Mô tả

** Taught by a Best Selling IT Certification Instructor **


Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.


My name is Jason Dion, and I have personally helped over 500,000 students earn their IT certifications, and now I can help you, too!


You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.


CompTIA Security+ (SY0-601) is the world's most popular cybersecurity certification today!


This course is designed to help prepare you for the CompTIA Security+ (SY0-601) certification exam and covers all the domains for the certification exam:

  1. Attacks, Threats, and Vulnerabilities

  2. Architecture and Design

  3. Implementation

  4. Operations and Incident Response

  5. Governance, Risk, and Compliance


What You Will Receive In The Course:

  • Video lectures with the essential information needed to pass the Security+ (SY0-601) exam

  • A complete downloadable study guide in PDF format based on the lessons

  • Practice quizzes to ensure mastery of each section of the course

  • A full-length practice exam with multiple choice and mock simulations


This course stays current and up-to-date with the SY0-601 version of the exam, and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!


Upon completion of this course, you will earn 21 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

Bạn sẽ học được gì

Yêu cầu

Nội dung khoá học

33 sections

Overview of Security

13 lectures
Welcome
11:56
Download the Study Guide
00:07
Overview of Security
02:58
CIA Triad
03:57
AAA of Security (OBJ 2.4)
03:08
Security Threats (OBJ 1.1 & 1.2)
02:59
Mitigating Threats (OBJ 5.1)
02:49
Hackers (OBJ 1.5)
04:56
Threat Actors (1.5)
03:15
Threat Intelligence and Sources (OBJ 1.5)
08:55
Threat Hunting (OBJ 1.7)
06:54
Attack Frameworks (OBJ 4.2)
11:13
Quiz: Overview of Security
3 questions

Malware

11 lectures
Malware (OBJ 1.2)
00:42
Viruses (OBJ 1.2)
06:24
Worms (OBJ 1.2)
02:12
Trojans (OBJ 1.2)
02:51
Demo: Viruses and Trojans (OBJ 1.2)
06:18
Ransomware (OBJ 1.2)
02:33
Spyware (OBJ 1.2)
02:42
Rootkits (OBJ 1.2 & 1.3)
03:31
Spam (OBJ 1.1)
02:59
Summary of Malware
02:05
Quiz: Malware
3 questions

Malware Infections

12 lectures
Malware Infections
04:15
Common Delivery Methods (OBJ 1.1 & 1.5)
04:29
Demo: Phishing (OBJ 1.1 & 5.3)
05:22
Botnets and Zombies (OBJ 1.2 & 1.4)
03:33
Active Interception and Privilege Escalation (OBJ 1.3 & 1.4)
02:31
Demo: Privilege Escalation (OBJ 1.3 & 1.8)
05:44
Backdoors and Logic Bombs (OBJ 1.2)
03:51
Symptoms of Infection (OBJ 1.2)
04:13
Removing Malware (OBJ 4.2)
05:04
Preventing Malware (OBJ 1.6 & 3.2)
05:59
Malware Exploitation (OBJ 1.2 & 1.4)
07:38
Quiz: Malware Infection
3 questions

Security Applications and Devices

11 lectures
Security Applications and Devices
00:35
Software Firewalls (OBJ 3.2)
04:18
Demo: Software Firewalls (OBJ 3.2)
06:47
IDS (OBJ 3.2 & 3.3)
05:05
Pop-up Blockers (OBJ 1.1, 3.3, 4.4)
03:12
Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4)
03:46
Securing the BIOS (OBJ 3.2)
03:58
Securing Storage Devices (OBJ 2.1, 2.5, & 3.3)
03:29
Disk Encryption (OBJ 2.1, 2.8 & 3.2)
04:54
Endpoint Analysis (OBJ 3.1 & 3.3)
05:47
Quiz: Security Applications and Devices
3 questions

