Course Overview

The CompTIA Security+ Exam Prep will be targeted toward both new learners and even professionals. One of the major issues within the cybersecurity realm is that IT professionals are not able to identify both internal and external threats that are affecting their organization. By completing this video series, you will be able to understand the baseline of IT security practices, policies, tools, types of attacks, and vulnerabilities and how to prevent and mitigate those threats. This video series also prepares you for the official CompTIA Security+ SY0-501 certification.

What You Will Learn

  • Learn how to identify threats
  • attacks
  • and vulnerabilities
  • Learn about security technologies and tools to help you secure your network
  • Learn how to design and create a security architecture within your organization
  • Understand how identity and access management improves security on a network
  • Learn how cryptography and PKI helps secure your data as its passes across an unsecure network

Program Curriculum

  • Introduction
  • Safety and Professionalism
  • Essentials of a Computer
  • Types of RAM
  • Fundamentals of Motherboards
  • Power Supply Unit (PSU)
  • Mass Storage Devices
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Introduction
  • Identifying Indicators of Compromise (IoC)
  • Comparing Different Types of Attacks – Social Engineering
  • Comparing Different Types of Attacks – Application Attacks
  • Comparing Different Types of Attacks – Wireless Attacks
  • Comparing Different Types of Attacks – Cryptographic Attacks
  • Understanding Threat Actors
  • Understanding the Need for Penetration Testing
  • Learning About the Concepts of Vulnerability Scanning
  • Types of Vulnerabilities
  • Chapter 2 Quiz

  • Introduction
  • Network Security Components – Firewalls and VPN
  • Network Security Components – Network Devices
  • Network Security Components – Proxies and Load Balancers
  • Network Security Components – Wireless Devices
  • Network Security Components – Other Security Devices
  • Using Security Tools to Assess Security Posture – Software Tools
  • Using Security Tools to Assess Security Posture – CLI Tools
  • Understanding Common Security Issues
  • Understanding Security Technologies
  • Securing Mobile Devices - Connection
  • Securing Mobile Devices - Management
  • Securing Mobile Devices - Enforcement
  • Securing Mobile Devices - Deployment
  • Implementing Secure Protocols
  • Chapter 3 Quiz

  • Introduction
  • Understanding Frameworks and Best Practices
  • Secure Configuration
  • Secure Network Architecture – Zones and Topologies
  • Secure Network Architecture – Network Segmentation
  • Secure Network Architecture – VPN
  • Secure Network Architecture – Device Placement
  • Implementing Secure Systems – Hardware Firmware Security
  • Implementing Secure Systems – Operating System Security
  • Implementing Secure Systems – Peripherals
  • Understanding the Importance of Secure Staging Concepts
  • Understanding Security Issues with Embedded Systems
  • Secure Application Development – Life Cycle Models
  • Secure Application Development – Version Control, Change Management, and Provisioning
  • Secure Application Development – Secure Coding Concepts
  • Secure Application Development – Code Quality and Testing
  • Security in Cloud and Virtualization Concepts
  • Understanding Resiliency and Automation Strategies to Reduce Risk
  • Implementing Physical Security Controls
  • Chapter 4 Quiz

  • Introduction
  • Understanding Identity and Access Management
  • Configuring Identity and Access Services – Part 1
  • Configuring Identity and Access Services – Part 2
  • Implementing Identity and Access Management Controls
  • Account Management Practices – Part 1
  • Account Management Practices – Part 2
  • Chapter 5 Quiz

  • Introduction
  • Understanding the Importance of Policies, Plans, and Procedures – Part 1
  • Understanding the Importance of Policies, Plans, and Procedures – Part 2
  • Understanding the Importance of Policies, Plans, and Procedures – Part 3
  • Business Impact Analysis Concepts
  • Risk Management Processes
  • Incident Response Procedures – Part 1
  • Incident Response Procedures – Part 2
  • Building and Planning Effective Business Continuity Plans
  • Computer Forensics Concepts – Part 1
  • Computer Forensics Concepts – Part 2
  • Understanding Disaster Recovery and Continuity of Operations – Part 1
  • Understanding Disaster Recovery and Continuity of Operations – Part 2
  • Understanding Types of Controls
  • Data Security and Privacy Practices
  • Chapter 6 Quiz

  • Introduction
  • Understanding the Concepts of Cryptography – Part 1
  • Understanding the Concepts of Cryptography – Part 2
  • Understanding the Concepts of Cryptography – Part 3
  • Describing the Characteristics of Cryptography Algorithms – Part 1
  • Describing the Characteristics of Cryptography Algorithms – Part 2
  • Implementing Wireless Security
  • Understanding Public Key Infrastructure (PKI) – Part 1
  • Understanding Public Key Infrastructure (PKI) – Part 2
  • Chapter 7 Quiz
Load more modules

Instructor

Glen Singh

Author

Glen D. Singh, CEH, CHFI, CCNA (CyberOps, Security, and Routing & Switching) is a cybersecurity instructor, author, and consultant. He specializes in penetration testing, digital forensics, network security, and enterprise networking. He enjoys teaching and mentoring students, writing books, and participating in a range of outdoor activities. As an aspiring game-changer, Glen is passionate about developing cyber security awareness in his homeland, Trinidad and Tobago. Glen is also the author of the following books: Learn Kali Linux 2019 Hands-On Penetration Testing with Kali NetHunter CompTIA Network+ Certification Guide CCNA Security 210-260 Certification Guide

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8