Get $1 credit for every $25 spent!

The 2023 Professional CompTIA Exam Certification Prep Bundle

Ending In:
Add to Cart - $34.99
Add to Cart ($34.99)
$1,600
97% off
wishlist
Courses
8
Lessons
1,611

What's Included

Product Details

Access
Lifetime
Content
14.0 hours
Lessons
133

TOTAL: CompTIA PenTest+ (PT0-002)

Learn Ethical Hacking Skills & Take Your Next Step in the CompTIA Cybersecurity Pathway

By Total Seminars, LLC | in Online Courses

Whether you're looking to pass the CompTIA PenTest+ certification exam, take your next step in the CompTIA Cybersecurity Pathway, or you're just looking to learn some awesome ethical hacking skills, you’re in the right place. Keep in mind there's much more to being an ethical hacker than what's covered here, including how to secure a network, however, this course focuses on how to be a pen tester. A pen tester plans and scopes a pen test engagement with a client, finds vulnerabilities, exploits them to get into a network, then reports on those findings to the client.

4.6/5 average rating: ★ ★ ★ ★

  • Access 133 lectures & 14 hours of content 24/7
  • Scan networks, crack passwords, analyze & intercept traffic, discover code vulnerabilities, and compromise resources
  • Recognize vulnerabilities within a system, run exploits & suggest solutions to a client to remediate the weak points
  • Work within a virtual environment to practice your pen testing skills, including using Oracle VM manager, Kali Linux, Metasploitable & DVWA
  • Scope, plan & execute a pen test engagement from start to finish

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Total Seminars | Home of Mike Meyers and His Team of IT Certification Pros
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI, and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars website.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • It’s recommended to be familiar with the information in the CompTIA Network+ and Security+ exams

Course Outline

  • Your First Program
  • Introduction to Ethical Hacking & CompTIA PenTest+ (PT0-002)
    • Introduction to the CompTIA PenTest+ (PT0-002) Course - 2:09
    • About the CompTIA PenTest+ (PT0-002) Exam - 7:21
  • Planning and Engagement
    • Planning a Pen Test - 8:21
    • Rules of Engagement - 10:28
    • Regulatory Compliance - 4:23
    • Resources and Budgets - 7:07
    • Impact and Constraints - 5:06
    • Support Resources - 13:14
    • Legal Groundwork - 11:43
    • Service Provider Agreements - 2:12
    • Standards and Methodologies, Part 1 - 6:48
    • Standards and Methodologies, Part 2 - 9:17
    • Environmental and Scoping Considerations - 13:38
    • Ethical Mindset - 5:36
    • Lab Environment Setup - 17:32
    • Project Strategy and Risk - 9:12
    • Scope Vulnerabilities - 13:19
    • Compliance-Based Assessments - 4:08
    • Chapter 1 Quiz
  • Information Gathering and Vulnerability Scanning
    • Scanning and Enumeration - 4:16
    • Scanning and Demo - 10:46
    • Packet Investigation - 7:57
    • Packet Inspection Demo - 5:48
    • Labtainers Setup - 12:09
    • Labtainers Lab (Wireshark) - 8:54
    • Application and Open-Source Resources - 11:38
    • Passive Reconnaissance - 10:07
    • Active Reconnaissance - 7:50
    • Vulnerability Scanning - 8:41
    • Vulnerability Scanning Demo - 16:20
    • Labtainers Lab (Network Basics) - 2:50
    • Labtainers Lab (Nmap Discovery) - 3:12
    • Target Considerations - 15:36
    • Analyzing Scan Output - 5:01
    • Nmap Scoping and Output Options - 21:04
    • Nmap Timing and Performance Options - 6:31
    • Prioritization of Vulnerabilities - 9:07
    • Common Attack Techniques - 12:05
    • Automating Vulnerability Scans - 3:35
    • Credential Attacks - 14:31
    • Labtainers Lab (Password Cracking) - 2:23
    • Labtainers Lab (Secure Socket Layers) - 2:30
    • Labtainers Lab (Routing Basics) - 1:59
    • Chapter 2 Quiz
  • Network-Based Attacks
    • Exploit Resources and Network Attacks - 4:37
    • Network-Based Exploits - 7:07
    • FTP Exploit Demo - 8:14
    • Man-in-the-Middle Exploits - 7:06
    • Labtainers Lab (TCP/IP Attacks) - 2:09
    • Labtainers Lab (ARP Spoof Attack) - 1:53
    • Labtainers Lab (Local DNS Attacks) - 1:47
    • Labtainers Lab (MACs and Hash Functions) - 1:19
    • Chapter 3 Quiz
  • Wireless and RF Attacks
    • Wireless Exploits - 13:17
    • Wireless Exploits, Part 2 - 2:46
    • Antennas - 3:48
    • Chapter 4 Quiz
  • Reporting and Communication
    • OWASP Top 10 - 8:40
    • Application Exploits, Part 1 - 5:34
    • SQL Injection Demo - 8:41
    • Labtainers Lab (SQL Injection) - 2:38
    • Application Exploits, Part 2 - 8:02
    • Application Exploits, Part 3 - 9:11
    • Cross-Site Scripting Demo - 7:00
    • Labtainers Lab (Cross-Site Scripting) - 1:36
    • Labtainers Lab (Cross-Site Request Forgery) - 1:14
    • Code Vulnerabilities - 16:36
    • API Attacks and Attack Resources - 6:28
    • Privilege Escalation (Linux) - 9:37
    • Privilege Escalation (Windows) - 6:09
    • Misc. Privilege Escalation - 7:54
    • Misc. Local Host Vulnerabilities - 8:05
    • Chapter 5 Quiz
  • Attacking the Cloud
    • Cloud Attacks, Part 1 - 4:50
    • Cloud Attacks, Part 2 - 4:39
    • Chapter 6 Quiz
  • Specialized and Fragile Systems
    • Mobile Attacks - 10:25
    • IoT Attacks - 10:18
    • Data Storage and Management Interface Attacks - 8:58
    • Virtual and Containerized Environment Attacks - 7:31
    • Labtainers Lab (Industrial Control System) - 1:51
    • Chapter 7 Quiz
  • Social Engineering and Physical Attacks
    • Pretext for a Social Engineering Attack - 2:31
    • Remote Social Engineering - 6:10
    • Spear Phishing Demo - 10:09
    • In-Person Social Engineering - 11:45
    • Physical Security - 11:17
    • Chapter 8 Quiz
  • Post-Exploitation
    • Post-Exploitation Techniques - 11:07
    • Post-Exploitation Tools - 3:22
    • Network Segmentation Testing - 3:00
    • Persistence and Stealth - 10:45
    • Detection Avoidance Techniques - 6:16
    • Chapter 9 Quiz
  • Post-Engagement Activities
    • Report Writing - 14:47
    • Important Components of Written Reports - 2:37
    • Mitigation Strategies - 5:00
    • Technical and Physical Controls - 3:46
    • Administrative and Operational Controls - 5:10
    • Communication - 8:38
    • Presentation of Findings - 2:57
    • Post-Report Activities - 5:23
    • Data Destruction Process - 1:37
    • Chapter 10 Quiz
  • Tools and Programming
    • Using Scripting in Pen Testing - 12:32
    • Bash Scripting Basics - 14:55
    • Bash Scripting Techniques - 10:11
    • PowerShell Scripts - 4:02
    • Ruby Scripts - 6:32
    • Python Scripts - 5:45
    • Scripting Languages Comparison - 10:56
    • Data Structures, Part 1 - 7:41
    • Data Structures, Part 2 - 8:12
    • Libraries - 3:03
    • Classes - 8:05
    • Procedures and Functions - 5:48
    • Perl and Javascript - 5:41
    • Chapter 11 Quiz
  • Tools Inventory
    • Pen Testing Toolbox - 6:46
    • Using Kali Linux - 6:14
    • Scanners and Credential Tools - 9:52
    • Code Cracking Tools - 4:20
    • Open Source Research Tools - 6:21
    • Wireless and Web Pen Testing Tools - 10:48
    • Remote Access Tools - 6:15
    • Analyzers and Mobile Pen Testing Tools - 2:29
    • Other Pen Testing Tools - 4:19
    • Labtainers Lab (Metasploit Framework) - 2:00
    • Labtainers Lab (Wireshark Packet Inspection) - 1:44
    • Labtainers Lab (SSH) - 0:58
    • Scanners, Debuggers, and Wireless Tools - 9:51
    • Web, Steganography, and Cloud Tools - 9:08
    • Chapter 12 Quiz

View Full Curriculum


Access
Lifetime
Content
21.0 hours
Lessons
168

TOTAL: CompTIA Network+ (N10-008)

Address the Current & Changing Networking Technologies as a CompTIA Network+ Professional

By Total Seminars, LLC | in Online Courses

The CompTIA Network+ Certification is a trusted mid-level certification for network technicians. Network+ professionals possess well-grounded knowledge and skills in troubleshooting, configuring, and managing networks. With 21 hours of instruction, this course aims to make you a good Network Tech and, in the process, make sure you are ready to pass the CompTIA exam.

4.7/5 average rating: ★ ★ ★ ★

  • Access 168 lectures & 21 hours of content 24/7
  • Design & implement functional networks
  • Understand & execute network security, standards, and protocols
  • Troubleshoot basic to advanced network problems

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Total Seminars | Home of Mike Meyers & His Team of IT Certification Pros
4.7/5 Instructor Rating: ★ ★ ★ ★

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI, and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print.

Total Seminars has created a number of “Best-Selling” Udemy video courses by Mike Meyers and the Total Seminars team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars website.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: intermediate
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with networks

