Booking options
£10.99
£10.99
On-Demand course
19 hours 23 minutes
All levels
Embarking on the CompTIA Security+ course is akin to unlocking a treasure trove of cybersecurity knowledge. Imagine standing at the forefront of digital security, equipped with the latest tools and techniques to safeguard information systems. This course, meticulously designed with fourteen comprehensive sections, offers an immersive journey from the basics of risk management to the complexities of securing dedicated systems. The curriculum is tailored to blend theoretical knowledge with real-world applications, ensuring learners grasp the essence of cybersecurity in today's technology-driven world. Whether it's understanding the nuances of cryptography or mastering the art of incident response, CompTIA Security+ is your gateway to becoming a cybersecurity connoisseur.
Delving into this course, you'll navigate through a landscape where every section is a stepping stone to mastering security competencies.
The course begins with an introduction to the fundamental principles of cybersecurity, setting the stage for more advanced topics like identity and account management, and securing wireless LANs. Each section is a meticulously crafted module, aimed at building a robust understanding of both the threats and the defenses in the cyber world. By the time you reach the final sections on secure protocols, applications, and testing infrastructure, you will have developed a holistic view of network security, ready to apply your knowledge in a variety of real-world scenarios.
CompTIA Security+ is not just a course; it's a journey through the dynamic landscape of network security. As you progress from one section to another, you'll not only learn about securing individual systems and public servers but also about the importance of physical security in protecting digital assets. This course is a blend of theory and practicality, providing an in-depth understanding of the latest security tools and techniques. It's an opportunity to transform yourself into a sought-after professional in the cybersecurity domain, equipped with the knowledge to protect and defend against the ever-evolving cyber threats.
Develop a comprehensive understanding of risk management strategies and their application in cybersecurity.
Acquire proficiency in various cryptographic methods and their importance in securing data.
Gain insights into effective identity and account management to enhance system security.
Learn to utilize essential security tools for safeguarding individual and network systems.
Master the skills to implement and manage security measures for both wired and wireless networks.
Unlimited access to the course for a lifetime.
Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course.
Structured lesson planning in line with industry standards.
Immerse yourself in innovative and captivating course materials and activities.
Assessments designed to evaluate advanced cognitive abilities and skill proficiency.
Flexibility to complete the Course at your own pace, on your own schedule.
Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience.
Unlock career resources for CV improvement, interview readiness, and job success.
After studying the course materials of the CompTIA Security+ there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60.
Individuals aiming to start a career in cybersecurity.
IT professionals seeking to deepen their knowledge in network security.
System administrators wanting to enhance their security skills.
Students interested in acquiring a foundational understanding of cybersecurity principles.
Professionals aiming to achieve the CompTIA Security+ certification for career advancement.
This CompTIA Security+ does not require you to have any prior qualifications or experience. You can just enrol and start learning.This CompTIA Security+ was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.
