CompTIA FC0-U61: IT Fundamentals
Module 1 - IT Concepts and Terminology
- 0.1 Instructor Intro
- 1.1 Compare and Contrast Notational Systems
- 1.1 Compare and Contrast Notational Systems Demo
- 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
- 1.3 Illustrate the Basics of Computing and Processing
- 1.4 Explain the Value of Data and Information
- 1.5 Compare and Contrast Common Units of Measure
- 1.5 Compare and Contrast Common Units of Measure Demo
- 1.6 Explain the Troubleshooting Methodology
Module 2 - Infrastructure
- 2.1 Classify Common Types of Input-Output Devices Interfaces
- 2.2 Given a Scenario, Set Up & Install Common Peripheral Devices to a PC
- 2.2 Given a Scenario, Set Up & Install Common Peripheral Devices to a PC Demo
- 2.3 Explain the Purpose of Common Internal Computing Components
- 2.4 Compare & Contrast Common Internet Service Types-
- 2.5 Compare & Contrast Storage Types
- 2.6 Compare & Contrast Common Computing Devices & Their Purposes
- 2.7 Explain Basic Networking Concepts
- 2.7 Explain Basic Networking Concepts Part 2
- 2.7 Explain Basic Networking Concepts Part 3
- 2.7 Explain Basic Networking Concepts Part 4
- 2.7 Explain Basic Networking Concepts Part 5
- 2.8 Given a Scenario Install, Configure, & Service a Basic Wireless Network
- 2.8 Given a Scenario Install, Configure, & Service a Basic Wireless Network Demo
Module 3 - Applications and Software
- 3.1 Explain the Purpose of Operating Systems
- 3.1 Explain the Purpose of Operating Systems Demo
- 3.2 Compare & Contrast Components of an Operating System
- 3.2 Compare & Contrast Components of an Operating System Demo
- 3.3 Explain the Purpose & Proper Use of Software
- 3.4 Explain Methods of Application Architecture & Delivery Models
- 3.5 Given a Scenario Configure & Use Web Browsers
- 3.5 Given a Scenario Configure & Use Web Browsers FireFox
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
- 3.6 Compare & Contrast General Application Concepts & Uses
Module 4 - Software Development
- 4.1 Compare & Contrast Programming Language Categories-
- 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
- 4.3 Explain the Purpose & Use of Programming Concepts-
- 4.3 HTML Demo
Module 5 - Database Fundamentals
- 5.1 Explain Database Concepts and the Purpose of Databases
- 5.2 Compare and Contrast Various Database Structures
- 5.3 Summarize Methods Used to Interface with Databases
- 5.3 Summarize Methods Used to Interface with Databases Demo
Module 6 - Security
- 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
- 6.2 Explain Methods to Secure Devices and Best Practices
- 6.3 Summarize Behavioral Security Concepts
- 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
- 6.5 Explain Password Best Practices
- 6.6 Explain Common Uses of Encryption
- 6.7 Explain Business Continuity Concepts
- 6.8 Takeaways
- 6.9 ITF Fundamentals Conclusion
CompTIA A+ 220-1001 (Core 1) and CompTIA A+ 220-1002 (Core 2)
220-1001 Module 1 - Mobile Devices
- 0.1 Intro to A+ Core 1 Instructor
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Devices Part 1
- 1.1 Mobile Devices Part 2
- 1.1 Mobile Devices Part 3
- 1.2 Installing Components in Laptop
- 1.3 Laptop Features Part 1
- 1.3 Laptop Features Part 2
- 1.4 Compare and Contrast Types of Mobile Devices
- 1.5 Accessories and Ports of Other Mobile Devices Part 1
- 1.5 Accessories and Ports of Other Mobile Devices Part 2