Mobile Device Security

10 lectures
Mobile Device Security (OBJ 1.5)
01:17
Securing Wireless Devices (OBJ 3.4 & 3.5)
01:33
Mobile Malware (OBJ 1.1 & 3.5)
06:21
SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6)
04:03
Bluetooth Attacks (OBJ 1.4 & 3.4)
02:11
Mobile Device Theft (OBJ 3.5)
03:13
Security of Apps (OBJ 3.1 & 3.5)
05:09
BYOD (OBJ 3.5)
04:59
Hardening Mobile Devices (OBJ 3.5)
03:54
Quiz: Mobile Device Security
3 questions

Hardening

11 lectures
Hardening (OBJ 3.2)
01:50
Unnecessary Applications (OBJ 1.6)
03:14
Restricting Applications (OBJ 3.2 & 4.4)
02:57
Demo: Unnecessary Services (OBJ 3.2 & 3.3)
05:37
Trusted Operating System (OBJ 3.2)
01:59
Updates and Patches (OBJ 1.6 & 3.2)
03:29
Patch Management (OBJ 1.6 & 3.2)
03:52
Group Policies (OBJ 2.1)
02:36
Demo: Group Policies (OBJ 3.2)
04:09
File Systems and Hard Drives (OBJ 2.1 & 3.2)
03:21
Quiz: Hardening
3 questions

Supply Chain Management

5 lectures
Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6)
05:25
Root of Trust (OBJ 3.2)
04:36
Trusted Firmware (OBJ 3.2)
04:55
Secure Processing (OBJ 3.2)
04:03
Quiz: Supply Chain Management
3 questions

Virtualization

7 lectures
Virtualization (OBJ 2.2)
02:10
Hypervisors (OBJ 2.2)
02:40
Demo: How to create a VM (OBJ 2.2)
04:41
Threats to VMs (OBJ 2.2)
03:46
Securing VMs (OBJ 2.2)
03:50
Demo: Securing VMs
04:43
Quiz: Virtualization
3 questions

Application Security

6 lectures
Application Security
01:46
Web Browser Security (OBJ 3.2 & 3.3)
06:42
Web Browser Concerns (OBJ 3.2 & 3.3)
03:22
Demo: Web Browser Configuration (OBJ 3.2 & 3.3)
05:22
Securing Applications (OBJ 1.4 & 3.2)
04:41
Quiz: Application Security
3 questions

Secure Software Development

13 lectures
Software Development (OBJ 2.1 & 2.3)
08:36
SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3)
06:25
Testing Methods (OBJ 2.3 & 3.2)
07:02
Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6)
03:47
Buffer Overflows (OBJ 1.3)
06:18
Demo: Buffer Overflow Attack (OBJ 1.3)
06:28
XSS and XSRF (OBJ 1.3)
03:10
SQL Injection (OBJ 1.3)
06:28
Demo: SQL Injection (OBJ 1.2 & 1.3)
07:16
XML Vulnerabilities (OBJ 1.3)
05:10
Race Conditions (OBJ 1.3)
05:50
Design Vulnerabilities (OBJ 1.3)
04:16
Quiz: Secure Software Development
3 questions

Network Design

12 lectures
Network Security
00:47
The OSI Model (OBJ 3.3 & 3.6)
06:03
Switches (OBJ 1.4 & 2.7)
03:35
Routers (OBJ 3.3)
02:30
Network Zones (OBJ 3.3)
03:29
** Jumpbox (OBJ 3.5)
05:03
Network Access Control (OBJ 3.3 & 4.4)
02:43
VLANs (OBJ 3.3)
01:32
Subnetting (OBJ 3.6)
01:53
Network Address Translation (OBJ 3.3)
02:35
Telephony (OBJ 3.1)
05:54
Quiz: Network Design
3 questions

Perimeter Security

9 lectures
Perimeter Security
00:49
Firewalls (OBJ 3.3 & 4.4)
08:04
Demo: SOHO Firewall (OBJ 3.3 & 4.4)
04:07
Proxy Servers (OBJ 3.3 & 4.4)
04:15
Honeypots and Honeynets (OBJ 2.1)
01:24
Data Loss Prevention (OBJ 2.1, 3.2, & 4.4)
01:37
NIDS and NIPS (OBJ 3.3)
04:13
Unified Threat Management (OBJ 3.2 & 3.3)
01:54
Quiz: Perimeter Security
3 questions

