Course Highlights
Welcome to the world of cybersecurity, where every byte holds secrets and threats loom in the shadows. In our CompTIA Security+ (SY0-601) Course, you’ll become a skilled guardian of digital realms, adept at shielding data from malevolent forces. Traverse the twelve realms of knowledge, from Risk Management’s strategic cunning to the tactical art of Dealing with Incidents. Uncover the mysteries of Cryptography, wielding encryption like a sorcerer’s spell. Forge identity fortresses in the treacherous realm of Account Management. Explore the arsenal of security tools and empower yourself with the art of securing individual systems.
The journey continues through LANs and Wireless LANs, where you’ll tame networks like an expert hunter. Venture into the realm of Public Servers, learning to repel attacks from all directions. As you ascend, conquer Dedicated Systems and Physical Security, fortifying the foundations of digital kingdoms. Embrace Secure Protocols and Applications as your code of honor. Test infrastructure like a seasoned knight, anticipating threats with every step. Finally, learn the art of Dealing with Incidents, becoming a fearless defender of peace in the digital realm. This course equips you with the prowess to combat cyber threats and defend vital information, making you an indispensable guardian of modern times.
Learning outcome
- Understand the basics of cyber security
- Identify and mitigate security risks
- Implement security controls
- Respond to security incidents
- Apply security concepts to real-world scenarios
Course media
Why should I take this course?
- Unravel the captivating world of cybersecurity through engaging modules.
- Acquire essential skills sought after in the ever-growing cybersecurity job market.
- Gain a globally recognized CompTIA Security+ certification to boost your career.
- Join a vibrant community of learners and exchange knowledge with industry experts.
- Safeguard digital landscapes against cyber threats and become a cyber-hero.
Career Path
- Cybersecurity Analyst
- Network Security Specialist
- Information Security Consultant
- IT Security Administrator
- Systems Administrator
Requirements
- No prior experience in cyber security is necessary
- Basic understanding of computer networking
- Ability to read and write technical documentation
Course Curriculum
-
Promo
00:01:00
-
Introduction to CompTIA Security+ SY0-601
00:03:00
-
About the CompTIA Security+ SY0-601 Exam
00:03:00
-
Resource – CompTIA Security+ SY0-601 Exam Objectives
00:05:00
-
Defining Risk
00:08:00
-
Threats and Vulnerabilities
00:07:00
-
Threat Intelligence
00:11:00
-
Risk Management Concepts
00:07:00
-
Security Controls
00:09:00
-
Risk Assessments and Treatments
00:06:00
-
Quantitative Risk Assessments
00:07:00
-
Qualitative Risk Assessments
00:04:00
-
Business Impact Analysis
00:09:00
-
Data Types and Roles
00:11:00
-
Security and the Information Life Cycle
00:09:00
-
Data Destruction
00:06:00
-
Personnel Risk and Policies
00:10:00
-
Third-Party Risk Management
00:09:00
-
Agreement Types
00:07:00
-
Exam Question Review
00:02:00
-
Wiping Disks with the dd Command Lab
00:06:00
-
Ask Me Anything (AMA)
00:02:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
Cryptography Basics
00:16:00
-
Data Protection
00:09:00
-
Cryptographic Methods
00:07:00
-
Symmetric Cryptosystems
00:13:00
-
Symmetric Block Modes
00:08:00
-
Asymmetric Cryptosystems
00:13:00
-
Diffie-Hellman
00:07:00
-
Hashing
00:09:00
-
Understanding Digital Certificates
00:08:00
-
Trust Models
00:05:00
-
Public Key Infrastructure
00:04:00
-
Certificate Types
00:14:00
-
Touring Certificates
00:09:00
-
Cryptographic Attacks
00:05:00
-
Password Cracking
00:10:00
-
Password Cracking Demo
00:06:00
-
Exam Question Review
00:02:00
-
SSH Public Key Authentication Lab
00:09:00
-
Ask Me Anything (AMA)
00:02:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
Identification, Authentication, and Authorization
00:08:00
-
Enabling Multifactor Authentication
00:05:00
-
Authorization
00:05:00
-
Accounting
00:05:00
-
Authentication Methods
00:14:00
-
Access Control Schemes
00:07:00
-
Account Management
00:13:00
-
Network Authentication
00:09:00
-
Identity Management Systems
00:06:00
-
Exam Question Review
00:02:00
-
Creating LInux Users and Groups Lab
00:06:00
-
Ask Me Anything (AMA)
00:01:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
Touring the CLI
00:16:00
-
Shells
00:06:00
-
The Windows Command Line
00:05:00
-
Microsoft PowerShell
