CompTIA Security+ (SY0-501 & SY0-601) Complete Course & Exam

CompTIA Security+ (SY0-501 & SY0-601) Complete Course & Exam

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 21.5 Hours | 20.2 GB

CompTIA Security+ (SY0-501 & SY0-601) Bootcamp – Your preparation for the world’s best cybersecurity certification!

Taught by a Best Selling IT Certification Instructor

COMPLETED UPDATED AND REDESIGNED FOR BOTH THE SY0-601 and SYO-501 EXAMS

Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.

You will learn the fundamentals of cyber security and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the exams.

This course is designed to help prepare you for the CompTIA Security+ (SY0-501) or the CompTIA Security (SY0-601) certification exam and covers all of the domains for both versions of the Security+ certification exam. So, don’t buy an outdated SY0-501 course, get the latest and greatest SY0-601 course for the world’s most popular cyber security certification today!

WAIT…what do you mean both versions of the exam?

Unlike other CompTIA Security+ courses that haven’t been updated for 3 years, this course was completely redesigned to cover the latest version of the CompTIA Security+ (SY0-601) that starts testing candidates in November 2020. From November 2020 until July 2021, candidates can choose to take the older 501 version or the brand new 601 version of the exam to earn their certification).

Which version should I take?

That is really up to you, but either way, this course has everything you need. If you decide to take the 501 version, simply skip the lessons marked with a ** in their title. If you are taking the 601, then you simply need to watch every lesson in this course. Personally, I recommend taking the 601 version since it has a larger focus on cloud computing, virtualization, and modern protection systems.

CompTIA Security+ (SY0-601):

  • Attacks, Threats, and Vulnerabilities
  • Architecture and Design
  • Implementation
  • Operations and Incident Response
  • Governance, Risk, and Compliance

CompTIA Security+ (SY0-501):

  • Threats, Attacks, and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI

What You Will Receive In The Course:

  • Video lectures with the essential information needed to pass the Security+ (SY0-501 and SY0-601) exams
  • A complete downloadable study guide in PDF format based on the lessons
  • Practice quizzes to ensure mastery of each section of the course
  • A full-length practice exam with multiple choice and mock simulations

What you’ll learn

  • Passing the CompTIA Security+ certification exam with confidence
  • Understand computer security, its functions, and its components
  • Performing basic security configurations
  • Become an effective security technician in a business environment
Table of Contents

Overview of Security
1 Welcome
2 Download the Study Guide
3 Overview of Security
4 CIA Triad
5 AAA of Security (OBJ 2.4)
6 Security Threats (OBJ 1.1 & 1.2)
7 Mitigating Threats (OBJ 5.1)
8 Hackers (OBJ 1.5)
9 Threat Actors (1.5)
10 Threat Intelligence and Sources (OBJ 1.5)
11 Threat Hunting (OBJ 1.7)
12 Attack Frameworks (OBJ 4.2)

Malware
13 Malware (OBJ 1.2)
14 Viruses (OBJ 1.2)
15 Worms (OBJ 1.2)
16 Trojans (OBJ 1.2)
17 Demo Viruses and Trojans (OBJ 1.2)
18 Ransomware (OBJ 1.2)
19 Spyware (OBJ 1.2)
20 Rootkits (OBJ 1.2 & 1.3)
21 Spam (OBJ 1.1)
22 Summary of Malware

Malware Infections
23 Malware Infections
24 Common Delivery Methods (OBJ 1.1 & 1.5)
25 Demo Phishing (OBJ 1.1 & 5.3)
26 Botnets and Zombies (OBJ 1.2 & 1.4)
27 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4)
28 Demo Privilege Escalation (OBJ 1.3 & 1.8)
29 Backdoors and Logic Bombs (OBJ 1.2)
30 Symptoms of Infection (OBJ 1.2)
31 Removing Malware (OBJ 4.2)
32 Preventing Malware (OBJ 1.6 & 3.2)
33 Malware Exploitation (OBJ 1.2 & 1.4)

Security Applications and Devices
34 Security Applications and Devices
35 Software Firewalls (OBJ 3.2)
36 Demo Software Firewalls (OBJ 3.2)
37 IDS (OBJ 3.2 & 3.3)
38 Pop-up Blockers (OBJ 1.1, 3.3, 4.4)
39 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4)
40 Securing the BIOS (OBJ 3.2)
41 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3)
42 Disk Encryption (OBJ 2.1, 2.8 & 3.2)
43 Endpoint Analysis (OBJ 3.1 & 3.3)