Cloud Security

11 lectures
Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6)
03:32
Cloud Types (OBJ 2.2 & 3.6)
02:54
As a Service (OBJ 2.2)
07:07
Cloud Security (OBJ 2.5 & 3.6)
02:27
Defending Servers (OBJ 1.7, 3.1, and 3.2)
04:35
Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6)
07:22
CASB (OBJ 2.1)
04:28
API (OBJ 2.1)
06:09
FAAS and Serverless (OBJ 2.2)
08:08
Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2)
08:11
Quiz: Cloud Security
3 questions

Automation

6 lectures
Workflow Orchestration (OBJ 2.3)
03:55
CI/CD (OBJ 2.3)
07:05
DevSecOps (OBJ 2.3)
04:51
IAC (OBJ 2.2)
04:23
Machine Learning (OBJ 1.2)
08:30
Quiz: Automation
3 questions

Network Attacks

15 lectures
Network Attacks (OBJ 1.4)
00:40
Ports and Protocols (OBJ 3.1)
04:27
Memorization of Ports (OBJ 3.1)
11:18
Unnecessary Ports (OBJ 1.6 & 3.2)
03:24
Denial of Service (OBJ 1.3 & 1.4)
07:58
DDoS (OBJ 1.2, 1.3, & 1.4)
01:39
Stopping a DDoS (OBJ 2.1 & 2.3)
02:29
Spoofing (OBJ 1.4 & 3.3)
01:19
Hijacking (OBJ 1.3 & 1.4)
03:47
Replay Attack (OBJ 1.3)
01:29
Demo: Null Sessions (OBJ 1.6)
02:27
Transitive Attacks (OBJ 2.4)
01:27
DNS Attacks (OBJ 1.1, 1.4 & 3.1)
04:36
ARP Poisoning (OBJ 1.4)
01:33
Quiz: Network Attacks
3 questions

Securing Networks

11 lectures
Securing Networks (OBJ 3.3)
00:52
Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7)
06:45
Securing Network Media (OBJ 2.7)
08:51
Securing WiFi Devices (OBJ 1.4 & 3.4)
04:25
Wireless Encryption (OBJ 1.6 & 3.4)
05:33
Wireless Access Points (OBJ 1.4 & 3.4)
06:14
Wireless Attacks (OBJ 1.2, 1.4 & 1.8)
04:18
Demo: Wireless Attack (OBJ 1.4)
07:42
WPA3 (OBJ 3.4)
06:08
Other Wireless Technologies (OBJ 1.4 & 3.5)
06:05
Quiz: Securing Networks
3 questions

Physical Security

6 lectures
Physical Security (OBJ 2.7)
01:33
Surveillance (OBJ 2.7)
02:54
Door Locks (OBJ 2.7)
03:50
Demo: Lock Picking (OBJ 2.7)
01:39
Biometric Readers (OBJ 2.4)
04:18
Quiz: Physical Security
3 questions

Facilities Security

11 lectures
Facilities Security (OBJ 2.7)
00:39
Fire Suppression (OBJ 2.7)
06:23
HVAC (OBJ 2.5, 2.6, & 2.7)
02:26
Shielding (OBJ 2.7)
02:37
Vehicular Vulnerabilities (OBJ 2.6 & 2.7)
06:53
IoT Vulnerabilities (OBJ 2.6)
03:29
Embedded System Vulnerabilities (OBJ 2.6)
06:52
ICS and SCADA Vulnerabilities (OBJ 2.6)
08:19
Mitigating Vulnerabilities (OBJ 2.6)
03:30
Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6)
06:14
Quiz: Facilities Security
3 questions

