Exclusive Deal! 94% Off, Today Only!
Buy 1 or more contact sale
Course Overview
Learn how to make a genuine difference in your life by taking our popular CompTIA Security+ (SY0-601). Our commitment to online learning and our technical experience have been put to excellent use within the content of these educational modules. By enrolling today, you can take your knowledge of CompTIA Security+ (SY0-601)Â to a whole new level and quickly reap the rewards of your study in the field you have chosen.
We are confident that you will find the skills and information that you will need to succeed in this area and excel in the eyes of others. Do not rely on substandard training or half-hearted education. Commit to the best, and we will help you reach your full potential whenever and wherever you need us.
Please note that CompTIA Security+ (SY0-601) provides valuable and significant theoretical training for all. However, it does not offer official qualifications for professional practice. Always check details with the appropriate authorities or management.
Learning Outcomes
Your Path to Success
By completing the training in CompTIA Security+ (SY0-601), you will be able to significantly demonstrate your acquired abilities and knowledge of CompTIA Security+ (SY0-601). This can give you an advantage in career progression, job applications, and personal mastery in this area.
Is This Course Right for You?
This course is designed to provide an introduction to CompTIA Security+ (SY0-601)Â and offers an excellent way to gain the vital skills and confidence to start a successful career. It also provides access to proven educational knowledge about the subject and will support those wanting to attain personal goals in this area. Full-time and part-time learners are equally supported, and the study periods are entirely customisable to your needs.
Assessment Process
Once you have completed all the modules in the CompTIA Security+ (SY0-601) course, you can assess your skills and knowledge with an optional assignment. Our expert trainers will assess your assignment and give you feedback afterwards.
Show off Your New Skills with a Certification of Completion
The learners have to successfully complete the assessment of this CompTIA Security+ (SY0-601) course to achieve the CPD accredited certificate. Digital certificates can be ordered for only £10. Learners can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39.
Section 01: Introduction | |||
Promo | 00:01:00 | ||
Introduction to CompTIA Security+ SY0-601 | 00:03:00 | ||
About the CompTIA Security+ SY0-601 Exam | 00:03:00 | ||
Resource – CompTIA Security+ SY0-601 Exam Objectives | 00:00:00 | ||
Section 02: Risk Management | |||
Defining Risk | 00:08:00 | ||
Threats and Vulnerabilities | 00:07:00 | ||
Threat Intelligence | 00:11:00 | ||
Risk Management Concepts | 00:07:00 | ||
Security Controls | 00:09:00 | ||
Risk Assessments and Treatments | 00:06:00 | ||
Quantitative Risk Assessments | 00:07:00 | ||
Qualitative Risk Assessments | 00:04:00 | ||
Business Impact Analysis | 00:09:00 | ||
Data Types and Roles | 00:12:00 | ||
Security and the Information Life Cycle | 00:09:00 | ||
Data Destruction | 00:06:00 | ||
Personnel Risk and Policies | 00:10:00 | ||
Third-Party Risk Management | 00:09:00 | ||
Agreement Types | 00:07:00 | ||
Exam Question Review | 00:02:00 | ||
Wiping Disks with the dd Command Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:00:00 | ||
Lab Handouts | 00:00:00 | ||
Section 03: Cryptography | |||
Cryptography Basics | 00:16:00 | ||
