CompTIA Security+ (SY0-701) Complete Course & Practice Exam
-
Introduction
-
Fundamentals of SecurityFundamentals of Security0sThreats and Vulnerabilities0sConfidentiality (OBJ 1.2)0sIntegrity (OBJ 1.2)0sAvailability (OBJ 1.2)0sNon-repudiation (OBJ 1.2)0sAuthentication (OBJ 1.2)0sAuthorization (OBJ 1.2)0sAccounting (OBJ 1.2)0sSecurity Control Categories (OBJ 1.1)0sSecurity Control Types (OBJ 1.1)0sZero Trust (OBJ 1.2)0sGap Analysis (OBJ 1.2)0sCheckpoint: Fundamentals of Security
-
Threat ActorsThreat Actors (OBJ 1.2, 2.1, & 2.2)0sThreat Actor Motivations (OBJ 2.1)0sThreat Actor Attributes (OBJ 2.1)0sUnskilled Attackers (OBJ 2.1)0sHacktivists (OBJ 2.1)0sOrganized Crime (OBJ 2.1)0sNation-state Actor (OBJ 2.1)0sInsider Threats (OBJ 2.1)0sShadow IT (OBJ 2.1)0sThreat Vectors and Attack Surfaces (OBJ 2.2)0sOutsmarting Threat Actors (OBJ 1.2)0sCheckpoint: Threat Actors
-
Physical SecurityPhysical Security (OBJ 1.2 & 2.4)0sFencing and Bollards (OBJ 1.2)0sAttacking with Brute Force (OBJ 2.4)0sSurveillance Systems (OBJ 1.2)0sBypassing Surveillance Systems (OBJ 2.4)0sAccess Control Vestibules (OBJ 1.2)0sDoor Locks (OBJ 1.2)0sAccess Badge Cloning (OBJ 2.4)0sCheckpoint: Physical Security
-
Social EngineeringSocial Engineering (OBJ 2.2 & 5.6)0sMotivational Triggers (OBJ 5.6)0sImpersonation (OBJ 2.2)0sPretexting (OBJ 2.2)0sPhishing Attacks (OBJ 2.2)0sPreventing Phishing Attacks (OBJ 5.6)0sConducting an Anti-Phishing Campaign (OBJ 5.6)0sFrauds and Scams (OBJ 2.2)0sInfluence Campaigns (OBJ 2.2)0sOther Social Engineering Attacks (OBJ 2.2)0sCheckpoint: Social Engineering
-
MalwareMalware (OBJ 2.4)0sViruses (OBJ 2.4)0sWorms (OBJ 2.4)0sTrojans (OBJ 2.4)0sViruses and Trojans (OBJ 2.4)0sRansomware (OBJ 2.4)0sZombies and Botnets (OBJ 2.4)0sRootkits (OBJ 2.4)0sBackdoors and Logic Bombs (OBJ 2.4)0sKeylogger (OBJ 2.4)0sSpyware and Bloatware (OBJ 2.4)0sMalware Attack Techniques (OBJ 2.4)0sIndications of Malware Attacks (OBJ 2.4)0sCheckpoint: Malware
-
Data ProtectionData Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)0sData Classifications (OBJ 3.3)0sData Ownership (OBJ 4.2 & 5.1)0sData States (OBJ 3.3)0sData Types (OBJ 3.3 & 1.4)0sData Sovereignty (OBJ 3.3)0sSecuring Data (OBJ 3.3)0sData Loss Prevention (DLP) (OBJ 4.4)0sConfiguring a DLP (OBJ 4.5)0sCheckpoint: Data Protection
-
Cryptographic SolutionsCryptographic Solutions (OBJ 1.4, 2.3, & 2.4)0sSymmetric vs Asymmetric (OBJ 1.4)0sSymmetric Algorithms (OBJ 1.4)0sAsymmetric Algorithms (OBJ 1.4)0sHashing (OBJ 1.4)0sIncreasing Hash Security (OBJ 1.4)0sPublic Key Infrastructure (PKI) (OBJ 1.4)0sDigital Certificates (OBJ 1.4)0sExploring Digital Certificates (OBJ 1.4)0sBlockchain (OBJ 1.4)0sEncryption Tools (OBJ 1.4)0sObfuscation (OBJ 1.4)0sCryptographic Attacks (OBJ 2.3 & 2.4)0sCheckpoint: Cryptographic Solutions
-
Risk ManagementRisk Management (OBJ 5.2)0sRisk Assessment Frequency (OBJ 5.2)0sRisk Identification (OBJ 5.2)0sRisk Register (OBJ 5.2)0sQualitative Risk Analysis (OBJ 5.2)0sQuantitative Risk Analysis (OBJ 5.2)0sRisk Management Strategies (OBJ 5.2)0sRisk Monitoring and Reporting (OBJ 5.2)0sCheckpoint: Risk Management
-
Third-party Vendor Risks
-
Governance and ComplianceGovernance and Compliance (OBJ 5.1 & 5.4)0sGovernance (OBJ 5.1)0sGovernance Structures (OBJ 5.1)0sPolicies (OBJ 5.1)0sStandards (OBJ 5.1)0sProcedures (OBJ 5.1)0sGovernance Considerations (OBJ 5.1)0sCompliance (OBJ 5.4)0sNon-compliance Consequences (OBJ 5.4)0sCheckpoint: Governance and Compliance
-