Course Outline

  • Chapter 1: Network Models
    • What is a Model? - 1:36
    • The OSI Model - 12:30
    • Meet the Frame - 5:44
    • The MAC Address - 7:12
    • Broadcast vs. Unicast - 4:10
    • Introduction to IP Addressing - 7:32
    • Packets and Ports - 4:49
  • Chapter 2: Cabling and Topology
    • Network Topologies - 4:43
    • Coaxial Cabling - 4:42
    • Twisted Pair Cabling - 5:26
    • Fiber Optic Cabling - 8:33
    • Fire Ratings - 5:13
  • Chapter 3: Ethernet Basics
    • What is Ethernet? - 6:22
    • Ethernet Frames - 6:35
    • Terminating Twisted Pair - 8:12
    • Hubs vs. Switches - 12:29
    • Connecting Switches - 5:22
  • Chapter 4: Ethernet Standards
    • 100BaseT - 5:15
    • Gigabit Ethernet and 10-Gigabit Ethernet - 4:45
    • Transceivers - 7:01
    • Connecting Ethernet Scenarios - 13:51
  • Chapter 5: Installing a Physical Network
    • Introduction to Structured Cabling - 4:07
    • Terminating Structured Cabling - 7:45
    • Equipment Room - 7:10
    • Alternative Distribution Panels - 3:41
    • Testing Cable - 8:43
    • Troubleshooting Structured Cabling, Part 1 - 4:09
    • Troubleshooting Structured Cabling, Part 2 - 3:39
    • Using a Toner and Probe - 2:36
    • Wired Connection Scenarios - 10:21
  • Chapter 6: TCP/IP Basics
    • Introduction to IP Addressing and Binary - 12:33
    • Introduction to ARP - 3:37
    • Subnet Masks - 12:00
    • Classful Addressing - 10:10
    • Subnetting with CIDR - 9:36
    • More CIDR Subnetting Practice - 9:48
    • Dynamic and Static IP Addressing - 13:40
    • Special IP Addresses - 6:52
    • IP Addressing Scenarios - 14:38
  • Chapter 7: Routing
    • Introducing Routers - 15:09
    • Understanding Ports - 5:17
    • Network Address Translation (NAT) - 6:15
    • Implementing NAT - 2:28
    • Forwarding Ports - 17:31
    • Tour of a SOHO Router - 11:53
    • SOHO vs. Enterprise - 8:32
    • Static Routes - 12:31
    • Dynamic Routing - 10:27
    • Routing Information Protocol (RIP) - 4:18
    • Open Shortest Path First (OSPF) - 3:25
    • Border Gateway Protocol (BGP) - 5:30
  • Chapter 8: TCP/IP Applications
    • Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) - 7:13
    • ICMP and IGMP - 5:59
    • Handy Tools - 6:35
    • Introduction to Wireshark - 10:29
    • Introduction to Netstat - 8:42
    • Web Servers - 11:43
    • File Transfer Protocol (FTP) - 11:37
    • E-mail Servers and Clients - 9:09
    • Securing E-mail - 5:39
    • Telnet and SSH - 9:08
    • Network Time Protocol (NTP) - 2:47
    • Network Service Scenarios - 9:25
  • Chapter 9: Network Naming
    • Understanding DNS - 6:47
    • Applying DNS - 18:47
    • net Command - 8:03
    • Windows Name Resolution - 11:14
    • Dynamic DNS - 5:13
    • DNS Troubleshooting - 13:04
  • Chapter 10: Securing TCP/IP
    • Making TCP/IP Secure - 4:17
    • Symmetric Encryption - 5:24
    • Asymmetric Encryption - 3:12
    • Cryptographic Hashes - 4:48
    • Identification - 8:00
    • Access Control - 4:12
    • AAA - 4:51
    • Kerberos/EAP - 7:24
    • Single Sign-On - 10:01
    • Certificates and Trust - 13:53
    • Certificate Error Scenarios - 7:58
  • Chapter 11: Switch Features
    • Switch Management - 8:54
    • Introduction to VLANs - 10:13
    • InterVLAN Routing - 3:01
    • Trunking - 7:44
    • Cisco Commands - 6:21
    • Switch Port Protection - 6:33
    • Port Bonding - 7:07
    • Port Mirroring - 3:24
    • Quality of Service - 5:02
    • IDS vs. IPS - 4:20
    • Proxy Servers - 12:36
    • Load Balancing - 8:24
    • Device Placement Scenarios - 12:46
  • Chapter 12: IPv6
    • IPv6 Addressing - 14:44
    • Intro to IPv6 - 12:44
    • IPv6 in Action - 13:05
    • IPv4 and IPv6 Tunneling - 5:11
  • Chapter 13: WAN Connectivity
    • Understanding IP Tunneling - 5:56
    • WAN Technologies - 5:35
    • Digital Subscriber Line (DSL) - 4:24
    • Connecting with Cable Modems - 4:08
    • Connecting with Satellites - 2:21
    • Cellular Technologies - 3:54
    • Remote Desktop Connectivity - 4:24
    • Virtual Private Networks (VPNs) - 8:42
    • WAN Troubleshooting Scenarios - 4:40
  • Chapter 14: Wireless Networking
    • Introduction to 802.11 - 11:30
    • 802.11 Standards - 12:09
    • Power Over Ethernet (PoE) - 3:35
    • Antennas - 8:30
    • Wireless Security Standards - 5:59
    • Implementing Wireless Security - 6:48
    • Threats to Your Wireless Network - 6:54
    • Enterprise Wireless - 5:59
    • Installing a Wireless Network - 14:36
    • Wireless Scenarios - 6:04
    • More Wireless Scenarios - 8:42
  • Chapter 15: Virtualization and Cloud Computing
    • Virtualization Basics - 6:34
    • Your First Virtual Machine - 7:17
    • Cloud Basics - 3:07
    • Cloud Services - 6:52
    • Cloud Ownership - 2:27
    • Infrastructure as Code (IaC) - 3:19
    • Heroku Demo - 8:46
    • Enterprise Virtualization - 5:25
    • Cloud Implementation - 11:28
  • Chapter 16: Data Centers
    • Classic Data Center Architecture - 12:28
    • NAS and SAN - 15:51
    • The Modern Data Center - 8:38
    • High Availability - 10:56
    • Documenting the Data Center - 7:40
  • Chapter 17: Integrating Networked Devices
    • Network Types - 3:59
    • Internet of Things (IoT) - 7:08
    • Voice Over IP (VoIP) - 11:04
    • Industrial Control Systems and SCADA - 8:34
  • Chapter 18: Network Operations
    • What are Network Operations? - 3:15
    • Hardening and Security Policies - 8:21
    • Change Management - 6:32
    • Patching and Updating - 7:12
    • Security Risk Management - 5:14
    • Points of Failure - 4:05
    • Standard Business Documentation - 4:59
    • Incident Response and Forensics - 5:27
    • Disaster Recovery and Backups - 12:28
    • Business Continuity - 11:36
    • Deployment Models - 5:15
  • Chapter 19: Protecting Networks
    • Security Concepts - 5:57
    • Defense in Depth - 5:17
    • Rogue DHCP Servers - 3:50
    • Denial of Service (DoS) - 9:53
    • On-Path and Spoofing Attacks - 22:31
    • Password Attacks - 6:23
    • VLAN Hopping - 6:10
    • System Life Cycle - 4:29
    • Malware - 6:12
    • Social Engineering - 7:39
    • Common Vulnerabilities - 3:12
    • Physical Security - 12:34
    • Network Hardening - 8:01
    • Demilitarized Zone (DMZ) - 5:21
    • Introduction to Firewalls - 4:22
    • Firewalls - 10:03
  • Chapter 20: Network Monitoring
    • Network Monitoring - 7:56
    • SNMP - 14:59
    • Documenting Logs - 7:26
    • System Monitoring - 7:54
    • Security Information and Event Management (SIEM) - 6:59
  • Chapter 21: Network Troubleshooting
    • Network Troubleshooting Theory - 5:03

View Full Curriculum


Access
Lifetime
Content
10.0 hours
Lessons
190

CompTIA A+, CompTIA A+ 220-1101, CompTIA A+ 220-1102 Prep Lab

Everything You Need to Pass the CompTIA A+ (220-1101) Exam, Step by Step

By Oak Academy | in Online Courses

The CompTIA A+ Core Series requires candidates to pass two exams: Core 1 (220-1101) and Core 2 (220-1102) covering the following new content, emphasizing the technologies and skills IT pros need to support a hybrid workforce. This course walks you through all the things you need to pass the CompTIA A+ (220-1101) exam, step by step. You can pass the CompTIA A+ exam by studying the topics covered throughout the course. By the way, you don't need to know anything for this course. It will tell you all the things you need to pass the CompTIA A+ (220-1101) exam.

4.2/5 average rating: ★ ★ ★ ★

  • Access 190 lectures & 10 hours of content 24/7
  • Install, configure & maintain PCs, mobile devices, and software
  • Know the basics of networking & security forensics
  • Diagnose, resolve & document common hardware and software issues
  • Understand the basics of scripting, virtualization, desktop imaging & deployment