Data Protection | 00:09:00 | ||
Cryptographic Methods | 00:07:00 | ||
Symmetric Cryptosystems | 00:13:00 | ||
Symmetric Block Modes | 00:08:00 | ||
Asymmetric Cryptosystems | 00:13:00 | ||
Diffie-Hellman | 00:07:00 | ||
Hashing | 00:09:00 | ||
Understanding Digital Certificates | 00:08:00 | ||
Trust Models | 00:05:00 | ||
Public Key Infrastructure | 00:04:00 | ||
Certificate Types | 00:14:00 | ||
Touring Certificates | 00:09:00 | ||
Cryptographic Attacks | 00:05:00 | ||
Password Cracking | 00:10:00 | ||
Password Cracking Demo | 00:06:00 | ||
Exam Question Review | 00:02:00 | ||
SSH Public Key Authentication Lab | 00:09:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:00:00 | ||
Lab Handouts | 00:00:00 | ||
Section 04: Identity and Account Management | |||
Identification, Authentication, and Authorization | 00:08:00 | ||
Enabling Multifactor Authentication | 00:05:00 | ||
Authorization | 00:05:00 | ||
Accounting | 00:05:00 | ||
Authentication Methods | 00:14:00 | ||
Access Control Schemes | 00:07:00 | ||
Account Management | 00:13:00 | ||
Network Authentication | 00:09:00 | ||
Identity Management Systems | 00:06:00 | ||
Exam Question Review | 00:02:00 | ||
Creating LInux Users and Groups Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:01:00 | ||
Handouts | 00:00:00 | ||
Lab Handouts | 00:00:00 | ||
Section 05: Tools of the Trade | |||
Touring the CLI | 00:18:00 | ||
Shells | 00:06:00 | ||
The Windows Command Line | 00:05:00 | ||
Microsoft PowerShell | 00:13:00 | ||
Linux Shells | 00:11:00 | ||
Python Scripts | 00:07:00 | ||
Windows Command-Line Tools | 00:16:00 | ||
Linux Command-Line Tools | 00:10:00 | ||
Network Scanners | 00:05:00 | ||
Network Scanning with Nmap | 00:09:00 | ||
Network Protocol Analyzers | 00:08:00 | ||
Using Wireshark to Analyze Network Traffic | 00:09:00 | ||
Using tcpdump to Analyze Network Traffic | 00:08:00 | ||
Log Files | 00:09:00 | ||
Centralized Logging | 00:09:00 | ||
Configuring Linux Log Forwarding | 00:08:00 | ||
Exam Question Review | 00:03:00 | ||
Lunux Shell Script Lab | 00:07:00 | ||
Nmap Lab | 00:05:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:00:00 | ||
Lab Handouts Part 1 | 00:00:00 | ||
Lab Handouts Part 2 | 00:00:00 | ||
Section 06: Securing Individual Systems | |||
Malware | 00:14:00 | ||
Weak Configurations | 00:12:00 | ||
Common Attacks | 00:09:00 | ||
Driver and Overflow Attacks | 00:08:00 | ||
Password Attacks | 00:08:00 | ||
Bots and Botnets | 00:06:00 | ||
Disk RAID Levels | 00:10:00 | ||
Securing Hardware | 00:11:00 | ||
Securing Endpoints | 00:09:00 | ||
Exam Question Review | 00:02:00 | ||
Linux Software RAID Lab | 00:08:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Handouts | 00:00:00 | ||
Lab Handouts Part 1 | 00:00:00 | ||
Lab Handouts Part 2 | 00:00:00 | ||
Section 07: The Basic LAN | |||
The OSI Model | 00:13:00 | ||
ARP Cache Poisoning | 00:09:00 | ||
Other Layer 2 Attacks | 00:05:00 | ||
Network Planning | 00:07:00 | ||
Load Balancing | 00:06:00 | ||
Securing Network Access | 00:06:00 | ||
Honeypots | 00:06:00 | ||
Firewalls | 00:11:00 | ||
Proxy Servers | 00:06:00 | ||
Network and Port Address Translation | 00:07:00 | ||
IP Security (IPsec) | 00:09:00 | ||
Virtual Private Networks (VPNs) | 00:10:00 | ||
Intrusion Detection and Prevention Systems (IDS/IPS) | 00:13:00 | ||
Exam Question Review | 00:03:00 | ||
Linux Snort IDS Lab | 00:07:00 | ||
Ask Me Anything (AMA) | 00:01:00 | ||
Chapter 06: Handouts | 00:00:00 | ||
Chapter 6: Lab Handouts | 00:00:00 | ||
Section 08: Securing Wireless LANs | |||
Wi-Fi Encryption Standards | 00:10:00 | ||