Mobile Device Security
44 Mobile Device Security (OBJ 1.5)
45 Securing Wireless Devices (OBJ 3.4 & 3.5)
46 Mobile Malware (OBJ 1.1 & 3.5)
47 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6)
48 Bluetooth Attacks (OBJ 1.4 & 3.4)
49 Mobile Device Theft (OBJ 3.5)
50 Security of Apps (OBJ 3.1 & 3.5)
51 BYOD (OBJ 3.5)
52 Hardening Mobile Devices (OBJ 3.5)

Hardening
53 Hardening (OBJ 3.2)
54 Unnecessary Applications (OBJ 1.6)
55 Restricting Applications (OBJ 3.2 & 4.4)
56 Demo Unnecessary Services (OBJ 3.2 & 3.3)
57 Trusted Operating System (OBJ 3.2)
58 Updates and Patches (OBJ 1.6 & 3.2)
59 Patch Management (OBJ 1.6 & 3.2)
60 Group Policies (OBJ 2.1)
61 Demo Group Policies (OBJ 3.2)
62 File Systems and Hard Drives (OBJ 2.1 & 3.2)

Suppy Chain Management
63 Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6)
64 Root of Trust (OBJ 3.2)
65 Trusted Firmware (OBJ 3.2)
66 Secure Processing (OBJ 3.2)

Virtualization
67 Virtualization (OBJ 2.2)
68 Hypervisors (OBJ 2.2)
69 Demo How to create a VM (OBJ 2.2)
70 Threats to VMs (OBJ 2.2)
71 Securing VMs (OBJ 2.2)
72 Demo Securing VMs

Application Security
73 Application Security
74 Web Browser Security (OBJ 3.2 & 3.3)
75 Web Browser Concerns (OBJ 3.2 & 3.3)
76 Demo Web Browser Configuration (OBJ 3.2 & 3.3)
77 Securing Applications (OBJ 1.4 & 3.2)

Secure Software Development
78 Software Development (OBJ 2.1 & 2.3)
79 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3)
80 Testing Methods (OBJ 2.3 & 3.2)
81 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6)
82 Buffer Overflows (OBJ 1.3)
83 Demo Buffer Overflow Attack (OBJ 1.3)
84 XSS and XSRF (OBJ 1.3)
85 SQL Injection (OBJ 1.3)
86 Demo SQL Injection (OBJ 1.2 & 1.3)
87 XML Vulnerabilities (OBJ 1.3)
88 Race Conditions (OBJ 1.3)
89 Design Vulnerabilities (OBJ 1.3)

Network Design
90 Network Security
91 The OSI Model (OBJ 3.3 & 3.6)
92 Switches (OBJ 1.4 & 2.7)
93 Routers (OBJ 3.3)
94 Network Zones (OBJ 3.3)
95 Jumpbox (OBJ 3.5)
96 Network Access Control (OBJ 3.3 & 4.4)
97 VLANs (OBJ 3.3)
98 Subnetting (OBJ 3.6)
99 Network Address Translation (OBJ 3.3)
100 Telephony (OBJ 3.1)

Perimeter Security
101 Perimeter Security
102 Firewalls (OBJ 3.3 & 4.4)
103 Demo SOHO Firewall (OBJ 3.3 & 4.4)
104 Proxy Servers (OBJ 3.3 & 4.4)
105 Honeypots and Honeynets (OBJ 2.1)
106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4)
107 NIDS and NIPS (OBJ 3.3)
108 Unified Threat Management (OBJ 3.2 & 3.3)

Cloud Security
109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6)
110 Cloud Types (OBJ 2.2 & 3.6)
111 As a Service (OBJ 2.2)
112 Cloud Security (OBJ 2.5 & 3.6)
113 Defending Servers (OBJ 1.7, 3.1, and 3.2)
114 Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6)
115 CASB (OBJ 2.1)
116 API (OBJ 2.1)
117 FAAS and Serverless (OBJ 2.2)
118 Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2)

Automation
119 Workflow Orchestration (OBJ 2.3)
120 CI CD (OBJ 2.3)
121 DevSecOps (OBJ 2.3)
122 IAC (OBJ 2.2)
123 Machine Learning (OBJ 1.2)