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Web & Mobile Development, IOS, Android, Ethical Hacking, IT
4.6/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction to CompTIA A+(220-1101) Complete Course & Lab
    • 1 - CompTIA A Course Introduction - 1:06
    • 2 - FAQ About CompTIA A+ | CompTIA A+220-1101, CompTIA A+220-1102 Prep
    • 3 - What is the CompTIA A - 1:24
    • 4 - How Can We Get CompTIA A+ - 1:31
    • 5 - 10 Reasons Why You Should Get CompTIA A+ Certified
  • About Computer in Comptia A+
    • 6 - History of Computer - 1:40
    • 7 - What is a computer? - 1:25
    • 8 - Benefits of Using Computer - 0:37
    • 9 - Types of Computer - 1:07
  • Components of Computer for Comptia A+
    • 10 - Input Processing - Output Cycle - 6:27
    • 11 - Computer Inputs - 1:18
    • 12 - What is Processing - 0:57
    • 13 - Cyber Attacks to CPU - 1:04
    • 14 - What is Storing - 0:53
    • 15 - Output - 1:25
    • 16 - Computer Components - 2:54
    • 17 - Input Devices - 2:28
  • Storage Devices in Comptia IT Fundamentals
    • 18 - Primary and Secondary Memory - 4:22
    • 19 - RAM - 1:18
    • 20 - SRAM and DRAM - 1:28
    • 21 - ROM - 1:12
    • 22 - PROM EPROM EEPROM - 1:04
    • 23 - What is Flash 23 - Memory, Magnetic Storage Devices, Optical Storage Devices - 2:19
    • 24 - Network attached storage - 1:40
    • 25 - Cloud Storage - 1:16
  • Processing Devices in Comptia A+
    • 26 - CPU - 3:00
    • 27 - GPU - 2:46
    • 28 - Motherboard - 1:15
    • 29 - Output Devices - 0:38
  • IoT & Mobile
    • 30 - What is IoT - 3:25
    • 31 - Where does IoT Exist in Our Lives - 1:47
    • 32 - How does IoT work - 0:47
    • 33 - Connection Standarts - 9:06
    • 34 - IoT Security - 7:04
    • 35 - Mobile Security Threats - 8:02
  • Output Devices in Comptia A+ 220-1001
    • 36 - What is Monitor - 3:40
    • 37 - What is Printer - 1:59
    • 38 - What are Headphones - 3:15
    • 39 - What is Computer Speaker - 1:48
    • 40 - What is Projector - 1:13
    • 41 - What is GPS - 2:28
  • Cables
    • 42 - Ethernet - 2:01
    • 43 - Fiber - 2:25
    • 44 - VGA - 2:03
    • 45 - HDMI - 1:32
    • 46 - DisplayPort - 1:50
    • 47 - DVI - 1:32
    • 48 - SATA Cables - 1:21
    • 49 - USB - 2:21
  • Network Fundamentals in Comptia A+
    • 50 - Attention for Ethical Hackers
    • 51- Content of the Network Fundamentals - 1:07
    • 52 - Basic Terms of Networking - 5:36
    • 53 - Reference Models - 0:24
    • 54 - TCP/IP (Networking) Basics - 13:43
    • 55 - OSI Reference Model vs. TCP/IP Reference Model - 2:33
    • 56 - Network Layers in Real World - 7:59
    • 57 - Layer 2 - Data Link Layer - 3:50
    • 58 - Layer 2: Ethernet - Principles, Frames & Headers - 4:06
    • 59 - Layer 2: ARP - Address Resolution Protocol - 6:10
    • 60 - Layer 2: Analysing ARP Packets - 3:14
    • 61 - Layer 2: VLANs (Virtual Local Area Networks) - 4:03
    • 62 - Layer 2: WLANs (Wireless Local Area Networks) - 7:01
    • 63 - Layer 3 - Network Layer - 1:37
    • 64 - Layer 3: IP (Internet Protocol) - 2:49
    • 65 - Layer 3: IPv4 Addressing System - 1:56
    • 66 - Layer 3: IPv4 Packet Header - 2:56
    • 67 - Layer 3: Subnetting - Classful Networks - 2:35
    • 68 - Layer 3 Subnetting Masks - 2:59
    • 69 - Layer 3: Understanding IPv4 Subnets - 3:09
    • 70 - Layer 3: IPv4 Address Shortage - 1:41
    • 71 - Layer 3 Private Networks - 3:59
    • 72 - Layer 3: Private Networks - Demonstration - 3:01
    • 73 - Layer 3: NAT (Network Address Translation) - 4:30
    • 74 - Layer 3: IPv6, Packet Header & Addressing - 8:30
    • 75 - Layer 3: DHCP - How the Mechanism Works - 9:23
    • 76 - Layer 3: ICMP (Internet Control Message Protocol) - 2:02
    • 77 - Layer 3 Traceroute - 9:51
    • 78 - Layer 4 - Transport Layer - 2:40
    • 79 -Layer 4 TCP (Transmission Control Protocol) - 6:59
    • 80 - Layer 4 TCP Header - 2:27
    • 81 - Layer 4 UDP (User Datagram Protocol) - 3:56
    • 82 - Layer 5-7 - Application Layer - 0:55
    • 83 - Layer 7: DNS (Domain Name System) - 5:56
    • 84 - Layer 7: HTTP (Hyper Text Transfer Protocol) - 3:09
    • 85 - Layer 7 HTTPS - 1:56
    • 86 - GNS3 - Graphical Network Simulator - 3:30
    • 87 - GNS3: Setting Up the First Project - 7:57
    • 88 - GNS3: Tool Components - 2:56
    • 89 - GNS3: Building the Network - 15:45
    • 90 - GNS3: Attaching VMware VMs (Including Kali) to the Network - 6:31
    • 91 - GNS3: Configuring Switch & Router (Cisco) and creating VLANs - 5:13
    • 92 - Active Network Devices: Router, Switch, Hub - 4:44
    • 93 - Wireless Access Point(WAP) - 1:06
    • 94 - Summary of Network Fundamentals - 1:23
  • Wi-fi Network Fundamentals
    • 95 - IEE-802.11 - 3:54
    • 96 - Basic Terminologies and Concepts - 4:50
    • 97 - Wireless Operating Modes - 6:11
    • 98 - MAC Frame Structure - 2:58
    • 99 - Wireless Packet Types - 5:22
    • 100 - Wireless Encryption Protocols: WEP vs. WPA - 3:58
    • 101 - WPA 4 Way Handshake - 5:45
    • 102 - WPA2 Personal and Enterprise - 3:16
    • 103 - Wireshark: WEP and WPA - 1:10
    • 104 - Wi-Fi Protected Setup (WPS) - 3:49
  • Operating Systems in CompTIA A+220-1102
    • 105 - Functions Of Operating Systems - 10:25
    • 106 - Kinds of Operating System - 1:47
    • 107 - 32-Bit vs. 64-Bit File Systems - 3:24
    • 108 - FAT32 - 1:33
    • 109 - FAT64 - 2:21
    • 110 - Windows - 2:17
    • 111 - Apple Macintosh OS - 1:52
    • 112 - Linux Systems - 5:12
    • 113 - Android - 1:25
    • 114 - IOS - 1:23
    • 115 - Chrome OS - 1:13
  • Linux Fundamentals
    • 116 - What is Linux? - 1:34
    • 117 - Distributions - 1:22
    • 118 - Pieces of Linux - 2:57
    • 119 - Shell - 2:05
    • 120 - Linux Signs: $, #, %, ~ - 0:59
    • 121 - Linux Desktop Environments - 1:53
    • 122 - Linux File Hierarchy - 2:57
    • 123 - Configuring Services - 3:42
    • 124 - User Management - 2:38
    • 125 - Package Management Concepts - 3:25
    • 126 - Foremost Linux Package Managers - 2:32
    • 127 - Repository - 0:49
    • 128 - “apt-get” Package Manager - 6:08
    • 129 - Debian packages "dpkg" - 2:26
    • 130 - Install from Source Code - 4:35
    • 131 - System Monitoring - 6:59
    • 132 - Status of Network - 1:50
  • Windows Fundamentals in CompTIA A+ Certification
    • 133 - Introduction to Users and Groups - 2:48
    • 134 - Managing Users and Groups - 1:22
    • 135 - NTFS Permissions - 1:54
    • 136 - File Explorer - 1:25
    • 137 - MSConfig - 2:06
    • 138 - Services (Services.msc) - 1:30
    • 139 - Performance Monitor - 1:56
    • 140 - Task Manager - 2:58
    • 141 - Disk Management - 1:50
    • 142 - MSTSC - 1:23
  • Hardware and Network Troubleshooting in Comptia A+ 220-1101
    • 143 - Troubleshooting Methodology - 3:24
    • 144 - System Lockups - 2:52
    • 145 - Troubleshooting Internet Connections - 3:33
    • 146 - Check the Wi-Fi Settings - 1:12
    • 147 - Who Else Is Using the Internet? - 1:32
    • 148 - BIOS Time and Setting Resets - 2:54
    • 149 - Attempts to Boot to Incorrect Device - 2:25
  • Software Troubleshooting in Comptia A+ Certification
    • 150 - Slow System Performance - 1:56
    • 151 - Common Symptoms of Malware Infections - 2:43
    • 152 - macOS Boot Errors - 1:54
    • 153 - Windows Boot Errors - 2:23
    • 154 - Linux Boot Errors - 2:09
  • Libraries and Virtualization
    • 155 - What is a Library - 1 - 4:48
    • 156 - What is Virtualization - 1:06
    • 157 - Types of Virtualization - 1:36
    • 158 - Functions of Virtualization - 1:06
    • 159 - Security of the Virtualization - 3:01
    • 160 - Virtualization Lab Exercise - 1 - 8:21
    • 161 - Virtualization Lab Exercise - 2 - 12:35
    • 162 - What is a Library - 2 - 4:21
  • Programming Languages
    • 163 - Programming Languages - 4:54
    • 164 - Types of Programming - 9:19
  • Database Fundamentals
    • 165 - What is database? - 3:19
    • 166 - RDBMS(Relational Database Management System) - 2:24
    • 167 - What is SQL/Query? - 2:47
    • 168 - Install MS SQL Server Express Edition 2019 - 4:35
    • 169 - Insert Data to Table - 10:06
    • 170 - Update Data in A Table - 5:42
    • 171 - Delete Data and AdventureWorks - 6:17
  • Cloud Computing
    • 172 - Characteristics of Cloud Computing - 9:19
    • 173 - What is Cloud Computing - 3:38
    • 174 - Cloud Service Modules - 1 - 7:31
    • 175 - Cloud Service Modules - 2 - 6:27
  • Security in Comptia A+
    • 176 - What is Security - 2:23
    • 177 - Privacy-Integrity-Availability - 3:15
    • 178 - Encryption and Access Control - 2:54
    • 179 - A Rule (Authentication, Authorization and Accounting) - 3:53
    • 180 - What is a Hacker - 6:27
    • 181 - What is Attack? What are the Stages? - 3:19
    • 182 - Terms: Asset, Threat, Vulnerability, Risk, Exploit - 3:08
    • 183 - What is a Zero-day Attack? - 4:19
    • 184 - What are Bot/Botnet and Zombies? - 1:45
    • 185 - What are DoS and DDoS Attacks? - 2:57
    • 186 - Malware Types - 1:45
  • Social Engineering
    • 187 - Terminologies Part 1 - 5:19
    • 188 - Terminologies Part 2 - 6:08
    • 189 - Sending Fake Emails-Phishing - 1:11
    • 190 - Vishing - Voice Phishing - 3:41

View Full Curriculum


Access
Lifetime
Content
27.0 hours
Lessons
336

CompTIA Pentest+ PT0-002 (Ethical Hacking) Complete Course

Boost Your Ethical Hacking & Pentesting Skills to Be a Certified Ethical Hacker

By Oak Academy | in Online Courses

PenTest+ is the only exam on the market to include all aspects of vulnerability management. It not only covers hands-on vulnerability assessment, scanning, and analysis, but also includes planning, scoping, and managing weaknesses, not just exploiting them. This course walks you through all the things you need to pass the CompTIA Pentest+ PT0-001 & PT0-002 exam, step by step.

4.8/5 average rating: ★ ★ ★ ★

  • Access 336 lectures & 27 hours of content 24/7
  • Understand the importance of CompTIA Pentest+
  • Learn network topologies & network attacks
  • Troubleshoot hardware, network & software
  • Know the top 10 web application security risks
  • Learn what scripting is & how can you analyze a script

