CompTIA Security+ Certification Prep

By Terry Cox

Get prepared to take and pass the Security+ Certification Exam.

20 hours
  • 69 Lessons
  • 5 Hands-On Labs
  • 6 Course Quizzes
  • 1 Practice Exam

About the course

This course is designed to prepare prospective students for the Security+ SY0-501 Certification Exam. In this course, we will cover the domains of the Security+ Certification Exam:

  • Threats, Attacks, and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI

After taking this course, the student will feel confident in their abilities to undertake the certification exam.

  • Chapter 1 3 Lessons Introduction 6:27

    About the Author

    0:28

    About the Course

    2:16

    About the Exam

    3:43
  • Chapter 2 2 Lessons 1.1. Indicators of Compromise and Malware 23:46

    Understanding IOCs

    10:46

    Types of Malware

    13:00
  • Chapter 3 3 Lessons 1.2 Compare and Contrast Types of Attacks 29:23

    Social Engineering Attacks

    5:12

    Technical Attacks

    12:08

    Wireless and Cryptographic Attacks

    12:03
  • Chapter 4 1 Lesson 1.3 Threat Actors 10:13

    Threat Actor Types and Attributes

    10:13
  • Chapter 5 1 Lesson 1.4 Penetration Testing 8:03

    Pentesting Concepts

    8:03
  • Chapter 6 1 Lesson 1.5 Vulnerability Scanning 7:32

    Explain concepts of vulnerability scanning

    7:32
  • Chapter 7 2 Lessons 1.6 Impact of Vulnerabilities 1:01:33

    Discuss the Impact of Vulnerability Types

    16:33

    Threats, Attacks, and Vulnerabilities

    45:00 Quiz
  • Chapter 8 6 Lessons 2.1 Installation and configuration of network security devices 1:51:48

    Firewalls

    10:35

    IDS/IPS

    14:12

    Router and Switch Security

    5:36

    Proxies and Load balancers

    6:57

    Other Network Components

    14:28

    Blocking and Allowing Traffic with a Firewall

    1:00:00 Hands-On Lab
  • Chapter 9 4 Lessons 2.2 Assessing Security Posture of an Organization 1:56:02

    Tool Overview

    15:52

    Command Line Tools

    10:10

    Utilize TCPDump for Packet Capture

    1:00:00 Hands-On Lab

    Utilizing Command Line Tools

    30:00 Hands-On Lab
  • Chapter 10 1 Lesson 2.3. Troubleshooting Common Security Issues 17:43

    Common Security Issues and their Impact

    17:43
  • Chapter 11 3 Lessons 2.4. Securely deploying mobile devices 40:28

    Connection Methodologies Defined

    11:18

    Mobile Device Management Principles

    10:52

    Monitoring and Enforcing Mobile methodologies

    18:18
  • Chapter 12 3 Lessons 2.5. Implementing Secure Protocols 1:18:06

    Secure Protocols Overview Part 1

    9:27

    Secure Protocols Overview Part 2

    8:39

    Technologies and Tools

    1:00:00 Quiz
  • Chapter 13 1 Lesson 3.1. Frameworks, Best Practices, and Secure Configuration Guides 8:10

    Frameworks Overview

    8:10
  • Chapter 14 1 Lesson 3.2. Secure Network Architecture Concepts 9:48

    Discussing the Concepts That Will Help Secure Your Network

    9:48
  • Chapter 15 2 Lessons 3.3. Secure System Design 17:40

    Hardware Security

    7:54

    Operating Systems

    9:46
  • Chapter 16 1 Lesson 3.4. Secure Staging Deployment Concepts 4:57

    Staging Environments and Security Implications

    4:57
  • Chapter 17 1 Lesson 3.5. Embedded Systems 13:59

    Security Implications of Embedded Systems

    13:59
  • Chapter 18 4 Lessons 3.6. Secure Application Development 35:45

    Development Lifecycle Models

    7:14

    Secure DevOps

    8:26

    Secure Coding Techniques and Best Practices

    14:39

    Code Quality and Testing

    5:26
  • Chapter 19 2 Lessons 3.7. Cloud and Virtualization Concepts 12:39

    Virtualization Concepts

    5:36

    Cloud Concepts

    7:03
  • Chapter 20 2 Lessons 3.8. Reducing risks through resiliency and automation 13:22

