HOME > IT & Software > CompTIA Security+ (SY0-501) Certification Bootcamp

CompTIA Security+ (SY0-501) Certification Bootcamp

SynopsisCompTIA Security+ (SY0-501 Certification Bootcamp, available...
CompTIA Security+ (SY0-501) Certification Bootcamp  No.1

CompTIA Security+ (SY0-501) Certification Bootcamp, available at $49.99, has an average rating of 4.15, with 70 lectures, 12 quizzes, based on 203 reviews, and has 794 subscribers.

You will learn about Threats, Attacks & Vulnerabilities Identity & Access Management Technologies & Tools Risk Management Architecture & Design Cryptography & PKI This course is ideal for individuals who are IT professionals looking to increase their knowledge about Information Security. or Professionals looking to break into the Information Security field. It is particularly useful for IT professionals looking to increase their knowledge about Information Security. or Professionals looking to break into the Information Security field.

Enroll now: CompTIA Security+ (SY0-501) Certification Bootcamp

Summary

Title: CompTIA Security+ (SY0-501) Certification Bootcamp

Price: $49.99

Average Rating: 4.15

Number of Lectures: 70

Number of Quizzes: 12

Number of Published Lectures: 70

Number of Published Quizzes: 12

Number of Curriculum Items: 82

Number of Published Curriculum Objects: 82

Original Price: $39.99

Quality Status: approved

Status: Live

What You Will Learn

  • Threats, Attacks & Vulnerabilities
  • Identity & Access Management
  • Technologies & Tools
  • Risk Management
  • Architecture & Design
  • Cryptography & PKI
  • Who Should Attend

  • IT professionals looking to increase their knowledge about Information Security.
  • Professionals looking to break into the Information Security field.
  • Target Audiences

  • IT professionals looking to increase their knowledge about Information Security.
  • Professionals looking to break into the Information Security field.
  • The job market for knowledgable Cybersecurity professionals is booming with an increase in regulations, and a desire to secure corporate networks. One of the best ways to exhibit Cybersecurity knowledge to employers is through gaining certifications.

    The primary goal of this course is to educate the student on Cybersecurity in preparation for the Security+ certification exam from CompTIA.

    WHAT OUR STUDENTS ARE SAYING:

    Fantastic Course! Jon is an excellent instructor and covers the essentials for passing the Security+ exam. The visuals really help with learning the core concepts of the exam. I highly recommend you add this course to your learning arsenal of tools so you confidently pass Security+ exam!” – James F.

    Jon does a great job of breaking down each section. I feel it is easy to grasp the concepts and I did not lose interest while watching this course.” – Joe W.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Course & Instructor Introduction

    Chapter 2: Cybersecurity Core Concepts

    Lecture 1: Section Introduction

    Lecture 2: CIA Triad: Confidentiality, Integrity, and Availability

    Lecture 3: Defense In Depth

    Lecture 4: Introduction To Risk Management Concepts

    Lecture 5: Policies & Standard Operating Procedures (SOPs)

    Lecture 6: Data Classification & Data Handling

    Chapter 3: Networking Basics

    Lecture 1: Section Introduction

    Lecture 2: Basic Networking Protocols

    Lecture 3: Implementing Network Protocols – Part 1

    Lecture 4: Implementing Network Protocols – Part 2

    Lecture 5: Identifying Ports

    Lecture 6: Network Devices

    Lecture 7: Secure Network Design

    Lecture 8: Advanced Security Devices

    Chapter 4: Security Controls

    Lecture 1: Section Introduction

    Lecture 2: Types of Controls – Part 1

    Lecture 3: Types of Controls – Part 2

    Lecture 4: Physical Security Controls

    Lecture 5: Environmental Controls

    Chapter 5: Identity & Access Management

    Lecture 1: Section Introduction

    Lecture 2: Identification & AAA: Authentication, Authorization, and Accounting

    Lecture 3: Authentication Factors

    Lecture 4: Authentication Services

    Lecture 5: Account Management

    Lecture 6: Access Control Models

    Chapter 6: Securing Systems

    Lecture 1: Section Introduction

    Lecture 2: Secure Systems

    Lecture 3: Secure Operating Systems

    Lecture 4: Secure Staging and Deployment

    Lecture 5: Hardware and Firmware Security

    Lecture 6: Mobile Device Management

    Lecture 7: Embedded Systems

    Lecture 8: Data Loss Prevention

    Chapter 7: Wireless Security

    Lecture 1: Section Introduction

    Lecture 2: Wireless Security

    Lecture 3: Wireless Cryptography

    Lecture 4: Wireless Authentication Protocols

    Lecture 5: Attacking Wireless

    Chapter 8: Virtualization, Cloud, & Remote Access

    Lecture 1: Section Introduction

    Lecture 2: Virtualization

    Lecture 3: Cloud Topologies and Deployment Types

    Lecture 4: VPNs and Remote Access

    Chapter 9: Common Attacks

    Lecture 1: Malware

    Lecture 2: Malware Prevention

    Lecture 3: Common Attacks: Part 1

    Lecture 4: Common Attacks: Part 2

    Lecture 5: Social Engineering

    Chapter 10: Application Security

    Lecture 1: Secure Coding

    Lecture 2: Application Attacks

    Lecture 3: Frameworks

    Chapter 11: Cryptography

    Lecture 1: Encryption Basics

    Lecture 2: Symmetric Encryption

    Lecture 3: Asymmetric Encryption

    Lecture 4: Digital Signatures & Web Encryption

    Lecture 5: Public Key Infrastructure (PKI)

    Lecture 6: Hashing

    Chapter 12: Penetration Testing & Incident Response

    Lecture 1: Penetration Testing

    Lecture 2: Incident Response

    Chapter 13: Risk Management

    Lecture 1: What is Risk Management

    Lecture 2: Threat Actors

    Lecture 3: Risk Mitigation Decisions

    Lecture 4: Risk Assessments

    Chapter 14: Business Continuity & Disaster Recovery

    Lecture 1: Redundancy

    Lecture 2: Business Continuity

    Lecture 3: Alternate Site Operations

    Lecture 4: Disaster Recovery

    Chapter 15: Tools & Logs

    Lecture 1: Command Line Tools

    Lecture 2: Security Tools

    Lecture 3: Monitoring The Network

    Instructors

  • CompTIA Security+ (SY0-501) Certification Bootcamp  No.2
    Jon Good
    Cyber Security Leader
  • Rating Distribution

  • 1 stars: 2 votes
  • 2 stars: 5 votes
  • 3 stars: 17 votes
  • 4 stars: 79 votes
  • 5 stars: 100 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!