**You can pass the CompTIA Security+ (SY0-501) Exam **

Taught by an expert in information technology and cyber security with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.

My name is Jason Dion, and I have personally helped over 60,000 students earn their IT certifications, and now I can help you, too!

This course is designed to help prepare you for the CompTIA Security+ (SY0-501) certification examand covers the six domains for the Security+ (SY0-501) certification exam:

  1. Threats, Attacks, and Vulnerabilities

  2. Technologies and Tools

  3. Architecture and Design

  4. Identity and Access Management

  5. Risk Management

  6. Cryptography and PKI

You will learn the fundamentals of cyber security  and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks. 

What You Will Receive In The Course:

  • Video lectures with the essential information needed to pass the Security+ exam

  • Downloadable copies of our Study Notes based on the lessons

  • Practice questions to ensure mastery of each section of the course

  • A full-length practice exam with multiple choice and mock simulations

Who this course is for:
  • Students wanting to pass the CompTIA Security+ certification exam
  • Students wanting to learn the terminology and nomenclature of computer security
  • Students seeking a career in cyber security

Course Curriculum

  • 1

    Overview of Security

    • Welcome

    • Overview of Security

    • CIA Triad

    • AAA of Security

    • Security Threats

    • Mitigating Threats

    • Hackers

  • 2

    Malware

    • Malware

    • Viruses

    • Worms

    • Trojans

    • Demo Viruses and Trojans

    • Ransomware

    • Spyware

    • Rootkits

    • Spam

    • Summary of Malware

  • 3

    Malware Infections

    • Malware Infections

    • Common Delivery Methods

    • Demo Phishing

    • Botnets and Zombies

    • Active Interception and Privilege Escalation

    • Demo Privilege Escalation

    • Backdoors and Logic Bombs

    • Symptoms of Infection

    • Removing Malware

    • Preventing Malware

  • 4

    Security Applications and Devices

    • Security Applications and Devices

    • Software Firewalls

    • Demo Software Firewalls

    • IDS

    • Pop-up Blockers

    • Data Loss Prevention (DLP)

    • Securing the BIOS

    • Securing Storage Devices

    • Disk Encryption

  • 5

    Mobile Device Security

    • Mobile Device Security

    • Securing Wireless Devices

    • Mobile Malware

    • SIM Cloning & ID Theft

    • Bluetooth Attacks

    • Mobile Device Theft

    • Security of Apps

    • BYOD

    • Hardening Mobile Devices

  • 6

    Hardening

    • Hardening

    • Unnecessary Applications

    • Restricting Applications

    • Demo Unnecessary Services

    • Trusted Operating System

    • Updates and Patches

    • Patch Management

    • Group Policies

    • Demo Group Policies

    • File Systems and Hard Drives

  • 7

    Virtualization

    • Virtualization

    • Hypervisors

    • How to create a VM

    • Threats to VMs

    • Securing VMs

    • Securing VMs (Demo)

  • 8

    Application Security

    • Application Security

    • Web Browser Security

    • Web Browser Concerns

    • Demo Web Browser Configuration

    • Securing Applications

  • 9

    Secure Software Development

    • Software Development

    • SDLC Principles

    • Testing Methods

    • Software Vulnerabilities and Exploits

    • Buffer Overflows

    • Demo Buffer Overflow Attack

    • XSS and XSRF

    • SQL Injection

    • Demo SQL Injection

  • 10

    Network Design

    • Network Security

    • OSI Model

    • Switches

    • Routers

    • Network Zones

    • Network Access Control (NAC)

