CompTIA Security+ (SY0-701)

Video description

This course begins with core cybersecurity concepts, creating a solid base for in-depth security management study. It dives into security principles, authentication factors, and control types, establishing fundamental cybersecurity knowledge.

The course covers topics such as Zero Trust, physical security, and encryption complexities, including Public Key Infrastructure and digital certificates. The course also explores the diverse threat landscape, from social engineering to cloud and virtualization vulnerabilities, providing a comprehensive understanding of cyber threats.

The course investigates various attack indicators, like malware and network attacks, boosting your threat identification and response capabilities. Key security infrastructure elements, including firewalls and secure communication, are discussed. The course also emphasizes practical applications in identity and access management, wireless security, and network device security. Vulnerability analysis and digital forensics are examined, readying you for both proactive and reactive cybersecurity roles.

Concluding with governance, risk management, and compliance, this course prepares you for real-world cybersecurity challenges, making it a crucial tool for aspiring professionals.

What you will learn

  • Understand security control categories
  • Learn Zero Trust and physical security
  • Explore encryption and PKI solutions
  • Identify and mitigate digital threats
  • Secure networks and communication
  • Implement comprehensive cybersecurity measures

Audience

This course is ideal for IT professionals, security analysts, network administrators, and anyone aspiring to specialize in cybersecurity. A foundational understanding of IT and basic security concepts is recommended. The course is perfect for those seeking to enhance their cybersecurity skills and apply them in various IT and network security roles.

About the Authors

ACI Learning: ACI Learning train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, they're with you every step of the way.

Wes Bryan: Wes Bryan, our Edutainer, began his IT journey in 2009 and transitioned into IT instruction. He earned global teaching awards three times during his early teaching years and holds certifications including CompTIA A+, Network+, Security+, Server+, Cloud+, CySA+, MCSA, MTA, MCTS, MCP, MS, and MCT.

Anthony Sequeira: Anthony Sequeira, our Edutainer, boasts a robust IT career since 1996 and a love for technology from various vendors. His extensive certifications cover CCIE R&S #15626, AWS, Cisco, CompTIA, Juniper, and Microsoft.

Daniel Lowrie: Daniel Lowrie, our show host, shifted to IT education after successful roles as a systems administrator and network administrator. His certifications include CompTIA A+, Network+, Linux+, CySA+, PenTest+, CEH, MCSA, CFR, and eJPT.

Sophie Goodwin: Sophie Goodwin, with 8+ years of experience as a film and voice talent, enriches our team with on-camera and voice-over expertise spanning eLearning content, independent films, TV & web commercials, and video games. Her qualifications include a Bachelor of Science in Telecommunication and (ISC)² CC certification in Cybersecurity.

Table of contents

  1. Chapter 1 : Course Overview
    1. Course Overview
  2. Chapter 2 : General Security Concepts
    1. Examining Security Control Categories
    2. Examining Security Control Types
    3. Examining the Principles of Security
    4. Examining Authentication Factors
    5. Examining Authorization and Access Control Models
    6. Examining Authentication, Authorization, and Accounting (AAA)
    7. Examining the Principles of Zero Trust
    8. Examining Physical Security
    9. Examining Deception and Disruption Technology
    10. Business Processes and Security Operations
    11. Change Management Implications Documentation
    12. Examining Encryption Solutions
    13. Examining Public Key Infrastructure (PKI)
    14. Examining Digital Certificates
    15. Examining Asymmetric Encryption
    16. Examining Symmetric Encryption
    17. Examining Hashing and Obfuscation
  3. Chapter 3 : Threats, Vulnerabilities, and Mitigation
    1. Threat Actors
    2. Social Engineering
    3. Business Email Compromise
    4. Digital System Threats
    5. Network Based Threats
    6. Removable Media Threats
    7. Supply Chain Attacks
    8. Application Vulnerabilities
    9. Operating System Vulnerabilities
    10. Web Based Vulnerabilities
    11. Hardware Vulnerabilities
    12. Cloud Vulnerabilities
    13. Virtualization Vulnerabilities
    14. Cryptographic Vulnerabilities
    15. Mobile Device Vulnerabilities
    16. Zero Day Vulnerabilities
    17. Indicators of Malware Attacks
    18. Indicators of Physical Attacks
    19. Indicators of Network Attacks
    20. Indicators of Application Attacks
    21. Indicators of Cryptographic Attacks
    22. Indicators of Password Attacks
    23. Cybersecurity Mitigation Techniques
  4. Chapter 4 : Security Architecture
    1. Cloud-Related Concepts
    2. Network Infrastructure Concepts
    3. Virtualization Concepts
    4. IoT and SCADA
    5. Architectural Model Considerations
    6. Security Infrastructure Considerations
    7. Network Appliances
    8. Port Security
    9. Firewall Types
    10. Secure Communication and Access
    11. Selecting Effective Controls
    12. Data Types
    13. Data Classifications
    14. Data Considerations
    15. Methods to Secure Data
    16. HA and Site Considerations
    17. Platform Diversity and Multi-Cloud Systems
    18. Continuity of Operations and Capacity Planning
    19. Testing
    20. Backups
    21. Power
  5. Chapter 5 : Security Operations
    1. Examining Identity and Access Management
    2. Examining Wireless Security
    3. Examining Operating System Security
    4. Examining Firewalls and Intrusion Detection Devices
    5. Examining Password Security
    6. Examining Web Filtering
    7. Examining the Incident Response Process and Activities
    8. Examining Endpoint Detection and Response (EDR)
    9. Examining Single Sign-on
    10. Examining Secure Network Protocols and Services
    11. Examining Automation and Scripting Uses
    12. Examining Asset Management
    13. Examining Privileged Identity Management
    14. Examining Application Security
    15. Examining Investigation Data Sources and Log Data
    16. Examining Security for Mobile Devices
    17. Examining Vulnerability Analysis
    18. Examining Digital Forensics Activities
    19. Vulnerability Response, Remediation and Reporting
    20. Examining Security Baselines and Hardening
    21. Examining User Onboarding and Offboarding
    22. Examining Email Security
    23. Examining Security Monitoring and Alerting
    24. Identifying Vulnerabilities
  6. Chapter 6 : Security Programs Management and Oversight
    1. Guidelines and Policies
    2. Standards and Procedures
    3. External Considerations and Revisions
    4. Governance Structures
    5. Roles and Responsibilities
    6. Risk Identification and Assessment
    7. Risk Analysis
    8. Risk Register, Tolerance, and Appetite
    9. Risk Management Strategies
    10. Risk Reporting And BIA
    11. Vendor Assessment and Selection
    12. Agreement Types
    13. Additional Vendor Considerations
    14. Compliance
    15. Compliance Monitoring
    16. Privacy
    17. Attestation
    18. Audits
    19. Penetration Testing
    20. Phishing
    21. Anomalous Behavior Recognition
    22. User Guidance and Training
    23. Reporting and Monitoring
    24. Development and Execution

Product information

  • Title: CompTIA Security+ (SY0-701)
  • Author(s): ACI Learning, Wes Bryan, Anthony Sequeira, Daniel Lowrie, Sophie Goodwin
  • Release date: December 2023
  • Publisher(s): Packt Publishing
  • ISBN: 9781835881446