Network Attacks
124 Network Attacks (OBJ 1.4)
125 Ports and Protocols (OBJ 3.1)
126 Memorization of Ports (OBJ 3.1)
127 Unnecessary Ports (OBJ 1.6 & 3.2)
128 Denial of Service (OBJ 1.3 & 1.4)
129 DDoS (OBJ 1.2, 1.3, & 1.4)
130 Stopping a DDoS (OBJ 2.1 & 2.3)
131 Spoofing (OBJ 1.4 & 3.3)
132 Hijacking (OBJ 1.3 & 1.4)
133 Replay Attack (OBJ 1.3)
134 Demo Null Sessions (OBJ 1.6)
135 Transitive Attacks (OBJ 2.4)
136 DNS Attacks (OBJ 1.1, 1.4 & 3.1)
137 ARP Poisoning (OBJ 1.4)

Securing Networks
138 Securing Networks (OBJ 3.3)
139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7)
140 Securing Network Media (OBJ 2.7)
141 Securing WiFi Devices (OBJ 1.4 & 3.4)
142 Wireless Encryption (OBJ 1.6 & 3.4)
143 Wireless Access Points (OBJ 1.4 & 3.4)
144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8)
145 Demo Wireless Attack (OBJ 1.4)
146 WPA3 (OBJ 3.4)
147 Other Wireless Technologies (OBJ 1.4 & 3.5)

Physical Security
148 Physical Security (OBJ 2.7)
149 Surveillance (OBJ 2.7)
150 Door Locks (OBJ 2.7)
151 Demo Lock Picking (OBJ 2.7)
152 Biometric Readers (OBJ 2.4)

Facilities Security
153 Facilities Security (OBJ 2.7)
154 Fire Suppression (OBJ 2.7)
155 HVAC (OBJ 2.5, 2.6, & 2.7)
156 Shielding (OBJ 2.7)
157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7)
158 IoT Vulnerabilities (OBJ 2.6)
159 Embedded System Vulnerabilities (OBJ 2.6)
160 ICS and SCADA Vulnerabilities (OBJ 2.6)
161 Mitigating Vulnerabilities (OBJ 2.6)
162 Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6)

Authentication
163 Authentication (OBJ 2.4, 3.5, & 3.8)
164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9)
165 x (OBJ 3.4 & 3.8)
166 LDAP and Kerberos (OBJ 3.1 & 3.8)
167 Remote Desktop Services (OBJ 3.1)
168 Remote Access Service (OBJ 3.1 & 3.8)
169 VPN (OBJ 3.3)
170 RADIUS vs TACACS+ (OBJ 3.8)
171 Authentication Summary (OBJ 3.8)
172 Authentication Attacks (OBJ 1.2)

Access Control
173 Access Control (OBJ 3.8)
174 Access Control Models (OBJ 3.8)
175 Best Practices (OBJ 2.7, 3.8, & 5.3)
176 Users and Groups (OBJ 3.7 & 3.8)
177 Permissions (OBJ 3.8)
178 Usernames and Passwords (OBJ 1.6 & 3.7)
179 Demo Policies (OBJ 3.7)
180 User Account Control (OBJ 3.7 & 3.8)

Risk Assessments
181 Risk Assessments (OBJ 5.4)
182 Qualitative Risk (OBJ 5.4)
183 Quantitative Risk (OBJ 5.4)
184 Methodologies (OBJ 1.7 & 5.4)
185 Security Controls (OBJ 5.1)
186 Types of Risk (OBJ 1.6 & 5.4)

Vulnerability Management
187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4)
188 Penetration Testing (OBJ 1.8)
189 Training and Exercises (OBJ 1.8 & 4.2)
190 OVAL (OBJ 1.7)
191 Vulnerability Assessments (OBJ 1.7 & 4.1)
192 Demo Nmap Scanning (OBJ 4.1)
193 Demo Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3)
194 Password Analysis (OBJ 1.2)
195 Demo Password Cracking (OBJ 4.1)

