CompTIA Security+ (SY0-701)
30 H 19 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Course Overview
- Course Overview
- General Security Concepts
- Examining Security Control Categories
- Examining Security Control Types
- Examining the Principles of Security
- Examining Authentication Factors
- Examining Authorization and Access Control Models
- Examining Authentication, Authorization, and Accounting (AAA)
- Examining the Principles of Zero Trust
- Examining Physical Security
- Examining Deception and Disruption Technology
- Business Processes and Security Operations
- Change Management Implications & Documentation
- Examining Encryption Solutions
- Examining Public Key Infrastructure (PKI)
- Examining Digital Certificates
- Examining Asymmetric Encryption
- Examining Symmetric Encryption
- Examining Hashing and Obfuscation
- Threats, Vulnerabilities, and Mitigation
- Threat Actors
- Social Engineering
- Business Email Compromise
- Digital System Threats
- Network Based Threats
- Removable Media Threats
- Supply Chain Attacks
- Application Vulnerabilities
- Operating System Vulnerabilities
- Web Based Vulnerabilities
- Hardware Vulnerabilities
- Cloud Vulnerabilities
- Virtualization Vulnerabilities
- Cryptographic Vulnerabilities
- Mobile Device Vulnerabilities
- Zero Day Vulnerabilities
- Indicators of Malware Attacks
- Indicators of Physical Attacks
- Indicators of Network Attacks
- Indicators of Application Attacks
- Indicators of Crypographic Attacks
- Indicators of Password Attacks
- Cybersecurity Mitigation Techniques
- Security Architecture
- Cloud-Related Concepts
- Network Infrastructure Concepts
- Virtualization Concepts
- IoT and SCADA
- Architectural Model Considerations
- Security Infrastructure Considerations
- Network Appliances
- Port Security
- Firewall Types
- Secure Communication and Access
- Selecting Effective Controls
- Data Types
- Data Classifications
- Data Considerations
- Methods to Secure Data
- HA and Site Considerations
- Platform Diversity and Multi-Cloud Systems
- Continuity of Operations and Capacity Planning
- Testing
- Backups
- Power
- Security Operations
- Examining Identity and Access Management
- Examining Wireless Security
- Examining Operating System Security
- Examining Firewalls and Intrusion Detection Devices
- Examining Password Security
- Examining Web Filtering
- Examining the Incident Response Process and Activities
- Examining Endpoint Detection and Response (EDR)
- Examining Single Sign-on
- Examining Secure Network Protocols and Services
- Examining Automation and Scripting Uses
- Examining Asset Management
- Examining Privileged Identity Management
- Examining Application Security
- Examining Investigation Data Sources and Log Data
- Examining Security for Mobile Devices
- Examining Vulnerability Analysis
- Examining Digital Forensics Activities
- Vulnerability Response, Remediation and Reporting
- Examining Security Baselines and Hardening
- Examining User Onboarding and Offboarding
- Examining Email Security
- Examining Security Monitoring and Alerting
- Identifying Vulnerabilities
- Security Programs Management and Oversight
- Guidelines and Policies
- Standards and Procedures
- External Considerations and Revisions
- Governance Structures
- Roles and Responsibilities
- Risk Identification and Assessment
- Risk Analysis
- Risk Register, Tolerance, and Appetite
- Risk Management Strategies
- Risk Reporting And BIA
- Vendor Assessment and Selection
- Agreement Types
- Additional Vendor Considerations
- Compliance
- Compliance Monitoring
- Privacy
- Attestation
- Audits
- Penetration Testing
- Phishing
- Anomalous Behavior Recognition
- User Guidance and Training
- Reporting and Monitoring
- Development and Execution
Course Overview
5 M



- Episode Description
- Transcript
This course is designed to equip you with the knowledge and skills required to excel in the dynamic field of cybersecurity and achieve the CompTIA Security+ certification. In this course, you will learn how to assess the security posture of an enterprise environment, enabling you to recommend and implement appropriate security solutions. You will delve into the intricacies of monitoring and securing hybrid environments, covering cloud, mobile, and Internet of Things (IoT) technologies. Our expert instructors will guide you through the essential principles of governance, risk, and compliance, ensuring you operate with a keen awareness of applicable regulations and policies. Moreover, you will gain proficiency in identifying, analyzing, and responding to security events and incidents, a crucial skillset in the ever-evolving world of cybersecurity. By the end of this course, you will not only be prepared to ace the CompTIA Security+ certification exam but also be well-equipped to tackle real-world security challenges and secure vital systems and data. Join us on this educational journey, and take the first step toward a fulfilling career in cybersecurity.