CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide

Video description

Embark on a transformative journey with our exhaustive CompTIA Security+ Training Guide, meticulously designed to pave your path from a cybersecurity enthusiast to a certified expert. This extensive course is your ultimate roadmap to mastering the wide-ranging concepts of information security, from the foundational cybersecurity frameworks to the advanced mechanisms of risk management.

Each section unfolds progressively, allowing you to build upon your knowledge through engaging lessons that cover essential security roles, threat types, cryptographic solutions, and much more. As cyber threats grow more sophisticated, the demand for professionals equipped with comprehensive and advanced skills has skyrocketed. Our course not only delves into theoretical knowledge but also provides hands-on practical scenarios to solidify your understanding. With over 30 hours of expert content, you'll learn the intricacies of securing networks, managing vulnerabilities, and ensuring resilience in the face of digital threats.

By the end of this course, you'll not just be prepared to ace the CompTIA Security+ exams but also to tackle real-world security challenges with confidence and expertise.

What you will learn

  • Summarize fundamental security concepts to build a strong base.
  • Compare various threat types to better understand security breaches.
  • Explain cryptographic solutions to secure organizational data.
  • Implement robust identity and access management controls.
  • Secure enterprise and cloud network architectures against potential threats.
  • Enhance application security capabilities and ensure software integrity.

Audience

This course is tailored for IT professionals eager to climb the cybersecurity career ladder, entry-level individuals ready to step into the security arena, and students focused on carving out a future in information security. It's also the perfect starting point for anyone seeking to build a solid foundation in cybersecurity principles, offering the knowledge and credentials needed to thrive in this dynamic field.

About the Author

Alexander Oni : Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.