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
- 1.7 Use Methods to Perform Mobile Device Synchronization
- 1.8 Laptop Disassemble and Assemble
220-1001 Module 2 - Networking
- 2.1 Networking Part 1
- 2.1 Networking Part 2
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
- 2.3 Setting up a Wireless Router
- 2.4 Compare and Contrast Wireless Networking Protocols
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
- 2.6 Explain Common Network Configuration Concepts Part 1
- 2.6 Explain Common Network Configuration Concepts Part 2
- 2.7 Compare and Contrast Internet Connection Types Network Types and Features
- 2.8 Given a Scenario Using Appropriate Networking Tools
220-1001 Module 3 - Hardware
- 3.1 Hardware Part 1
- 3.1 Hardware Part 2
- 3.1 Hardware Part 3
- 3.2 Identify Common Connector Types
CompTIA N10-007: CompTIA Network+
Module 1: Networking Concepts
- Intro Network Plus N10 007
- Basic Networking
- Activity Basic Networking
- OSI Model
- Exploring the OSI Model- Act
- Protocol and Ports
- Activity Examining Protocols and Ports
- Connection-oriented vs. connectionless
- Activity Comparing TCP and UDP
- Internet Protocol (IP)
- Activity Examining the Lower Layer Protocols
- Layer 7 Remote Control Protocols
- Layer 7 File Transfer Protocols
- Layer 7 Messaging Protocols
- Activity Examining Messaging Protocols
- Layer 7 Web Traffic Protocols
- Layer 7 Streaming Media Protocols
- Layer 7 Infrastructure Management Protocols
- Switching
- Activity Creating Collision and Broadcast Domains
- Interface Properties and Segmentation
- Activity Creating a Basic Network Segment
- Switching prt 2
- Activity Switching
- Switching Loop Management
- Activity Managing Switching Loops
- VLANs
- Activity Creating VLANs
- Routing
- Activity Examining ARP
- IP Addressing Basics
- Activity Configuring IP
- Routers
- Activity Setting Up a Router
- Routing Basics
- Activity Adding Static Routes
- VLAN Routing
- Activity Routing Between VLANs
- NAT/PAT
- Activity Configuring NAT/PAT
- Routing Protocols
- Activity Configuring a Routing Protocol
- Firewalls
- Activity Configuring Firewalls
- Advanced Switching and Routing Concepts
- Activity Exploring IPv6
- Performance Concepts
- IP Addressing
- Subnetting
- Activity Learning to Subnet
- Address Assignments
- Network Types and Topologies
- Wireless Topologies
- Network Types
- Technologies that Facilitate the Internet of Things (IoT)
- Wireless Technologies
- 802.11 Standards
- Wi-Fi Frequencies
- Wi-Fi Antenna Concepts
- Bluetooth
- Cellular
- Activity Using an RF Spectrum Analyzer
- Cloud Concepts
- Activity Exploring Cloud Services
- Network Services
- Activity Setting up DNS
- DHCP Service
- Activity Setting Up DHCP
- NTP
Module 2: Infrastructure
- Activity Testing a Fiber Optic Cable
- Plenum vs. PVC
- Activity Crimping on an RJ-45 Connector
- Transceivers
- Activity Terminating Cable to a 110 Block
- Copper Cable Standards
- Activity Creating a Crossover Cable
- Ethernet Deployment Standards
- Network Device Placement and Installation
- Repeater
- Router
- Modem
- Activity Setting up a WAP
- Firewall
- Media Converter
- Advanced Network Devices
- Wireless Controller
- Proxy Server
- Activity Configuring Proxy Settings
- VPN Concentrator
- Virtual Networking Components
- Network Storage Types
- WAN Technologies
- Transmission Mediums
- Activity Configuring WAN Links
- Termination
Module 3: Network Operation
