CompTIA-Security-SY0-501

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

This entry-level CompTIA Security+ training will cover the objectives in the SY0-501 exam, which is the one required exam to earn the CompTIA Security+ certification.

Security+ is well-known and appreciated by government agencies and businesses, and it’s an excellent place to start for those interested in security. IT practitioners who complete this SY0-501 course will be prepared to progress into positions that contribute to junior security roles.

This course can be used for Security+ test planning, onboarding new security personnel, or even curated to be used as end-user security training for someone who leads an IT team.

>>

What Will You Learn?

  • -This is a complete and comprehensive CompTIA Security+ Certification (SY0-501) course. It is designed to prepare you to be able to take and pass the exam to become CompTIA Security+ Certified.
  • -Once you complete the course, you will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech. This course is ideal as both a study tool and an on-the-job reference.
  • -Your new skills and the CompTIA Security+ Certification will help you land a great IT security tech job. Or, if you are already a security tech, get that raise or advancement you are after.

Course Content

CompTIA-Security-SY0-501

  • How to Pass your SY0-501 Security+ Exam
    07:34
  • An Overview of Malware
    00:00
  • Viruses and Worms
    00:00
  • Ransomware and Crypto-Malware
    00:00
  • Trojans and RATs
    00:00
  • Rootkits
    00:00
  • Keyloggers
    00:00
  • Adware and Spyware
    00:00
  • Bots and Botnets
    00:00
  • Logic Bombs
    00:00
  • Phishing
    00:00
  • Tailgating and Impersonation
    00:00
  • Dumpster Diving
    00:00
  • Shoulder Surfing
    00:00
  • Hoaxes
    00:00
  • Watering Hole Attacks
    00:00
  • Principles of Social Engineering
    00:00
  • Denial of Service
    00:00
  • Man-in-the-Middle
    00:00
  • Buffer Overflows
    00:00
  • Data Injection
    00:00
  • Cross-site Scripting
    00:00
  • Cross-site Request Forgery
    00:00
  • Privilege Escalation
    00:00
  • DNS Poisoning and Domain Hijacking
    00:00
  • Driver Manipulation
    00:00
  • Zero-Day Attacks
    00:00
  • Replay Attacks
    00:00
  • Client Hijacking Attacks
    00:00
  • Spoofing
    00:00
  • Wireless Replay Attacks
    00:00
  • Rogue Access Points and Evil Twins
    00:00
  • Wireless Jamming
    00:00
  • WPS Attacks
    00:00
  • Bluejacking and Bluesnarfing
    00:00
  • RFID and NFC Attacks
    00:00
  • Wireless Disassociation Attacks
    00:00
  • Cryptographic Attacks
    00:00
  • Threat Actors
    00:00
  • Penetration Testing
    00:00
  • Vulnerability Scanning
    00:00
  • Vulnerability Types
    00:00
  • Firewalls
    00:00
  • VPN Concentrators
    00:00
  • Network Intrusion Detection and Prevention
    00:00
  • Router and Switch Security
    00:00
  • Proxies
    00:00
  • Load Balancers
    00:00
  • Access Points
    00:00
  • SIEM
    00:00
  • Data Loss Prevention
    00:00
  • Network Access Control
    00:00
  • Mail Gateways
    00:00
  • Other Security Devices
    00:00
  • Software Security Tools
    00:00
  • Command Line Security Tools
    00:00
  • Common Security Issues
    00:00
  • Analyzing Security Output
    00:00
  • Mobile Device Connection Methods
    00:00
  • Mobile Device Management
    00:00
  • Mobile Device Enforcement
    00:00
  • Mobile Device Deployment Models
    00:00
  • Secure Protocols
    00:00
  • Secure Configuration Guides
    00:00
  • Compliance and Frameworks
    00:00
  • Defense-in-Depth
    00:00
  • Secure Network Topologies
    00:00
  • Network Segmentation
    00:00
  • VPN Technologies
    00:00
  • Security Technology Placement
    00:00
  • Securing SDN
    00:00
  • Hardware Security
    00:00
  • Operating System Security
    00:00
  • Peripheral Security
    00:00
  • Secure Deployments
    00:00
  • Embedded Systems
    00:00
  • Development Life Cycle Models
    00:00
  • Secure DevOps
    00:00
  • Version Control and Change Management
    00:00
  • Provisioning and Deprovisioning
    00:00
  • Secure Coding Techniques
    00:00
  • Code Quality and Testing
    00:00
  • Virtualization Overview
    00:00
  • Virtualization Security
    00:00
  • Cloud Deployment Models
    00:00
  • Security in the Cloud
    00:00
  • Draft Lesson
  • Resiliency and Automation
    00:00
  • Redundancy, Fault Tolerance, and High Availability
    00:00
  • Physical Security Controls
    00:00
  • AAA and Authentication
    00:00
  • Identity and Access Services
    00:00
  • PAP, CHAP, and MS-CHAP
    00:00
  • Federated Identities
    00:00
  • Access Control Models
    00:00
  • Access Control Technologies
    00:00
  • Account Types
    00:00
  • Account Management
    00:00
  • Account Policy Enforcement
    00:00
  • Agreement Types
    00:00
  • General Security Policies
    00:00
  • Personnel Management
    00:00
  • Business Impact Analysis
    00:00
  • General Security Policies
    00:00
  • Role-based Awareness Training
    00:00
  • Risk Assessment
    00:00
  • Incident Response Planning
    00:00
  • Incident Response Process
    00:00
  • Gathering Forensics Data
    00:00
  • Using Forensics Data
    00:00
  • Disaster Recovery Sites
    00:00
  • Application Recovery
    00:00
  • Geographic Considerations
    00:00
  • Continuity of Operations
    00:00
  • Security Controls
    00:00
  • Data Destruction
    00:00
  • Handling Sensitive Data
    00:00
  • Data Roles and Retention
    00:00
  • Cryptography Concepts
    00:00
  • Symmetric and Asymmetric Encryption
    00:00
  • Hashing and Digital Signatures
    00:00
  • Continuity of Operations
    00:00
  • Randomizing Cryptography
    00:00
  • Weak Encryption
    00:00
  • Cryptographic Keys
    00:00
  • Steganography
    00:00
  • Stream and Block Ciphers
    00:00
  • States of Data
    00:00
  • Perfect Forward Secrecy
    00:00
  • Cryptography Use Cases
    00:00
  • Symmetric Algorithms
    00:00
  • Block Cipher Modes
    00:00
  • Asymmetric Algorithms
    00:00
  • Hashing Algorithms
    00:00
  • Key Stretching Algorithms
    00:00
  • Obfuscation
    00:00
  • Wireless Cryptographic Protocols
    00:00
  • Wireless Authentication Protocols
    00:00
  • Wireless Security
    00:00
  • PKI Components
    00:00
  • PKI Concepts
    00:00
  • Types of Certificates
    00:00
  • Certificate File Formats
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet