor Authentication - SY0-601 CompTIA Security+ : 2.4
  79. 79- Disk Redundancy - SY0-601 CompTIA Security+ : 2.5
  80. 80- Network Redundancy - SY0-601 CompTIA Security+ : 2.5
  81. 81- Power Redundancy - SY0-601 CompTIA Security+ : 2.5
  82. 82- Replication - SY0-601 CompTIA Security+ : 2.5
  83. 83- Backup Types - SY0-601 CompTIA Security+ : 2.5
  84. 84- Resiliency - SY0-601 CompTIA Security+ : 2.5
  85. 85- Embedded Systems - SY0-601 CompTIA Security+ : 2.6
  86. 86- Embedded Systems Communication - SY0-601 CompTIA Security+ : 2.6
  87. 87- Embedded Systems Constraints - SY0-601 CompTIA Security+ : 2.6
  88. 88- Physical Security Controls - SY0-601 CompTIA Security+ : 2.7
  89. 89- Secure Areas - SY0-601 CompTIA Security+ : 2.7
  90. 90- Secure Data Destruction - SY0-601 CompTIA Security+ : 2.7
  91. 91- Cryptography Concepts - SY0-601 CompTIA Security+ : 2.8
  92. 92- Symmetric and Asymmetric Cryptography - SY0-601 CompTIA Security+ : 2.8
  93. 93- Hashing and Digital Signatures - SY0-601 CompTIA Security+ : 2.8
  94. 94- Cryptographic Keys - SY0-601 CompTIA Security+ : 2.8
  95. 95- Steganography - SY0-601 CompTIA Security+ : 2.8
  96. 96- Quantum Computing - SY0-601 CompTIA Security+ : 2.8
  97. 97- Stream and Block Ciphers - SY0-601 CompTIA Security+ : 2.8
  98. 98- Blockchain Technology - SY0-601 CompTIA Security+ : 2.8
  99. 99- Cryptography Use Cases - SY0-601 CompTIA Security+ : 2.8
  100. 100- Cryptography Limitations - SY0-601 CompTIA Security+ : 2.8
  101. 101- Secure Protocols - SY0-601 CompTIA Security+ : 3.1
  102. 102- Endpoint Protection - SY0-601 CompTIA Security+ : 3.2
  103. 103- Boot Integrity - SY0-601 CompTIA Security+ : 3.2
  104. 104- Database Security - SY0-601 CompTIA Security+ : 3.2
  105. 105- Application Security - SY0-601 CompTIA Security+ : 3.2
  106. 106- Application Hardening - SY0-601 CompTIA Security+ : 3.2
  107. 107- Load Balancing - SY0-601 CompTIA Security+ : 3.3
  108. 108- Network Segmentation - SY0-601 CompTIA Security+ : 3.3
  109. 109- Virtual Private Networks - SY0-601 CompTIA Security+ : 3.3
  110. 110- Port Security - SY0-601 CompTIA Security+ : 3.3
  111. 111- Secure Networking - SY0-601 CompTIA Security+ : 3.3
  112. 112- Firewalls - SY0-601 CompTIA Security+ : 3.3
  113. 113- Network Access Control - SY0-601 CompTIA Security+ : 3.3
  114. 114- Proxy Servers - SY0-601 CompTIA Security+ : 3.3
  115. 115- Intrusion Prevention - SY0-601 CompTIA Security+ : 3.3
  116. 116- Other Network Appliances - SY0-601 CompTIA Security+ : 3.3
  117. 117- Wireless Cryptography - SY0-601 CompTIA Security+ : 3.4
  118. 118- Wireless Authentication Methods - SY0-601 CompTIA Security+ : 3.4
  119. 119- Wireless Authentication Protocols - SY0-601 CompTIA Security+ : 3.4
  120. 120- Installing Wireless Networks - SY0-601 CompTIA Security+ : 3.4
  121. 121- Mobile Networks - SY0-601 CompTIA Security+ : 3.5
  122. 122- Mobile Device Management - SY0-601 CompTIA Security+ : 3.5
  123. 123- Mobile Device Security - SY0-601 CompTIA Security+ : 3.5
  124. 124- Mobile Device Enforcement - SY0-601 CompTIA Security+ : 3.5
  125. 125- Mobile Deployment Models - SY0-601 CompTIA Security+ : 3.5
  126. 126- Cloud Security Controls - SY0-601 CompTIA Security+ : 3.6
  127. 127- Securing Cloud Storage - SY0-601 CompTIA Security+ : 3.6
  128. 128- Securing Cloud Networks - SY0-601 CompTIA Security+ : 3.6
