Learn your way! Get started

CompTIA Security+, Part 2: Security Services

with expert Ryan Hendricks


Watch trailer

CompTIA Security+, Part 2: Security Services Trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack
  • Power Pack Plus

Release date Release date 1/15/2016
Level Level Intermediate
Runtime Runtime 1h 48m
Closed captioning Closed captioning Included
Transcript Transcript Included
eBooks / courseware eBooks / courseware N/A
Hands-on labs Hands-on labs N/A
Sample code Sample code N/A
Exams Exams Included


Enterprise Solutions
Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

In this course we will discuss the OSI and TCP/IP model. We will discuss the vast number of applications found on networks and how they communicate. We will discuss their uses, their security, and as a security practitioner how you can utilize them to increase security on the network. We will finish this course by discussing wireless communication and the inherent risk with using that as our communication means. This course will cover the CompTIA Security+ objectives 1.4 and 1.5.

Prerequisites

This course assumes that the user has working knowledge of networks and networking. Ideally, the user should have their CompTIA Network+ certification, but can be replaced with networking experience.

Learning Paths

This course will help you prepare for the following certification and exam:
CompTIA Security+ Certification

Meet the expert

Ryan Hendricks Ryan Hendricks is an experienced instructor who teaches networking and security courses to IT professionals throughout the nation. He currently has the CompTIA Certified Technical Trainer (CTT+ Classroom) and the Cisco Certified Academy Instructor (CCAI) credentials. He holds certifications from (ISC)2, EC-Council, CompTIA, and Cisco. When not on the podium instructing, he delves into IT books, always looking to learn more and keep up with the latest security topics.


Course outline



Security Services

Models (15:20)
  • Introduction (00:18)
  • OSI Model (00:53)
  • Layer 7 - Application (01:11)
  • Layer 6 - Presentation (00:49)
  • Layer 5 - Session (00:35)
  • Layer 4 - Transport (03:04)
  • Layer 3 - Network (00:21)
  • Layer 2 - Data-Link (01:00)
  • Layer 1 - Physical (00:30)
  • TCP/IP (02:54)
  • OSI & TCP/IP, Cont. (00:52)
  • OSI & TCP/IP (02:30)
  • Summary (00:17)
Protocols (33:40)
  • Introduction (00:24)
  • Fibre Channel (01:11)
  • Fibre Channel over Ethernet (01:08)
  • iSCSI (00:46)
  • IPv4 (01:29)
  • IPv6 (02:39)
  • ICMP (01:26)
  • ICMP Types & Codes (01:15)
  • ICMP Types & Codes, Cont. (01:28)
  • IP Security (01:09)
  • IPsec, Cont. (02:02)
  • Domain Name System (DNS) (02:26)
  • DNS Authoritative Name Server (00:50)
  • DNS Records (01:36)
  • Start of Authority (01:07)
  • DNS Queries (00:51)
  • Demo: DNS Information (05:46)
  • Demo: More DNS Information (05:31)
  • Summary (00:27)
Protocols 2 (27:29)
  • Introduction (00:23)
  • SNMP (01:32)
  • SNMP Messages (02:00)
  • SNMP Versions (01:44)
  • TELNET (02:05)
  • Remote Desktop Protocol (01:11)
  • File Transfer Protocol (FTP) (01:57)
  • SFTP & SCP (00:49)
  • Trivial File Transfer Protocol (01:05)
  • Hyptertext Transport Protocol (00:47)
  • Secure Sockets Layer (01:09)
  • Transport Layer Security (00:26)
  • HTTP over SSL (01:08)
  • File Transfer Protocol Secure (00:42)
  • NetBIOS (00:46)
  • Simple Mail Transfer Protocol (01:01)
  • Post Office Protocol (01:01)
  • IMAP (01:28)
  • Demo: Protocol Security (05:41)
  • Summary (00:25)
Wireless Protocols (31:48)
  • Introduction (00:28)
  • Wireless Communication (01:15)
  • Wired Equivalent Privacy (WEP) (03:23)
  • 802.11i (00:46)
  • WPA (02:26)
  • WPA2 (02:23)
  • Encryption Troubleshooting (01:00)
  • EAP (00:36)
  • Protected EAP (00:37)
  • Authentication Troubleshooting (00:52)
  • MAC Filtering (01:53)
  • Service Set Identifier (01:40)
  • SSID Broadcasting (02:26)
  • Antenna Placement (01:37)
  • RF Degradation (02:07)
  • Power Level Controls (00:56)
  • Antenna Placement Example (01:54)
  • Antenna Placement Example, Cont. (01:19)
  • Site Survey (01:17)
  • Captive Portals (01:11)
  • VPNs (01:11)
  • Summary (00:18)