Library

Course: CompTIA Security+ Certification (SY0-401): The Total Course

CompTIA Security+ Certification (SY0-401): The Total Course

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
About this Course

Welcome to the CompTIA Security+ Certification; SY0-401. The Total Course from Mike Meyers and Total Seminars.

This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-401 Exam. The first goal of the course is to make you a good IT security tech and in the process make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.

The course covers all the CompTIA Security+ SY0-401 Objective Domains:

  • Network Security: 20%
  • Compliance and Operational Security: 18%
  • Threats and Vulnerabilities: 20%
  • Application, Data and Host Security: 15%
  • Access Control and Identity Management: 15%
  • Cryptography: 12%

Topics include:

  • Risk management
  • Cryptography
  • Authentication and authorization
  • Host, LAN, and application security
  • Wireless, cloud and mobile security
  • Environmental and personnel security and controls

This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.

Who is the target audience?

  • This course is intended for anyone that is preparing for an IT Security position or looking to improve their security skills and become CompTIA Security+ Certified. However, it goes beyond that and will give you the skills you need to be a better security tech on the job
Basic knowledge
  • Basic familiarity with PCs and networks
  • There are no specific prerequisites as the course covers all the topics in detail
  • It is a good idea to have an understanding of CompTIA A+ and Network+ or to be certified in these topics. You can learn more about these certifications from our Mike Meyers – Total Seminars CompTIA A+ and Network+ Certification courses on Simpliv
What you will learn
  • This is a complete and comprehensive CompTIA Security+ Certification; SY0-401 course. It is designed to prepare the student to be able to take and pass the exam to become CompTIA Security+ Certified
  • Once you complete the course you will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech. This course is ideal as both a study tool and an on-the-job reference
  • Your new skills and the CompTIA Security+ Certification will help you land a great It security tech job or if you are already a security tech, get that raise or advancement you are after
Curriculum
Lectures quantity: 87
Common duration: 13:41:36
The CompTIA Security+ Exam
  • Introduction to CompTIA Security+ Exam SY0-401  

    In this introduction to the CompTIA Security+ exam, Mike explains what the exam is all about and the focus of IT security.

    Download the CompTIA Security+ objectives attached to this lecture.

  • The Security+ Exam basics  

    In this episode, Mike describes the CompTIA Security+ exam objectives and explains in broad terms what is covered in each of them.

  • Passing the Security+ Exam  

    In this episode, Mike outlines a study strategy for success on the CompTIA Security+ exam.

Stepping Up to IT Security
  • The CIA of Security  

    In this episode, Mike discusses the CIA goals of security: confidentiality, integrity, and availability.

  • Security Controls  

    In this episode, Mike explains the three categories of security controls.

  • Interesting Security Controls  

    In this episode, Mike discusses other related security controls.

  • IT Security Governance  

    In this episode, Mike explains the concept of security governance: policies, standards, and procedures.

  • Security Policies  

    In this episode, Mike addresses various examples of security policies.

  • What is Risk?  

    In this episode, Mike explains risk and related concepts.

  • Managing Risk  

    In this episode, Mike explains the terms and processes to manage risk.

  • Quantitative Risk Calculations  

    In this episode, Mike looks at the impact of risk.


Core Security Concepts
  • Cryptography Basics  

    In this episode, Mike presents the concept of basic cryptography methods.

  • Hashing  

    In this episode, Mike shows how a hash provides integrity to data.

  • Hash-based Message Authentication Code - HMAC  

    In this episode, Mike explains how hashing can improve message security.

  • Symmetric Algorithms  

    In this episode, Mike describes encrypting and decrypting data with the same key.



  • Asymmetric Algorithms  

    In this episode, Mike shows that encrypting and decrypting can be done with different keys.

  • Secure Applications and Protocols  

    In this episode, Mike looks at Internet processes that have built-in encryption.

  • Steganography  

    In this episode, Mike illustrates that information can be hidden within other data.

  • Certificates and Trust  

    In this episode Mike explains certificates and how they are used to establish trust.

  • Public Key Infrastructure  

    In this episode, Mike discusses the public key infrastructure (PKI), used to enable commerce and other secure activities over the Internet.

Authentication and Authorization
  • Identification and Authentication  

    In this episode, Mike explains the issues of proving that you are who you are.


  • Understanding Authorization  

    In this episode, Mike explores methods used for authorization, enabling clients to do stuff with resources properly.

  • Authentication Methods  

    In this episode, Mike discusses common protocols used to identify proper users, such as PAP, CHAP, Kerberos, LDAP, and more.

  • AAA  

    In this episode, Mike explores two common methods used for AAA, RADIUS and TACACS+.


  • Linux File Permissions  

    In this episode, Mike looks at how to control access to files in a Linux system.


  • Windows File Permissions  

    Windows File Permissions

  • Single Sign On  

    In this episode, Mike describes how to log in to one computer and gain access to many.

  • Password Security  

    In this episode, Mike shows methods to keep passwords secure.

  • Account Issues  

    In this episode, Mike discusses the security of user accounts.