Asset and Change ManagementAsset and Change Management (OBJ 1.3, 4.1, & 4.2)0sAcquisition and Procurement (OBJ 4.2)0sMobile Asset Deployments (OBJ 4.1)0sAsset Management (OBJ 4.2)0sAsset Disposal and Decommissioning (OBJ 4.2)0sChange Management (OBJ 1.3)0sChange Management Processes (OBJ 1.3)0sTechnical Implications of Changes (OBJ 1.3)0sDocumenting Changes (OBJ 1.3)0sCheckpoint: Asset and Change Management
-
Audits and AssessmentsAudits and Assessments (OBJ 5.5)0sInternal Audits and Assessments (OBJ 5.5)0sPerforming an Internal Assessment (OBJ 5.5)0sExternal Audits and Assessments (OBJ 5.5)0sPerforming an External Assessment (OBJ 5.5)0sPenetration Testing (OBJ 5.5)0sReconnaissance in Pentesting (OBJ 5.5)0sPerforming a Basic PenTest (OBJ 5.5)0sAttestation of Findings (OBJ 5.5)0sCheckpoint: Audits and Assessments
-
Cyber Resilience and RedundancyCyber Resilience and Redundancy (OBJ 3.4)0sHigh Availability (OBJ 3.4)0sData Redundancy (OBJ 3.4)0sConfiguring a RAID (OBJ 3.4)0sCapacity Planning (OBJ 3.4)0sPowering Data Centers (OBJ 3.4)0sData Backups (OBJ 3.4)0sContinuity of Operations Plan (OBJ 3.4)0sRedundant Site Considerations (OBJ 3.4)0sResilience and Recovery Testing (OBJ 3.4)0sCheckpoint: Cyber Resilience and Redundancy
-
Security ArchitectureSecurity Architecture (OBJ 3.1 & 4.1)0sOn-premise versus the Cloud (OBJ 3.1)0sCloud Security (OBJ 3.1 & 4.1)0sVirtualization and Containerization (OBJ 2.3 & 3.1)0sServerless (OBJ 3.1)0sMicroservices (OBJ 3.1)0sNetwork Infrastructure (OBJ 3.1)0sSoftware-Defined Network (SDN) (OBJ 3.1)0sInfrastructure as Code (IaC) (OBJ 3.1)0sCentralized vs Decentralized Architectures (OBJ 3.1)0sInternet of Things (IoT) (OBJ 3.1 & 4.1)0sICS and SCADA (OBJ 3.1 & 4.1)0sEmbedded Systems (OBJ 3.1 & 4.1)0sCheckpoint: Security Architecture
-
Security InfrastructureSecurity Infrastructure (OBJ 3.2 & 4.5)0sPorts and Protocols (OBJ 4.5)0sFirewalls (OBJ 3.2)0sConfiguring Firewalls (OBJ 4.5)0sIDS and IPS (OBJ 3.2)0sNetwork Appliances (OBJ 3.2)0sPort Security (OBJ 3.2)0sSecuring Network Communications (OBJ 3.2)0sSD-WAN and SASE (OBJ 3.2)0sInfrastructure Considerations (OBJ 3.2)0sSelecting Infrastructure Controls (OBJ 3.2)0sCheckpoint: Security Infrastructure
-
Identity and Access Management (IAM) SolutionsIdentity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)0sIdentity and Access Management (IAM) (OBJ 4.6)0sMultifactor Authentication (OBJ 4.6)0sPassword Security (OBJ 4.6)0sPassword Attacks (OBJ 2.4)0sSingle Sign-On (SSO) (OBJ 4.6)0sFederation (OBJ 4.6)0sPrivileged Access Management (PAM) (OBJ 4.6)0sAccess Control Models (OBJ 4.6)0sAssigning Permissions (OBJ 4.6)0sCheckpoint: Identity and Access Management (IAM) Solutions
-
Vulnerabilities and AttacksVulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)0sHardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)0sBluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)0sMobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)0sZero-day Vulnerabilities (OBJ 2.3)0sOperating System Vulnerabilities (OBJ 2.3 & 2.5)0sSQL and XML Injections (OBJ 2.3 & 2.4)0sConducting an SQL Injection (OBJ 2.3 & 2.4)0sXSS and XSRF (OBJ 2.3 & 2.4)0sBuffer Overflow (OBJ 2.3 & 2.4)0sRace Conditions (OBJ 2.3)0sCheckpoint: Vulnerabilities and Attacks
-
Malicious ActivityMalicious Activity (OBJ 2.4)0sDistributed Denial of Service (OBJ 2.4)0sDomain Name System (DNS) Attacks (OBJ 2.4)0sDirectory Traversal Attack (OBJ 2.4)0sExecution and Escalation Attack (OBJ 2.4)0sReplay Attacks (OBJ 2.4)0sSession Hijacking (OBJ 2.4)0sOn-Path Attacks (OBJ 2.4)0sInjection Attacks (OBJ 2.4)0sIndicators of Compromise (IoC) (OBJ 2.4)0sCheckpoint: Malicious Activity