  129. 129- Securing Compute Clouds - SY0-601 CompTIA Security+ : 3.6
  130. 130- Cloud Security Solutions - SY0-601 CompTIA Security+ : 3.6
  131. 131- Identity Controls - SY0-601 CompTIA Security+ : 3.7
  132. 132- Account Types - SY0-601 CompTIA Security+ : 3.7
  133. 133- Account Policies - SY0-601 CompTIA Security+ : 3.7
  134. 134- Authentication Management - SY0-601 CompTIA Security+ : 3.8
  135. 135- PAP and CHAP - SY0-601 CompTIA Security+ : 3.8
  136. 136- Identity and Access Services - SY0-601 CompTIA Security+ : 3.8
  137. 137- Federated Identities - SY0-601 CompTIA Security+ : 3.8
  138. 138- Access Control - SY0-601 CompTIA Security+ : 3.8
  139. 139- Public Key Infrastructure - SY0-601 CompTIA Security+ : 3.9
  140. 140- Certificates - SY0-601 CompTIA Security+ : 3.9
  141. 141- Certificate Formats - SY0-601 CompTIA Security+ : 3.9
  142. 142- Certificate Concepts - SY0-601 CompTIA Security+ : 3.9
  143. 143- Reconnaissance Tools - Part 1 - SY0-601 CompTIA Security+ : 4.1
  144. 144- Reconnaissance Tools - Part 2 - SY0-601 CompTIA Security+ : 4.1
  145. 145- File Manipulation Tools - SY0-601 CompTIA Security+ : 4.1
  146. 146- Shell and Script Environments - SY0-601 CompTIA Security+ : 4.1
  147. 147- Packet Tools - SY0-601 CompTIA Security+ : 4.1
  148. 148- Forensic Tools - SY0-601 CompTIA Security+ : 4.1
  149. 149- Incident Response Process - SY0-601 CompTIA Security+ : 4.2
  150. 150- Incident Response Planning - SY0-601 CompTIA Security+ : 4.2
  151. 151- Attack Frameworks - SY0-601 CompTIA Security+ : 4.2
  152. 152- Vulnerability Scan Output - SY0-601 CompTIA Security+ : 4.3
  153. 153- SIEM Dashboards - SY0-601 CompTIA Security+ : 4.3
  154. 154- Log Files - SY0-601 CompTIA Security+ : 4.3
  155. 155- Log Management - SY0-601 CompTIA Security+ : 4.3
  156. 156- Endpoint Security Configuration - SY0-601 CompTIA Security+ : 4.4
  157. 157- Security Configurations - SY0-601 CompTIA Security+ : 4.4
  158. 158- Digital Forensics - SY0-601 CompTIA Security+ : 4.5
  159. 159- Forensics Data Acquisition - SY0-601 CompTIA Security+ : 4.5
  160. 160- On-Premises vs. Cloud Forensics - SY0-601 CompTIA Security+ : 4.5
  161. 161- Managing Evidence - SY0-601 CompTIA Security+ : 4.5
  162. 162- Security Controls - SY0-601 CompTIA Security+ : 5.1
  163. 163- Security Regulations and Standards - SY0-601 CompTIA Security+ : 5.2
  164. 164- Security Frameworks - SY0-601 CompTIA Security+ : 5.2
  165. 165- Security Configurations - SY0-601 CompTIA Security+ : 5.2
  166. 166- Personnel Security - SY0-601 CompTIA Security+ : 5.3
  167. 167- Third-party Risk Management - SY0-601 CompTIA Security+ : 5.3
  168. 168- Managing Data - SY0-601 CompTIA Security+ : 5.3
  169. 169- Credential Policies - SY0-601 CompTIA Security+ : 5.3
  170. 170- Organizational Policies - SY0-601 CompTIA Security+ : 5.3
  171. 171- Risk Management Types - SY0-601 CompTIA Security+ : 5.4
  172. 172- Risk Analysis - SY0-601 CompTIA Security+ : 5.4
  173. 173- Business Impact Analysis - SY0-601 CompTIA Security+ : 5.4
  174. 174- Privacy and Data Breaches - SY0-601 CompTIA Security+ : 5.5
  175. 175- Data Classifications - SY0-601 CompTIA Security+ : 5.5
  176. 176- Enhancing Privacy - SY0-601 CompTIA Security+ : 5.5
  177. 177- Data Roles and Responsibilities - SY0-601 CompTIA Security+ : 5.5