• LOGIN
  • No products in the cart.

Login

Level
Intermediate

Units
194
Duration
15.21 Hours

GET LIFETIME ACCESS TO THIS COURSE AND 2500+ OTHER COURSES FOR ONLY £99. FIND OUT MORE

  • Course Highlights

Welcome to the world of cybersecurity, where every byte holds secrets and threats loom in the shadows. In our CompTIA Security+ (SY0-601) Course, you’ll become a skilled guardian of digital realms, adept at shielding data from malevolent forces. Traverse the twelve realms of knowledge, from Risk Management’s strategic cunning to the tactical art of Dealing with Incidents. Uncover the mysteries of Cryptography, wielding encryption like a sorcerer’s spell. Forge identity fortresses in the treacherous realm of Account Management. Explore the arsenal of security tools and empower yourself with the art of securing individual systems.

The journey continues through LANs and Wireless LANs, where you’ll tame networks like an expert hunter. Venture into the realm of Public Servers, learning to repel attacks from all directions. As you ascend, conquer Dedicated Systems and Physical Security, fortifying the foundations of digital kingdoms. Embrace Secure Protocols and Applications as your code of honor. Test infrastructure like a seasoned knight, anticipating threats with every step. Finally, learn the art of Dealing with Incidents, becoming a fearless defender of peace in the digital realm. This course equips you with the prowess to combat cyber threats and defend vital information, making you an indispensable guardian of modern times.

  • Learning outcome
  • Understand the basics of cyber security
  • Identify and mitigate security risks
  • Implement security controls
  • Respond to security incidents
  • Apply security concepts to real-world scenarios
  • Develop a security mindset
  • Work effectively as part of a security team
  • Requirements
  • No prior experience in cyber security is necessary
  • Basic understanding of computer networking
  • Ability to read and write technical documentation
  • Why should I take this course?
  • Unravel the captivating world of cybersecurity through engaging modules.
  • Acquire essential skills sought after in the ever-growing cybersecurity job market.
  • Gain a globally recognized CompTIA Security+ certification to boost your career.
  • Join a vibrant community of learners and exchange knowledge with industry experts.
  • Safeguard digital landscapes against cyber threats and become a cyber-hero.
  • Career Path
  • Cybersecurity Analyst
  • Network Security Specialist
  • Information Security Consultant
  • IT Security Administrator
  • Systems Administrator
  • Security Operations Center (SOC) Analyst