Cybersecurity Analyst: £30,000 - £60,000 annually
Information Security Manager: £40,000 - £75,000 annually
Network Security Engineer: £35,000 - £65,000 annually
Security Consultant: £35,000 - £70,000 annually
Systems Administrator (with security specialization): £25,000 - £50,000 annually
IT Security Coordinator: £28,000 - £55,000 annually
Section 01: Introduction | |||
Introduction to CompTIA Security+ SY0-601 | 00:03:00 | ||
About the CompTIA Security+ SY0-601 Exam | 00:03:00 | ||
Section 02: Risk Management | |||
Defining Risk | 00:08:00 | ||
Threats and Vulnerabilities | 00:07:00 | ||
Threat Intelligence | 00:11:00 | ||
Risk Management Concepts | 00:07:00 | ||
Security Controls | 00:09:00 | ||
Risk Assessments and Treatments | 00:06:00 | ||
Quantitative Risk Assessments | 00:07:00 | ||
Qualitative Risk Assessments | 00:04:00 | ||
Business Impact Analysis | 00:05:00 | ||
Data Types and Roles | 00:11:00 | ||
Security and the Information Life Cycle | 00:09:00 | ||
Data Destruction | 00:06:00 | ||
Personnel Risk and Policies | 00:10:00 | ||
Third-Party Risk Management | 00:09:00 | ||
Agreement Types | 00:07:00 | ||
Exam Question Review | 00:02:00 | ||
Wiping Disks with the dd Command Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Section 03: Cryptography | |||
Cryptography Basics | 00:16:00 | ||
Data Protection | 00:09:00 | ||
Cryptographic Methods | 00:07:00 | ||
Symmetric Cryptosystems | 00:13:00 | ||
Symmetric Block Modes | 00:08:00 | ||
Asymmetric Cryptosystems | 00:13:00 | ||
Diffie-Hellman | 00:07:00 | ||
Hashing | 00:09:00 | ||
Understanding Digital Certificates | 00:08:00 | ||
Trust Models | 00:05:00 | ||
Public Key Infrastructure | 00:04:00 | ||
Certificate Types | 00:14:00 | ||
Touring Certificates | 00:09:00 | ||
Cryptographic Attacks | 00:05:00 | ||
Password Cracking | 00:10:00 | ||
Password Cracking Demo | 00:06:00 | ||
Exam Question Review | 00:02:00 | ||
SSH Public Key Authentication Lab | 00:09:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Section 04: Identity and Account Management | |||
Identification, Authentication, and Authorization | 00:08:00 | ||
Enabling Multifactor Authentication | 00:05:00 | ||
Authorization | 00:05:00 | ||
Accounting | 00:05:00 | ||
Authentication Methods | 00:14:00 | ||
Access Control Schemes | 00:07:00 | ||
Account Management | 00:13:00 | ||
Network Authentication | 00:09:00 | ||
Identity Management Systems | 00:06:00 | ||
Exam Question Review | 00:02:00 | ||
Creating LInux Users and Groups Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:01:00 | ||
Section 05: Tools of the Trade | |||
Touring the CLI | 00:16:00 | ||
Shells | 00:06:00 | ||
The Windows Command Line | 00:05:00 | ||
Microsoft PowerShell | 00:13:00 | ||
Linux Shells | 00:12:00 | ||
Python Scripts | 00:06:00 | ||
Windows Command-Line Tools | 00:16:00 | ||
Linux Command-Line Tools | 00:10:00 | ||
Network Scanners | 00:05:00 | ||
Network Scanning with Nmap | 00:09:00 | ||
Network Protocol Analyzers | 00:08:00 | ||
Using Wireshark to Analyze Network Traffic | 00:09:00 | ||
Using tcpdump to Analyze Network Traffic | 00:08:00 | ||
Log Files | 00:09:00 | ||
Centralized Logging | 00:09:00 | ||
Configuring Linux Log Forwarding | 00:08:00 | ||
Exam Question Review | 00:03:00 | ||
Lunux Shell Script Lab | 00:07:00 | ||
Nmap Lab | 00:05:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Section 06: Securing Individual Systems | |||
Malware | 00:14:00 | ||
Weak Configurations | 00:12:00 | ||
Common Attacks | 00:09:00 | ||
Driver and Overflow Attacks | 00:08:00 | ||
Password Attacks | 00:08:00 | ||
Bots and Botnets | 00:06:00 | ||
Disk RAID Levels | 00:10:00 | ||
Securing Hardware | 00:11:00 | ||
Securing Endpoints | 00:09:00 | ||
Exam Question Review | 00:02:00 | ||
Linux Software RAID Lab | 00:08:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Section 07: The Basic LAN | |||