RFID, NFC, and Bluetooth | 00:07:00 | ||
Wi-Fi Coverage and Performance | 00:08:00 | ||
Wi-Fi Discovery and Attacks | 00:12:00 | ||
Cracking WPA2 | 00:10:00 | ||
Wi-Fi Hardening | 00:11:00 | ||
Exam Question Review | 00:02:00 | ||
WPA2 Cracking Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Chapter 07: Handouts | 00:00:00 | ||
Chapter 07: Lab Handouts | 00:00:00 | ||
Section 09: Securing Public Servers | |||
Defining a Public Server | 00:01:00 | ||
Common Attacks and Mitigations | 00:10:00 | ||
Containers and Software-Defined Networking | 00:11:00 | ||
Hypervisors and Virtual Machines | 00:08:00 | ||
Cloud Deployment Models | 00:09:00 | ||
Cloud Service Models | 00:08:00 | ||
Securing the Cloud | 00:10:00 | ||
Exam Question Review | 00:02:00 | ||
Docker Container Lab | 00:04:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Chapter 08: Handouts | 00:00:00 | ||
Chapter 08: Lab Handouts | 00:00:00 | ||
Section 10: Securing Dedicated Systems | |||
Embedded Systems | 00:13:00 | ||
Industrial Control System (ICS) | 00:07:00 | ||
Internet of Things (IoT) Devices | 00:10:00 | ||
Connecting to Dedicated and Mobile Systems | 00:11:00 | ||
Security Constraints for Dedicated Systems | 00:05:00 | ||
Mobile Device Deployment and Hardening | 00:11:00 | ||
Exam Question Review | 00:03:00 | ||
Smartphone Hardening Lab | 00:03:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Chapter 09: Handouts | 00:00:00 | ||
Chapter 09: Lab Handouts | 00:00:00 | ||
Section 11: Physical Security | |||
Physical Security Overview | 00:01:00 | ||
Physical Security | 00:10:00 | ||
Keylogger Demo | 00:05:00 | ||
Environmental Controls | 00:05:00 | ||
Exam Question Review | 00:02:00 | ||
Physical Security Lab | 00:03:00 | ||
Ask Me Anything (AMA) | 00:03:00 | ||
Chapter 10: Handouts | 00:00:00 | ||
VirtualBox Troubleshooting Tips | 00:02:00 | ||
Section 12: Secure Protocols and Applications | |||
DNS Security | 00:05:00 | ||
FTP Packet Capture | 00:03:00 | ||
Secure Web and E-mail | 00:12:00 | ||
Request Forgery Attacks | 00:05:00 | ||
Cross-Site Scripting Attacks | 00:07:00 | ||
Web Application Security | 00:08:00 | ||
Web App Vulnerability Scanning | 00:06:00 | ||
Exam Question Review | 00:03:00 | ||
OWASP ZAP Web App Scan Lab | 00:04:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Chapter 11: Handouts | 00:00:00 | ||
Chapter 11:Lab Handouts | 00:00:00 | ||
Section 13: Testing Infrastructure | |||
Testing Infrastructure Overview | 00:05:00 | ||
Social Engineering | 00:06:00 | ||
Social Engineering Attacks | 00:11:00 | ||
Vulnerability Assessments | 00:09:00 | ||
Penetration Testing | 00:10:00 | ||
Security Assessment Tools | 00:12:00 | ||
The Metasploit Framework | 00:08:00 | ||
Exam Question Review | 00:02:00 | ||
Hping3 Forged Packet Lab | 00:06:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Chapter 12: Handouts | 00:00:00 | ||
Chapter 12: Lab Handouts | 00:00:00 | ||
Section 14: Dealing with Incidents | |||
Incident Response Overview | 00:03:00 | ||
Incident Response Plans (IRPs) | 00:06:00 | ||
Threat Analysis and Mitigating Actions | 00:08:00 | ||
Digital Forensics | 00:12:00 | ||
Gathering Digital Evidence | 00:10:00 | ||
Business Continuity and Alternate Sites | 00:06:00 | ||
Data Backup | 00:10:00 | ||
Exam Question Review | 00:01:00 | ||
Autopsy Forensic Browser Lab | 00:05:00 | ||
Ask Me Anything (AMA) | 00:02:00 | ||
Chapter 13: Handouts | 00:00:00 | ||
Chapter 13: Lab Handouts | 00:00:00 | ||
Order Your Certificate | |||
Order your Certificate. | 00:00:00 |
3699
4.5
£25
3674
4.3
£25