CompTIA Security+, Part 3 of 9: Virtualization and Secure Dev
Interactive

CompTIA Security+, Part 3 of 9: Virtualization and Secure Dev

LearnNow Online
Updated Sep 10, 2019

Course description

Virtualization is king. this course will discuss creating and securing Virtual Machines. as well as application security, web browser security and configuration. Next, if covers securing vulnerabilities and exploits as well as buffer overflows, SQL Injection and cross-side scripting for the for the SY0-501 Exam.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

• Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course) • Completion of the CompTIA A+ and Network+ certifications (Helpful, but not required)


Meet the expert

Jason Dion

Jason Dion, CISSP No. 349867, is a professor at University of Maryland University College with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. He holds a Masters of Science degree in Information Technology with a specialization in Information Assurance

Video Runtime

99 Minutes

Time to complete

168 Minutes

Course Outline

Virtualization and Secure Dev

Virtualization (21:53)

  • Introduction (00:08)
  • Virtualization (02:07)
  • Hypervisors (02:37)
  • How to create a Virtual Machine (04:39)
  • Threats to VMs (03:43)
  • Securing VMs (03:47)
  • Demo: Securing VMs (04:41)
  • Summary (00:08)

Application Security (22:09)

  • Introduction (00:08)
  • Application Security (01:43)
  • Web Browser Security (06:39)
  • Web Browser Concerns (03:19)
  • Web Browser Configuration (Lab) (05:20)
  • Securing Applications (04:49)
  • Summary (00:08)

Secure Software (25:59)

  • Introduction (00:08)
  • Software Development (08:35)
  • SDLC Principles (06:22)
  • Testing Methods (07:00)
  • Software Vulnerabilities and Exploits (03:44)
  • Summary (00:08)

Buffer Overflows (29:45)

  • Introduction (00:08)
  • Buffer Overflows (06:15)
  • Demo: Buffer Overflow Attack (06:26)
  • XSS and XSRF (03:08)
  • SQL Injection (06:25)
  • Demo: SQL Injection (07:13)
  • Summary (00:08)
;