- Master CompTIA's Security+ SY0-401 exam topics
- Assess your knowledge with chapter-ending quizzes
- Reinforce your knowledge of key concepts with chapter review activities
- Practice with realistic exam questions on the DVD
- Includes complete video solutions to 31 hands-on labs
- Plus 31 interactive simulations on key exam topics
- Work through 270 Flash Cards in Q&A and glossary term format
- Includes free access to the Premium Edition eBook
- 2-1: Identifying Malware Types
- 2-2: Securing the BIOS
- 2-4: Filtering E-mails
- 3-3: Stopping Services in the Command Prompt
- 4-1: Securing Web Browsers
- 5-1: Creating a DMZ
- 5-3: Defending against the Web Shell
- 6-1a: Understanding Port Numbers, Part A
- 6-1b: Understanding Port Numbers, Part B
- 6-1c: Understanding Port Numbers, Part C
- 6-2a: Identifying Network Attacks, Part A
- 6-2b: Identifying Network Attacks, Part B
- 6-2c: Identifying Network Attacks, Part C
- 6-2d: Identifying Network Attacks, Part D
- 7-1: Configuring a Firewall's Ruleset
- 8-4: Planning Network Security
- 9-1: Choosing Physical Security Methods
- 9-2: Selecting the Correct Authentication Technology
- 9-3: Understanding 802.1X
- 10-1: Password Strength
- 10-2: Configuring Logon Hours
- 10-3: Understanding Access Control Models
- 11-1a: Risk Assessment, Part A
- 11-1b: Risk Assessment, Part B
- 11-1c: Vulnerability Management Process
- 12-1: Capturing and Analyzing Packets
- 12-2: Deciphering Log Files
- 13-1: Understanding Symmetric and Asymmetric Algorithms
- 15-1: Configuring RAID
- 16-1a: Identifying Social Engineering Attacks, Part A
- 16-1b: Identifying Social Engineering Attacks, Part B
- 2-1: Using Free Malware Scanning Programs
- 2-2: Securing the BIOS
- 2-3: Securing Mobile Devices
- 3-1: Discerning and Updating Service Pack Level
- 3-2: Securing a Virtual Machine
- 3-3: Working with Services in Windows and Linux
- 4-1: Securing Web Browsers
- 4-2: Whitelisting and Blacklisting Applications with a Windows Server Policy
- 5-2: Subnetting a Network
- 6-1: Scanning Ports
- 7-2: Configuring Packet Filtering and NAT
- 7-3: Configuring an Inbound Filter
- 8-1: Securing a Wireless Device
- 8-2: Enabling MAC Filtering
- 8-3: Wardriving and the Cure
- 9-3: Understanding 802.1X
- 9-4: Setting Up a Secure VPN
- 10-1: Configuring Complex Passwords
- 10-2: Configuring Password Policies and User Accounts Restrictions
- 10-4: Configuring User and Group Permissions
- 11-2: Mapping and Scanning the Network
- 11-3: Defending Against Password Cracking
- 12-1: Capturing and Analyzing Packets
- 12-2: Deciphering Log Files
- 12-3: Auditing Files
- 13-1: Understanding Symmetric and Asymmetric Algorithms
- 13-2: Disabling the LM Hash
- 14-1: Understanding PKI
- 14-2: Making an SSH Connection
- 15-1: Configuring RAID
- 17-1: Analyzing Test Questions
- Core computer system security
- OS hardening and virtualization
- Application security
- Network design elements and threats
- Perimeter security
- Network media and devices security
- Physical security and authentication models
- Access control
- Vulnerability and risk assessment
- Monitoring and auditing
- Cryptography, including PKI
- Redundancy and disaster recovery
- Policies and procedures