    Resiliency and Automation

    8:01

    Redundancy and High Availability

    5:21
  • Chapter 21 2 Lessons 3.9. Physical Controls 1:27:28

    Physical Controls

    12:28

    Architecture and Design

    1:15:00 Quiz
  • Chapter 22 1 Lesson 4.1. Identity and access management concepts 7:37

    Identification, Authentication, Authorization, and Accounting (AAA)

    7:37
  • Chapter 23 2 Lessons 4.4. Common Account Management Practices 21:17

    Account Management

    12:20

    Account Policy Enforcement

    8:57
  • Chapter 24 2 Lessons 4.2. Installation and Configuration of Identity and Access Services 13:27

    Define Different Identity and Access Service Types

    8:03

    Identity and Access Services Part 2

    5:24
  • Chapter 25 2 Lessons 4.3. Identity and Access Management Controls 38:16

    Identity and Access Management Controls

    8:16

    Identity and Access Management

    30:00 Quiz
  • Chapter 26 2 Lessons 5.1. Organizational Security Policies, Plans and Policies 17:18

    Personnel Management

    9:46

    Agreement Types

    7:32
  • Chapter 27 1 Lesson 5.2. Concepts from a Business Impact Analysis 12:26

    Business Impact Analysis

    12:26
  • Chapter 28 1 Lesson 5.3. Risk Management Processes and Concepts 7:25

    Risk Management

    7:25
  • Chapter 29 1 Lesson 5.4. Incident Response 9:49

    Incident Response Concepts

    9:49
  • Chapter 30 1 Lesson 5.5. Digital Forensics 4:56

    Digital Forensics

    4:56
  • Chapter 31 2 Lessons 5.6. Disaster Recovery and Continuity of Operations 1:09:16

    Disaster Recovery and Continuity of Operations

    9:16

    Backup and Recovery

    1:00:00 Hands-On Lab
  • Chapter 32 1 Lesson 5.7. Control Types 4:59

    Differentiating Between Control Types

    4:59
  • Chapter 33 2 Lessons 5.8. Data Security and Privacy Practices 53:07

    Data Security and Privacy Practices

    8:07

    Risk Management

    45:00 Quiz
  • Chapter 34 3 Lessons 6.1. Basic Concepts of Cryptography 1:16:50

    Basic Concepts of Cryptography (Part 1)

    10:35

    Basic Concepts of Cryptography (Part 2)

    6:15

    Generating and Exchanging SSH Keys Between Servers

    1:00:00 Hands-On Lab
  • Chapter 35 3 Lessons 6.2. Basic Characteristics of Cryptographic Algorithms 15:36

    Symmetric Algorithms

    8:00

    Asymmetric Algorithms

    2:37

    Hashing Algorithms

    4:59
  • Chapter 36 1 Lesson 6.3. Wireless Security Settings 8:33

    Wireless Cryptography

    8:33
  • Chapter 37 4 Lessons 6.4. Public Key Infrastructure (PKI) 1:33:09

    PKI Overview

    6:34

    Types of Certificates

    7:15

    Concepts

    4:20

    Cryptography and PKI

    1:15:00 Quiz
  • Chapter 38 1 Lesson Practice Exam 1:00:00

    Security+ Prep Course Practice Exam

    1:00:00 Quiz

What are Hands-on Labs

What's the difference between theoretical knowledge and real skills? Practical real-world experience. That's where Hands-on Labs come in! Hands-on Labs are guided, interactive experiences that help you learn and practice real-world scenarios in real cloud environments. Hands-on Labs are seamlessly integrated in courses, so you can learn by doing.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!