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Web & Mobile Development, IOS, Android, Ethical Hacking, IT
4.6/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Setting Up Virtual Lab Environment for CompTIA Pentest+ PT0-002- Ethical Hacking
    • 1 - Requirements and Overview of Lab - 3:54
    • 2 - Installing VMware Workstation Player - 7:32
    • 3 - FAQ about CompTIA Pentest+ PT0-002 (Ethical Hacking), Pentesting
    • 4 - Virtualbox Download and Install - 5:02
    • 5 - Installing Kali using the ISO file for VMware - Step 1 - 1:26
    • 6 - Installing Kali using the ISO file for VMware - Step 2 - 6:48
    • 7 - Installing Kali using the ISO file for VMware - Step 3 - 2:41
    • 8 - Installing Kali on VirtualBox using the OVA file - Step 1 - 3:14
    • 9 - Installing Kali on VirtualBox using the OVA file - Step 2 - 6:44
    • 10 - Installing Kali on VirtualBox using the OVA file - Step 3 - 4:11
    • 11 - Installing Metasploitable 2 - 3:43
    • 12 - Installing Metasploitable 3: VM Creation with Vagrant - 6:21
    • 13 - Downloading and Installing Free Windows 7 and Windows 10 - 2:58
    • 14 - Installing Vulnerable Virtual Machine: BeeBox - 8:04
    • 15 - Nat Network Create and Settings - 3:15
    • 16 - Connection Test - 6:36
  • Introduction to Penetration Testing (Pentest+)
    • 17 - Content of the Penetration Testing - 2:34
    • 18 - Definition of "Penetration Test" - 2:13
    • 19 - Penetration Test Types - 0:28
    • 20 - Security Audits - 4:41
    • 21 - Vulnerability Scan - 2:45
    • 22 - Terms: Asset, Threat, Vulnerability, Risk, Exploit - 3:08
    • 23 - Penetration Test Approaches - 2:44
    • 24 - Planning a Penetration Test - 4:24
    • 25 - Penetration Test Phases - 7:01
    • 26 - Legal Issues & Testing Standards - 4:18
  • Basic Networking
    • 27 - What is “Protocol” - 5:36
    • 28 - Reference Models - 0:24
    • 29 - OSI Reference Model - 13:43
    • 30 - OSI vs TCP/IP - 2:33
    • 31 - Demonstration using Wireshark - 7:59
    • 32 - Standards & Protocols - 3:50
    • 33 - Ethernet: Principles, Frame & Headers - 4:06
    • 34 - ARP ( Address Resolution Protocol ) : Mechanism, ARP Tables, ARP Packets - 6:10
    • 35 - ARP Hand-On Practices - 3:14
    • 37 - WLANs – Wireless Local Area Networks - 7:01
    • 38 - Introduction to Network Layer - 1:37
    • 39 - Internet Protocol - IP - 2:49
    • 40 - IPv4 Adressing System - 1:56
    • 41 - IPv4 Packet Header - 2:56
    • 42 - IPv4 Subnetting: Classful Networks - 2:35
    • 43 - IPv4 Subnetting: Subnet Mask - 2:59
    • 44 - IPv4 Subnetting: Understanding - 3:09
    • 45 - IPv4 Shortage - 1:41
    • 46 - Private Networks - 3:59
    • 47 - Private Networks - Demonstration - 3:01
    • 48 - NAT – Network Address Translation - 4:30
    • 49 - IPv6, Packet Header & Addressing - 8:30
    • 50 - DHCP - How the Mechanism Works - 9:23
    • 51 - ICMP – Internet Control Message Protocol - 2:02
    • 52 - Traceroute - 9:51
    • 53 - Introduction to Transport Layer - 2:40
    • 54 - TCP – Transmission Control Protocol - 6:59
    • 55 - TCP Header - 2:27
    • 56 - UDP – User Datagram Protocol - 3:56
    • 57 - Introduction to Application Layer - 0:55
    • 58 - DNS – Domain Name System - 5:56
    • 59 - HTTP ( Hyper Text Transfer Protocol ) - 3:09
    • 60 - HTTPS - 1:56
  • Information Gathering
    • 61 - Intro to Reconnaissance - 3:31
    • 62 - Extract Domain Registration Information: Whois - 4:20
    • 63 - Identifying Hosts or Subdomains Using DNS: Fierce & Theharvester - 6:08
    • 64 - Detect Applications on The Same Service - 1:10
    • 65 - Ports and Services on The Web Server - 8:44
    • 66 - Review Technology/Architecture Information - 4:37
    • 67 - Extracting Directory Structure: Crawling - 8:17
    • 68 - Minimum Information Principle - 2:56
    • 69 - Using Search Engines: Google Hacking - 6:10
    • 70 - Shodan - 2:50
    • 71 - Web Archives - 1:53
    • 72 - FOCA - Fingerprinting Organisations with Collected Archives - 7:41
    • 73 - Maltego - Visual Link Analysis Tool - 4:38
  • Vulnerability Scan and Introduction to Nessus
    • 74 - Introduction to Vulnerability Scan - 9:19
    • 75 - Introduction to Nessus - 1:57
    • 76 - Nessus: Download - 1:40
    • 77 - Nessus: Install & Setup - 3:42
    • 78 - Nessus: Creating a Custom Policy - 5:39
    • 79 - Nessus: First Scan - 7:07
    • 80 - An Aggressive Scan - 4:23
    • 81 - Results of an Aggressive Scan - 7:17
    • 82 - Results of an Aggressive Scan with Windows Systems - 2:45
    • 83 - Nessus: Report Function - 2:21
  • Network Scan & Network Attacks
    • 84 - Passive Scan - Definition - 2:50
    • 85 - Passive Scan - ARP Tables - 6:20
    • 86 - Passive Scan - Wireshark - 6:36
    • 87 - Wireshark Following Stream - 2:40
    • 88- Wireshark: Summarise Network - 6:19
    • 89 - Active Scan - 8:30
    • 90 - MitM Listening to the traffic - 1:45
    • 91 - Sniffing - 1:03
    • 92 - TCPDump - 5:23
    • 93 - Router Switch Hub - 4:44
    • 94 - How to Expand Sniffing Space - 5:13
    • 95 - MAC Flood Switching - 3:55
    • 96 - MAC Flood Using Macof Tool - 7:09
    • 97 - MacFlood - Countermeasures - 1:13
    • 98 - ARP Spoof - 3:40
    • 99 - ARP Cache Poisoning using Ettercap - 10:35
    • 100 - DHCP Starvation & DHCP Spoofing - 3:36
    • 101 - DHCP Mechanism - 6:15
  • Network Scan & Network Attacks
    • 102 - DHCP Starvation Scenario - 4:00
    • 103 - DHCP Starvation Demonstration with Yersinia - 8:33
    • 104 - VLAN Hopping - 2:05
    • 105 - VLAN Hopping Switch Spoofing - 1:39
    • 106 - VLAN Hopping Double Tagging - 3:17
  • Nmap
    • 107 - What Is Nmap - 4:14
    • 108 - Nmap First Scan - 4:47
    • 109 - Interpretation of Nmap Results - 2:04
    • 110 - Scanning Specific IPs or Specific Targets With Nmap - 1:57
    • 111 - Nmap IP List Creation - 4:07
    • 112 - Nmap Random Scan and Exclude Ips - 4:17
    • 113 - Input Output Management in Nmap - 8:28
    • 114 - What is Port Nmap Port Scan - 3:34
    • 115 - Scanning Top 20 Top 100 Ports With Nmap - 4:43
    • 116 - Scanning Specific Ports With Nmap - 6:01
    • 117 - Nmap Syn Scannig - 3:21
    • 118 - Nmap TCP Scan - 2:46
    • 119 - Nmap UDP Scan - 4:12
    • 120 - Nmap FiN, Xmas, Null and ACK Scan in Ethical Hacking - 2:55
    • 121 - Discovering hosts with ARP ping scans - 4:52
    • 122 - Discovering hosts with ICMP ping scans - 3:23
    • 123 - Nmap Fast Scan - 1:13
    • 124 - Nmap Open Ports Scan - 1:23
    • 125 - Nmap No PORT Scan - 2:15
    • 126 - Nmap PING and noPING Scan - 3:19
    • 127 - Nmap Verbose Command - 2:15
    • 128 - Nmap Version Detection - 7:10
    • 129 - Nmap Operating System Detection - 5:58
    • 130 - Nmap Script Engine (NSE) - 10:59
    • 131 - Nmap Script Engine Example 1 - 2:53
    • 132 - Nmap Script Engine Example 2 - 0:58
    • 133 - NMAP Brute Force Attacks - 4:35
    • 134 - Nmap Timing Templates - 3:36
    • 135 - Bypass of IPS & IDS Systems With Nmap - 10:57
  • Using Metasploit Framework
    • 136 - Why Metasploit Framework? AKA: MSF - 5:33
    • 137 - Importance of Penetration Testing (Pentesting) - 3:15
    • 138 - Penetration Testing Execution Standard - 5:40
    • 139 - Requirements ( Like Storage. Processor ) - 2:44
    • 140 - Lab Connectivity and Taking Snapshots - 2:05
    • 141 - Evolution of Metasploit - 4:18
    • 142 - Metasploit Filesystem and Libraries - 4:31
    • 143 - The Architecture of MSF - 1:43
    • 144 - Auxiliary Modules - 4:37
    • 145 - Payload Modules - 6:00
    • 146 - Exploit Modules - 3:33
    • 147 - Encoder Modules - 2:35
    • 148 - Post Modules - 3:24
    • 149- Metasploit Editions - 4:02
    • 150- Metasploit Community - 3:09
    • 151 - Metasploit Interfaces - 4:50
    • 152 - Armitage - 3:16
    • 153 - MSFconsole - 4:53
    • 154 - MSFConsole Basic Commands 1 - 6:44
    • 155 - MSFConsole Basic Commands 2 - 7:59
    • 156 - MSFConsole Basic Commands 3 - 3:32
    • 157 - Using Databases in MSF 1 - 5:43
    • 158 - Using Databases in MSF 2 - 3:14
    • 159 - More on Exploits in MSF - 3:14
  • Enumeration
    • 160 - What is Enumeration - 2:03
    • 161 - SMB and Samba Enumeration - 5:40
    • 162 - MySQL Enumeration - 3:40
    • 163 - FTP Enumeration - 4:15
    • 164 - SSH Enumeration - 2:30
    • 165 - HTTP Enumeration - 6:02
    • 166 - SNMP Enumeration - 3:43
    • 167 - SMTP Enumeration - 3:49
    • 168 - NMAP DNS Enumeration - 6:12
    • 169 - NMAP HTTP Enumeration - 2:52
    • 170 - NMAP MySQL Enumeration - 5:06
    • 171 - NMAP SMB Enumeration - 4:55
    • 172 - NMAP SNMP Enumeration - 6:56
  • Social Engineering
    • 173 - Terminologies Part 1 - 5:19
    • 174 - Terminologies Part 2 - 6:08
    • 175 - Creating Malware and Terminologies - 3:37
    • 176 - MSFvenom Part 1 - 14:09
    • 177 - MSFvenom Part 2 - 2:25
    • 178 - Veil Installation - 2:36
    • 179 - Veil in Action - 5:12
    • 180 - TheFatRat Installation - 4:19
    • 181 - TheFatRat in Action - 11:08
    • 182 - TheFatRat Overcoming a Problem - 0:46
    • 183 - Embedding Malware in PDF - 4:04
    • 184 - Embedding Malware in WORD - 9:21
    • 185 - Embedding Malware in Firefox Add-on - 7:02
    • 186 - Empire Installation - 4:07
    • 187 - Empire in Action Part 1 - 8:12
    • 188 - Empire in Action Part 2 - 4:23
    • 189 - Exploiting Java Vulnerabilities - 2:24
    • 190 - Social Engineering Toolkit - 6:34
    • 191 - Sending Fake Emails Phishing - 1:11
    • 192 - Vishing - Voice Phishing - 3:41
  • Wi-Fİ Hacking And Tools
    • 193 - Hardware and Software Requirements - 7:02
    • 194 - Wi-Fi Adapter Settings - 6:17
    • 195 - IEE-802.11 - 3:54
    • 196 - Basic Terminologies Concepts - 4:50
    • 197 - Wireless Operating Modes - 6:11
    • 198 - MAC Frame Structure - 2:58
    • 199 - Wireless Packet Types - 5:22
    • 200 - Wireshark Analysing Packet Types - 6:33
    • 201 - Wifi Network Interaction - 5:03
    • 202 - Wireless Encryption Protocols WEP WPA - 3:58
    • 203 - WPA-4 Way Handshake - 5:45
    • 204 - Personal Enterprise - 3:16
    • 205 - Wireshark WEP and WPA - 1:10
    • 206 - Wifi Protected Setup - 3:49
    • 207 - Wireless Reconnaissance Bettercap - 3:35
    • 208 - Wardriving with Kismet: Configuration - 6:45
    • 209 - Wardriving with Kismet: Mapping - 4:50
    • 210 - Rogue Access Points Airbase ng - 5:46
    • 211 - Rogue Access Points Evil Twin Attack - 6:42
    • 212 - Rogue Access Points Wifi Pumpkin - 7:30
    • 213 - Rogue Access Points Fluxion - 2:50
    • 214 - Fluxion Handshake Snooper Attack - 4:54
    • 215 - Fluxion Captive Portal Attack - 5:28
    • 216 - WEP Cracking Preparing Attacks - 2:49
    • 217 - Cracking WEP Fake Authentication Attack - 3:50
    • 218 - Cracking WEP Deauthentication Attack - 2:59
    • 219 - WEP Cracking Deauthentication Attack with Bettercap - 1:32
  • Web Application Pentesting
    • 231 - Reflected Cross-Site Scripting Attacks - 9:42
    • 232 - Reflected Cross-Site Scripting over JSON - 6:24
    • 233 - Stored Cross-Site Scripting Attacks - 9:56
    • 234 - DOM Based Cross-Site Scripting Attacks - 10:04
    • 235 - Inband SQL Injection over a Search Form - 14:24
    • 236 - Inband SQL Injection over a Select Form - 8:22
    • 237 - Error-Based SQL Injection over a Login Form - 6:47
    • 238 - SQL Injection over Insert Statement - 7:07
    • 239 - Boolean Based Blind SQL Injection - 6:53
    • 240 - Time Based Blind SQL Injection - 5:34
    • 241 - Detecting and Exploiting SQL Injection with SQLmap - 11:30
    • 242 - Detecting and Exploiting Error Based SQL Injection with SQLmap - 5:10
    • 243 - Detecting and Exploiting Boolean and Time Based Blind SQL Injection with SQLmap - 8:02
    • 244 - Command Injection Introduction - 5:35
    • 245 - Automate Command Injection Attacks: Commix - 5:43
    • 246 - XML/XPATH Injection - 14:07
    • 247 - SMTP Mail Header Injection - 6:51
    • 248 - PHP Code Injection - 6:00
    • 249 - Zed Attack Proxy (ZAP): A Web App Vulnerability Scanner - 3:06
    • 250 - Introduction to Burp: Downloading, Installing and Running - 8:44
    • 251 - Intercepting HTTP Traffic with Burp Suite - 3:48
    • 252 - Intercepting HTTPS Traffic with Burp Suite - 2:52
  • Authentication and Authorization Testing
    • 253 - Definition - 2:37
    • 254 - Creating a Password List: Crunch - 7:32
    • 255 - Differece Between HTTP and HTTPS Traffic: Wireshark - 3:43
    • 256 - Attacking Insecure Login Mechanisms - 9:12
    • 257 - Attacking Insecure Logout Mechanisms - 4:50
    • 258 - Attacking Improper Password Recovery Mechanisms - 5:50
    • 259 - Attacking Insecure CAPTCHA Implementations - 8:39
    • 260 - Path Traversal: Directory - 6:44
    • 261 - Path Traversal: File - 5:41
    • 262 - Introduction to File Inclusion Vulnerabilities - 6:23
    • 263 - Local File Inclusion Vulnerabilities - 6:11
    • 264 - Remote File Inclusion Vulnerabilities - 5:51
  • Post Exploitation
    • 265 - Post-Exploitation - 3:28
    • 266 - What is “Persistence”? - 1:28
    • 267 - Meterpreter’s Persistence module - 8:55
    • 268 - Removing the Backdoor - 5:00
  • IoT & Mobile
    • 269 - What is IoT - 3:25
    • 270 - Where does IoT Exist in Our Lives - 1:47
    • 271 - How does IoT work - 0:47
    • 272 - Connection Standarts - 9:06
    • 273 - IoT Security - 7:04
    • 274 - Mobile Security Threats - 8:02
  • Scripting Basics
    • 275 - Bash Scripting 101 - 4:18
  • Python Scripting
    • 276 - Installing Anaconda Distribution For Windows in Python - 2:49
    • 277 - Installing Python 3.9.7 and PyCharm For Windows in Python - 4:19
    • 278 - Variables in python - 8:35
    • 279 - Numbers in Python - 10:20
    • 280 - String Operations and Useful String Methods in python examples - 5:37
    • 281 - Data Type Conversion in Python - 3:53
    • 282 - Exercise : Company Email Generator in python - 2:57
    • 283 - Conditionals in python - 1:41
    • 284 - bool() Function in Python - 2:08
    • 285 - Comparison and Logical Operators in Python - 9:05
    • 286 - If Statements in Python - 9:59
    • 287 - Exercise: Calculator - 11:05
    • 288 - Loops in Python - 1:31
    • 289 - While Loops in Python - 4:15
    • 290 - For Loops in python - 4:29
    • 291 - Range Function in Python - 3:24
    • 292 - Control Statements in python - 5:03
    • 293 - Functions in Python Programming - 2:11
    • 294 - Create A New Function and Function Calls - 3:53
    • 295 - Return Statement - 4:36
    • 296 - Lambda Functions - 2:58
    • 297 - Lists and List Operations in Python Programming - 4:55
    • 298 - List Methods in Python Programming - 5:35
    • 299 - Dictionaries in Python Hands-on - 10:16
    • 300 - Dictionary Comprehensions - 2:20
    • 301 - Logic of OOP in Object Oriented Programming (OOP) - 4:58
    • 302 - Constructor - 6:34
    • 303 - Methods - 4:41
    • 304 - Inheritance - 6:42
    • 305 - Overriding and Overloading - 10:33
  • Ruby Scripting
    • 306 - Ruby Set Up - Installing Ruby on Windows - 2:01
    • 307 - Ruby Development Editor - 3:18
    • 308 - First Program - 6:25
    • 309 - Debugging - 2:05
    • 310 - Comments - 1:02
    • 311 - What is a variable? - 3:42
    • 312 - Data Types - 3:07
    • 313 - Arithmetic Operators - 2:16
    • 314 - Assignment Operator - 2:15
    • 315 - Parallel Assignment - 2:03
    • 316 - Comparison Operators - 5:10
    • 317 - Logical Operators - 1:28
    • 318 - Special Operators - 2:27
    • 319 - Operation Ordering - 3:00
    • 320 - String Operations - 9:50
    • 321 - String Methods - 6:18
    • 322 - If Statements - 10:38
    • 323 - Unless Statements - 4:06
    • 324 Case Statements - 4:00
    • 325 Loops - 4:24
    • 326 - For Loops and Iterators - 3:34
    • 327 - Do / While Loops - 1:19
    • 328 - Break and Next Keywords - 3:59
    • 329 - Method Calls - 2:24
    • 330 - Create A New Method - 5:02
    • 331 - Blocks - 3:48
    • 332 - Method Arguments - 5:51
    • 333 - Lambda Functions - 3:46
    • 334 - Global and Local Variables - 4:19
    • 335 - Recursive Functions - 3:15
    • 336 - Modules - 5:46
    • 337 - Arrays - 4:12
    • 338 - Traverse an Array - 4:12
    • 339 - Array Operations - 8:11
    • 340 - Array Methods - 8:25
    • 341 - Hashes - 4:52
    • 342 - Traverse a Hash - 2:45
    • 343 - Hash Operations - 1:51
    • 344 - Hash Methods - 6:04
    • 345 - Files and Directories - 8:17
    • 346 - File Operations - 7:49
    • 347 - Exceptions - 12:03
    • 348 - Throw-Catch Statements - 5:37