Host Security
  • Host Threats  

    In this episode, Mike looks at some of the things that threaten computers and users.

  • Malware  

    In this episode, Mike talks about types of malware and what they do.

  • Cryptographic Attacks  

    In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.

  • Man-in-the-Middle  

    In this episode, Mike shows attacks where bad actors function between encrypting hosts.

  • Denial of Service  

    In this episode, Mike discusses attacks that prevents servers from providing their essential services.

  • Host Hardening  

    In this episode, Mike talks about techniques to protect a host computer from threats.

  • Network Models  

    In this episode, Mike looks at the conceptual structure of networks.

  • Know your protocols-TCP/IP  

    In this episode, Mike discusses the elements of TCP/IP networking.

  • Know your protocols-Applications  

    In this episode, Mike reviews common applications, protocols, and port numbers.

  • Transport Layer Security - TLS  

    In this episode, Mike presents the elements of Transport Layer Security.

  • IPsec  

    In this episode, Mike addresses IPsec, the first standardized Internet encryption.

  • NAS and SAN  

    In this episode, Mike discusses secure methods to save and access data on a network device.

  • RAID Security  

    In this episode, Mike explores using multiple disks to improve reliability and performance.

  • Securing Data  

    In this episode, Mike explains how to ensure that stored data is safe from physical loss.

  • Disk Encryption  

    In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.

  • Static Hosts  

    In this episode, Mike looks at network-aware devices, appliances, and industrial systems.

LAN Security
  • LAN Security Review  

    In this episode, Mike reviews elements of local area networks.

  • Access Control Lists  

    In this episode, Mike discusses how to govern access to resources.


  • Proxy Servers  

    In this episode, Mike presents the functions of proxy servers.

  • IDS vs. IPS  

    In this episode, Mike addresses the difference between detecting network intruders and preventing intrusions.


  • Network Access Control  

    Network Access Control

  • Virtual Private Networks  

    Virtual Private Networks

  • SNMP  

    SNMP

  • Logs  


    Logs

Application Security
  • Attacking Applications  

    Attacking Applications

  • Attacking Websites  

    Attacking Websites

  • Hardening Web Servers  

    Hardening Web Servers

  • Internet Service Hardening  

    Internet Service Hardening

  • Virtualization Basics  

    Virtualization Basics

  • Virtual Security  

    Virtual Security

Wireless Security
  • Wireless Review  

    Wireless Review

  • Living in Open Networks  

    Living in Open Networks

  • Fun with Access Points  

    Fun with Access Points

  • Cracking 802.11 Part 1 - WEP  

    In this episode Mike talks about WEP wireless security attacks and methods for cracking WEP passwords.

  • Cracking 802.11 Part 2 - WPA  

    In this episode Mike talks about WPA and WPA2 wireless security attachs and methods for cracking WPA passwords.



  • Cracking 802.11 Part 3 - WPS  

    In this episode Mike talks about WPS wireless security attacks and methods for cracking WPS passwords.


  • Wireless Hardening  

    Wireless Hardening

Physical Security
  • RFI, EMI, ESD  

    RFI, EMI, ESD

  • HVAC  

    HVAC


  • Fire Suppression  

    Fire Suppression

  • Classifying Security Controls  


    Classifying Security Controls

  • Physical Controls  

    Physical Controls

Outside Security
  • Third Party Agreements  

    In this episode, Mike discusses types and the importance third-party agreements and how they affect IT security

  • Infrastructure as a Service (IaaS)  

    In this episode, Mike explores devices and purposes involved in IaaS.

  • Platform as a Service (PaaS)  

    In this episode, Mike describes the purpose of devices used to set up PaaS infrastructures.

  • Software as a Service (SaaS)  

    Software as a Service (SaaS)

  • Deploying Mobile Devices  

    In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.


  • Mobile Device Management  

    In this episode, Mike goes through the various device and application level management that can take place on mobile devices

People Security
  • Social Engineering Principles  

    In this episode, Mike explores many aspects of attacks designed to use people to exploit resources.

  • Social Engineering Attacks  

    In this episode, Mike describes specific attack vectors and potentials that manipulate people and circumstances to access or destroy information.

  • Security Training  

    In this episode, Mike goes through the controls and roles that make security training work.


Proactive Security
  • Vulnerability Scanning Tools  

    In this episode, Mike delves into the world of vulnerability tools and how they work.

  • Vulnerability Assessment  

    In this episode, Mike discusses the importance of and what takes place during vulnerability assessments.

  • Penetration (Pen) Testing  

    In this episode, Mike discusses the ins and outs of penetration testing.

  • Incident Response  

    In this episode, Mike discusses the steps involved in incident response.

  • Forensic Procedures  

    In this episode, Mike clues us in on how to properly collect and preserve data when incidents happen or legal inquiries are made.

  • Contingency Planning  

    In this episode, Mike explains the thought processes necessary to create an effective contingency plan.

  • Backups  

    In this video, Mike describes the when, why and how of backups.

Reviews (0)