Table of contents

  1. Chapter 1 : Welcome to the Course SY0-701
    1. Introduction to the CompTIA Security+ Exam
    2. Introduction to the Course
    3. How to Prepare for the Exam
  2. Chapter 2 : Part 1 - Summarize Fundamental Security Concepts
    1. Section Preview
    2. Introduction to Information Security
    3. Cybersecurity Framework
    4. Control Objectives
    5. Security Control Categories
    6. Security Control Functional Types
    7. Pop Quiz
    8. Information Security Roles Responsibilities
  3. Chapter 3 : Part 2 - Compare Threat Types
    1. Section Preview
    2. Vulnerability, Threat, and Risk
    3. Attributes of Threat Actors
    4. Threat Actors
    5. Attack Surface Attack Vectors
    6. Vulnerable Software Network Vectors
    7. Lure-Based Message-Based Vectors
    8. Third Party Risks
    9. Introduction to Social Engineering
    10. Social Engineering Techniques Part 1
    11. Social Engineering Techniques Part 2
    12. Social Engineering Techniques Part 3
  4. Chapter 4 : Part 3 - Explain Cryptographic Solutions
    1. Section Preview
    2. Introduction to Cryptography and Hashing
    3. Encryption
    4. Cryptographic Modes of Operation
    5. Demo - Calculating Hash Values with PowerShell
    6. Certificates, PKIs, RAs, and CSRs
    7. Digital Certificates
    8. Key Management
    9. Certificate Management
    10. Certificate Formats OpenSSL
    11. Demo - Digital Certificates
    12. Longevity, Salting Key Stretching
    13. Homomorphic Encryption, Blockchain, and Steganography
  5. Chapter 5 : Part 4 - Implement Identity and Access Management
    1. Section Preview
    2. Identity Access Management
    3. Authentication Factors, Design Attributes
    4. Biometric Authentication
    5. Password Concepts
    6. Demo - Account Password Policy
    7. Authorization Solutions - Part 1
    8. Authorization Solutions - Part 2
    9. Account Attributes and Access Policies
    10. Local, Network, and Remote Authentication
    11. Kerberos Authentication Authorization
  6. Chapter 6 : Part 5 - Secure Enterprise Network Architecture
    1. Section Preview
    2. Secure Network Designs
    3. Network Segmentation, Topology DMZs
    4. Routing and Switching Protocols
    5. Secure Switching and Routing
    6. Firewalls
    7. Firewall Implementation
    8. Demo - Windows 10 Firewall Configuration
    9. Demo - Creating an Outbound Rule
    10. Next-Generation Firewalls HBIDS
    11. Remote Access Architecture Part 1
    12. Remote Access Architecture Part 2
  7. Chapter 7 : Part 6 - Secure Cloud Network Architecture
    1. Section Preview
    2. Cloud Deployment Models
    3. Cloud Security Solutions - Part 1
    4. Cloud Security Solutions - Part 2
    5. Infrastructure as Code Concepts
    6. Zero Trust
    7. Embedded Systems
    8. Industrial Control Systems Internet of Things
  8. Chapter 8 : Part 7 - Explain Resiliency and Site Security Concepts
    1. Section Preview
    2. Backup Strategies
    3. Backup Storage
    4. Cyber Security Resilience
    5. Implementing Redundancy Strategies
    6. Diversity and Defense in Depth
    7. Physical Security Controls - Part 1
    8. Physical Security Controls - Part 2
    9. Physical Host Security Controls
  9. Chapter 9 : Part 8 - Explain Vulnerability Management
    1. Section Preview
    2. Vulnerability Discovery
    3. Weak Host and Network Configurations
    4. Evaluation Scope
    5. Overflows, Resource Exhaustion, Memory Leaks Race Conditions
    6. Cross-Site Scripting Attack
    7. Standard Query Language Injection Attack
    8. Sideloading, Rooting Jailbreaking
    9. Threat Research Sources
    10. Threat Intelligence Providers
    11. Threat Data Feeds AI
    12. Vulnerability Response Remediation
  10. Chapter 10 : Part 9 - Evaluate Network Security Capabilities
    1. Section Preview
    2. Bench Marks Secure Configuration Guides
    3. Wi-Fi Authentication Methods - Part 1
    4. Wi-Fi Authentication Methods - Part 2
    5. Network Security Monitoring
    6. Web Filtering
  11. Chapter 11 : Part 10 - Assess Endpoint Security Capabilities
    1. Section Preview
    2. Endpoint Security
    3. Segmentation
    4. Mobile Device Management - Part 1
    5. Mobile Device Management - Part 2
    6. Secure Mobile Device Connections
    7. Secure Design Principles
  12. Chapter 12 : Part 11 - Enhance Application Security Capabilities
    1. Section Preview
    2. DNS Security, Directory Services SNMP
    3. File Transfer Email and Video Services
    4. Secure Coding Techniques - Part 1
    5. Secure Coding Techniques - Part 2
  13. Chapter 13 : Part 12 - Explain Incident Response and Monitoring Concepts
    1. Section Preview
    2. Incident Response Process
    3. Cyber Incident Response Team
    4. Incident Identification - Part 1