View Full Curriculum


Access
Lifetime
Content
15.0 hours
Lessons
292

CompTIA Security+ (SY0-601) Complete Course & CompTIA Lab

CompTIA Security+ Topics & Sample Questions Required for the CompTIA Security SY601 Exam

By Oak Academy | in Online Courses

Prepare for the CompTIA Security+ certification with real-world cybersecurity. You’ll get step-by-step video tutorials along with hands-on exercises and practice tests that mirror real-world problems you’ll encounter in a typical IT security job. Everything you need to pass the CompTIA Security+(SY0-601) is here. This course walks you through all the things you need to pass the CompTIA Security + (SY601) exam, step by step. As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects.

During the course, sample questions were given at the end of each section. These questions are generally similar to questions that were previously found in the CompTIA Security + exam.

4.4/5 average rating: ★ ★ ★ ★

  • Access 292 lectures & 15 hours of content 24/7
  • Assess the cybersecurity posture of an enterprise environment
  • Recommend & implement appropriate cybersecurity solutions
  • Monitor & secure hybrid environments
  • Operate with an awareness of applicable laws & policies
  • Identify, analyze & respond to cybersecurity events and incidents
  • Utilize appropriate data sources to support an investigation
  • Use mitigation techniques or controls to secure an environment
  • Compare various types of controls

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Web & Mobile Development, IOS, Android, Ethical Hacking, IT
4.6/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with PCs and networks

