Course Highlights
  • Passing the CompTIA Security+ certification exam with confidence
  • Understand computer security, its functions, and its components
  • Performing basic security configurations
  • Become an effective security technician in a business environment
Curriculum

13 Topics
Welcome
Download the Study Guide
Overview of Security
CIA Triad
AAA of Security (OBJ 2.4)
Security Threats (OBJ 1.1 & 1.2)
Mitigating Threats (OBJ 5.1)
Hackers (OBJ 1.5)
Threat Actors (1.5)
Threat Intelligence and Sources (OBJ 1.5)
Threat Hunting (OBJ 1.7)
Attack Frameworks (OBJ 4.2)
Quiz: Overview of Security

11 Topics
Malware (OBJ 1.2)
Viruses (OBJ 1.2)
Worms (OBJ 1.2)
Trojans (OBJ 1.2)
Demo: Viruses and Trojans (OBJ 1.2)
Ransomware (OBJ 1.2)
Spyware (OBJ 1.2)
Rootkits (OBJ 1.2 & 1.3)
Spam (OBJ 1.1)
Summary of Malware
Quiz: Malware

12 Topics
Malware Infections
Common Delivery Methods (OBJ 1.1 & 1.5)
Demo: Phishing (OBJ 1.1 & 5.3)
Botnets and Zombies (OBJ 1.2 & 1.4)
Active Interception and Privilege Escalation (OBJ 1.3 & 1.4)
Demo: Privilege Escalation (OBJ 1.3 & 1.8)
Backdoors and Logic Bombs (OBJ 1.2)
Symptoms of Infection (OBJ 1.2)
Removing Malware (OBJ 4.2)
Preventing Malware (OBJ 1.6 & 3.2)
Malware Exploitation (OBJ 1.2 & 1.4)
Quiz: Malware Infection

11 Topics
Security Applications and Devices
Software Firewalls (OBJ 3.2)
Demo: Software Firewalls (OBJ 3.2)
IDS (OBJ 3.2 & 3.3)
Pop-up Blockers (OBJ 1.1 3.3 4.4)
Data Loss Prevention (DLP) (OBJ 2.1 3.2 4.4)
Securing the BIOS (OBJ 3.2)
Securing Storage Devices (OBJ 2.1 2.5 & 3.3)
Disk Encryption (OBJ 2.1 2.8 & 3.2)
Endpoint Analysis (OBJ 3.1 & 3.3)
Quiz: Security Applications and Devices

10 Topics
Mobile Device Security (OBJ 1.5)
Securing Wireless Devices (OBJ 3.4 & 3.5)
Mobile Malware (OBJ 1.1 & 3.5)
SIM Cloning & ID Theft (OBJ 1.1 2.4 & 2.6)
Bluetooth Attacks (OBJ 1.4 & 3.4)
Mobile Device Theft (OBJ 3.5)
Security of Apps (OBJ 3.1 & 3.5)
BYOD (OBJ 3.5)
Hardening Mobile Devices (OBJ 3.5)
Quiz: Mobile Device Security

11 Topics
Hardening (OBJ 3.2)
Unnecessary Applications (OBJ 1.6)
Restricting Applications (OBJ 3.2 & 4.4)
Demo: Unnecessary Services (OBJ 3.2 & 3.3)
Trusted Operating System (OBJ 3.2)
Updates and Patches (OBJ 1.6 & 3.2)
Patch Management (OBJ 1.6 & 3.2)
Group Policies (OBJ 2.1)
Demo: Group Policies (OBJ 3.2)
File Systems and Hard Drives (OBJ 2.1 & 3.2)
Quiz: Hardening

5 Topics
Supply Chain Assessment (OBJ 1.2 1.5 & 1.6)
Root of Trust (OBJ 3.2)
Trusted Firmware (OBJ 3.2)
Secure Processing (OBJ 3.2)
Quiz: Supply Chain Management

7 Topics
Virtualization (OBJ 2.2)
Hypervisors (OBJ 2.2)
Demo: How to create a VM (OBJ 2.2)
Threats to VMs (OBJ 2.2)
Securing VMs (OBJ 2.2)
Demo: Securing VMs
Quiz: Virtualization

