Sale!

CompTIA Security+ SY0-701 Complete Course

Original price was: $45.00.Current price is: $15.00.

Price: 15.00 USD | Size: 6.16 GB |  Duration : 27.24 Hours  | 183 Video Lessons | Bonus : CompTIA Security+ PDF Guides  

BRAND:

ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

Description

Price: 15.00 USD | Size: 6.16 GB |  Duration : 27.24 Hours  | 183 Video Lessons | Bonus : CompTIA Security+ PDF Guides  

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | ⭐️⭐️⭐️⭐️⭐️ 4.9

 

CompTIA Security+ SY0-701 (Video Course)

27+ Hours of Video Instruction

Get the edge you need to successfully study for the CompTIA Security+ exam!

Overview

CompTIA Security+ (SY0-701) is designed to prepare you for the SY0-701 version of the Security+ exam. It is an engaging self-paced video training solution that provides learners with more than 27.5 hours of personal training from security expert Sari Greene.

With topic-focused instructional videos, you will gain an in-depth understanding of each exam objective in the CompTIA Security+ (SY0-701) exam, as well as a deeper understanding of security foundations and principles to ensure exam success. This self-paced video course maps to the CompTIA Security+ Certification Exam Objectives for the SY0-701 exam, which has been updated to reflect current and emerging cybersecurity trends and techniques. At the end of every sub lesson youll find a three-second challenge, a Security-in-Action case study, and a word cloud that displays key concepts and terminology.

  • At the end of every lesson, you’ll find a Deep Dive quiz to help you assess your knowledge and progress.
  • At the end of every module, you’ll find practical application Closer Look labs.

 

The exam objectives are organized into five domains:

  1. General Security Concepts
  2. Threats, Vulnerabilities, and Mitigations
  3. Security Architecture
  4. Security Operations
  5. Security Program Management and Oversight

Skill Level

Intermediary to Advanced

Learn How To

  • Confidently understand every objective on the CompTIA Security+ examthis course covers every objective and topic in depth.
  • Prepare for exam successSari shares her best practices for studying for and taking the Security+ exam.
  • Enhance your real-world cybersecurity skills and knowledge.

Course Requirement

CompTIA recommends but does not require at least two years of experience in IT administration with a focus on security prior to taking the certification exam.

Who Should Take This Course

  • Anyone preparing for the CompTIA Security+ examination. Secondary audience: IT professionals
  • Anyone interested in learning security fundamentals

 

Table of contents

Introduction
CompTIA Security+ SY0-701: Introduction

Module 1: General Security Concepts
Module introduction
Lesson 1: Compare and Contrast Various Types of Security Controls
Learning objectives
1.1 Control Objectives
1.2 Control Categories and Classifications
1.3 Deep Dive Quiz

Lesson 2: Summarize Fundamental Security Concepts
Learning objectives
2.1 Security and Privacy Principles
2.2 Zero Trust
2.3 Physical Security
2.4 Environmental Impact
2.5 Deception and Disruption
2.6 Deep Dive Quiz

Lesson 3: Explain the Importance of Change Management Processes and the Impact to Security
Learning objectives
3.1 Configuration Management
3.2 Change Management
3.3 Deep Dive Quiz

Lesson 4: Explain the Importance of Using Appropriate Cryptographic Solutions
Learning objectives
4.1 Cryptography Primer
4.2 Encryption
4.3 Hashing and Digital Signatures
4.4 Digital Certificates
4.5 Emerging Cryptography
4.6 Steganography
4.7 Deep Dive Quiz
Module 1 Closer Look Labs
Honeypots
Hashing and HMACS
Digital Certificates

Module 2: Threats, Vulnerabilities and Mitigations
Module introduction

Lesson 5: Compare and Contrast Common Threat Actors and Motivations
Learning objectives
5.1 Threat Actors and Attributes
5.2 Threat Modeling and Intelligence
5.3 Deep Dive Quiz

Lesson 6: Explain Common Threat Vectors and Attack Surfaces
Learning objectives
6.1 Operational Threat Vectors
6.2 Third-Party and Supply Chain Threat Vectors
6.3 Social Engineering
6.4 Deep Dive Quiz

Lesson 7: Explain Various Types of Vulnerabilities
Learning objectives
7.1 Vulnerability Primer
7.2 Network, OS, and Cloud Vulnerabilities
7.3 Deep Dive Quiz

Lesson 8: Given a Scenario, Anaylze Indicators of Malicious Activity
Learning objectives
8.1 Indicators of Malicious Activity
8.2 Malware Attacks
8.3 Brute Force Attacks
8.4 Digital Infrastructure Attacks
8.5 Application Attacks
8.6 Wireless Attacks
8.7 Cryptographic Attacks
8.8 Deep Dive Quiz

Lesson 9: Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise
Learning objectives
9.1 Secure Design Principles
9.2 Segmentation
9.3 Deep Dive Quiz
Module 2 Closer Look Labs
Phone and Text Spoofing
Malware Analysis
Constructing Error Messages
Threat Intelligence Workflow
Zero-day Vulnerabilities
Module 3: Security Architecture
Module introduction

Lesson 10: Compare and Contrast Security Implications of Different Architecture Models
Learning objectives
10.1 Computing Architecture Models
10.2 Cloud Services
10.3 Cloud Infrastructure
10.4 Data Center Solution Elements
10.5 Virtualization
10.6 Embedded Systems
10.7 Internet of Things (IoT)
10.8 Deep Dive Quiz