- Change Management
- IDF-MDF Documentation
- Labeling
- Logical vs Physical Diagrams
- Network Operations Documentation
- Rack Diagrams
- Standard Operation Procedures
- Using Documentation Act
- Wiring and Ports Locations
- Continuity and Disaster
- MTTR Mean Time Repair
- Recovery
- Backing Up Your Data Act
- Event Management
- Metrics
- Scanning Monitoring Patching
- Testing the Network Act
- HTTPS-Management
- Out-of-Band Management
- RDP
- Remote Access Methods
- Remote File Access
- Making Remote Connections Act
- SSH
- VNC
- Policies and Best Practices
- Creating Policies and Procedures Act
Module 4: Network Security
- Physical Security Devices
- Examining Security Devices Act
- Authentication and Access
- Access Controls Methods Act
- Multifactor Authentication
- Basic Wireless Network Security
- Demonstrating the Need for Wireless Act
- Common Network Attacks
- Conducting a Phishing Campaign Act
- Network Device Hardening
- Supporting Secure Authentication Encryption Act
- Updating Firmware
- Explain Common Mitigation Techniques
- Implementing a Honey Pot Act
Module 5: Network Troubleshooting and Tools
- Network Troubleshoot
- Hardware Tools Analyzers
- Troubleshooting with Hardware Tools Act
- Software Tools Command Line
- Troubleshooting with Command Line Tools Act
- Software Tools
- Troubleshooting with Software Tools Act
- Using the Appropriate Tools
- Physical Issues
- Traffic Flow Issues
- Transceiver Issues
- Troubleshoot Common Wired Connectivity
- Troubleshooting Signal Problems
- Troubleshooting Transceiver Problems
- Incorrect WAP Types
- Latency and Jitter
- Troubleshoot Common Wireless Connectivity
- Troubleshooting WAP Issues
- Advanced Network Issues
- Case Study Troubleshooting
- DHCP Issues
- 22. Firewall ACL Issues
- 23. Troubleshooting Common Network
- 24. Unresponsive Services
- 25. Outro N10 007
CompTIA SY0-501: Security+
Module 1 - Threats, Attacks, and Vulnerabilities
1.1 Introduction
1.2 Types of Malware - Part 1
1.3 Types of Malware - Part 2
1.4 Types of Attacks - Part 1
1.5 Types of Attacks - Part 2
1.6 Types of Attacks - Part 3
1.7 Types of Attacks - Part 4
1.8 Types of Attacks - Part 5
1.9 Threat Actors - Part 1
1.10 Threat Actors - Part 2
1.11 Penetration Testing and Vulnerability Scanning - Part 1
1.12 Penetration Testing and Vulnerability Scanning - Part 2
1.13 Impact of Vulnerabilities - Part 1
1.14 Impact of Vulnerabilities - Part 2
Module 2 - Technologies and Tools
2.1 Networking Hardware and Software - Part 1
2.2 Networking Hardware and Software - Part 2
2.3 Networking Hardware and Software - Part 3
2.4 Networking Hardware and Software - Part 4
2.5 Networking Hardware and Software - Part 5
2.6 Networking Hardware and Software - Part 6
2.7 Security Assessment - Part 1
2.8 Security Assessment - Part 2
2.9 Troubleshooting Issues - Part 1
2.10 Troubleshooting Issues - Part 2
2.11 Securing Mobile Devices - Part 1
2.12 Securing Mobile Devices - Part 2
CompTIA Cybersecurity Analyst (CSA+)
Module 1: Threat Management
- 1.1 Introduction
- 1.2 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 1
- 1.3 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 2
- 1.4 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 3
- 1.5 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 4
- 1.6 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 5
- 1.7 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 6