Course Outline

  • CompTIA Security+ (SY0-601) Complete Course & Exam Lab Introduction
    • 1- CompTIA Security+ (SY0-601) Complete Course & Exam Lab Introduction - 11:34
    • 2- FAQ CompTIA Security Plus (SY0-601) Course | Comptia Security+
  • Basic Security Concepts
    • 3- What is Security? - 2:22
    • 4- Privacy-Integrity-Availability - 3:15
    • 5- Encryption and Access Control - 2:54
    • 6- 3 A Rule (Authentication, Authorization and Accounting) - 3:52
    • 7- Threat - 3:45
    • 8- What is a Hacker? - 6:27
    • 9- What is Attack? What are the Stages? - 3:19
    • 10- Single Point Of Failure (SPOF) - 3:13
    • 11- Introducing Basic Risk Concepts - 3:22
    • Quiz
    • Quiz
    • Quiz
  • Identity Management
    • 12- What is Identity Management? - 2:14
    • 13- KERBEROS & NTLM&LDAP - 7:31
    • 14- Single Sign-On - 11:02
    • 15- Smart Cards - 2:58
    • 16- Tokens or Key Fobs - 5:20
    • 17- Biometric Methods - 7:36
    • 18- Dual-Factor and Multifactor Authentication - 1:38
    • 19- PAP / CHAP / MS-CHAP - 2:46
    • 20- RADIUS - 6:26
    • Quiz
    • Quiz
    • Quiz
  • Summary-1
    • 21- Summary-1 - 3:26
  • Users
    • 22- Create a User In Comptia - 3:03
    • 23- Managing Accounts-1 - 11:44
    • 24- Managing Accounts-2 - 9:20
    • 25- Passwords - 9:18
    • 26- Password Policy - 9:02
    • Quiz
    • Quiz
    • Quiz
  • Comparing Access Control Models
    • 27- Comparing Access Control Models - 2:19
    • 28- Role-Based Access Control - 3:15
    • 29- Establishing Access with Group-Based Privileges - 4:42
    • 30- Rule Based and Discretionary Access Control - 5:39
    • 31- Mandatory Access Control - 2:46
    • 32- Establishing Access Attribute-Based Access Control - 6:07
    • Quiz
    • Quiz
    • Quiz
  • Virtualization
    • 33- What is Virtualization? - 3:46
    • 34- Virtualization Technologies - 2:55
    • 35- Benefits of Virtualization - 5:00
    • 36- Security Issues of Virtualization - 3:50
    • 37- Create Lab Download and Install VirtualBox - 5:02
    • 38- Install Virtual Kali Linux-1 - 1:43
    • 39- Install Virtual Kali Linux-2 - 6:46
    • 40- Install Virtual Kali Linux-3 - 5:24
    • 41- OWASP Broken Web Applications - 4:30
    • 42- Configuring NAT Network in Oracle VM VirtualBox - 1:07
    • Quiz
    • Quiz
    • Quiz
  • Network Technologies
    • 43- Basic Network Concepts - 15:38
    • 44- Domain Name Services(DNS) - 9:47
    • 45- What is the port? How does it work? - 5:10
    • 46- What is the Network Address - 7:05
    • 47- Combining the IP Address and the Port - 4:37
    • 48- Switches - 5:03
    • 49- Bridge - 3:07
    • 50- Routers - 9:29
    • 51- Understanding NAT and PAT - 2:37
    • 52- Network Separation - 3:16
    • 53- Proxy Servers - 7:13
    • 54- Types of Using Network Technologies-1 - 9:14
    • 55- Types of Using Network Technologies-2 - 8:26
    • Quiz
    • Quiz
    • Quiz
  • Wireless Networks
    • 56- Reviewing Basic Wireless Network Information - 6:29
    • 57- Wireless Cryptographic Protocols - 7:38
    • 58- Authentication Protocols for Wireless Networks - 6:24
    • Quiz
    • Quiz
    • Quiz
  • Summary-2
    • 59- Summary-2 - 3:02
  • Network Security Technologies
    • 60- Firewalls - 9:28
    • 61- Network Access Control - 9:27
    • 62- Implementing a Secure Network - 5:15
    • Quiz
    • Quiz
    • Quiz
  • Intrusion Detection Systems
    • 63- Understanding IDSs and IPSs - 4:46
    • 64- Detection Methods - 11:49
    • 65- Honeypots - 4:42
    • Quiz
    • Quiz
    • Quiz
  • Virtual Private Network(VPN) Technologies
    • 66- Using VPNs for Remote Access - 3:54
    • 67- VPN Tunnel Protocols - 6:18
    • 68- Site-to-Site VPNs - 2:36
    • Quiz
    • Quiz
    • Quiz
  • Security Threats
    • 69- Understanding Threat Actors - 12:36
    • 70- Viruses - 2:10
    • 71- Logic Bombs - 3:21
    • 72- Trojans
    • 73- Ransomware - 3:24
    • 74- Spyware - 3:03
    • 75- Bots and Botnets - 4:17
    • 76- Unified Threat Management(UTM) - 5:55
    • Quiz
    • Quiz
    • Quiz
  • Securing Wireless Networks
    • 77- Disable SSID Broadcasting or Not - 1:26
    • 78- Enable MAC Filtering - 1:53
    • Quiz
    • Quiz
    • Quiz
  • Understanding Wireless Attacks
    • 79- Disassociation Attacks - 1:58
    • 80- WPS and WPS Attacks - 1:50
    • 81- Rogue AP - 2:14
    • 82- Evil Twin - 2:08
    • 83- Jamming Attacks - 3:47
    • 84- Bluetooth Attacks - 2:51
    • 85- RFID Attacks - 2:40
    • 86- Wireless Replay Attacks - 1:49
    • 87- Rogue Access Points-Airbase-ng - 5:46
    • 88- Rogue Access Points-Evil-Twin-Attack - 6:42
    • 89- Cracking-WEP-Preparing-Attacks - 2:49
    • 90- Cracking-WEP-Fake-Authentication-Attack - 3:50
    • 91- Cracking-WEP-ChopChop-Attack - 3:47
    • 92- Cracking-WPA-Aircrack-ng - 3:56
    • 93- Cracking-WPA-John-the-Ripper - 4:09
    • Quiz
    • Quiz
    • Quiz
  • Summary-3
    • 94- Summary-3 - 2:44
  • Network Attacks
    • 95- Network Attacks - 3:39
    • 96- SYN Flood Attack - 2:55
    • 97- MAC Flood Attacks - 2:53
    • 98- MAC Flood Using Macof - 7:09
    • 99- Man-in-the-Middle Attacks - 1:33
    • 100- ARP Poisoning Attacks - 3:49
    • 101- DNS Attacks - 6:17
    • Quiz
    • Quiz
  • Password Attacks
    • 102- Brute Force&Dictionary Attacks - 3:32
    • 104- Cain & Abel_ A Dictionary Attack - 3:36
    • 105- Password Hashes - 4:53
    • 106- Cain and Abel_ Gathering Hashes - 4:43
    • 107- Birthday Attacks - 4:50
    • 108- Replay Attacks - 3:25
    • 109- Hijacking and Related Attacks - 5:59
    • 110- Driver Manipulation - 2:07
    • Quiz
    • Quiz
    • Quiz
  • Zero-Day Attacks
    • 111- Zero-Day Attacks - 4:19
    • Quiz
    • Quiz
    • Quiz
  • Code Attacks
    • 112- Code Reuse and SDKs - 4:31
    • 113- Code Quality and Testing - 2:51
    • 114- Development Life-Cycle Models - 3:42
    • 115- Secure DevOps - 3:19
    • 116- Version Control and Change Management - 2:17
    • 117- Provisioning and Deprovisioning - 1:48
    • Quiz
    • Quiz
    • Quiz
  • Web Server Attacks
    • 118- Web Servers - 2:07
    • 119- SQL Injection Attacks - 4:32
    • 120- Protecting Against SQL Injection Attacks - 2:38
    • 121- SQL Injection - Part I - 4:20
    • 122- SQL Injection - Part II - 4:41
    • 123- SQL Injection - Part III - 5:20
    • 124- DLL Injection - 2:24
    • 125- Cross-Site Scripting - 6:40
    • 126- Classification of Web Attacks - 1:36
    • 127- Zed Attack Proxy (ZAP)_ A Web App Vulnerability Scanner - 3:06
    • 128- XSS (Cross Site Scripting) - Stored and DOM Based XSS - 7:01
    • 129- Cross Site Request Forgery (CSRF) - 5:12
    • 130- Path Traversal_ File - 5:41
    • Quiz
    • Quiz
    • Quiz
  • Social Engineering Attacks
    • 131- Social Engineering - 4:09
    • 132- Shoulder Surfing - 1:06
    • 133- Tricking Users with Hoaxes - 1:18
    • 134- Tailgating and Mantraps - 1:12
    • 135- Dumpster Diving - 1:26
    • 136- Watering Hole Attacks - 1:06
    • 137- Spam - 2:04
    • 138- Phishing - 6:24
    • 139- Whaling - 2:45
    • 140- Vishing - 3:08
    • 143- Social Engineering Toolkit (SET) for Phishing - 6:33
    • Quiz
    • Quiz
    • Quiz
  • Summary-4
    • 144- Summary-4 - 3:32
  • Memory Buffer Vulnerabilities
    • 145- Memory Leak - 2:41
    • 146- Buffer Overflow Attacks - 4:16
    • 147- Pointer Dereference - 2:07
    • 148- Compiled Versus Runtime Code - 1:20
    • 149- Proper Input Validation - 4:07
    • 150- Side Input Validation - 3:20
    • 151- Avoiding Race Conditions - 2:13
    • 152- Proper Error Handling - 2:14
    • 153- Cryptographic Techniques - 1:43
    • Quiz
    • Quiz
    • Quiz
  • Preventing Attacks
    • 154- Protecting Systems from Malware - 2:05
    • 155- Antivirus and Anti-Malware Software - 8:22
    • 156- Advanced Malware Tools - 3:31
    • 157- Educating Users - 1:53
    • 158- Implementing Defense in Depth - 3:35
    • Quiz
    • Quiz
    • Quiz
  • Server Security
    • 159- Implementing Secure Systems - 4:11
    • 160- Operating systems - 4:12
    • 161- Secure Operating System Configurations - 6:33
    • 162- Resiliency and Automation Strategies - 4:56
    • 163- Change Management Policy - 7:09
    • 164- Secure Staging and Deployment - 5:26
    • 165- Peripherals - 4:10
    • 166- EMI and EMP - 7:46
    • 167- Hardware Security Module - 2:26
    • 168- Cloud Deployment Models - 5:29
    • 169- Cloud Services - 6:20
    • 170- Security Responsibilities with Cloud Models - 1:52
    • Quiz
    • Quiz
    • Quiz
  • Mobile Devices
    • 171- Deploying Mobile Devices Securely - 2:14
    • 172- Deployment Models - 8:35
    • 173- Mobile Device Management - 9:26
    • 174- Unauthorized Software - 5:03
    • 175- Hardware Control - 2:42
    • 176- Unauthorized Connections - 2:32
    • Quiz
    • Quiz
    • Quiz
  • Exploring Embedded Systems
    • 177- Exploring Embedded Systems - 7:06
    • 178- Understanding Stuxnet - 2:13
    • 179- Real-Time Operating Systems - 3:16
    • Quiz
  • Summary-5
    • 180- Summary-5 - 4:13
  • Data Security
    • 181- Protecting Data - 11:24
    • 182- Data Loss Prevention - 5:31
    • Quiz
    • Quiz
    • Quiz
  • Database Security
    • 184- Normalization - 5:26
    • 186- Database Security - 0:57
    • Quiz
    • Quiz
    • Quiz
  • Risk Management
    • 187- Understanding Risk Management - 2:39
    • 188- Risk Management - 2:45
    • 189- Threats and Threat Assessments - 4:22
    • 190- Vulnerabilities - 2:03
    • 191- Risk Assessment - 13:06
    • 192- Risk Registers - 5:51
    • Quiz
    • Quiz
  • Checking for Vulnerabilities
    • 194- Password Crackers - 1:59
    • 196- Hydra_ Cracking the Password of a Web App - 10:01
    • 197- Password Cracking with Cain & Aibel - 1:01
    • 198- Network Scan Types - 2:50
    • 204- Nmap with Version Detection - 5:58
    • 205- Nmap with Operating System Detection - 7:10
    • 206- Active Scan with Hping - 8:30
    • 210- Introduction to Vulnerability Scan - 9:19
    • 211- Introduction to Nessus - 1:57
    • 212- Nessus_ First Scan - 7:07
    • Quiz
    • Quiz
    • Quiz
  • Penetration Tests
    • 213- Penetration Tests - 2:45
    • 214- Passive & Active Reconnaissance - 2:02
    • 215- Initial Exploitation - 3:45
    • Quiz
  • Physical Security Precautions
    • 219- Comparing Physical Security Controls - 3:28
    • 223- Using Hardware Locks - 2:56
    • 224- Asset Management - 2:33
    • Quiz
  • Summary-6
    • 226- Summary-6 - 1:59
  • Single Point of Failure
    • 227- Single Point of Failure - 1:46
  • Business Continuity Plans
    • 231- Comparing Business Continuity Elements - 6:09
    • 235- Disaster Recovery - 8:11
  • Examination of Logs
    • 237- Other Logs-SIEM - 7:12
  • Cryptography and PKI
    • 245- HMAC - 2:49
    • 249- Providing Confidentiality with Encryption - 8:16

View Full Curriculum


Access
Lifetime
Content
2.0 hours
Lessons
48

CompTIA ITF+ Fundamentals Exam Essentials

Perform Tasks Commonly Performed by Advanced End-Users & Entry-Level IT Professionals Alike

By Oak Academy | in Online Courses

CompTIA IT Fundamentals (ITF+) is an introduction to basic IT knowledge and skills that helps professionals decide if a career in IT is right for them. It also helps organizations prepare non-technical teams for digital transformation. And in this course, you will focus on the essential IT skills and knowledge needed to perform tasks commonly performed by advanced end-users and entry-level IT professionals alike. Pass the exam and be one of the in-demand professionals in the field.

4.5/5 average rating: ★ ★ ★ ★

  • Access 48 lectures & 2 hours of content 24/7
  • Be familiar with computer hardware & software, databases, networking security, and software development
  • Gain basic IT knowledge & skills
  • Perform tasks commonly performed by advanced end-users & entry-level IT professionals alike
  • Pass the CompTIA IT Fundamentals exam

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Web & Mobile Development, IOS, Android, Ethical Hacking, IT
4.6/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Introduction to IT Fundamentals and Comptia IT Fundamentals Exam Essensials
    • 1- History of Computer - 1:40
    • 2- FAQ about IT Fundamentals, Comptia IT Fundamentals, comptia itf, itf certificate
    • 3- What is a Computer - 1:25
    • 4- Benefits of Using Computer - 0:37
    • 5- Types of Computer - 1:07
  • Components of Computer
    • 6- Input Processing - Output Cycle - 6:27
    • 7- Computer Inputs - 0:57
    • 8- What is Processing - 1:18
    • 9- Cyper Attacks to CPU - 1:04
    • 10- What is Storing - 0:53
    • 11- Output - 1:25
    • 12- Computer Components - 2:54
    • 13- Input Devices - 2:28
  • Storage Devices
    • 14- Primary and Secondary Memory - 4:22
    • 15- Primary and Secondary Memory - 1:18
    • 16- SRAM and DRAM - 1:28
    • 17- ROM - 1:12
    • 18- PROM, EPROM, EEPROM - 1:04
    • 19- Storage Devices - 2:19
    • 20- Network attached storage - 1:40
    • 21- Cloud_Storage - 1:16
  • Processing Devices
    • 22- PU - 3:00
    • 23- GPU - 2:46
    • 24- Motherboard - 1:14
    • 25- Output Devices - 0:38
  • IoT & Mobile
    • 26- What is IoT - 3:24
    • 27- Where does IoT Exist in Our Lives - 1:47
    • 28- How does IoT work - 0:47
    • 29- Connection Standarts - 9:06
    • 30- IoT Security - 7:04
    • 31- Mobile Security Threats - 8:02
  • Network Components
    • 32- Network Interface Card - 2:06
    • 33- What is Hub - 1:22
    • 34- What is Switch - 1:46
    • 35- How does switch work - 2:21
    • 36- What is Router - 1:33
    • 38- Modem Types - 2:59
    • 39- Wireless Access Point (WAP) - 1:06
  • Operating Systems
    • 41- Functions Of Operating Systems - 10:25
    • 42- Kinds of Operating System - 1:47
    • 44- Windows and MacOS - 3:28
    • 45- Virtualbox Virtualization Software - 3:13
  • Libraries and Virtualization
    • 49- Functions of Virtualization - 1:06
    • 50- Security of the Virtualization - 3:01
    • 53- What is a Library 2 - 4:21
  • Programming Languages
    • 55- Types of Programming - 9:19
  • Cloud Computing
    • 56- Characteristics of Cloud Computing - 9:19
    • 59- Cloud Service Modules 2 - 6:26

View Full Curriculum


Access
Lifetime
Content
8.0 hours
Lessons
132

CompTIA A+ CompTIA A 220-1001 Exam & A+ Certification Prep

Master the Basics of Working with Hardware, Networks & Computer Systems

By Oak Academy | in Online Courses

Enroll in this CompTIA A+ certification course to prepare for your exam. This certification is the internationally-recognized industry standard — and it’s the first step to getting a great job in IT support. Find out from real-world experts how to troubleshoot everything from networks to mobile devices to the basics (and more) of operating systems. CompTIA A+ certified professionals are proven, problem solvers. They support today’s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today’s digital world.

