Author: Christopher Rees
In this series, you will expand your knowledge of threats, attacks, and vulnerabilities; security technologies and tools; security architecture and design, identity and access management, risk management, and cryptography through exposure to the CompTIA Security+ SY0-501 exam objectives.... Read more Read less
In this series, you will learn how to install and configure systems to secure applications, networks and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws and regulations. These courses will also help you prepare for the CompTIA Security+ SY0-501 certification exam.
This course covers domain one of the CompTIA Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for CompTIA Security+, you'll learn about the various types of threats and attacks every company faces. First, you'll learn the ins and outs of Malware, ransom-ware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks. Next, you'll also learn the characteristics of the various types of threat actors, the skills they have and the tools they use. Finally, you'll learn about penetration testing and vulnerability scanning and how they're used to help tighten security and mitigate potential breaches. By the end of this course, you'll have a solid understanding of the various threats you're likely to face and what tools are available to mitigate these threats.
IT Security comprises many different areas and organizations that need skilled IT security personnel who understand the tools and technologies required to architect, deploy, maintain, and troubleshoot the infrastructure required to keep a company's data secure. In this course, Technologies and Tools for CompTIA Security+, you'll learn the networking components (hardware and software) required to maintain organizational security. First, you'll explore the concepts required to troubleshoot and remediate issues. Next, you'll discover the tools required to properly assess a company's security posture, including network scanners, protocol analyzers, vulnerability scanning, and exploitation frameworks. Finally, you'll learn the infrastructure and security concerns dealing with mobile device deployment, including the protocols, devices, and infrastructure needed to secure a company's assets. By the end of this course, you'll understand the various technologies and tools required to assess a company's security posture, identify gaps in their defenses, and recommend solutions to mitigate those risks.
Security is the number one thing that every company needs, and with each massive breach this becomes more and more apparent. IT security is a multi-pronged approach and employs defense-in-depth principles. In this course, Architecture and Design for CompTIA Security+, you'll learn architecture and design for CompTIA Securty+. First, you'll start by learning the best practices and frameworks required for creating a secure environment. Next, you'll discover designing secure networks, honeypots, VPNs, firewalls, and various security infrastructure. Then, you'll explore the virtualization techniques, and how IaaS and PaaS, coupled with cloud technologies can increase security. Finally, you'll learn about the importance of physical security and how that can strengthen or weaken your overall security posture. By the end of this course, you'll have a better understanding of critical components to maintaining a successful security posture.
Organizations are constantly faced with the ongoing threat of breaches and data comprise from both internal and external threats. In this course, Identity and Access Management for CompTIA Security+, you'll learn the critical foundational concepts that form the building blocks of every company's information security posture. First, you'll explore the various methods of identification, authentication, and authorization, including the technologies that enable secure access to resources both locally and remotely. Next, you'll delve into the various technologies that enable identity and access management, including physical controls, group policy based controls, and biometric controls. Finally, you'll learn user account and access best practices, including various account types, account maintenance, and policy enforcement. By the end of this course, you'll have a better understanding of user account and access management, and you'll be able to take this knowledge into the Security+ exam.
Managing risk is a critical component of an organizations security posture. In this course, Risk Management for CompTIA Security+, you'll learn how to assess a company's risk across each area within IT. First, you'll explore the various methods used to assess risk like SLE, ALE, and ARO. Next, you'll learn the fundamentals of computer forensics, including maintaining chain of custody, legal holds, and data acquisition techniques. Finally, you'll discover the principals of disaster recovery, maintaining highly available infrastructure, and business continuity basics. By the end of the course, you'll understand what's required to assess an organization's operational risk, the methods used to conduct a forensic investigation, and how to keep a business operational leveraging disaster recovery and business continuity concepts.
Providing secure communication, access to data, and disposal of assets is no longer essential to every company's overall IT security plan. In this course, Cryptography and PKI for CompTIA Security+, you'll learn the various concepts and components that make up a company's Public Key Infrastructure (PKI). First, you'll delve into the basics of cryptography, including symmetric and asymmetric algorithms, and cipher types. Next, you'll explore the various methods to encrypt data and how to verify a file's integrity. Then, you'll discover how to secure wireless communication using encryption. Finally, you'll learn about the components that make up a PKI. By the end of this course, you'll have the information necessary to discuss and assess your company's PKI, wireless security posture, and identify gaps both internally and externally.
CompTIA recommends CompTIA Security+ candidates have a minimum of two years of experience in IT administration with a focus on security, day-to-day technical information security experience, and broad knowledge of security concerns and implementation. It’s also recommended that candidates hold the CompTIA Network+ certification or have the equivalent networking experience. This path does not require any prior knowledge or experience.