Download Stone River eLearning – CompTIA Security + Certification (Exam number SY0-501)


CompTIA Security + Certification One of the company's training courses Stone River eLearning It teaches important concepts and topics of cyber security and prepares you for the Security + (SY0-501) test. The test consists of six domains, all of which are examined in this course. These issues include: network security; Operational security and compatibility; Threats and vulnerabilities; Security hosts, data and applications; Identity management and access control; And cryptography.

CompTIA Security + Certification Topics:

  • Network Security Domain

    1. Networking 101 (14:06)
    2. LAN Security (12:31)
    3. Firewalls (2:53)
    4. IDS – Video (8:42)
    5. Transport Layer Security (3:38)
    6. IPSec (7:03)
    7. NAC (8:00)
    8. Advanced IDS (5:44)
    9. Advanced Perimeter Security (11:42)

  • Compliance and Operational Security Domain

    1. Principles of Security (7:41)
    2. Risk Management (17:01)
    3. Physical Security (7:29)
    4. Environmental Security (4:20)
    5. Data Classification (13:42)
    6. Operational Security (7:18)
    7. Incident Response (8:40)
    8. Change Management (4:01)
    9. Disaster Recovery (9:06)
    10. Forensics (14:00)

  • Threats and Vulnerabilities Domain

    1. Malware 101 (13:49)
    2. Cyberattacks (17:16)
    3. DNS Security (4:08)
    4. Social Engineering (8:49)
    5. Wireless Attacks (7:39)
    6. Advanced Wireless Security (14:08)
    7. Cross Site Scripting – XSS Attacks (8:31)
    8. Buffer Overflows (23:18)
    9. Security Testing Tools (9:23)
    10. Security Information and Event Management (11:51)
    11. Hardening and Baselining Platform (7:44)
    12. Honeypots (5:58)
    13. SW Vulnerability Assessment and Pen Testing (8:47)

  • Applications, Data and Host Security Domain

    1. Application Design Flaws and Bugs (3:53)
    2. Mobile Security and Device Management (9:23)
    3. Key Management (16:55)
    4. Virtualization and Cloud Security (28:40)
    5. Securing Storage and Storage Platforms (18:41)
    6. Information Lifecycle Management (5:16)
    7. Hacking IoT (8:51)
    8. Securing the Power Grid (3:56)

  • Access Control and Identity Management Domain

    1. Access Controls (10:05)
    2. Kerberos (12:50)
    3. Single Sign On (13:40)
    4. Identity Federation (6:53)
    5. Id Governance (13:24)

  • Cryptography Domain

    1. Encryption (7:14)
    2. Advanced Cryptography (13:40)
    3. Message Authentication Codes (5:40)
    4. Crypto Algorithms (8:03)
    5. A Note On Salting (6:59)
    6. Public Key Infrastructure (9:36)
    7. PKI Management (20:17)

Download Link
Download Link Size
Download Part 1 476.84 MB
Download Part 2 476.84 MB
Download Part 3 271.96 MB

Download Guide

  1. To download, click on "Download" and wait for the relevant window to appear, then select the location of the file to be saved and wait until the download ends.
  2. If you do not have download management software, it is recommended to download a download manager, especially an internet download manager, to download files.
  3. The files placed to download are compressed to reduce volume and get faster, to extract files from the compressed version of Winrar software or similar.
  4. The password for opening the compressed file is All the letters should be typed in small and when typing into the EN / FA status of your keyboard note, it is also better to type a password and avoid Copy-Paste.
  5. If you encounter a CRC message when exiting the file, you will be logged in if you have entered the correct password. The file has been downloaded corrupted and you have to download it again. Of course, the bulky files have the ability to recover using the Winrar software to enter the Tools menu and select the Repair option to solve the downloaded file problem.
  6. Crack files due to the nature of the functionality when used may be detected by antivirus as a malicious file, in which case temporarily disable your antivirus.
  7. In the event of a file failure or any problem, you can put your comments in the comments section to address your problem as soon as possible.
  8. If the downloaded file or file was obtained after an iso format, you can mount the files using the UltrISO software. Then, go to the path where you saved the files and double-click on it. Or use this software to burn it.
  9. If the software requires cracking, crack in the folder with the same name or the ReadMe file you can check out the crack and crack the software.
Show More

Leave a Reply

Your email address will not be published. Required fields are marked *

Donations help me to keep the site running. Every dollar is greatly appreciated. You can donate via PayPal.Donate Now

Adblock Detected

Please consider supporting us by disabling your ad blocker