    5. Incident Identification Part 2
    6. Incident Response Plan
    7. Incident Response Exercises, Recovery and Retention Policy
    8. Digital Forensics Documentation
    9. Digital Forensics Evidence Acquisition Part 1
    10. Digital Forensics Evidence Acquisition Part 2
    11. Data Sources
  14. Chapter 14 : Part 13 - Analyze Indicators of Malicious Activity
    1. Section Preview
    2. Malware Classification
    3. Computer Viruses
    4. Computer Worms Fileless Malware
    5. Spyware, Keyloggers, Rootkits, Backdoors, Ransomware Logic Bombs
    6. Malware Indicators and Process Analysis
    7. Password Attacks
    8. Tactics, Techniques Procedures
    9. Privilege Escalation Error Handling
    10. Uniform Resource Locator Analysis Percent Encoding
    11. API Replay Attacks, CSRF, Clickjacking SSL Strip Attacks
    12. Other Injection Attacks
  15. Chapter 15 : Part 14 - Summarize Security Governance Concepts
    1. Section Preview
    2. Regulations, Standards Legislation
    3. ISO and Cloud Frameworks
    4. Governance Structure
    5. Governance Documents
    6. Change Management
    7. Configuration Management
    8. Scripting, Automation and Orchestration
  16. Chapter 16 : Part 15 - Explain Risk Management
    1. Section Preview
    2. Risk Management Process
    3. Risk Controls
    4. Pop Quiz
    5. Business Impact Analysis
    6. Third-Party Risk Management Security Agreements
    7. Audit and Assurance
    8. Introduction to Penetration Testing
    9. Pen Test Attack Life Cycle
  17. Chapter 17 : Part 16 - Summarize Data Protection and Compliance Concepts
    1. Section Preview
    2. Privacy and Sensitive Data Concepts
    3. Data Sovereignty, Privacy Breaches Data Sharing
    4. Privacy and Data Controls
    5. Pop Quiz
    6. Privacy Principles
    7. Compliance Monitoring
    8. Education, Training and Awareness
    9. Personnel Policies
  18. Chapter 18 : Conclusion
    1. Conclusion
  19. Chapter 19 : Welcome to the Course (SY0-601)
    1. Introduction to the CompTIA Security+ Exam
  20. Chapter 20 : Part 1 - Intro To Information Security And Security Roles Responsibilities
    1. Section Preview
    2. Introduction To Information Security
    3. Cybersecurity Framework
    4. Security Roles Responsibilities
    5. Security Control Categories
    6. Security Control Functional Types
    7. ISO and Cloud Frameworks
    8. Bench Marks Secure Configuration Guides
    9. Regulations, Standards Legislation
  21. Chapter 21 : Section 2 - Explaining Threat Actors And Threat Vectors
    1. Section Preview
    2. Vulnerability, Threat And Risk
    3. Attributes Of Threat Actors
    4. Threat Actors
    5. Attack Surface Attack Vectors
    6. Threat Research Sources
    7. Threat Intelligence Providers
    8. Tactics, Techniques Procedures
    9. Threat Data Feeds
  22. Chapter 22 : Part 3 - Performing Security Assessments
    1. Section Preview
    2. Network Reconnaissance Tools
    3. Other Network Reconnaissance Tools
    4. Demo - Ipconfig, Ping, Tracert, Netstat Nslookup
    5. Simulated Question Test
    6. Software Vulnerabilities and Patch Management
    7. Weak Host and Network Configurations
    8. Vulnerability Impacts
    9. Third Party Risks
    10. Introduction to Penetration Testing
    11. Reconnaissance
    12. Pen Test Attack Life Cycle
    13. Demo - NMAP
  23. Chapter 23 : Part 4 - Social Engineering Techniques Malware
    1. Section Preview
    2. Intro to Social Engineering
    3. Social Engineering Techniques Part 1
    4. Social Engineering Techniques Part 2
    5. Social Engineering Techniques Part 3
    6. Malware Classification
    7. Computer Viruses
    8. Computer Worms Fileless Malware
    9. Spyware, Keyloggers, Rootkits, Backdoors, Ransomware Logic Bombs
    10. Malware Indicators Process Analysis
  24. Chapter 24 : Part 5 - Cryptographic Concepts, Hashing, Ciphers Encryption
    1. Section Preview
    2. Introduction to Cryptography
    3. Encryption
    4. Cryptographic Modes of Operation
    5. Cipher Suites Modes of Operation
    6. Cryptographic Use Cases
    7. Cryptographic Limitations
    8. Longevity, Salting, and Key Stretching
    9. Man in the Middle and Downgrade Attacks
    10. Homomorphic Encryption, Blockchain, and Steganography
    11. Quantum and Post Quantum
    12. Demo - Calculating Hash Values with PowerShell
  25. Chapter 25 : Part 6 - Implementing Public Key Infrastructure
    1. Section Preview
    2. Certificates, PKIs, RAs, and CSRs
    3. Digital Certificates
    4. Key Management
    5. Certificate Management
    6. Certificate Formats OpenSSL
    7. Demo - Digital Certificates
  26. Chapter 26 : Part 7 - Authentication Design Concepts
    1. Section Preview
    2. Identity Access Management
    3. Authentication Factors, Design Attributes