6 Topics
Application Security
Web Browser Security (OBJ 3.2 & 3.3)
Web Browser Concerns (OBJ 3.2 & 3.3)
Demo: Web Browser Configuration (OBJ 3.2 & 3.3)
Securing Applications (OBJ 1.4 & 3.2)
Quiz: Application Security

13 Topics
Software Development (OBJ 2.1 & 2.3)
SDLC Principles (OBJ 1.6 2.3 3.2 & 5.3)
Testing Methods (OBJ 2.3 & 3.2)
Software Vulnerabilities and Exploits (OBJ 1.2 1.3 & 1.6)
Buffer Overflows (OBJ 1.3)
Demo: Buffer Overflow Attack (OBJ 1.3)
XSS and XSRF (OBJ 1.3)
SQL Injection (OBJ 1.3)
Demo: SQL Injection (OBJ 1.2 & 1.3)
XML Vulnerabilities (OBJ 1.3)
Race Conditions (OBJ 1.3)
Design Vulnerabilities (OBJ 1.3)
Quiz: Secure Software Development

12 Topics
Network Security
The OSI Model (OBJ 3.3 & 3.6)
Switches (OBJ 1.4 & 2.7)
Routers (OBJ 3.3)
Network Zones (OBJ 3.3)
** Jumpbox (OBJ 3.5)
Network Access Control (OBJ 3.3 & 4.4)
VLANs (OBJ 3.3)
Subnetting (OBJ 3.6)
Network Address Translation (OBJ 3.3)
Telephony (OBJ 3.1)
Quiz: Network Design

9 Topics
Perimeter Security
Firewalls (OBJ 3.3 & 4.4)
Demo: SOHO Firewall (OBJ 3.3 & 4.4)
Proxy Servers (OBJ 3.3 & 4.4)
Honeypots and Honeynets (OBJ 2.1)
Data Loss Prevention (OBJ 2.1 3.2 & 4.4)
NIDS and NIPS (OBJ 3.3)
Unified Threat Management (OBJ 3.2 & 3.3)
Quiz: Perimeter Security

11 Topics
Cloud Computing (OBJ 1.5 2.2 3.5 & 3.6)
Cloud Types (OBJ 2.2 & 3.6)
As a Service (OBJ 2.2)
Cloud Security (OBJ 2.5 & 3.6)
Defending Servers (OBJ 1.7 3.1 and 3.2)
Cloud-based Infrastructure (OBJ 1.2 1.6 2.2 2.4 2.5 & 3.6)
CASB (OBJ 2.1)
API (OBJ 2.1)
FAAS and Serverless (OBJ 2.2)
Cloud Threats (OBJ 1.3 1.6 2.1 & 2.2)
Quiz: Cloud Security

6 Topics
Workflow Orchestration (OBJ 2.3)
CI/CD (OBJ 2.3)
DevSecOps (OBJ 2.3)
IAC (OBJ 2.2)
Machine Learning (OBJ 1.2)
Quiz: Automation

15 Topics
Network Attacks (OBJ 1.4)
Ports and Protocols (OBJ 3.1)
Memorization of Ports (OBJ 3.1)
Unnecessary Ports (OBJ 1.6 & 3.2)
Denial of Service (OBJ 1.3 & 1.4)
DDoS (OBJ 1.2 1.3 & 1.4)
Stopping a DDoS (OBJ 2.1 & 2.3)
Spoofing (OBJ 1.4 & 3.3)
Hijacking (OBJ 1.3 & 1.4)
Replay Attack (OBJ 1.3)
Demo: Null Sessions (OBJ 1.6)
Transitive Attacks (OBJ 2.4)
DNS Attacks (OBJ 1.1 1.4 & 3.1)
ARP Poisoning (OBJ 1.4)
Quiz: Network Attacks

