CompTIA Security+ SY0-401

Get the Security+ certification to show that you have the skills to secure a network & deter hackers

4.25 (44 reviews)
Udemy
platform
English
language
IT Certification
category
411
students
8 hours
content
Mar 2017
last update
$39.99
regular price

What you will learn

The Security+ provides a good general nuts-and-bolts survey of modern information security topics, tools, techniques, and best practices.

Description

CompTIA's Security+ is a vendor-neutral certification that validates the competency of security professionals working in the IT industry. The Security Plus Certification confirms a technician's critical knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. Because human error is the number one cause for a network security breach, CompTIA Security+ is recognized by the technology community as a valuable credential that proves competency with information security.

The CompTIA Security+ Certification Training Course measures the necessary competencies for an IT professional with approximately two years networking experience. Students will learn the knowledge and skills needed to protect your business from the theft or destruction of information or disruption of communication.

This Security Plus training course follows the CompTIA authorized curriculum, ensuring you receive the training and knowledge needed to succeed.

  • Security+ is government approved
  • Security+ is globally recognised
  • Security+ provides substantial earnings potential 
  • Security+ is industry supported

Content

Course Introduction

Introduction

Module 1:General Security Concepts

General Security Concepts
Security+ Exam Domains
Basic Terminology
Additional Security Goals
Host Security
Additional Security Concepts
Module Close

Module 2: Organizational Security

Organizational Security
What is a Security Program
Operational Process
Password Policies
Demo - Password Policies
Social Engineering
Security Policies
Concepts the Support Policies
Human Resources Policies
Module Close

Module 3:Privacy, Ethics and Legal issues

Privacy, Ethics and Legal issues
Cybercrime
Reactions to Cybercrime Part1
Reactions to Cybercrime Part2
Module Close

Module 4 Cryptography

Cryptography
Cryptography Explained
Ciphers
Cryptographic Math and Hashing
Algorithms and Encryption Part1
Algorithms and Encryption Part2
Algorithms and Encryption Part3
Symmetric and Asymmetric Working Together
Digital Signatures
Module Close

Module 5: Public Key Infrastructure

Public Key Infrastructure
Basics of Public Key Infrastructures
Certificate Hierarchies
Trust and Certificate Verification
Types of Certificates and Extensions
Certificate Revocation List
Key Protection
Key Recovery
Trust Models
Module Close

Module 6 Standards and Protocols

Standards and Protocols
Standards and Protocols Supporting PKI
SSL and TLS
S/MIME
IPsec
Common Criteria - CC
Module Close

Module 7 Physical Security

Physical Security
Physical Security Measures
Access Controls and Monitoring
Biometrics
Module Close

Module 8 Infrastructure Security

Infrastructure Security
Infrastructure Security - Printers and Workstations
Servers and Devices
VLANs and Firewalls
Securing Wireless Access Points
VPN - Network Access Control
Network Monitoring
Handling Big Data and Physical Security
Security Zones, VLANs and NAT
Virtualization and Cloud Computing
Module Close

Module 9 Authentication and Remote Access

Authentication and Remote Access
Remote Access and Kerberos
Alternatives to Passwords
Other Protocols
Federated Authentication
HOTP and TOTP
Remote Access Protocols Authentication
Module Close

Module 10 Wireless Security

Wireless Security
Wireless Networking
Bluetooth
Controlling the Radio Waves
WPA Encryption
Module Close

Module 11 Intrusion Detection Systems

Intrusion Detection Systems
Intrusion Detection Systems - HIDs
HIDs Advancements and Anti-Virus
Demo - Windows Defender
Network-Based IDSs
Content-Based Signatures and Proxy Servers
Protocol Analyzers
Anti-Spam Techniques
Module Close

Module 12 Security Baselines

Security Baselines
Overview of Baselines
Operating System Hardening
Demo - Windows Update
Network Hardening
Application Hardening and Patch Management Part1
Application Hardening and Patch Management Part2
Module Close

Module 13 Attacks and Malicious Software

Attacks and Malicious Software
Avenues of Attack
Minimizing Possible Avenues of Attack
DDOS Mitigation
Null Sessions and Privilege Escalation
IP Address Spoofing
Replay Attacks and TCP/IP Hijacking
Password Attacks and Software Exploitation
Viruses
Other Malware
Module Close

Module 14 E-mail and Instant Messaging

E-mail and Instant Messaging
End User Issues with Email
Enterprise Mitigation Techniques
Module Close

Module 15 Web Components

Web Components
Web Components and Concerns
HTTP and HTTPS
Code-Based Vulnerabilities
Mitigations and Cookies
Application-Based Weaknesses
Module Close

Module 16 Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity
Disaster Recovery
Backups
Storage Considerations
Raid
Module Close

Module 17 Risk Management

Risk Management
Risk Management Key Terms
Risk Management Process
General Risk Management Model
Software Engineering Institute Model
Common Objective Approach
Security Integration Issues with Third Parties
Module Close

Module 18 Change Management

Change Management
Change Management Procedures
Change Management Workflow
Maintaining Code Integrity
Module Close

Module 19 Privilege Management

Privilege Management
Privilege Management Details
Centralized Management
Access Control Models
Module Close

Module 20 Computer Forensics

Computer Forensics
Computer Forensics and Evidence
The Investigative Process
Module Close

Screenshots

CompTIA Security+ SY0-401 - Screenshot_01CompTIA Security+ SY0-401 - Screenshot_02CompTIA Security+ SY0-401 - Screenshot_03CompTIA Security+ SY0-401 - Screenshot_04

Reviews

John
January 2, 2018
I don't think the presenter has even read the CompTIA objectives. The modules do not align with the objectives. He simply skims over topics and the slides\graphics are very simplistic.
Steven
October 31, 2017
The first three modules of this course made me laugh out loud on several occasions. I don't think a course on computer security ought to do that unless it's an intentional part of the instructor's delivery. This was not. For example, I was too busy laughing at such cringe worthy statements such as the observation that legislation is produced by "some kind of body" to be annoyed by the instructor's embrace of the journalistic use of the word "hacker". Perhaps it's because I am writing the night before Halloween, but I found myself wondering about the state of decomposition of that legislative body. The structure and presentation of this course reminds me of some of the senior level seminars I endured as an undergraduate student lo these many years ago. There may well be merit in later modules in the course, but I'm too impatient to wait to find out. Mercifully, Udemy's refund policy was made for situations such as this.
Trae
August 17, 2017
It's purely lecture but the topics are well covered. The speaker is interesting and has an engaging voice that keeps the material flowing in short concise modules. Do not rely solely on this course to pass the test. This is a good start but only covers the very basics of what to expect on the exam.
Tenzing
August 17, 2017
So far the information is great. This being my first time learning about secuirty+ i'm learning a lot of valuable information/terms.
Harrison
May 26, 2017
20% through and enjoying it! This guy has a soothing voice which isn't a bad thing actually helps me remember stuff
Jp
May 7, 2017
I have over 14 years experience in the I.T. industry and 2 years as a Security Risk Analyst. I find this video very helpful especially if you have the IT background already and would like to take the Security + certification.

Charts

Price

CompTIA Security+ SY0-401 - Price chart

Rating

CompTIA Security+ SY0-401 - Ratings chart

Enrollment distribution

CompTIA Security+ SY0-401 - Distribution chart

Related Topics

985094
udemy ID
10/15/2016
course created date
1/5/2022
course indexed date
Bot
course submited by