CompTIA Security+ (SY0-701)
Last update:
11/24/2024
Completed
2.1) Types of attacks (e.g., DDoS, man-in-the-middle)
53 Views •2.2) Malware varieties (viruses, worms, trojans)
55 Views •2.3) Social engineering and phishing tactics
34 Views •2.4) Vulnerability assessments and penetration testing
41 Views •2.5) Role of threat intelligence in security
33 Views •2.2) Malware varieties (viruses, worms, trojans)
55 Views •2.1) Types of attacks (e.g., DDoS, man-in-the-middle)
53 Views •6.2) Attack frameworks (MITRE ATT&CK)
50 Views •6.1) Incident response strategies
49 Views •3.3) Network segmentation techniques
49 Views •4.4) Implementing secure protocols like SSL/TLS and IPsec
48 Views •5.1) Risk assessment and mitigation
47 Views •4.1) Basic cryptography concepts (encryption, hashing)
44 Views •1.1) Core cybersecurity principles
44 Views •6.3) Forensic techniques
43 Views •5.4) Compliance standards (PCI, GDPR, HIPAA)
43 Views •2.4) Vulnerability assessments and penetration testing
41 Views •5.3) Business continuity strategies
41 Views •1.2) Importance of confidentiality, integrity, and availability (CIA Triad)
40 Views •3.1) Designing secure networks
39 Views •5.2) Incident response planning
39 Views •3.2) Virtualization and cloud security considerations
38 Views •4.2) Symmetric vs. asymmetric encryption
37 Views •4.3) Public Key Infrastructure (PKI) fundamentals
34 Views •2.3) Social engineering and phishing tactics
34 Views •2.4) Vulnerability assessments and penetration testing
Rating
0
0
Commenting is not enabled on this course.