11 Topics
Securing Networks (OBJ 3.3)
Securing Network Devices (OBJ 1.2 1.6 3.3 & 3.7)
Securing Network Media (OBJ 2.7)
Securing WiFi Devices (OBJ 1.4 & 3.4)
Wireless Encryption (OBJ 1.6 & 3.4)
Wireless Access Points (OBJ 1.4 & 3.4)
Wireless Attacks (OBJ 1.2 1.4 & 1.8)
Demo: Wireless Attack (OBJ 1.4)
WPA3 (OBJ 3.4)
Other Wireless Technologies (OBJ 1.4 & 3.5)
Quiz: Securing Networks

6 Topics
Physical Security (OBJ 2.7)
Surveillance (OBJ 2.7)
Door Locks (OBJ 2.7)
Demo: Lock Picking (OBJ 2.7)
Biometric Readers (OBJ 2.4)
Quiz: Physical Security

11 Topics
Facilities Security (OBJ 2.7)
Fire Suppression (OBJ 2.7)
HVAC (OBJ 2.5 2.6 & 2.7)
Shielding (OBJ 2.7)
Vehicular Vulnerabilities (OBJ 2.6 & 2.7)
IoT Vulnerabilities (OBJ 2.6)
Embedded System Vulnerabilities (OBJ 2.6)
ICS and SCADA Vulnerabilities (OBJ 2.6)
Mitigating Vulnerabilities (OBJ 2.6)
Premise System Vulnerabilities (OBJ 1.2 1.3 1.7 & 2.6)
Quiz: Facilities Security

11 Topics
Authentication (OBJ 2.4 3.5 & 3.8)
Authentication Models (OBJ 2.4 3.5 3.8 & 3.9)
802.1x (OBJ 3.4 & 3.8)
LDAP and Kerberos (OBJ 3.1 & 3.8)
Remote Desktop Services (OBJ 3.1)
Remote Access Service (OBJ 3.1 & 3.8)
VPN (OBJ 3.3)
RADIUS vs TACACS+ (OBJ 3.8)
Authentication Summary (OBJ 3.8)
Authentication Attacks (OBJ 1.2)
Quiz: Authentication

9 Topics
Access Control (OBJ 3.8)
Access Control Models (OBJ 3.8)
Best Practices (OBJ 2.7 3.8 & 5.3)
Users and Groups (OBJ 3.7 & 3.8)
Permissions (OBJ 3.8)
Usernames and Passwords (OBJ 1.6 & 3.7)
Demo: Policies (OBJ 3.7)
User Account Control (OBJ 3.7 & 3.8)
Quiz: Access Control

7 Topics
Risk Assessments (OBJ 5.4)
Qualitative Risk (OBJ 5.4)
Quantitative Risk (OBJ 5.4)
Methodologies (OBJ 1.7 & 5.4)
Security Controls (OBJ 5.1)
Types of Risk (OBJ 1.6 & 5.4)
Quiz: Risk Assessments

10 Topics
Vulnerability Management (OBJ 1.7 4.1 & 5.4)
Penetration Testing (OBJ 1.8)
Training and Exercises (OBJ 1.8 & 4.2)
OVAL (OBJ 1.7)
Vulnerability Assessments (OBJ 1.7 & 4.1)
Demo: Nmap Scanning (OBJ 4.1)
Demo: Vulnerability Scanning (OBJ 1.7 4.1 & 4.3)
Password Analysis (OBJ 1.2)
Demo: Password Cracking (OBJ 4.1)
Quiz: Vulnerability Management

13 Topics
Monitoring Types (OBJ 3.3)
Performance Baselining (OBJ 2.1)
Protocol Analyzers (OBJ 3.3 & 4.1)
SNMP (OBJ 3.1)
Demo: Analytical Tools (OBJ 4.1)
Auditing (OBJ 1.7)
Demo: Auditing Files (OBJ 1.7)
Logging (OBJ 1.7 4.3 & 4.5)
Log Files (OBJ 4.3)
SIEM (OBJ 1.7 & 4.3)
Syslog (OBJ 1.7 & 4.3)
SOAR (OBJ 1.7 & 4.4)
Quiz: Monitoring and Auditing