    • VLANs

    • Subnetting

    • Network Address Translation

    • Telephony Devices

  • 11

    Perimeter Security

    • Perimeter Security

    • Firewalls

    • Demo SOHO Firewall

    • Proxy Servers

    • Honeypots and Honeynets

    • Data Loss Prevention

    • NIDS vs NIPS

    • Unified Threat Management

  • 12

    Cloud Security

    • Cloud Computing

    • Cloud Types

    • As a Service

    • Cloud Security

    • Defending Servers

  • 13

    Network Attacks

    • Network Attacks

    • Ports and Protocols

    • Memorization of Ports

    • Unnecessary Ports

    • Denial of Service

    • DDoS

    • Stopping a DDoS

    • Spoofing

    • Hijacking

    • Replay Attack

    • Demo Null Sessions

    • Transitive Attacks

    • DNS Attacks

    • ARP Poisoning

  • 14

    Securing Networks

    • Securing Networks

    • Securing Network Devices

    • Securing Network Media

    • Securing WiFi Devices

    • Wireless Encryption

    • Wireless Access Points

    • Wireless Attacks

    • Demo Wireless Attack

    • Other Wireless Technologies

  • 15

    Physical Security

    • Physical Security

    • Surveillance

    • Door Locks

    • Demo Lock Picking

    • Biometric Readers

  • 16

    Facilities Security

    • Facilities Security

    • Fire Suppression

    • HVAC

    • Shielding

    • Vehicles

  • 17

    Authentication

    • Authentication

    • Authenication Models

    • 802.1x

    • LDAP and Kerberos

    • Remote Desktop Services

    • Remote Access Services

    • VPN

    • RADIUS and TACACS+

    • Authentication Summary

  • 18

    Access Control

    • Access Control

    • Access Control Models

    • Best Practices

    • Users and Groups

    • Permissions

    • Usernames and Password

    • Demo Policies

    • User Account Control

  • 19

    Risk Assessments

    • Risk Assessments

    • Qualitative Risk

    • Quantitative Risk

    • Methodologies

    • Security Controls

    • Vulnerability Management

    • Penetration Testing

    • OVAL

    • Vulnerability Assessment

    • Nmap Scanning

    • Demo Vulnerability Scanning

    • Password Analysis

    • Demo Password Cracking

  • 20

    Monitoring and Auditing

    • Monitoring Types

    • Performance Baselining

    • Protocol Analyzers

    • SNMP

    • Demo Analytical Tools

    • Auditing

    • Auditing Files (Demo)

    • Logging

    • Log Files

    • SIEM

  • 21

    Cryptography

    • Cryptography

    • Symmetric vs Asymmetric

    • Symmetric Algorithms

    • Public Key Cryptography

    • Asymmetric Algorithms

    • Pretty Good Privacy

    • Key Management

    • One-Time Pad

    • Steganography (Demo)

    • Hashing

    • Demo Hashing

    • Hashing Attacks

    • Increasing Hash Security

  • 22

    Public Key Infrastructure

    • Public Key Infrastructure

    • Digital Certificates

    • Certificates (Demo)

    • Certificate Authorities

    • Web of Trust

  • 23

    Security Protocols

    • Security Protocols

    • SMIME

    • SSL and TLS

    • SSH

    • VPN Protocols

    • Demo Setting Up a VPN

  • 24

    Planning for the Worst

    • Planning for the Worst

    • Redundant Power

    • Backup Power

    • Data Redundancy

    • Demo RAIDs

    • Network Redundancy

    • Server Redundancy

    • Redundant Sites

    • Data Backup

    • Tape Rotation

    • Disaster Recovery Plan

  • 25

    Social Enginerring

    • Social Engineering

    • Demo Pretexting

    • Insider Threat

    • Phishing

    • More Social Engineering

    • User Education

  • 26

    Policies and Procedures

    • Policies and Procedures

    • Data Classifications

    • PII and PHI

    • Security Policies

    • User Education

    • Vendor Relationships

    • Disposal Policies

    • Incident Response Procedures

    • Data Collection Procedures

    • Demo Disk Imaging

    • IT Security Frameworks

  • 27

    Conclusion

    • Conclusion

    • Exam Tricks

  • 28

    Practice Exam

    • Practice Exam

About the instructor

IT Manager

Eric Chu

A proven and experienced IT Manager, customer-focused and equipped with a technical background. I have over 8 years’ experience in IT Service Delivery Management and leading small to medium crossfunctional teams, and over 15 years of experience in IT Training and Sales.Through my passion for technology, science, and innovation, I have fostered extensive practical knowledge of emerging technologies, complex networks, and data centre eco-systems.I have had the opportunity to work across the Asia Pacific region as an experienced Business Development Manager and IT Project Manager delivering end to end solutions.

What others have been saying about this course:

Use your Call To Action description to encourage students to sign up for your course

You may also be interested in...