00:13:00
-
Linux Shells
00:12:00
-
Python Scripts
00:07:00
-
Windows Command-Line Tools
00:16:00
-
Linux Command-Line Tools
00:10:00
-
Network Scanners
00:05:00
-
Network Scanning with Nmap
00:09:00
-
Network Protocol Analyzers
00:08:00
-
Using Wireshark to Analyze Network Traffic
00:09:00
-
Using tcpdump to Analyze Network Traffic
00:08:00
-
Log Files
00:09:00
-
Centralized Logging
00:09:00
-
Configuring Linux Log Forwarding
00:08:00
-
Exam Question Review
00:03:00
-
Lunux Shell Script Lab
00:07:00
-
Nmap Lab
00:05:00
-
Ask Me Anything (AMA)
00:02:00
-
Handouts
00:05:00
-
Lab Handouts Part 1
00:05:00
-
Lab Handouts Part 2
00:05:00
-
Malware
00:14:00
-
Weak Configurations
00:12:00
-
Common Attacks
00:09:00
-
Driver and Overflow Attacks
00:08:00
-
Password Attacks
00:08:00
-
Bots and Botnets
00:06:00
-
Disk RAID Levels
00:10:00
-
Securing Hardware
00:11:00
-
Securing Endpoints
00:09:00
-
Exam Question Review
00:02:00
-
Linux Software RAID Lab
00:08:00
-
Ask Me Anything (AMA)
00:02:00
-
Handouts
00:05:00
-
Lab Handouts Part 1
00:05:00
-
Lab Handouts Part 2
00:05:00
-
The OSI Model
00:13:00
-
ARP Cache Poisoning
00:09:00
-
Other Layer 2 Attacks
00:05:00
-
Network Planning
00:07:00
-
Load Balancing
00:06:00
-
Securing Network Access
00:06:00
-
Honeypots
00:06:00
-
Firewalls
00:11:00
-
Proxy Servers
00:06:00
-
Network and Port Address Translation
00:07:00
-
IP Security (IPsec)
00:09:00
-
Virtual Private Networks (VPNs)
00:10:00
-
Intrusion Detection and Prevention Systems (IDS/IPS)
00:13:00
-
Exam Question Review
00:03:00
-
Linux Snort IDS Lab
00:07:00
-
Ask Me Anything (AMA)
00:01:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
Wi-Fi Encryption Standards
00:10:00
-
RFID, NFC, and Bluetooth
00:07:00
-
Wi-Fi Coverage and Performance
00:08:00
-
Wi-Fi Discovery and Attacks
00:12:00
-
Cracking WPA2
00:10:00
-
Wi-Fi Hardening
00:11:00
-
Exam Question Review
00:02:00
-
WPA2 Cracking Lab
00:06:00
-
Ask Me Anything (AMA)
00:01:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
Defining a Public Server
00:01:00
-
Common Attacks and Mitigations
00:10:00
-
Containers and Software-Defined Networking
00:11:00
-
Hypervisors and Virtual Machines
00:08:00
-
Cloud Deployment Models
00:09:00
-
Cloud Service Models
00:08:00
-
Securing the Cloud
00:10:00
-
Exam Question Review
00:02:00
-
Docker Container Lab
00:04:00
-
Ask Me Anything (AMA)
00:02:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
Embedded Systems
00:13:00
-
Industrial Control System (ICS)
00:07:00
-
Internet of Things (IoT) Devices
00:10:00
-
Connecting to Dedicated and Mobile Systems
00:11:00
-
Security Constraints for Dedicated Systems
00:05:00
-
Mobile Device Deployment and Hardening
00:11:00
-
Exam Question Review
00:03:00
-
Smartphone Hardening Lab
00:03:00
-
Ask Me Anything (AMA)
00:02:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
Physical Security Overview
00:01:00
-
Physical Security
00:10:00
-
Keylogger Demo
00:05:00
-
Environmental Controls
00:05:00
-
Exam Question Review
00:02:00
-
Physical Security Lab
00:03:00
-
Ask Me Anything (AMA)
00:03:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
DNS Security
00:05:00
-
FTP Packet Capture
00:03:00
-
Secure Web and E-mail
00:12:00
-
Request Forgery Attacks
00:05:00
-
Cross-Site Scripting Attacks
00:07:00
-
Web Application Security
00:08:00
-
Web App Vulnerability Scanning
00:06:00
-
Exam Question Review
00:03:00
-
OWASP ZAP Web App Scan Lab
00:04:00
-
Ask Me Anything (AMA)
00:02:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
Testing Infrastructure Overview
00:05:00
-
Social Engineering
00:06:00
-
Social Engineering Attacks
00:11:00
-
Vulnerability Assessments
00:09:00
-
Penetration Testing
00:10:00
-
Security Assessment Tools
00:12:00
-
The Metasploit Framework
00:08:00
-
Exam Question Review
00:02:00
-
Hping3 Forged Packet Lab
00:06:00
-
Ask Me Anything (AMA)
00:02:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
-
Incident Response Overview
00:03:00
-
Incident Response Plans (IRPs)
00:06:00
-
Threat Analysis and Mitigating Actions
00:08:00
-
Digital Forensics
00:12:00
-
Gathering Digital Evidence
00:10:00
-
Business Continuity and Alternate Sites
00:06:00
-
Data Backup
00:10:00
-
Exam Question Review
00:01:00
-
Autopsy Forensic Browser Lab
00:05:00
-
Ask Me Anything (AMA)
00:02:00
-
Handouts
00:05:00
-
Lab Handouts
00:05:00
14-Day Money-Back Guarantee
-
Duration:21 hours, 59 minutes
-
Access:1 Year
-
Units:194


Want to get everything for £149
Take Lifetime Pack