CompTIA Security+
Learn to become the Certified Security+ Professional
The CompTIA Security+ is a globally recognized certification, validating an individual's fundamental security knowledge and skills. This video training will teach you to support the principles of confidentiality, integrity, and availability. Learn to identify risk, participate in risk mitigation, and maintain infrastructure, information, and operational security as you prepare for CompTIA's Security+ SY0-501 exam.
Recommended Experience
- Experience in IT administration with a focus on security
- Broad knowledge of security concerns and implementation
Related Job Functions
- Security architect
- Security engineer
- Security consultant/specialist
- Information assurance technician
- Security administrator
- Systems administrator
- Network administrator
- Penetration Tester
Course Curriculum
Let's Get Started
Available in
days
days
after you enroll
-
Start001 Welcome to Security+ (6:52)
-
Start002 Infrastructure Security Devices (24:02)
-
Start003 Application and Traffic Analysis (10:27)
-
Start004 Network Segmentation and Separation with VLANs (14:01)
-
Start005 ACL Case Study (16:11)
-
Start006 Design Considerations (20:20)
-
Start007 NAT and PAT Case Study (12:21)
-
Start008 Firewall and Switch Protection Mechanisms (15:39)
-
Start009 Virtualization Overview (14:14)
-
Start010 IPsec_ Protocols_ and Well-known Ports (18:26)
-
Start011 ICMP and a Few More Protocols (16:18)
-
Start012 Security for WiFi (25:38)
-
Start013 Risk Overview (24:58)
-
Start014 Risk Calculation (18:37)
-
Start015 Attack Vectors_ Risk Management_ and Recovery (11:19)
-
Start016 Third-Party Risk from Integration (10:46)
-
Start017 Change Management and Account Auditing (15:56)
-
Start018 Data Loss Prevention (DLP) (11:02)
-
Start019 Forensics (19:43)
-
Start020 Incident Response Concepts (11:45)
-
Start021 Security Awareness_ RBAC_ and Data Labeling (14:42)
-
Start022 Passwords_ Best Practices_ and Standards (14:41)
-
Start023 Environmental Controls (10:45)
-
Start024 Physical Security (12:58)
-
Start025 Business Continuity (17:34)
-
Start026 Fault Tolerance (18:09)
-
Start027 Controls for Confidentiality (13:30)
-
Start028 Tools and Controls for Data Integrity (18:35)
-
Start029 Availability and Safety (5:39)
-
Start030 Malware_ Adware - Spyware (11:40)
-
Start031 Trojans_ Backdoors_ and More Malware (18:34)
-
Start032 Attack Types MITM - Spear Fishing (19:29)
-
Start033 Attack Types_ Xmas - Client Side (14:52)
-
Start034 Password Attacks and Watering Holes (13:46)
-
Start035 Social Engineering Threats (13:11)
-
Start036 Vishing and Why Social Engineering Works (11:38)
-
Start037 Wireless Attacks (15:04)
-
Start038 Cross-site and Injection Attacks (17:27)
-
Start039 Application Attacks (12:39)
-
Start040 Monitoring and Device Hardening (19:05)
-
Start041 Baselines_ Detection_ and Reporting (10:27)
-
Start042 Analyzers and Scanners (20:20)
-
Start043 Discovering and Assessing Threats (15:41)
-
Start044 Penetration Testing (13:11)
-
Start045 Techniques for Securing Apps (10:43)
-
Start046 Application Security Controls (15:09)
-
Start047 Mobile Device Security Overview (19:05)
-
Start048 Host Security (11:37)
-
Start049 Hardware and Virtualization Security (12:32)
-
Start050 Data Security (10:50)
-
Start051 Securing Data with H_W_ Controls_ and Policy (10:40)
-
Start052 Security in Static Environments (14:42)
-
Start053 AAA Concepts (9:58)
-
Start054 Authentication Protocols and Services (18:33)
-
Start055 Multifactor Authentication (13:50)
-
Start056 Authentication Controls (19:22)
-
Start057 Controlling Access via Authorization (18:36)
-
Start058 Account Management (20:45)
-
Start059 Symmetric and Asymmetric Encryption (18:48)
-
Start060 Crypto Key Management (22:06)
-
Start061 Hashing and Encryption Protocols (19:29)
-
Start062 Comparing Cryptography Algorithms (17:01)
-
Start063 PKI Overview (14:55)
-
Start064 Certificate Warnings and Trust Models (10:11)
-
Start065 Layered Security Case Study (10:35)
-
Start066 Attack Types and Vectors (4:13)
-
Start067 Threat Actor Types and Ethics (5:25)
-
Start068 Reconnaissance Information Gathering Concepts (9:50)
-
Start069 Hacking Vocabulary and Terms (6:02)
-
Start070 Malware Concepts (9:08)
-
Start071 Network Scanning Overview (3:42)
-
Start072 Trojans (10:02)
-
Start073 Port Security (10:12)
-
Start074 Scanning Methodologies (8:48)
-
Start075 Sniffing Overview (11:44)
-
Start076 Vulnerability Scanning (7:56)
-
Start077 Social Engineering Overview (13:42)
-
Start078 System Hacking Stages and Goals (9:13)
-
Start079 Buffer Overflow (13:04)
-
Start080 OWASP BWAP (9:44)
-
Start081 Honeypots and Honeynets (11:08)
-
Start082 Centralized Identity Management (13:26)
-
Start083 SSO_ Kerberos_ and Security Threats (17:14)
-
Start084 Incident Response (11:56)
-
Start085 Penetration Testing Legally (10:06)
-
Start086 Case Study #1 (20:30)
Frequently Asked Questions
When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.