-
HardeningHardening (OBJ 2.5, 4.1, & 4.5)0sChanging Default Configurations (OBJ 2.5)0sRestricting Applications (OBJ 2.5)0sUnnecessary Services (OBJ 2.5)0sTrusted Operating Systems (OBJ 2.5)0sUpdates and Patches (OBJ 2.5)0sPatch Management (OBJ 2.5)0sGroup Policies (OBJ 2.5 & 4.5)0sSELinux (OBJ 2.5 & 4.5)0sData Encryption Levels (2.5)0sSecure Baselines (OBJ 2.5 and 4.1)0sCheckpoint: Hardening
-
Security TechniquesSecurity Techniques (OBJ 4.1 & 4.5)0sWireless Infrastructure Security (OBJ 4.1)0sWireless Security Settings (OBJ 4.1)0sApplication Security (OBJ 4.1)0sNetwork Access Control (NAC) (OBJ 4.5)0sWeb and DNS Filtering (OBJ 4.5)0sEmail Security (OBJ 4.5)0sEndpoint Detection and Response (OBJ 4.5)0sUser Behavior Analytics (OBJ 4.5)0sSelecting Secure Protocols (OBJ 4.5)0sCheckpoint: Security Techniques
-
Vulnerability ManagementVulnerability Management (OBJ 4.3)0sIdentifying Vulnerabilities (OBJ 4.3)0sThreat Intelligence Feeds (OBJ 4.3)0sResponsible Disclosure Programs (OBJ 4.3)0sAnalyzing Vulnerabilities (OBJ 4.3)0sConducting Vulnerability Scans (OBJ 4.3)0sAssessing Vulnerability Scan Results (OBJ 4.3)0sVulnerability Response and Remediation (OBJ 4.3)0sValidating Vulnerability Remediation (OBJ 4.3)0sVulnerability Reporting (OBJ 4.3)0sCheckpoint: Vulnerability Management
-
Alerting and MonitoringAlerting and Monitoring (OBJ 4.4)0sMonitoring Resources (OBJ 4.4)0sAlerting and Monitoring Activities (OBJ 4.4)0sSimple Network Management Protocol (SNMP) (OBJ 4.4)0sSecurity Information and Event Management (SIEM) (OBJ 4.4)0sData from Security Tools (OBJ 4.4)0sSecurity Content Automation and Protocol (SCAP) (OBJ 4.4)0sNetFlow and Flow Analysis (OBJ 4.4)0sSingle Pane of Glass (OBJ 4.4)0sCheckpoint: Alerting and Monitoring
-
Incident ResponseIncident Response (OBJ 4.8)0sIncident Response Process (OBJ 4.8)0sThreat Hunting (OBJ 4.8)0sRoot Cause Analysis (OBJ 4.8)0sIncident Response Training and Testing (OBJ 4.8)0sDigital Forensic Procedures (OBJ 4.8)0sData Collection Procedures (OBJ 4.8)0sDisk Imaging and Analysis (OBJ 4.8)0sCheckpoint: Incident Response
-
Investigating an IncidentInvestigating an Incident (OBJ 4.9)0sInvestigating with Data (OBJ 4.9)0sDashboards (OBJ 4.9)0sAutomated Reports (OBJ 4.9)0sVulnerability Scans (OBJ 4.9)0sPacket Captures (OBJ 4.9)0sFirewall Logs (OBJ 4.9)0sApplication Logs (OBJ 4.9)0sEndpoint Logs (OBJ 4.9)0sOS-specific Security Logs (OBJ 4.9)0sIPS/IDS Logs (OBJ 4.9)0sNetwork Logs (OBJ 4.9)0sMetadata (OBJ 4.9)0sCheckpoint: Investigating an Incident
-
Automation and OrchestrationAutomation and Orchestration (OBJ 4.7)0sWhen to Automate and Orchestrate (OBJ 4.7)0sBenefits of Automation and Orchestration (OBJ 4.7)0sAutomating Support Tickets (OBJ 4.7)0sAutomating Onboarding (OBJ 4.7)0sAutomating Security (OBJ 4.7)0sAutomating Application Development (OBJ 4.7)0sIntegrations and APIs (OBJ 4.7)0sCheckpoint: Automation and Orchestration
-
Security AwarenessSecurity Awareness (OBJ 5.6)0sRecognizing Insider Threats (OBJ 5.6)0sPassword Management (OBJ 5.6)0sAvoiding Social Engineering (OBJ 5.6)0sPolicy and Handbooks (OBJ 5.6)0sRemote and Hybrid Work Environments (OBJ 5.6)0sCreating a Culture of Security (OBJ 5.6)0sCheckpoint: Security Awareness
-
Conclusion
-
Practice Exam