    4. Local, Network Remote Authentication
    5. Kerberos Authentication Authorization
    6. PAP, CHAP, and MS-CHAP Authentication
    7. Authentication Technologies and Protocols
    8. Biometric Authentication
  27. Chapter 27 : Part 8 - Identity and Management Controls
    1. Section Preview
    2. Identity Management Controls
    3. Pop Quiz
    4. Account Attributes and Access Policies
    5. Authorization Solutions - Part 1
    6. Authorization Solutions - Part 2
    7. Personnel Policies
    8. Demo - Account Password Policy
  28. Chapter 28 : Part 9 - Implementing Secure Network Designs
    1. Section Preview
    2. Secure Network Designs
    3. Network Segmentation, Topology DMZs
    4. Secure Switching and Routing
    5. Routing and Switching Protocols
    6. Wi-Fi Authentication Methods - Part 1
    7. Wi-Fi Authentication Methods - Part 2
    8. Network Attacks
    9. Network Attacks Mitigation
  29. Chapter 29 : Part 10 - Firewalls and Proxy Servers
    1. Section Preview
    2. Firewalls
    3. Firewall Implementation
    4. Access Control Lists, NAT, Virtual Firewalls
    5. Next-Generation Firewalls HBIDS
    6. Demo - Windows 10 Firewall Configuration
    7. Demo - How to Create an Outbound Rule
    8. Network Security Monitoring
    9. Monitoring Services and SIEMs
    10. File Manipulation, REGEX and GREP
  30. Chapter 30 : Part 11 - Implement Secure Network Operations Protocols
    1. Section Preview
    2. Secure Network Operations
    3. DNS Security Directory Services and SNMP
    4. Secure Application Protocols
    5. File Transfer Email and Video Services
    6. Remote Access Architecture Part 1
    7. Remote Access Architecture Part 2
  31. Chapter 31 : Part 12 - Implement Host Security Solutions
    1. Section Preview
    2. Hardware Root of Trust
    3. Boot Integrity
    4. Disk Encryption USB Flash Drive Security
    5. Pop Quiz
    6. Third-Party Risk Management
    7. Endpoint Security
    8. Embedded Systems
    9. Embedded Systems Communications Considerations
    10. Industrial Control Systems Internet Of Things
    11. Specialized Systems
  32. Chapter 32 : Part 13 - Implement Secure Mobile Solutions
    1. Section Preview
    2. Mobile Device Management Part 1
    3. Mobile Device Management Part 2
    4. Secure Mobile Device Connections
  33. Chapter 33 : Part 14 - Application Attacks
    1. Section Preview
    2. Privilege Escalation Error Handling
    3. Overflows, Resource Exhaustion, Memory Leaks Race Conditions
    4. Uniform Resource Locator Analysis Percent Encoding
    5. API Replay Attacks, CSRF, Clickjacking SSL Strip Attacks
    6. Cross-Site Scripting Attack
    7. SQL Injection
    8. Other Injection Attacks
    9. Secure Coding Techniques - Part 1
    10. Secure Coding Techniques - Part 2
    11. Implement Secure Script Environments
    12. Deployment and Automation Concepts
  34. Chapter 34 : Part 15 - Implement Secure Cloud Solutions
    1. Section Preview
    2. Cloud Deployment Models
    3. Virtualization Technology Hypervisor Types
    4. Cloud Security Solutions - Part 1
    5. Cloud Security Solutions Part 2
    6. Infrastructure as Code Concepts
  35. Chapter 35 : Part 16 - Data Privacy Protection Concepts
    1. Section Preview
    2. Privacy and Sensitive Data Concepts
    3. Data Sovereignty, Privacy Breaches Data Sharing
    4. Privacy and Data Controls
  36. Chapter 36 : Part 17 - Incident Response Procedures
    1. Section Preview
    2. Incident Response Process
    3. Cyber Incident Response Team
    4. Incident Response Plan
    5. Incident Response Exercises, Recovery and Retention Policy
    6. Incident Identification Part 1
    7. Incident Identification Part 2
    8. Mitigation Controls
  37. Chapter 37 : Part 18 - Digital Forensics
    1. Section Preview
    2. Digital Forensics Documentation
    3. Digital Forensics Evidence Acquisition Part 1
    4. Digital Forensics Evidence Acquisition Part 2
  38. Chapter 38 : Part 19 - Risk Management Processes and Concepts
    1. Section Preview
    2. Risk Management Process
    3. Risk Controls
    4. Pop Quiz
    5. Business Impact Analysis
  39. Chapter 39 : Part 20 - Implement Cyber Security Resilience
    1. Section Preview
    2. Cyber Security Resilient Strategies
    3. Implementing Redundancy
    4. Backup Strategies
    5. Backup Storage
    6. Defense in Depth
  40. Chapter 40 : Part 21 - Implement Physical Security
    1. Section Preview
    2. Physical Host Security Controls
    3. Physical Host Security Controls Part 1
    4. Physical Host Security Host Controls Part 2

Product information

  • Title: CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
  • Author(s): Alexander Oni
  • Release date: February 2024
  • Publisher(s): Packt Publishing
  • ISBN: 9781835888940