Course Curriculum

Section 01: Introduction
Promo 00:01:00
Introduction to CompTIA Security+ SY0-601 00:03:00
About the CompTIA Security+ SY0-601 Exam 00:03:00
Resource – CompTIA Security+ SY0-601 Exam Objectives 00:05:00
Section 02: Risk Management
Defining Risk 00:08:00
Threats and Vulnerabilities 00:07:00
Threat Intelligence 00:11:00
Risk Management Concepts 00:07:00
Security Controls 00:09:00
Risk Assessments and Treatments 00:06:00
Quantitative Risk Assessments 00:07:00
Qualitative Risk Assessments 00:04:00
Business Impact Analysis 00:09:00
Data Types and Roles 00:11:00
Security and the Information Life Cycle 00:09:00
Data Destruction 00:06:00
Personnel Risk and Policies 00:10:00
Third-Party Risk Management 00:09:00
Agreement Types 00:07:00
Exam Question Review 00:02:00
Wiping Disks with the dd Command Lab 00:06:00
Ask Me Anything (AMA) 00:02:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 03: Cryptography
Cryptography Basics 00:16:00
Data Protection 00:09:00
Cryptographic Methods 00:07:00
Symmetric Cryptosystems 00:13:00
Symmetric Block Modes 00:08:00
Asymmetric Cryptosystems 00:13:00
Diffie-Hellman 00:07:00
Hashing 00:09:00
Understanding Digital Certificates 00:08:00
Trust Models 00:05:00
Public Key Infrastructure 00:04:00
Certificate Types 00:14:00
Touring Certificates 00:09:00
Cryptographic Attacks 00:05:00
Password Cracking 00:10:00
Password Cracking Demo 00:06:00
Exam Question Review 00:02:00
SSH Public Key Authentication Lab 00:09:00
Ask Me Anything (AMA) 00:02:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 04: Identity and Account Management
Identification, Authentication, and Authorization 00:08:00
Enabling Multifactor Authentication 00:05:00
Authorization 00:05:00
Accounting 00:05:00
Authentication Methods 00:14:00
Access Control Schemes 00:07:00
Account Management 00:13:00
Network Authentication 00:09:00
Identity Management Systems 00:06:00
Exam Question Review 00:02:00
Creating LInux Users and Groups Lab 00:06:00
Ask Me Anything (AMA) 00:01:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 05: Tools of the Trade
Touring the CLI 00:16:00
Shells 00:06:00
The Windows Command Line 00:05:00
Microsoft PowerShell 00:13:00
Linux Shells 00:12:00
Python Scripts 00:07:00
Windows Command-Line Tools 00:16:00
Linux Command-Line Tools 00:10:00
Network Scanners 00:05:00
Network Scanning with Nmap 00:09:00
Network Protocol Analyzers 00:08:00
Using Wireshark to Analyze Network Traffic 00:09:00
Using tcpdump to Analyze Network Traffic 00:08:00
Log Files 00:09:00
Centralized Logging 00:09:00
Configuring Linux Log Forwarding 00:08:00
Exam Question Review 00:03:00
Lunux Shell Script Lab 00:07:00
Nmap Lab 00:05:00
Ask Me Anything (AMA) 00:02:00
Handouts 00:05:00
Lab Handouts Part 1 00:05:00
Lab Handouts Part 2 00:05:00
Section 06: Securing Individual Systems
Malware 00:14:00
Weak Configurations 00:12:00
Common Attacks 00:09:00
Driver and Overflow Attacks 00:08:00
Password Attacks 00:08:00
Bots and Botnets 00:06:00
Disk RAID Levels 00:10:00
Securing Hardware 00:11:00
Securing Endpoints 00:09:00
Exam Question Review 00:02:00
Linux Software RAID Lab 00:08:00
Ask Me Anything (AMA) 00:02:00
Handouts 00:05:00
Lab Handouts Part 1 00:05:00
Lab Handouts Part 2 00:05:00
Section 07: The Basic LAN
The OSI Model 00:13:00
ARP Cache Poisoning 00:09:00
Other Layer 2 Attacks 00:05:00
Network Planning 00:07:00
Load Balancing 00:06:00
Securing Network Access 00:06:00
Honeypots 00:06:00
Firewalls 00:11:00
Proxy Servers 00:06:00
Network and Port Address Translation 00:07:00
IP Security (IPsec) 00:09:00
Virtual Private Networks (VPNs) 00:10:00
Intrusion Detection and Prevention Systems (IDS/IPS) 00:13:00
Exam Question Review 00:03:00
Linux Snort IDS Lab 00:07:00
Ask Me Anything (AMA) 00:01:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 08: Securing Wireless LANs
Wi-Fi Encryption Standards 00:10:00
RFID, NFC, and Bluetooth 00:07:00
Wi-Fi Coverage and Performance 00:08:00
Wi-Fi Discovery and Attacks 00:12:00
Cracking WPA2 00:10:00
Wi-Fi Hardening 00:11:00
Exam Question Review 00:02:00
WPA2 Cracking Lab 00:06:00
Ask Me Anything (AMA) 00:01:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 09: Securing Public Servers
Defining a Public Server 00:01:00
Common Attacks and Mitigations 00:10:00
Containers and Software-Defined Networking 00:11:00
Hypervisors and Virtual Machines 00:08:00
Cloud Deployment Models 00:09:00
Cloud Service Models 00:08:00
Securing the Cloud 00:10:00
Exam Question Review 00:02:00
Docker Container Lab 00:04:00
Ask Me Anything (AMA) 00:02:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 10: Securing Dedicated Systems
Embedded Systems 00:13:00
Industrial Control System (ICS) 00:07:00
Internet of Things (IoT) Devices 00:10:00
Connecting to Dedicated and Mobile Systems 00:11:00
Security Constraints for Dedicated Systems 00:05:00
Mobile Device Deployment and Hardening 00:11:00
Exam Question Review 00:03:00
Smartphone Hardening Lab 00:03:00
Ask Me Anything (AMA) 00:02:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 11: Physical Security
Physical Security Overview 00:01:00
Physical Security 00:10:00
Keylogger Demo 00:05:00
Environmental Controls 00:05:00
Exam Question Review 00:02:00
Physical Security Lab 00:03:00
Ask Me Anything (AMA) 00:03:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 12: Secure Protocols and Applications
DNS Security 00:05:00
FTP Packet Capture 00:03:00
Secure Web and E-mail 00:12:00
Request Forgery Attacks 00:05:00
Cross-Site Scripting Attacks 00:07:00
Web Application Security 00:08:00
Web App Vulnerability Scanning 00:06:00
Exam Question Review 00:03:00
OWASP ZAP Web App Scan Lab 00:04:00
Ask Me Anything (AMA) 00:02:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 13: Testing Infrastructure
Testing Infrastructure Overview 00:05:00
Social Engineering 00:06:00
Social Engineering Attacks 00:11:00
Vulnerability Assessments 00:09:00
Penetration Testing 00:10:00
Security Assessment Tools 00:12:00
The Metasploit Framework 00:08:00
Exam Question Review 00:02:00
Hping3 Forged Packet Lab 00:06:00
Ask Me Anything (AMA) 00:02:00
Handouts 00:05:00
Lab Handouts 00:05:00
Section 14: Dealing with Incidents
Incident Response Overview 00:03:00
Incident Response Plans (IRPs) 00:06:00
Threat Analysis and Mitigating Actions 00:08:00
Digital Forensics 00:12:00
Gathering Digital Evidence 00:10:00
Business Continuity and Alternate Sites 00:06:00
Data Backup 00:10:00
Exam Question Review 00:01:00
Autopsy Forensic Browser Lab 00:05:00
Ask Me Anything (AMA) 00:02:00
Handouts 00:05:00
Lab Handouts 00:05:00

Don't just take our word for it

Select your currency