- 1.8 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 7
- 1.9 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 8
- 1.10 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 9
- 1.11 Given a scenario, analyze the results of a network reconnaissance - Part 1
- 1.12 Given a scenario, analyze the results of a network reconnaissance - Part 2
- 1.13 Given a scenario, analyze the results of a network reconnaissance - Part 3
- 1.14 Given a scenario, analyze the results of a network reconnaissance - Part 4
- 1.15 Given a scenario, analyze the results of a network reconnaissance - Part 5
- 1.16 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 1
- 1.17 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 2
- 1.18 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 3
- 1.19 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 4
- 1.20 Explain the purpose of practices used to secure a corporate environment - Part 1
CompTIA CAS-001: Advanced Security Practitioner (CASP)
Module 1: Underlying Security Models
- 1.0 Course Guide
- 1.1 Underlying Security Models Part 1
- 1.2 Underlying Security Models Part 2
- 1.3 Underlying Security Models Part 3
- 1.4 Underlying Security Models Part 4
- 1.5 Underlying Security Models Part 5
- 1.6 Underlying Security Models Part 6
- 1.7 Underlying Security Models Part 7
- 1.8 General Security Part 1
- 1.9 General Security Part 2
Module 2: Selecting Security
- 2.0 Selecting Security Products Part 1
- 2.1 Selecting Security Products Part 2
- 2.2 Selecting Security Products Part 3
- 2.3 Control Selection Process Part 1
- 2.4 Control Selection Process Part 2
Module 3: Cryptography
- 3.0 Cryptography Symmetric and Asymmetric Part 1
- 3.1 Cryptography Symmetric and Asymmetric Part 2
- 3.2 Cryptography Symmetric and Asymmetric Part 3
- 3.3 Cryptography Symmetric and Asymmetric Part 4
- 3.4 Cryptography Message Integrity Controls Part 1
- 3.5 Cryptography Message Integrity Controls Part 2
- 3.6 Cryptography Message Integrity Controls Part 3
- 3.7 Cryptography Digital Signatures Part 1
- 3.8 Cryptography Digital Signatures Part 2
- 3.9 Cryptography PKI and PGP Part 1
- 3.10 Cryptography PKI and PGP Part 2
- 3.11 Cryptography PKI and PGP Part 3
- 3.12 Cryptography PKI and PGP Part 4
Module 4: Storage
- 4.0 Storage Part 1
- 4.1 Storage Part 2
- 4.2 Storage Part 3
- 4.3 Storage Part 4
Module 5: Virtual Computing
- 5.0 Virtual Computing
- 5.1 Cloud Computing Part 1
- 5.2 Cloud Computing Part 2
- 5.3 Cloud Computing Part 3
- 5.4 Cloud Computing Part 4
- 5.5 Cloud Computing Part 5
Module 6: IPv6
- 6.0 IPV6 Part 1
- 6.1 IPV6 Part 2
Module 7: Remote Access Security
- 7.0 Remote Access Security Part 1
- 7.1 Remote Access Security Part 2
Module 8: Domain Name System
- 8.0 Domain Name System Part 1
- 8.1 Domain Name System Part 2
- 8.2 Domain Name System Part 3
- 8.3 Domain Name System Part 4
- 8.4 Domain Name System Part 5
- 8.5 Domain Name System Part 6
- 8.6 Domain Name System Part 7
- 8.7 Domain Name System Part 8
Module 9: Directory Services
Module 10: Firewall and VPN
- 10.0 Firewall and VPN Part 1
- 10.1 Firewall and VPN Part 2
- 10.2 Firewall and VPN Part 3
- 10.3 Firewall and VPN Part 4
- 10.4 Firewall Policy Part 1
- 10.5 Firewall Policy Part 2
- 10.6 Firewall Policy Part 3
- 10.7 Firewall Policy Part 4
Module 11: Security Configuration Management
- 11.0 Security Configuration Management Part 1
- 11.1 Security Configuration Management Part 2