11 Topics
Cryptography (OBJ 2.1 & 2.8)
Symmetric vs Asymmetric (OBJ 2.8)
Symmetric Algorithms (OBJ 2.8)
Public Key Cryptography (OBJ 2.8)
Asymmetric Algorithms (OBJ 2.8)
Pretty Good Privacy (OBJ 2.8)
Key Management (OBJ 2.8)
One-Time Pad (OBJ 2.8)
Demo: Steganography (OBJ 2.8)
Cryptography Considerations (OBJ 2.8)
Quiz: Cryptography

5 Topics
Hashing (OBJ 1.2 2.8 & 3.2)
Demo: Hashing (OBJ 2.8)
Hashing Attacks (OBJ 1.21.3 & 2.8)
Increasing Hash Security (OBJ 2.8 & 3.7)
Quiz: Hashing

6 Topics
Public Key Infrastructure (OBJ 3.1 3.3 & 3.9)
Digital Certificates (OBJ 3.9)
Demo: Certificates (OBJ 2.8 & 3.9)
Certificate Authorities (OBJ 3.2 & 3.9)
Web of Trust (OBJ 3.9)
Quiz: Public Key Infrastructure

7 Topics
Security Protocols (OBJ 3.1)
S/MIME (OBJ 3.1)
SSL and TLS (OBJ 1.2 2.1 3.1 & 3.3)
SSH (OBJ 3.1 & 4.1)
VPN Protocols (OBJ 3.1 & 3..3)
Demo: Setting up a VPN (OBJ 3.3)
Quiz: Security Protocols

13 Topics
Planning for the Worst (OBJ 2.5 & 5.4)
Redundant Power (OBJ 2.5)
Backup Power (OBJ 2.5)
Data Redundancy (OBJ 2.5)
Demo: RAIDs (OBJ 2.5)
Network Redundancy (OBJ 2.5)
Server Redundancy (OBJ 2.5 &3.3)
Redundant Sites (OBJ 2.1)
Data Backup (OBJ 2.5)
Tape Rotation (OBJ 2.5)
Disaster Recovery Plan (OBJ 2.1 2.5 4.2 & 5.4)
Business Impact Analysis (OBJ 5.4)
Quiz: Planning for the Worst

10 Topics
Social Engineering (OBJ 1.1)
Demo: Pretexting (OBJ 1.1 & 5.3)
Insider Threat (OBJ 1.5)
Phishing (OBJ 1.1 & 5.3)
Motivation Factors (OBJ 1.1)
More Social Engineering (OBJ 1.1 & 1.2)
Fraud and Scams (OBJ 1.1)
Influence Campaigns (OBJ 1.1)
User Education (OBJ 5.3)
Quiz: Social Engineering

13 Topics
Policies and Procedures (OBJ 5.2 & 5.3)
Data Classifications (OBJ 5.3 & 5.5)
Data Ownership
PII and PHI (OBJ 5.2 & 5.5)
Legal Requirements (OBJ 5.2 & 5.5)
Privacy Technologies (OBJ 5.5)
Security Policies (OBJ 5.3 & 5.5)
User Education (OBJ 5.3)
Vendor Relationships (OBJ 5.3)
Disposal Policies (OBJ 2.7 & 4.1)
IT Security Frameworks (OBJ 5.2)
Key Frameworks (OBJ 5.2)
Quiz: Policies and Procedures

8 Topics
Incident Response Procedures (OBJ 4.2)
Incident Response Planning (OBJ 4.2)
Investigative Data (OBJ 4.3)
Forensic Procedures (OBJ 4.5)
Data Collection Procedures (OBJ 4.1 & 4.5)
Demo: Disk Imaging (OBJ 4.1)
Security Tools (OBJ 4.1)
Quiz: Incident Response and Forensics

2 Topics
Conclusion
BONUS: What's Next?

1 Topic
Full-length Practice Exam with Simulations (Security+ SY0-601)

  Write a Review

CompTIA Security+ (SY0-601) Complete Course & Exam

Go to Paid Course