4.5/5 average rating: ★ ★ ★ ★

  • Access 190 lectures & 10 hours of content 24/7
  • Test your knowledge of PC hardware, mobile device hardware, operating systems, security, cloud computing, & troubleshooting hardware
  • Learn about computers & their components
  • Learn about storage & processing devices
  • Validate your knowledge of wired & wireless networks

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Web & Mobile Development, IOS, Android, Ethical Hacking, IT
4.6/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • About computer
    • 1- History Of Computer - 1:40
    • 2- FAQ about CompTIA, CompTIA A+, CompTIA A 220-1001 Exam and A+ Certification
    • 3- What is a Computer - 1:25
    • 4- Benefits of Using Computer - 0:37
    • 5- Types of Computer - 1:07
  • Components of Computer
    • 6- Input Processing - Output Cycle - 6:27
    • 7- Computer Inputs - 0:57
    • 8- What is Processing - 1:18
    • 9- Cyper Attacks to CPU - 1:04
    • 10- What is Storing - 0:53
    • 11- Output - 1:25
    • 12- Computer Components - 2:54
    • 13- Input Devices - 2:28
  • Storage Devices
    • 14- Primary and Secondary Memory - 4:22
    • 15- RAM - 1:18
    • 16- SRAM and DRAM - 1:28
    • 17- ROM - 1:12
    • 18- PROM, EPROM, EEPROM - 1:04
    • 19- What is Flash Memory, Magnetic Storage Devices, Optical Storage Devices - 2:19
    • 20- Network attached storage - 1:40
    • 21- Cloud Storage - 1:16
  • Processing Devices
    • 22- CPU - 3:00
    • 23- GPU - 2:46
    • 24- Motherboard - 1:14
    • 25- Output Devices - 0:38
  • IoT & Mobile
    • 26- What is IoT - 3:24
    • 27- Where does IoT Exist in Our Lives - 1:47
    • 28- How does IoT work - 0:47
    • 29- Connection Standarts - 9:06
    • 30- IoT Security - 7:04
    • 31- Mobile Security Threats - 8:02
  • Network Fundamentals
    • 32- Attention for Ethical Hackers
    • 33- Content of the Network Fundamentals - 1:07
    • 34- Basic Terms of Networking - 5:36
    • 35- Reference Models - 0:24
    • 36- TCP/IP (Networking) Basics - 13:43
    • 37- OSI Reference Model vs. TCP/IP Reference Model - 2:32
    • 38- Network Layers in Real World - 7:59
    • 39- Layer 2 - Data Link Layer - 3:50
    • 40- Layer 2: Ethernet - Principles, Frames & Headers - 4:06
    • 41- Layer 2: ARP - Address Resolution Protocol - 6:10
    • 42- Layer 2: Analysing ARP Packets - 3:14
    • 43- Layer 2: VLANs (Virtual Local Area Networks) - 4:03
    • 44- Layer 2: WLANs (Wireless Local Area Networks) - 7:01
    • 45- Layer 3 - Network Layer - 1:36
    • 46- Layer 3: IP (Internet Protocol) - 2:49
    • 47- Layer 3: IPv4 Addressing System - 1:56
    • 48- Layer 3: IPv4 Packet Header - 2:56
    • 49- Layer 3: Subnetting - Classful Networks - 2:35
    • 50- Layer 3: Subnetting Masks - 2:59
    • 51- Layer 3: Understanding IPv4 Subnets - 3:09
    • 52- Layer 3: IPv4 Address Shortage - 1:41
    • 53- Layer 3: Private Networks - 3:59
    • 54- Layer 3: Private Networks - Demonstration - 3:01
    • 55- Layer 3: NAT (Network Address Translation) - 4:30
    • 56- Layer 3: IPv6, Packet Header & Addressing - 8:30
    • 57- Layer 3: DHCP - How the Mechanism Works - 9:23
    • 58- Layer 3: ICMP (Internet Control Message Protocol) - 2:02
    • 59- Layer 3: Traceroute - 9:50
    • 60- Layer 4 - Transport Layer - 2:39
    • 61- Layer 4: TCP (Transmission Control Protocol) - 6:59
    • 62- Layer 4: TCP Header - 2:27
    • 63- Layer 4: UDP (User Datagram Protocol) - 3:56
    • 64- Layer 5-7 - Application Layer - 0:55
    • 65- Layer 7: DNS (Domain Name System) - 5:56
    • 66- Layer 7: HTTP (Hyper Text Transfer Protocol) - 3:09
    • 67- Layer 7: HTTPS - 1:56
    • 68- GNS3 - Graphical Network Simulator - 3:30
    • 69- GNS3: Setting Up the First Project - 7:57
    • 70- GNS3: Tool Components - 2:56
    • 71- GNS3: Building the Network - 15:45
    • 72- GNS3: Attaching VMware VMs (Including Kali) to the Network - 6:31
    • 73- GNS3: Configuring Switch & Router (Cisco) and creating VLANs - 5:13
    • 74- Active Network Devices: Router, Switch, Hub - 4:44
    • 75- Wireless Access Point (WAP) - 1:06
    • 76- Summary of Network Fundamentals - 1:23
  • Wi-fi Network Fundamentals
    • 77- IEE-802.11 - 3:54
    • 78- Basic Terminologies Concepts - 4:50
    • 79- Wireless Operating Modes - 6:11
    • 80- MAC Frame Structure - 2:58
    • 81- Wireless Packet Types - 5:21
    • 82- Wireless Encryption Protocols: WEP vs. WPA - 3:58
    • 83- WPA 4-Way Handshake - 5:45
    • 84- WPA2 Personal and Enterprise - 3:16
    • 85- Wireshark: WEP and WPA - 1:10
    • 86- Wi-Fi Protected Setup (WPS) - 3:49
  • Operating Systems
    • 87- Functions Of Operating Systems - 10:25
    • 88- Kinds of Operating System - 1:47
    • 89- Linux Systems - 5:12
  • Linux Fundamentals
    • 90- What is Linux? - 1:34
    • 91- Distributions - 1:22
    • 92- Pieces of Linux - 2:57
    • 93- Shell - 2:04
    • 94- Linux Signs: $, #, %, ~ - 0:59
    • 96- Linux File Hierarchy - 2:57
    • 97- Configuring Services - 3:42
    • 98- User Management - 2:38
    • 99- Package Management Concepts - 3:25
    • 100- Foremost Linux Package Managers - 2:32
    • 101- Repository (a.k.a. Repo) - 0:49
    • 102- “apt-get” Package Manager - 6:08
    • 103- Debian packages "dpkg" - 2:26
    • 104- Install From Source Code - 4:35
    • 105- System Monitoring - 6:59
    • 106- Status of Network - 1:49
  • Libraries and Virtualization
    • 107- What is a Library - 1 - 4:48
    • 108- What is Virtualization - 1:06
    • 109- Types of Virtualization - 1:36
    • 110- Functions of Virtualization - 1:06
    • 111- Security of the Virtualization - 3:01
    • 112- Virtualization Lab Exercise - 1 - 8:20
    • 113- Virtualization Lab Exercise - 2 - 12:35
    • 114- What is a Library - 2 - 4:21
  • Programming Languages
    • 116- Types of Programming - 9:19
  • Database Fundamentals
    • 118- RDBMS(Relational Database Management System) - 2:24
    • 119- What is SQL/Query? - 2:47
    • 120- Insert Data To Table - 10:06
    • 121- Update Data In A Table - 5:42
    • 122- Delete Data and AdventureWorks - 6:17
  • Cloud Computing
    • 123- Characteristics of Cloud Computing - 9:19
    • 124- What is Cloud Computing - 3:38
    • 125- Cloud Service Modules - 1 - 7:31
    • 126- Cloud Service Modules - 2 - 6:26
  • Security
    • 127- What is Security - 2:22
    • 128- Privacy-Integrity-Availability - 3:15
    • 129- Encryption and Access Control - 2:54
    • 130- A Rule (Authentication, Authorization and Accounting) - 3:52
    • 132- What is Attack? What are the Stages? - 3:19
  • Social Engineering
    • 133- Terminologies Part 1 - 5:19
    • 134- Terminologies Part 2 - 6:08
    • 135- Sending Fake Emails - Phishing - 1:11
    • 136- Vishing - Voice Phishing - 3:40

View Full Curriculum


Access
Lifetime
Content
16.0 hours
Lessons
312

CompTIA Security Plus (SY0-601) Course | CompTIA Security+

All the Things You Need to Know Anything About CompTIA Security

By Oak Academy | in Online Courses

Every internet-connected person is affected by issues pertaining to cybersecurity. As a result, cybersecurity professionals are increasingly in-demand. This course walks you through all the things you need to pass the CompTIA Security + (SY601) exam, step by step. You can pass the CompTIA Security + exam by studying the topics covered throughout the course. During the course, sample questions were given at the end of each section in CompTIA. These questions are generally similar to questions that were previously found in the CompTIA Security + exam.

4.4/5 average rating: ★ ★ ★ ★

  • Access 312 lectures & 16 hours of content 24/7
  • Pass the CompTIA Security+ certification exam with confidence
  • Understand computer security, its functions, & its components
  • Perform basic security configurations
  • Become an effective security technician in a business environment

IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Oak Academy | Web & Mobile Development, IOS, Android, Ethical Hacking, IT
4.6/5 Instructor Rating: ★ ★ ★ ★

Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Any device with basic specifications

