CompTIA Security+ Certification Prep

By Terry Cox

Get prepared to take and pass the Security+ Certification Exam.

20 hours
  • 69 Lessons
  • 5 Hands-On Labs
  • 6 Course Quizzes
  • 1 Practice Exam

About the course

This course is designed to prepare prospective students for the Security+ Certification Exam. In this course, we will cover the domains of the Security+ Certification Exam:

  • Threats, Attacks, and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI

After taking this course, the student will feel confident in their abilities to undertake the certification exam.

  • Chapter 1 3 Lessons Introduction 6:27

    About the Author

    0:28

    About the Course

    2:16

    About the Exam

    3:43
  • Chapter 2 2 Lessons 1.1. Indicators of Compromise and Malware 23:46

    Understanding IOCs

    10:46

    Types of Malware

    13:00
  • Chapter 3 3 Lessons 1.2 Compare and Contrast Types of Attacks 29:23

    Social Engineering Attacks

    5:12

    Technical Attacks

    12:08

    Wireless and Cryptographic Attacks

    12:03
  • Chapter 4 1 Lesson 1.3 Threat Actors 10:13

    Threat Actor Types and Attributes

    10:13
  • Chapter 5 1 Lesson 1.4 Penetration Testing 8:03

    Pentesting Concepts

    8:03
  • Chapter 6 1 Lesson 1.5 Vulnerability Scanning 7:32

    Explain concepts of vulnerability scanning

    7:32
  • Chapter 7 2 Lessons 1.6 Impact of Vulnerabilities 1:01:33

    Discuss the Impact of Vulnerability Types

    16:33

    Threats, Attacks, and Vulnerabilities

    45:00 Quiz
  • Chapter 8 6 Lessons 2.1 Installation and configuration of network security devices 51:48

    Firewalls

    10:35

    IDS/IPS

    14:12

    Router and Switch Security

    5:36

    Proxies and Load balancers

    6:57

    Other Network Components

    14:28

    Blocking and Allowing Traffic with a Firewall

    0:00 Hands-On Lab
  • Chapter 9 4 Lessons 2.2 Assessing Security Posture of an Organization 26:02

    Tool Overview

    15:52

    Command Line Tools

    10:10

    Utilize TCPDump for Packet Capture

    0:00 Hands-On Lab

    Utilizing Command Line Tools

    0:00 Hands-On Lab
  • Chapter 10 1 Lesson 2.3. Troubleshooting Common Security Issues 17:43

    Common Security Issues and their Impact

    17:43
  • Chapter 11 3 Lessons 2.4. Securely deploying mobile devices 40:28

    Connection Methodologies Defined

    11:18

    Mobile Device Management Principles

    10:52

    Monitoring and Enforcing Mobile methodologies

    18:18
  • Chapter 12 3 Lessons 2.5. Implementing Secure Protocols 1:18:06

    Secure Protocols Overview Part 1

    9:27

    Secure Protocols Overview Part 2

    8:39

    Technologies and Tools

    1:00:00 Quiz
  • Chapter 13 1 Lesson 3.1. Frameworks, Best Practices, and Secure Configuration Guides 8:10

    Frameworks Overview

    8:10
  • Chapter 14 1 Lesson 3.2. Secure Network Architecture Concepts 9:48

    Discussing the Concepts That Will Help Secure Your Network

    9:48
  • Chapter 15 2 Lessons 3.3. Secure System Design 17:40

    Hardware Security

    7:54

    Operating Systems

    9:46
  • Chapter 16 1 Lesson 3.4. Secure Staging Deployment Concepts 4:57

    Staging Environments and Security Implications

    4:57
  • Chapter 17 1 Lesson 3.5. Embedded Systems 13:59

    Security Implications of Embedded Systems

    13:59
  • Chapter 18 4 Lessons 3.6. Secure Application Development 35:45

    Development Lifecycle Models

    7:14

    Secure DevOps

    8:26

    Secure Coding Techniques and Best Practices

    14:39

    Code Quality and Testing

    5:26
  • Chapter 19 2 Lessons 3.7. Cloud and Virtualization Concepts 12:39

    Virtualization Concepts

    5:36

    Cloud Concepts

    7:03
  • Chapter 20 2 Lessons 3.8. Reducing risks through resiliency and automation 13:22