Monitoring and Auditing
196 Monitoring Types (OBJ 3.3)
197 Performance Baselining (OBJ 2.1)
198 Protocol Analyzers (OBJ 3.3 & 4.1)
199 SNMP (OBJ 3.1)
200 Demo Analytical Tools (OBJ 4.1)
201 Auditing (OBJ 1.7)
202 Demo Auditing Files (OBJ 1.7)
203 Logging (OBJ 1.7, 4.3, & 4.5)
204 Log Files (OBJ 4.3)
205 SIEM (OBJ 1.7 & 4.3)
206 Syslog (OBJ 1.7 & 4.3)
207 SOAR (OBJ 1.7 & 4.4)

Cryptography
208 Cryptography (OBJ 2.1 & 2.8)
209 Symmetric vs Asymmetric (OBJ 2.8)
210 Symmetric Algorithms (OBJ 2.8)
211 Public Key Cryptography (OBJ 2.8)
212 Asymmetric Algorithms (OBJ 2.8)
213 Pretty Good Privacy (OBJ 2.8)
214 Key Management (OBJ 2.8)
215 One-Time Pad (OBJ 2.8)
216 Demo Steganography (OBJ 2.8)
217 Cryptography Considerations (OBJ 2.8)

Hashing
218 Hashing (OBJ 1.2, 2.8 & 3.2)
219 Demo Hashing (OBJ 2.8)
220 Hashing Attacks (OBJ 1.2,1.3, & 2.8)
221 Increasing Hash Security (OBJ 2.8 & 3.7)

Public Key Infrastructure
222 Public Key Infrastructure (OBJ 3.1, 3.3, & 3.9)
223 Digital Certificates (OBJ 3.9)
224 Demo Certificates (OBJ 2.8 & 3.9)
225 Certificate Authorities (OBJ 3.2 & 3.9)
226 Web of Trust (OBJ 3.9)

Security Protocols
227 Security Protocols (OBJ 3.1)
228 S MIME (OBJ 3.1)
229 SSL and TLS (OBJ 1.2, 2.1, 3.1, & 3.3)
230 SSH (OBJ 3.1 & 4.1)
231 VPN Protocols (OBJ 3.1 & 3..3)
232 Demo Setting up a VPN (OBJ 3.3)

Planning for the Worst
233 Planning for the Worst (OBJ 2.5 & 5.4)
234 Redundant Power (OBJ 2.5)
235 Backup Power (OBJ 2.5)
236 Data Redundancy (OBJ 2.5)
237 Demo RAIDs (OBJ 2.5)
238 Network Redundancy (OBJ 2.5)
239 Server Redundancy (OBJ 2.5 &3.3)
240 Redundant Sites (OBJ 2.1)
241 Data Backup (OBJ 2.5)
242 Tape Rotation (OBJ 2.5)
243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4)
244 Business Impact Analysis (OBJ 5.4)

Social Engineering
245 Social Engineering (OBJ 1.1)
246 Demo Pretexting (OBJ 1.1 & 5.3)
247 Insider Threat (OBJ 1.5)
248 Phishing (OBJ 1.1 & 5.3)
249 Motivation Factors (OBJ 1.1)
250 More Social Engineering (OBJ 1.1 & 1.2)
251 Fraud and Scams (OBJ 1.1)
252 Influence Campaigns (OBJ 1.1)
253 User Education (OBJ 5.3)

Policies and Procedures
254 Policies and Procedures (OBJ 5.2 & 5.3)
255 Data Classifications (OBJ 5.3 & 5.5)
256 Data Ownership
257 PII and PHI (OBJ 5.2 & 5.5)
258 Legal Requirements (OBJ 5.2 & 5.5)
259 Privacy Technologies (OBJ 5.5)
260 Security Policies (OBJ 5.3 & 5.5)
261 User Education (OBJ 5.3)
262 Vendor Relationships (OBJ 5.3)
263 Disposal Policies (OBJ 2.7 & 4.1)
264 IT Security Frameworks (OBJ 5.2)
265 Key Frameworks (OBJ 5.2)

Incident Response and Forensics
266 Incident Response Procedures (OBJ 4.2)
267 Incident Response Planning (OBJ 4.2)
268 Investigative Data (OBJ 4.3)
269 Forensic Procedures (OBJ 4.5)
270 Data Collection Procedures (OBJ 4.1 & 4.5)
271 Demo Disk Imaging (OBJ 4.1)
272 Security Tools (OBJ 4.1)

Conclusion
273 Conclusion
274 BONUS What’s Next

Practice Exam