Course Outline

  • Intro to CompTIA Security Plus (SY0-601) Course | Comptia Security+
    • 1- Introduction to comptia security + - 11:34
    • 2- New LectureFAQ about CompTIA Security Plus (SY0-601) Course | Comptia Security+
  • Basic Security Concepts
    • 3- What is Security? - 2:22
    • 4- Privacy-Integrity-Availability - 3:15
    • 5- Encryption and Access Control - 2:54
    • 6- 3 A Rule (Authentication, Authorization and Accounting) - 3:52
    • 7- Threat - 3:45
    • 8- What is a Hacker? - 6:27
    • 9- What is Attack? What are the Stages? - 3:19
    • 10- Single Point Of Failure (SPOF) - 3:13
    • 11- Introducing Basic Risk Concepts - 3:22
    • Quiz in CompTIA Security+(SYo-601)
    • Quiz
    • Quiz
  • Identity Management
    • 12- What is Identity Management? - 2:14
    • 13- KERBEROS & NTLM&LDAP - 7:31
    • 14- Single Sign-On (SSO) - 11:02
    • 15- Smart Cards - 2:58
    • 16- Tokens or Key Fobs - 5:20
    • 17- Biometric Methods - 7:36
    • 18- Dual-Factor and Multifactor Authentication - 1:38
    • 19- PAP / CHAP / MS-CHAP - 2:46
    • 20- RADIUS - 6:26
    • Quiz
    • Quiz
    • Quiz
  • Summary-1 in CompTIA Security +
    • 21- Summary-1 in comptia security plus - 3:26
  • Users in CompTIA
    • 22- Create a User in comptia - 3:03
    • 23- Managing Accounts - 1 - 11:44
    • 24- Managing Accounts - 2 - 9:20
    • 25- Passwords - 9:18
    • 26- Password Policy - 9:02
    • Quiz
    • Quiz
    • Quiz
  • Comparing Access Control Models
    • 27- Comparing Access Control Models - 2:19
    • 28- Role-Based Access Control - 3:15
    • 29- Establishing Access with Group-Based Privileges - 4:42
    • 30- Rule Based and Discretionary Access Control - 5:39
    • 31- Mandatory Access Control - 2:46
    • 32- Establishing Access - 6:07
    • Quiz
    • Quiz
  • Virtualization
    • 33- What is Virtualization? - 3:46
    • 34- Virtualization Technologies - 2:55
    • 35- Benefits of Virtualization - 5:00
    • 36- Security Issues of Virtualization - 3:50
    • Quiz
    • Quiz
    • Quiz
  • Network Technologies
    • 37- Basic Network Concepts - 15:38
    • 38- Domain Name Services(DNS) - 9:47
    • 39- What is the port? How does it work? - 5:10
    • 40- What is the Network Address - 7:05
    • 41- Combining the IP Address and the Port - 4:37
    • 42- Switches - 5:03
    • 43- Bridge - 3:07
    • 44- Routers - 9:29
    • 45- Understanding NAT and PAT - 2:37
    • 46- Network Separation - 3:16
    • 47- Proxy Servers - 7:13
    • 48- Types of Using Network Technologies - 1 - 9:12
    • 49- Types of Using Network Technologies - 2 - 8:26
    • Quiz
    • Quiz
    • Quiz
  • Wireless Networks
    • 50- Reviewing Basic Wireless Network Information - 6:29
    • 51- Wireless Cryptographic Protocols - 7:38
    • 52- Authentication Protocols for Wireless Networks - 6:24
    • Quiz
    • Quiz
    • Quiz
  • Summary-2
    • 53- Summary-2 - 3:02
  • Network Security Technologies
    • 54- Firewalls - 9:28
    • 55- Network Access Control - 9:27
    • 56- Implementing a Secure Network - 5:15
    • Quiz
    • Quiz
    • Quiz
  • Intrusion Detection Systems
    • 57- Understanding IDSs and IPSs - 4:46
    • 58- Detection Methods - 11:49
    • 59- Honeypots - 4:42
    • Quiz
    • Quiz
    • Quiz
  • Virtual Private Network(VPN) Technologies
    • 60- Using VPNs for Remote Access - 3:54
    • 61- VPN Tunnel Protocols - 6:18
    • 62- Site-to-Site VPNs - 2:36
    • Quiz
    • Quiz
    • Quiz
  • Security Threats
    • 63- Understanding Threat Actors - 12:36
    • 64- Viruses - 2:10
    • 65- Logic Bombs - 3:21
    • 66- Trojans - 5:30
    • 67- Ransomware - 3:24
    • 68- Spyware - 3:03
    • 69- Bots and Botnets - 4:17
    • 70- Unified Threat Management(UTM) - 5:55
    • Quiz
    • Quiz
    • Quiz
  • Securing Wireless Networks
    • 71- Disable SSID Broadcasting or Not - 1:26
    • 72- Enable MAC Filtering - 1:53
    • Quiz
    • Quiz
    • Quiz
  • Understanding Wireless Attacks
    • 73- Disassociation Attacks - 1:58
    • 74- WPS and WPS Attacks - 1:50
    • 75- Rogue AP - 2:14
    • 76- Evil Twin - 2:08
    • 77- Jamming Attacks - 3:47
    • 78- Bluetooth Attacks - 2:51
    • 79- RFID Attacks - 2:40
    • 80- Wireless Replay Attacks - 1:49
    • Quiz
    • Quiz
    • Quiz
  • Summary-3
    • 81- Summary-3 - 2:44
  • Network Attacks
    • 82- Network Attacks - 3:39
    • 83- SYN Flood Attack - 2:55
    • 84- MAC Flood Attacks - 2:53
    • 85- Man-in-the-Middle Attacks - 1:33
    • 86- ARP Poisoning Attacks - 3:49
    • 87- DNS Attacks - 6:17
    • Quiz
    • Quiz
    • Quiz
  • Password Attacks
    • 88- Brute Force Attacks - 3:32
    • 89- Password Hashes - 4:53
    • 90- Birthday Attacks - 4:50
    • 91- Replay Attacks - 3:25
    • 92- Hijacking and Related Attacks - 5:59
    • 93- Driver Manipulation - 2:07
    • Quiz
    • Quiz
    • Quiz
  • Zero-Day Attacks
    • Quiz
    • Quiz
    • Quiz
  • Code Attacks
    • 95- Code Reuse and SDKs - 4:31
    • 96- Code Quality and Testing - 2:51
    • 97- Development Life-Cycle Models - 3:42
    • 98- Secure DevOps - 3:19
    • 99- Version Control and Change Management - 2:17
    • 100- Provisioning and Deprovisioning - 1:48
    • Quiz
    • Quiz
    • Quiz
  • Web Server Attacks
    • 101- Web Servers - 2:07
    • 102- SQL Injection Attacks - 4:32
    • 103- Protecting Against SQL Injection Attacks - 2:38
    • 104- DLL Injection - 2:24
    • 105- Cross-Site Scripting - 6:40
    • Quiz
    • Quiz
    • Quiz
  • Social Engineering Attacks
    • 106- Social Engineering - 4:09
    • 107- Shoulder Surfing - 1:06
    • 108- Tricking Users with Hoaxes - 1:18
    • 109- Tailgating and Mantraps - 1:12
    • 110- Dumpster Diving - 1:26
    • 111- Watering Hole Attacks - 1:06
    • 112- Spam - 2:04
    • 113- Phishing - 6:24
    • 114- Whaling - 2:45
    • 115- Vishing - 3:08
    • 116- Beware of Email from Friends - 2:00
    • 117- Why Social Engineering Works - 9:31
    • Quiz
    • Quiz
    • Quiz
  • Summary-4
    • 118- Summary-4 - 3:32
  • Memory Buffer Vulnerabilities
    • 119- Memory Leak - 2:41
    • 120- Buffer Overflow Attacks - 4:16
    • 121- Pointer Dereference - 2:07
    • 122- Compiled Versus Runtime Code - 1:20
    • 123- Proper Input Validation - 4:07
    • 124- Side Input Validation - 3:20
    • 125- Avoiding Race Conditions - 2:13
    • 126- Proper Error Handling - 2:14
    • 127- Cryptographic Techniques - 1:43
    • Quiz
    • Quiz
    • Quiz
  • Preventing Attacks
    • 128- Protecting Systems from Malware - 2:05
    • 129- Antivirus and Anti-Malware Software - 8:22
    • 130- Advanced Malware Tools - 3:31
    • 131- Educating Users - 1:53
    • 132- Implementing Defense in Depth - 3:35
    • Quiz
    • Quiz
    • Quiz
  • Server Security
    • 133- Implementing Secure Systems - 4:11
    • 134- Operating systems - 4:12
    • 136- Resiliency and Automation Strategies - 4:56
    • 137- Change Management Policy - 7:09
    • 138- Secure Staging and Deployment - 5:26
    • 139- Peripherals - 4:10
    • 140- EMI and EMP - 7:46
    • 141- Hardware Security Module - 2:26
    • 142- Cloud Deployment Models - 5:29
    • 143- Cloud Services - 6:20
    • Quiz
    • Quiz
    • Quiz
  • Mobile Devices
    • 145- Deploying Mobile Devices Securely - 2:14
    • 146- Deployment Models - 8:35
    • 148- Unauthorized Software - 5:03
    • 149- Hardware Control - 2:42
    • 150- Unauthorized Connections - 2:32
    • Quiz
    • Quiz
    • New Lecture
  • Exploring Embedded Systems
    • 151- Exploring Embedded Systems - 7:06
    • 152- Understanding Stuxnet - 2:13
    • 153- Real-Time Operating Systems - 3:16
  • Summary-5
    • 154- Summary-5 - 4:13
  • Data Security
    • 155- Protecting Data - 11:24
    • 156- Data Loss Prevention - 5:31
    • Quiz
    • Quiz
  • Database Security
    • 157- Database Concepts - 2:47
    • 160- Database Security - 0:57
    • Quiz
    • Quiz
  • Risk Management
    • 161- Understanding Risk Management - 2:39
    • 162- Risk Management - 2:45
    • 163- Threats and Threat Assessments - 4:22
    • 164- Vulnerabilities - 2:03
    • 165- Risk Assessment - 13:06
    • 166- Risk Registers - 5:51
    • Quiz
    • Quiz
    • Quiz
  • Checking for Vulnerabilities
    • 167- Checking for Vulnerabilities - 1:52
    • 168- Password Crackers - 1:59
    • 169- Network Scanners - 5:23
    • 170- Wireless Scanners / Cracker - 3:17
    • 171- Banner Grabbing - 0:47
    • 172- Vulnerability Scanning - 11:23
    • Quiz
    • Quiz
  • Penetration Tests
    • 173- Penetration Tests - 2:45
    • 174- Passive & Active Reconnaissance - 2:02
    • 176- White, Gray and Black Box Testing - 3:00
    • 177- Intrusive and Non-Intrusive Testing - 1:22
    • 178- Passive Versus Active Tools - 11:41
    • Quiz
    • Quiz
  • Physical Security Precautions
    • 179- Comparing Physical Security Controls - 3:28
    • 181- Preventing Tailgating with Mantraps - 2:00
    • 182- Increasing Physical Security with Guards - 8:20
    • 183- Using Hardware Locks - 2:56
    • 184- Asset Management - 2:33
    • 185- Implementing Environmental Controls - 14:02
    • Quiz
    • Quiz
  • Summary-6
    • 186- Summary-6 - 1:59
  • Single Point of Failure
    • 187- Single Point of Failure - 1:46
    • 188- Disk Redundancies - 4:24
    • 190- Backup - 15:18
    • Quiz
    • Quiz
  • Business Continuity Plans
    • 191- Comparing Business Continuity Elements - 6:09
    • 192- Impact - 3:54
    • 193- Recovery Time Objective - 4:55
    • 194- Recovery Sites - 5:53
    • 195- Disaster Recovery - 8:11
    • Quiz
    • Quiz
    • Quiz
  • Examination of Logs
    • 196- Monitoring Logs for Event Anomalies - 8:43
    • 197- OtherLogs-SIEM - 7:12
    • 198- Continuous Monitoring - 6:08
    • Quiz
    • Quiz
    • Quiz
  • Controls
    • 200- Control Goals - 10:53
    • 199- Understanding Control Types - 7:12
    • Quiz
    • Quiz
  • Cryptography and PKI
    • 201- Introducing Cryptography Concepts - 3:08
    • 203- MD5 - 0:54
    • 204- SHA - 2:55
    • 205- HMAC - 2:49
    • 206- Hashing Files - 2:56
    • 207- Digital Signatures, Certificates and Non-repudiation - 2:52
    • 208- Hashing Messages - 4:35
    • 209- Providing Confidentiality with Encryption - 8:16
    • 210- Block Versus Stream Ciphers - 4:09
    • 211- Symmetric Encryption - 1:55
    • 214- Certificates - 3:58
    • 216- Using Cryptographic Protocols - 1:49
    • 219- Recovery Agent - 1:08
    • 220- Comparing Certificate Types - 4:37
    • 221- Certificate Formats - 3:10
    • Quiz
    • Quiz
    • Quiz
  • Protecting Email
    • 222- Protecting Email - 1:51
    • Quiz
    • Quiz
    • Quiz
  • Secure Web Page
    • Quiz
    • Quiz
  • Risk Mitigation Methods
    • 225- Exploring Security Policies - 1:14
    • 226- Personnel Management Policies - 10:41
    • 228- NDA - 4:40
    • 229- Policy Violations and Adverse Actions - 1:37
    • Quiz
  • Summary-7
    • 235- Summary-7 - 1:41

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.