Authentication

11 lectures
Authentication (OBJ 2.4, 3.5, & 3.8)
05:56
Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9)
05:22
802.1x (OBJ 3.4 & 3.8)
03:47
LDAP and Kerberos (OBJ 3.1 & 3.8)
02:29
Remote Desktop Services (OBJ 3.1)
01:54
Remote Access Service (OBJ 3.1 & 3.8)
02:05
VPN (OBJ 3.3)
03:05
RADIUS vs TACACS+ (OBJ 3.8)
02:20
Authentication Summary (OBJ 3.8)
02:06
Authentication Attacks (OBJ 1.2)
07:12
Quiz: Authentication
3 questions

Access Control

9 lectures
Access Control (OBJ 3.8)
00:53
Access Control Models (OBJ 3.8)
08:17
Best Practices (OBJ 2.7, 3.8, & 5.3)
05:46
Users and Groups (OBJ 3.7 & 3.8)
09:15
Permissions (OBJ 3.8)
03:44
Usernames and Passwords (OBJ 1.6 & 3.7)
02:38
Demo: Policies (OBJ 3.7)
04:37
User Account Control (OBJ 3.7 & 3.8)
01:56
Quiz: Access Control
3 questions

Risk Assessments

7 lectures
Risk Assessments (OBJ 5.4)
08:36
Qualitative Risk (OBJ 5.4)
04:09
Quantitative Risk (OBJ 5.4)
05:30
Methodologies (OBJ 1.7 & 5.4)
02:52
Security Controls (OBJ 5.1)
06:52
Types of Risk (OBJ 1.6 & 5.4)
07:12
Quiz: Risk Assessments
3 questions

Vulnerability Management

10 lectures
Vulnerability Management (OBJ 1.7, 4.1, & 5.4)
07:53
Penetration Testing (OBJ 1.8)
04:29
Training and Exercises (OBJ 1.8 & 4.2)
04:48
OVAL (OBJ 1.7)
01:37
Vulnerability Assessments (OBJ 1.7 & 4.1)
06:55
Demo: Nmap Scanning (OBJ 4.1)
08:52
Demo: Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3)
09:35
Password Analysis (OBJ 1.2)
05:57
Demo: Password Cracking (OBJ 4.1)
02:38
Quiz: Vulnerability Management
3 questions

Monitoring and Auditing

13 lectures
Monitoring Types (OBJ 3.3)
02:57
Performance Baselining (OBJ 2.1)
04:37
Protocol Analyzers (OBJ 3.3 & 4.1)
03:00
SNMP (OBJ 3.1)
03:43
Demo: Analytical Tools (OBJ 4.1)
04:29
Auditing (OBJ 1.7)
01:57
Demo: Auditing Files (OBJ 1.7)
03:56
Logging (OBJ 1.7, 4.3, & 4.5)
03:42
Log Files (OBJ 4.3)
05:17
SIEM (OBJ 1.7 & 4.3)
08:51
Syslog (OBJ 1.7 & 4.3)
05:52
SOAR (OBJ 1.7 & 4.4)
03:20
Quiz: Monitoring and Auditing
3 questions

Cryptography

11 lectures
Cryptography (OBJ 2.1 & 2.8)
04:58
Symmetric vs Asymmetric (OBJ 2.8)
06:14
Symmetric Algorithms (OBJ 2.8)
04:59
Public Key Cryptography (OBJ 2.8)
03:12
Asymmetric Algorithms (OBJ 2.8)
03:47
Pretty Good Privacy (OBJ 2.8)
01:49
Key Management (OBJ 2.8)
02:14
One-Time Pad (OBJ 2.8)
04:21
Demo: Steganography (OBJ 2.8)
03:54
Cryptography Considerations (OBJ 2.8)
12:26
Quiz: Cryptography
3 questions

Hashing

5 lectures
Hashing (OBJ 1.2, 2.8 & 3.2)
08:31
Demo: Hashing (OBJ 2.8)
03:07
Hashing Attacks (OBJ 1.2,1.3, & 2.8)
03:17
Increasing Hash Security (OBJ 2.8 & 3.7)
01:29
Quiz: Hashing
3 questions