Lesson 11: Given a Scenario, Apply Security Principles to Secure the Enterprise
Learning objectives
11.1 Network Devices
11.2 Network Access Control
11.3 Firewalls
11.4 Secure Communications
11.5 Deep Dive Quiz

Lesson 12: Compare and Contrast Concepts and Strategies to Protect Data
Learning objectives
12.1 Data Types
12.2 Data Classification
12.3 Data Protection
12.4 Deep Dive Quiz

Lesson 13: Explain the Importance of Resilience and Recovery in Security Architecture
Learning objectives
13.1 Backup and Recovery
13.2 Resiliency Concepts
13.3 Continuity of Operations
13.4 Deep Dive Quiz
Module 3 Closer Look Labs
RAID
SSL and TLS Packet Capture
Cloud Controls
Module 4: Security Operations
Module introduction

Lesson 14: Given a Scenario, Apply Common Security Techniques to Computing Resources
Learning objectives
14.1 Secure Baselines and Hardening Targets
14.2 Wireless Configuration
14.3 Wireless Design
14.4 Mobile Connectivity
14.5 Mobile Device Management
14.6 Application Security
14.7 Secure Coding
14.8 Deep Dive Quiz

Lesson 15: Explain the Security Implications of Proper Hardware, Software, and Data Asset Management
Learning objectives
15.1 Asset Management
15.2 Deletion, Disposal, and Destruction
15.3 Deep Dive Quiz

Lesson 16: Explain Various Activities Associated with Vulnerability Management
Learning objectives
16.1 Vulnerability Identification
16.2 Vulnerability Response and Remediation
16.3 Deep Dive Quiz

Lesson 17: Explain Security Alerting and Monitoring Concepts and Tools
Learning objectives
17.1 Logging and Analysis
17.2 SNMP, NetFlow, and SCAP
17.3 Deep Dive Quiz

Lesson 18: Given a Scenario, Modify Enterprise Capabilities to Enhance Security
Learning objectives
18.1 Enhancing Security with Network Devices
18.2 TCP/IP and Secure Protocols
18.3 Email Security
18.4 Group Policy and SELinux
18.5 Deep Dive Quiz

Lesson 19: Given a Scenario, Implement and Maintain Identity and Access Management
Learning objectives
19.1 Identity and Access Management (IAM)
19.2 Federated Identity
19.3 Authentication
19.4 Biometrics
19.5 Access Control and Authorization
19.6 Privileged Access Management
19.7 Deep Dive Quiz

Lesson 20: Explain the Importance of Automation and Orchestration Related to Secure Operations
Learning objectives
20.1 Scripting, Automation, and Orchestration
20.2 Deep Dive Quiz
Lesson 21: Explain Appropriate Incident Response Activities
Learning objectives
21.1 Incident Management
21.2 Incident Response
21.3 Evidence Handling
21.4 Forensic Examination
21.5 Disclosure and Notification
21.6 Deep Dive Quiz

Lesson 22: Given a Scenario, Use Data Sources to Support an Investigation
Learning objectives
22.1 Data Sources
22.2 Deep Dive Quiz
Module 4 Closer Look Labs
PowerShell
Pwned Passwords
IPv6 Addressing
Wireless Heat Maps
ZenMap
Log files
Ram Capture

Module 5: Security Program Management and Oversight
Module introduction
Lesson 23: Summarize Effective Security Governance
Learning objectives
23.1 Governance Structure
23.2 Governance Documents
23.3 Deep Dive Quiz

Lesson 24: Explain Elements of the Risk Management Process
Learning objectives
24.1 Risk Concepts
24.2 Risk Assessment and Analysis
24.3 Risk Response and Treatment
24.4 Business Impact Analysis
24.5 Deep Dive Quiz

Lesson 25: Explain the Processes Associated with Third-Party Risk Assessment and Management
Learning objectives
25.1 Third-party Risk Management
25.2 Deep Dive Quiz

Lesson 26: Summarize Elements of Effective Security Compliance
Learning objectives
26.1 Compliance Monitoring
26.2 Privacy Principles
26.3 Deep Dive Quiz

Lesson 27: Explain Types and Purposes of Audits and Assessment
Learning objectives
27.1 Audit and Assurance
27.2 Penetration Testing Concepts
27.3 Penetration Testing Tools and Techiques
27.4 Deep Dive Quiz

Lesson 28: Given a Scenario, Implement Security Awareness Practices
Learning objectives
28.1 Education, Training, and Awareness
28.2 Deep Dive Quiz
Module 5 Closer Look Labs
Passive Reconnaissance
Policies and standards
Quantitative Risk Analysis
Privacy Walkthrough

Module 6: Preparing for the Exam
Module introduction
Lesson 29: Attaining Your SY0-701 Security+ Certification
Learning objectives
29.1 Understanding the SY0-701 Security+ Exam Structure
29.2 SY0-701 Exam Testing Options
29.3 SY0-701 Exam Testing Strategies
29.4 Congratulations! What’s Next?

Summary
CompTIA Security+ SY0-701: Summary

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

You may also like…

0
    0
    Your Cart
    Your cart is emptyReturn to Shop

    Add to cart