The OSI Model | 00:13:00 | ||
ARP Cache Poisoning | 00:09:00 | ||
Other Layer 2 Attacks | 00:05:00 | ||
Network Planning | 00:07:00 | ||
Load Balancing | 00:06:00 | ||
Securing Network Access | 00:06:00 | ||
Honeypots | 00:06:00 | ||
Firewalls | 00:08:00 | ||
Proxy Servers | 00:06:00 | ||
Network and Port Address Translation | 00:07:00 | ||
IP Security (IPsec) | 00:09:00 | ||
Virtual Private Networks (VPNs) | 00:10:00 | ||
Intrusion Detection and Prevention Systems (IDS/IPS) | 00:13:00 | ||
Exam Question Review | 00:03:00 | ||
Linux Snort IDS Lab | 00:07:00 | ||
Ask Me Anything (AMA) | 00:01:00 | ||
Section 08: Securing Wireless LANs | |||
Wi-Fi Encryption Standards | 00:10:00 | ||
RFID, NFC, and Bluetooth | 00:07:00 | ||
Wi-Fi Coverage and Performance | 00:08:00 | ||
Wi-Fi Discovery and Attacks | 00:12:00 | ||
Cracking WPA2 | 00:10:00 | ||
Wi-Fi Hardening | 00:11:00 | ||
Exam Question Review | 00:02:00 | ||
WPA2 Cracking Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:01:00 | ||
Section 09: Securing Public Servers | |||
Defining a Public Server | 00:01:00 | ||
Common Attacks and Mitigations | 00:10:00 | ||
Containers and Software-Defined Networking | 00:11:00 | ||
Hypervisors and Virtual Machines | 00:08:00 | ||
Cloud Deployment Models | 00:09:00 | ||
Cloud Service Models | 00:08:00 | ||
Securing the Cloud | 00:10:00 | ||
Exam Question Review | 00:02:00 | ||
Docker Container Lab | 00:04:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Section 10: Securing Dedicated Systems | |||
Embedded Systems | 00:13:00 | ||
Industrial Control System (ICS) | 00:07:00 | ||
Internet of Things (IoT) Devices | 00:10:00 | ||
Connecting to Dedicated and Mobile Systems | 00:11:00 | ||
Security Constraints for Dedicated Systems | 00:05:00 | ||
Mobile Device Deployment and Hardening | 00:11:00 | ||
Exam Question Review | 00:03:00 | ||
Smartphone Hardening Lab | 00:03:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Section 11: Physical Security | |||
Physical Security Overview | 00:01:00 | ||
Physical Security | 00:10:00 | ||
Keylogger Demo | 00:05:00 | ||
Environmental Controls | 00:05:00 | ||
Exam Question Review | 00:02:00 | ||
Physical Security Lab | 00:03:00 | ||
Ask Me Anything (AMA) | 00:03:00 | ||
Section 12: Secure Protocols and Applications | |||
DNS Security | 00:05:00 | ||
FTP Packet Capture | 00:03:00 | ||
Secure Web and E-mail | 00:12:00 | ||
Request Forgery Attacks | 00:05:00 | ||
Cross-Site Scripting Attacks | 00:07:00 | ||
Web Application Security | 00:08:00 | ||
Web App Vulnerability Scanning | 00:06:00 | ||
Exam Question Review | 00:03:00 | ||
OWASP ZAP Web App Scan Lab | 00:04:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Section 13: Testing Infrastructure | |||
Testing Infrastructure Overview | 00:05:00 | ||
Social Engineering | 00:06:00 | ||
Social Engineering Attacks | 00:11:00 | ||
Vulnerability Assessments | 00:09:00 | ||
Penetration Testing | 00:10:00 | ||
Security Assessment Tools | 00:12:00 | ||
The Metasploit Framework | 00:08:00 | ||
Exam Question Review | 00:02:00 | ||
Hping3 Forged Packet Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Section 14: Dealing with Incidents | |||
Incident Response Overview | 00:03:00 | ||
Incident Response Plans (IRPs) | 00:06:00 | ||
Threat Analysis and Mitigating Actions | 00:08:00 | ||
Digital Forensics | 00:10:00 | ||
Gathering Digital Evidence | 00:10:00 | ||
Business Continuity and Alternate Sites | 00:06:00 | ||
Data Backup | 00:10:00 | ||
Exam Question Review | 00:01:00 | ||
Autopsy Forensic Browser Lab | 00:05:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Assignment | |||
Assignment - CompTIA Security+ | 00:00:00 |
Studyhub is a premier online learning platform which aims to help individuals worldwide to realise their educational dreams. For 5 years, we have been dedicated...