** Taught by a Best Selling IT Certification Instructor **
Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.
You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.
CompTIA Security+ (SY0-701) is the world’s most popular cybersecurity certification today!
This course is designed to help prepare you for the CompTIA Security (SY0-701) certification exam and covers all the domains the Security+ (SY0-701) certification exam:
CompTIA Security+ (SY0-701):
General Security Concepts
Threats, Vulnerabilities, and Mitigations
Security Architecture
Security Operations
Security Program Management and Oversight
What You Will Receive In The Course:
Video lectures with the essential information needed to pass the Security+ (SY0-701) exam
A complete downloadable study guide in PDF format based on the lessons
Practice quizzes to ensure mastery of each section of the course
A full-length practice exam with multiple choice and mock simulations
This course stays current and up-to-date with the latest release of the CompTIA Security+ exam (SY0-701), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!
What Other Students Are Saying About My CompTIA Security+ Course:
Solid information, acronym break downs throughout the course (allows for better note taking). Jason is easy to follow, listen to, and understand during your study period (I sit for hours listening and taking notes and replaying the section) (Mark Guillen, 5 stars)
Just passed my security+ today! Dion’s course was excellent. It was all I needed, and I took his practice tests I also purchased. The only thing I think would help other testers is more sophisticated and harder performance-based questions as I experienced ones today that were pretty tough and required more hands-on experience. Overall, though completely worth the money. (Duran navarro, 5 stars)
The course is very informative and good for people that has no knowledge about cybersecurity so far. It teaches us about the harm caused by attacks and how to prevent them. I would suggest everyone to take this course, even if they don’t wan the certificate from Comptia. (Mahmoud Choumar, 5 stars)
Jason is a great pedagogue. He is thorough and amiable. The course has very minimal errors and you can tell he is very strict with the format of his lessons. I had very few questions during the lectures and only experience one issue throughout the whole experience. I will definitely buy more courses from him. I also bought the voucher from his website to get the retake for only 100 bucks! Good job Dion Training! Keep up the great job! (Victor Cabrales, 5 stars)
Passed the exam in December of 2022 using this course – FIRST TRY!! This course gave the back bone of everything I needed to pass the Sec. + exam. When the time came to study up a day or two before the actual exam, I used all the practice quizzes/tests from the CompTIA Sec. + study book. Seems thoughtless or stupid to not use the book for actual studying, but I found I learn slightly better in a class environment and this course/videos allowed me that. Thank you for this course and I look forward to many more in the future! Honestly, I haven’t taken an ACTUAL exam in years – many years. If I can do it, you all can too! Good luck and God speed! (Nathaniel Shumaker, 5 stars)
Upon completion of this course, you will earn 31 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.
What's included
- 31 hours on-demand video
- 1 article
- Access on mobile and TV
- Certificate of completion