** Taught by a Best Selling IT Certification Instructor **
Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.
My name is Jason Dion, and I have personally helped over 500,000 students earn their IT certifications, and now I can help you, too!
You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.
CompTIA Security+ (SY0-601) is the world’s most popular cybersecurity certification today!
This course is designed to help prepare you for the CompTIA Security (SY0-601) certification exam and covers all the domains the Security+ (SY0-601) certification exam:
CompTIA Security+ (SY0-601):
What You Will Receive In The Course:
This course stays current and up-to-date with the latest release of the CompTIA Security+ exam (SY0-601), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!
What Other Students Are Saying About My CompTIA Security+ Course:
Upon completion of this course, you will earn 21 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.
A short welcome to the course, a brief background of the instructor, information on the exam itself, and where to buy your exam voucher at a discount.
This lesson includes the downloadable study guide as a resource for your offline studies and note taking.
This lesson talks about the difference in information security and information systems security.
This lesson discusses the CIA Triad: confidentiality, integrity, and availability.
This lesson covers the AAA of security: authentication, authorization, and accounting.
This lesson covers the different types of security threats that will be discussed in the course.
This lesson covers the three basic types of security controls and how to mitigate threats.
This lesson covers the 5 different types of hackers: white hats, black hats, gray hats, blue hats, and elite.
This lesson covers the four types of threat actors covered by the Security+ exam: script kiddies, hacktivists, organized crime groups, and advanced persistent threats (APTs).
This lesson will cover the attributes of threat actors, threat intelligence, and sources.
This lesson covers the basics of threat hunting, including intelligence fusion, threat feeds, advisories, bulletins, and maneuvers.
This lesson covers the different types of attack frameworks, including MITRE ATT&CK, The Diamond Model of Intrusion Analysis, and the Cyber Kill Chain.
This quiz will test your knowledge of the topics covered in this section of the course.
This lesson provides an overview of the 7 types of malicious software that will be covered in this section.
This lesson discusses the different types of computer viruses.
This lesson discusses what a computer worm is.
This lesson discusses how Trojans work.
This lesson provides a demonstration of how to create and distribute viruses and Trojans in a lab environment.
This lesson discusses ransomware.
This lesson discusses spyware.
This lesson discusses rootkits.
This lesson discusses the concept of spam.
This lesson summarizes this section and provides you with the key information you need to know for the exam.
This quiz will test your knowledge of the topics covered in this section of the course.
This lesson provides an overview of the methods of malware infection.
This lesson covers the most common infection vectors: software, messaging, and media.
This demonstration will show you how easy it is to be tricked by a phishing email and how to prevent it.
This lesson covers botnets and zombies.
This lesson covers active interception and privilege escalation.
This demonstration will show you how an attacker might gain access to a system by using an exploit that provides privilege escalation.
This lesson covers backdoors and logic bombs.
This lesson covers the symptoms of a malware infection.
This lesson provides the steps to take to remove malware.
This lesson provides tips for preventing malware from infecting your systems.
This lesson provides coverage of fileless malware, the attacker's basic methodology, and how an attacker can 'live off the land' using PowerShell and Bash.
This quiz will test your knowledge of the topics covered in this section of the course.
This lesson provides an overview of this section of the course.
This lesson describes software firewalls, how they are different from our network firewalls, and the most commonly used software firewalls in today's computers.
This demonstration shows how to set up Windows and OSX firewalls.
This lesson covers the concepts of host-based intrusion detection systems and how they are used in our enterprise networks.
This lesson covers the use of pop-up blockers and how they can help us avoid adware and malware.
This lesson covers the concepts of Data Loss Prevention systems.
This lesson covers the different ways to implement security features from your computer's BIOS.
This lesson discusses how removable storage and network storage can be better secured.
This lesson discusses how the contents of your hard drive can be encrypted to secure your files.
This lesson covers the concept of endpoint analysis, including antivirus, HIDS/HIPS, EPP, EDR, and UEBA.
This quiz will test your knowledge of the topics covered in this section of the course.
This lesson provides an overview of this section of the course.
This lesson discusses the importance of securing your wireless devices and peripherals.
This lesson covers mobile malware and botnets.
This lesson covers SIM Cloning and how an attacker can bypass two-factor authentication by taking over your phone number.
This lesson covers bluejacking and bluesnarfing.
This lesson covers the issues involved with mobile device theft.
This lesson covers the dangers of mobile apps.
This lesson covers the dangers of Bring Your Own Device (BYOD) policies.
This lesson provides a summary of the type of actions you can take to best harden your mobile devices.
This quiz will test your knowledge of the topics covered in this section of the course.
This lesson discusses the concept of hardening and how it applies to our operating systems and organizations.
This lesson discusses the concept of least functionality and how it is applied by removing unnecessary applications.
This lesson describes the concepts of application whitelist and blacklist.
This demonstration will teach you how to stop and disable a service in Windows and Linux.
This lesson discusses what makes an operating system a Trusted Operating System.
This lesson discusses the importance of updates, patches, and hotfixes.
This lesson discusses how to properly perform patch management.
This lesson discusses group policies and shows how they are created.
This demonstration shows how to use the group policy editor to whitelist or blacklist an application.
This lesson discusses the various ways to harden file systems and hard drives.
This quiz will test your knowledge of the topics covered in this section of the course.
This lesson focuses on the security of our supply chains.
This lesson focuses on the Root of Trust, including HSM and TPM.
This lesson focuses on trusted firmware and its place in security.
This lesson focuses on our data in use can be protected using secure processing.
This quiz will test your knowledge of the topics covered in this section of the course.
This lesson discusses the concept of virtualization, its types, and how they are utilized in our organizations.
This lesson focuses on the hypervisor and its two types.
This demonstration shows how to install and create a virtual machine in VirtualBox.
This lesson discusses the security threats related to virtual machines.
This lesson discusses the ways to best secure a virtual machine.
This demonstration will show you how to encrypt the virtual machine's files on the host system and to isolate a virtual machine from the network and host computer.
This quiz will test your knowledge of the topics covered in this section of the course.
This lesson provides an overview of the topics covered in this section of the course.
This lesson focuses on how to best secure your web browser.
This lesson focuses on the various threats and concerns associated with web browser security.
This demonstration will show you how to best configure your web browser on Windows for a secure environment.
This lesson discusses methods to secure Microsoft Office and other applications on your workstation.
This quiz will test your knowledge of the topics covered in this section of the course.