CompTIA Security+ (SY0-701)
Last update:
11/24/2024
Completed
2.2) Malware varieties (viruses, worms, trojans)
55 Views •2.1) Types of attacks (e.g., DDoS, man-in-the-middle)
53 Views •6.1) Incident response strategies
49 Views •3.3) Network segmentation techniques
49 Views •6.2) Attack frameworks (MITRE ATT&CK)
49 Views •4.4) Implementing secure protocols like SSL/TLS and IPsec
48 Views •5.1) Risk assessment and mitigation
47 Views •4.1) Basic cryptography concepts (encryption, hashing)
44 Views •1.1) Core cybersecurity principles
44 Views •6.3) Forensic techniques
43 Views •5.4) Compliance standards (PCI, GDPR, HIPAA)
43 Views •5.3) Business continuity strategies
41 Views •2.4) Vulnerability assessments and penetration testing
41 Views •1.2) Importance of confidentiality, integrity, and availability (CIA Triad)
39 Views •3.1) Designing secure networks
39 Views •5.2) Incident response planning
39 Views •3.2) Virtualization and cloud security considerations
38 Views •4.2) Symmetric vs. asymmetric encryption
37 Views •4.3) Public Key Infrastructure (PKI) fundamentals
34 Views •2.3) Social engineering and phishing tactics
34 Views •1.2) Importance of confidentiality, integrity, and availability (CIA Triad)
Rating
0
0
Commenting is not enabled on this course.