CompTIA Security+, Part 9 of 9: Social Engineering and Wrap up
Interactive

CompTIA Security+, Part 9 of 9: Social Engineering and Wrap up

LearnNow Online
Updated Sep 10, 2019

Course description

This course wraps up the series with planning for disaster recovery as well as redundancy, backups and RAID,
Next, it tackles the human element with social engineering, insider threats, phishing and user education.
Finally, it discusses policies and procedures, vendor relationships, incident response and IT security frameworks for the SY0-501 Exam.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

• Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course)
• Completion of the CompTIA A+ and Network+ certifications (Helpful, but not required)


Meet the expert

Jason Dion

Jason Dion, CISSP No. 349867, is a professor at University of Maryland University College with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. He holds a Masters of Science degree in Information Technology with a specialization in Information Assurance

Video Runtime

126 Minutes

Time to complete

229 Minutes

Course Outline

Social Engineering

Planning for the Worst (19:01)

  • Introduction (00:08)
  • Planning for the Worst (02:10)
  • Redundant Power (03:08)
  • Backup Power (03:06)
  • Data Redundancy (04:39)
  • Demo: RAIDs (03:36)
  • Network Redundancy (02:04)
  • Summary (00:08)

Server Redundancy (16:46)

  • Introduction (00:08)
  • Server Redundancy (01:42)
  • Redundant Sites (02:20)
  • Data Backup (02:54)
  • Tape Rotation (03:53)
  • Disaster Recovery Plan (05:39)
  • Summary (00:08)

Social Engineering (17:33)

  • Introduction (00:08)
  • Social Engineering (00:53)
  • Demo: Pretexting (04:14)
  • Insider Threat (02:10)
  • Phishing (01:13)
  • More Social Engineering (04:01)
  • User Education (04:44)
  • Summary (00:08)

Policies and Procedures

Security Policies (19:11)

  • Introduction (00:08)
  • Policies and Procedures (05:53)
  • Data Classifications (06:42)
  • PII and PHI (06:20)
  • Summary (00:08)

Policies and Procedures (22:31)

  • Introduction (00:08)
  • Security Policies (10:19)
  • User Education (04:02)
  • Vendor Relationships (07:52)
  • Summary (00:08)

Disposal Policies (23:24)

  • Introduction (00:08)
  • Disposal Policies (05:04)
  • Incident Response Procedures (04:36)
  • Data Collection Procedures (03:11)
  • Demo: Disk Imaging (06:56)
  • IT Security Frameworks (03:18)
  • Summary (00:08)

Conclusion (08:13)

  • Introduction (00:08)
  • Conclusion (03:47)
  • Exam Tricks (04:10)
  • Summary (00:08)
;