    Resiliency and Automation

    8:01

    Redundancy and High Availability

    5:21
  • Chapter 21 2 Lessons 3.9. Physical Controls 1:27:28

    Physical Controls

    12:28

    Architecture and Design

    1:15:00 Quiz
  • Chapter 22 1 Lesson 4.1. Identity and access management concepts 7:37

    Identification, Authentication, Authorization, and Accounting (AAA)

    7:37
  • Chapter 23 2 Lessons 4.4. Common Account Management Practices 21:17

    Account Management

    12:20

    Account Policy Enforcement

    8:57
  • Chapter 24 2 Lessons 4.2. Installation and Configuration of Identity and Access Services 13:27

    Define Different Identity and Access Service Types

    8:03

    Identity and Access Services Part 2

    5:24
  • Chapter 25 2 Lessons 4.3. Identity and Access Management Controls 38:16

    Identity and Access Management Controls

    8:16

    Identity and Access Management

    30:00 Quiz
  • Chapter 26 2 Lessons 5.1. Organizational Security Policies, Plans and Policies 17:18

    Personnel Management

    9:46

    Agreement Types

    7:32
  • Chapter 27 1 Lesson 5.2. Concepts from a Business Impact Analysis 12:26

    Business Impact Analysis

    12:26
  • Chapter 28 1 Lesson 5.3. Risk Management Processes and Concepts 7:25

    Risk Management

    7:25
  • Chapter 29 1 Lesson 5.4. Incident Response 9:49

    Incident Response Concepts

    9:49
  • Chapter 30 1 Lesson 5.5. Digital Forensics 4:56

    Digital Forensics

    4:56
  • Chapter 31 2 Lessons 5.6. Disaster Recovery and Continuity of Operations 9:16

    Disaster Recovery and Continuity of Operations

    9:16

    Backup and Recovery

    0:00 Hands-On Lab
  • Chapter 32 1 Lesson 5.7. Control Types 4:59

    Differentiating Between Control Types

    4:59
  • Chapter 33 2 Lessons 5.8. Data Security and Privacy Practices 53:07

    Data Security and Privacy Practices

    8:07

    Risk Management

    45:00 Quiz
  • Chapter 34 3 Lessons 6.1. Basic Concepts of Cryptography 16:50

    Basic Concepts of Cryptography (Part 1)

    10:35

    Basic Concepts of Cryptography (Part 2)

    6:15

    Generating and Exchanging SSH Keys Between Servers

    0:00 Hands-On Lab
  • Chapter 35 3 Lessons 6.2. Basic Characteristics of Cryptographic Algorithms 15:36

    Symmetric Algorithms

    8:00

    Asymmetric Algorithms

    2:37

    Hashing Algorithms

    4:59
  • Chapter 36 1 Lesson 6.3. Wireless Security Settings 8:33

    Wireless Cryptography

    8:33
  • Chapter 37 4 Lessons 6.4. Public Key Infrastructure (PKI) 1:33:09

    PKI Overview

    6:34

    Types of Certificates

    7:15

    Concepts

    4:20

    Cryptography and PKI

    1:15:00 Quiz
  • Chapter 38 1 Lesson Practice Exam 1:00:00

    Security+ Prep Course Practice Exam

    1:00:00 Quiz

What are Hands-on Labs

What's the difference between theoretical knowledge and real skills? Practical real-world experience. That's where Hands-on Labs come in! Hands-on Labs are guided, interactive experiences that help you learn and practice real-world scenarios in real cloud environments. Hands-on Labs are seamlessly integrated in courses, so you can learn by doing.

Get Started
Who’s going to be learning?

How many seats do you need?

  • $499 USD per seat per year
  • Billed Annually
  • Renews in 12 months

Ready to accelerate learning?

For over 25 licenses, a member of our sales team will walk you through a custom tailored solution for your business.


$2,495.00

Checkout
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!