Public Key Infrastructure

6 lectures
Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9)
03:56
Digital Certificates (OBJ 3.9)
06:45
Demo: Certificates (OBJ 2.8 & 3.9)
03:33
Certificate Authorities (OBJ 3.2 & 3.9)
04:15
Web of Trust (OBJ 3.9)
02:38
Quiz: Public Key Infrastructure
3 questions

Security Protocols

7 lectures
Security Protocols (OBJ 3.1)
00:24
S/MIME (OBJ 3.1)
01:32
SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3)
05:38
SSH (OBJ 3.1 & 4.1)
02:31
VPN Protocols (OBJ 3.1 & 3..3)
06:40
Demo: Setting up a VPN (OBJ 3.3)
01:37
Quiz: Security Protocols
3 questions

Planning for the Worst

13 lectures
Planning for the Worst (OBJ 2.5 & 5.4)
02:13
Redundant Power (OBJ 2.5)
03:10
Backup Power (OBJ 2.5)
03:08
Data Redundancy (OBJ 2.5)
04:42
Demo: RAIDs (OBJ 2.5)
03:38
Network Redundancy (OBJ 2.5)
02:07
Server Redundancy (OBJ 2.5 &3.3)
01:45
Redundant Sites (OBJ 2.1)
02:23
Data Backup (OBJ 2.5)
02:57
Tape Rotation (OBJ 2.5)
03:55
Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4)
05:41
Business Impact Analysis (OBJ 5.4)
15:47
Quiz: Planning for the Worst
3 questions

Social Engineering

10 lectures
Social Engineering (OBJ 1.1)
00:55
Demo: Pretexting (OBJ 1.1 & 5.3)
04:17
Insider Threat (OBJ 1.5)
02:12
Phishing (OBJ 1.1 & 5.3)
06:34
Motivation Factors (OBJ 1.1)
07:14
More Social Engineering (OBJ 1.1 & 1.2)
04:03
Fraud and Scams (OBJ 1.1)
05:25
Influence Campaigns (OBJ 1.1)
04:14
User Education (OBJ 5.3)
04:47
Quiz: Social Engineering
3 questions

Policies and Procedures

13 lectures
Policies and Procedures (OBJ 5.2 & 5.3)
05:55
Data Classifications (OBJ 5.3 & 5.5)
06:45
Data Ownership
04:06
PII and PHI (OBJ 5.2 & 5.5)
06:22
Legal Requirements (OBJ 5.2 & 5.5)
05:45
Privacy Technologies (OBJ 5.5)
06:29
Security Policies (OBJ 5.3 & 5.5)
10:22
User Education (OBJ 5.3)
04:05
Vendor Relationships (OBJ 5.3)
07:55
Disposal Policies (OBJ 2.7 & 4.1)
05:07
IT Security Frameworks (OBJ 5.2)
03:20
Key Frameworks (OBJ 5.2)
08:37
Quiz: Policies and Procedures
3 questions

Incident Response and Forensics

8 lectures
Incident Response Procedures (OBJ 4.2)
04:39
Incident Response Planning (OBJ 4.2)
18:19
Investigative Data (OBJ 4.3)
12:20
Forensic Procedures (OBJ 4.5)
13:55
Data Collection Procedures (OBJ 4.1 & 4.5)
07:59
Demo: Disk Imaging (OBJ 4.1)
06:59
Security Tools (OBJ 4.1)
21:00
Quiz: Incident Response and Forensics
3 questions

Conclusion

2 lectures
Conclusion
09:23
BONUS: What's Next?
04:05

Practice Exam

1 lectures
Full-length Practice Exam with Simulations (Security+ SY0-601)
90 questions

Đánh giá của học viên

Chưa có đánh giá
Course Rating
5
0%
4
0%
3
0%
2
0%
1
0%

Bình luận khách hàng

Viết Bình Luận

Bạn đánh giá khoá học này thế nào?

image

Đăng ký get khoá học Udemy - Unica - Gitiho giá chỉ 50k!

Get khoá học giá rẻ ngay trước khi bị fix.