SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
Video accessible from your Account page after purchase.
23+ Hours of Video Instruction
CompTIA Security+ (SY0-601) Complete Video Course is an engaging self-paced video training solution that provides learners with more than 23 hours of personal training from security expert Sari Greene. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CompTIA Security+ (SY0-601) exam, as well as a deeper understanding of security foundations and principles to ensure exam success.
CompTIA Security+ (SY0-601) Complete Video Course contains more than 23 hours of training with content divided into 5 modules with 35 content-targeted lessons. This title covers every objective in the newly updated CompTIA Security+ SY0-601 exam and includes screencast teaching, deep dives on security theory and everyday practices, question reviews, and live demos/labs showing how to complete tasks in real time. Most lessons end with a "Security in Action" segment, which takes the security knowledge you've learned to the next level.
The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CompTIA Security+ exam.
Major sections are as follows:
· Confidently understand every objective on the CompTIASecurity+ exam this course covers every objective and topic in depth.
· Prepare for exam success Sari shares her best practices forstudying for and taking the Security+ exam.
· Enhance your real-world cybersecurity skills and knowledge
· Day-to-day information technology or cybersecurity experience.
· Note: CompTIA recommends but does not require at least twoyears of experience in IT administration with a focus on security prior totaking the certification exam.
Module 1: Threats, Attacks, and Vulnerabilities (24% Exam Objectives)Lesson 1 Compare and Contrast Different Types of Social Engineering TechniquesLesson 2 Given a Scenario, Analyze Indicators of Compromise and Determine the MalwareLesson 3 Given a Scenario, Analyze Potential Indicators Associated with Application AttacksLesson 4 Given a Scenario, Analyze Potential Indicators Associated with Network AttacksLesson 5 Explain Different Threat Actors, Vectors and Intelligence SourcesLesson 6 Explain the Security Concerns Associated with Various Types of VulnerabilitiesLesson 7 Summarize the Techniques Used in Security AssessmentsLesson 8 Explain the Techniques Used in Penetration Testing
Module 2: Architecture and Design (21% Exam Objectives)Lesson 9 Explain the Importance of Security Concepts in an Enterprise EnvironmentLesson 10 Summarize Virtualization and Cloud Computing ConceptsLesson 11 Summarize Secure Application Development, Deployment, and Automation ConceptsLesson 12 Summarize Authentication and Authorization Design ConceptsLesson 13 Given a Scenario, Implement Cybersecurity ResilienceLesson 14 Explain the Security Implications of Embedded and Specialized SystemsLesson 15 Explain the Importance of Physical Security ControlsLesson 16 Summarize the Basics of Cryptographic Concepts
Module 3: Implementation (25% Exam Objectives)Lesson 17 Given a Scenario, Implement Secure ProtocolsLesson 18 Given a Scenario, Implement Host or Application Security SolutionsLesson 19 Given a Scenario, Implement Secure Network DesignsLesson 20 Given a Scenario, Install and Configure Wireless Security SettingsLesson 21 Given a Scenario, Implement Secure Mobile SolutionsLesson 22 Given a Scenario, Apply Cybersecurity Solutions to the CloudLesson 23 Given a Scenario, Implement Identity and Account Management ControlsLesson 24 Given a Scenario, Implement Authentication and Authorization SolutionsLesson 25 Given a Scenario, Implement Public Key Infrastructure
Module 4: Operations and Incident Response (16% Exam Objectives)Lesson 26 Given a Scenario, Use the Appropriate Tool to Assess Organizational SecurityLesson 27 Summarize the Importance of Policies, Processes, and Procedures for Incident ResponseLesson 28 Given an Incident, Utilize Appropriate Data Sources to Support an InvestigationLesson 29 Given an Incident, Apply Mitigation Techniques or Controls to Secure an EnvironmentLesson 30 Explain the Key Aspects of Digital Forensics
Module 5: Governance, Risk & Compliance (14% Exam Objectives)Lesson 31 Compare and Contrast Various Types of ControlsLesson 32 Explain the Importance of Applicable Regulations Standards or Frameworks That Impact Organizational Security PostureLesson 33 Explain the Importance of Policies to Organizational SecurityLesson 34 Summarize Risk Management Processes and ConceptsLesson 35 Explain Privacy and Sensitive Data Concepts in Relation to SecurityLesson 36 Preparing for the Exam