- 11.2 Security Configuration Management Part 3
Module 12: Network Infrastructure Security
- 12.0 Network Infrastructure Security Part 1
- 12.1 Network Infrastructure Security Part 2
- 12.2 Network Infrastructure Security Part 3
- 12.3 Network Infrastructure Security Part 4
Module 13: Secure Web Services
- 13.0 Secure Web Services Part 1
- 13.1 Secure Web Services Part 2
- 13.2 OWASP top Ten Part 1
- 13.3 OWASP top Ten Part 2
- 13.4 OWASP top Ten Part 3
- 13.5 OWASP top Ten Part 4
- 13.6 OWASP top Ten Part 5
Module 14: Buffer Overflows
- 14.0 Buffer Overflows Part 1
- 14.1 Buffer Overflows Part 2
Module 15: SQL Injection
- 15.0 SQL Injection Part 1
- 15.1 SQL Injection Part 2
Module 16: Access Control
- 16.0 Access Control Part 1
- 16.1 Access Control Part 2
Module 17: Single Sign-On
- 17.0 Single Sign-On Part 1
- 17.1 Single Sign-On Part 2
- 17.2 Single Sign-On Part 3
Module 18: Risk Assessment
- 18.0 Risk Assessment Part 1
- 18.1 Risk Assessment Part 2
Module 19: Testing and Assessment
- 19.0 Testing and Assessment Part 1
- 19.1 Testing and Assessment Part 2
- 19.2 Testing and Assessment Part 3
Module 20: Common Vulnerability
- 20.0 Common Vulnerability Scoring System Part 1
- 20.1 Common Vulnerability Scoring System Part 2
- 20.2 Common Vulnerability Scoring System Part 3
- 20.3 Common Vulnerability Scoring System Part 4
Module 21: Common Criteria
- 21.0 Common Criteria Part 1
- 21.1 Common Criteria Part 2
- 21.2 Common Criteria Part 3
- 21.3 Common Criteria Part 4
- 21.4 Common Criteria Part 5
Module 22: Personally Identifiable Information
- 22.0 Personally Identifiable Information Part 1
- 22.1 Personally Identifiable Information Part 2
Module 23: Risk Management
- 23.0 Risk Management Part 1
- 23.1 Risk Management Part 2
- 23.2 Risk Management Part 3
Module 24: Frameworks
- 24.0 Frameworks Part 1
- 24.1 Frameworks Part 2
- 24.2 Frameworks Part 3
- 24.3 Frameworks Part 4
Module 25: Interconnecting Systems
- 25.0 Interconnecting Systems Part 1
- 25.1 Interconnecting Systems Part 2
Module 26: Security Services
- 26.0 Security Services Part 1
- 26.1 Security Services Part 2
- 26.2 Security Services Part 3
- 26.3 Security Services Part 4
Module 27: Continuous Monitoring
- 27.0 Continuous Monitoring Part 1
- 27.1 Continuous Monitoring Part 2
- 27.2 Continuous Monitoring Part 3
- 27.3 Continuous Monitoring Part 4
Module 28: Incident Handling
- 28.0 Incident Handling Part 1
- 28.1 Incident Handling Part 2
- 28.2 Incident Handling Part 3
- 28.3 Incident Handling Part 4
Module 29: Forensic & Incident Response
- 29.0 Forensic and Incident Response Part 1
- 29.1 Forensic and Incident Response Part 2
- 29.2 Forensic and Incident Response Part 3
Module 30: Requirements Processing
- 30.0 Requirements Processing Part 1
- 30.1 Requirements Processing Part 2
- 30.2 Requirements Processing Part 3
Module 31: Standards Bodies
Module 32: Secure System Life Cycle
- 32.0 Secure System Life Cycle Part 1
- 32.1 Secure System Life Cycle Part 2
- 32.2 Secure System Life Cycle Part 3
Module 33: Email
Module 34: Mobile and BYOD
- 34.0 Mobile and BYOD Part 1
- 34.1 Mobile and BYOD Part 2
Module 35: Voiceover IP
Module 36: Physical Facilities Assessment Process
- 36.0 Physical Facilities Assessment Process Part 1
- 36.1 Physical Facilities Assessment Process Part 2
Module 37: Security Requirements Traceability Matrix
- 37.0 Security Requirements Traceability Matrix