CompTIA Security+

CompTIA Security+

You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks for your organization.

Course Details

Reviews

5 out of 5 stars
546 Total Reviews

5 out of 5 stars

Course Highlights

  • Course Price$349
  • InstructorsJason Dion
  • Total Duration57 hours
  • Total Lessons340
  • Total Quizzes12
  • Enrolled546 Students
  • Access to material12 Months
  • Official TextbookIncluded
  • Full Practice ExamsIncluded
  • 100% Pass GuaranteeIncluded

Meet Your Instructor

Disclaimer

Prices may vary depending on local currency and exchange rates.

License

Description

You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the exams.

CompTIA Security+ (SY0-601) is the world's most popular cybersecurity certification today!

The CompTIA Security+ (SY0-601) certification is a entry-level, vendor-neutral certification that validates that you have the knowledge and skills required to assess the security posture of an enterprise environment and recommend/implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents.

The CompTIA Security+ certification exam, and this course, is focused on providing you a foundation in the cybersecurity field, including an understanding of basic attacks, threats, and vulnerabilities, architecture and design, security implementations, operations and incident response, and governance, risk and compliance concepts.

This course is designed for secure administrators, systems administrators, help desk managers and analysts, security engineers and analysts, IT auditors, IT project managers, DevOps/Software Developers, network or cloud engineers, or anyone who is trying to get a better understanding of the concepts involved in cybersecurity and its associated toolsets.  

By the end of the course, you will be comfortable with the tasks required of a security technician and be ready to take on a cybersecurity role in your organization!

This course is designed to help prepare you for the CompTIA Security+ (SY0-601) certification exam and covers all five domains:

  • Attacks, Threats, and Vulnerabilities (24%)
  • Architecture and Design (21%)
  • Implementation (25%)
  • Operations and Incident Response (16%)
  • Governance, Risk, and Compliance (14%)

Frequently Asked Questions

No.

Title

Type

Status

1.

Welcome

VIDEO

2.

Download the Study Guide

VIDEO

3.

100% Pass Guarantee

VIDEO

4.

How to Use CertMaster Labs

VIDEO

5.

Labs: Exploring the Lab Environment

LAB

No.

Title

Type

Status

1.

Overview of Security

VIDEO

2.

CIA Triad

VIDEO

3.

AAA of Security

VIDEO

4.

Security Threats

VIDEO

5.

Mitigating Threats

VIDEO

6.

Hackers

VIDEO

7.

Threat Actors

VIDEO

8.

Threat Intelligence and Sources

VIDEO

9.

Threat Hunting

VIDEO

10.

Attack Frameworks

VIDEO

11.

Quiz: Overview of Security

QUIZ

No.

Title

Type

Status

1.

Malware

VIDEO

2.

Viruses

VIDEO

3.

Worms

VIDEO

4.

Trojans

VIDEO

5.

Demo: Viruses and Trojans

VIDEO

6.

Ransomware

VIDEO

7.

Spyware

VIDEO

8.

Rootkits

VIDEO

9.

Spam

VIDEO

10.

Summary of Malware

VIDEO

11.

Labs: Installing, Using, and Blocking a Malware-based Backdoor

LAB

12.

Quiz: Malware

QUIZ

No.

Title

Type

Status

1.

Malware Infections

VIDEO

2.

Common Delivery Methods

VIDEO

3.

Demo: Phishing

VIDEO

4.

Botnets and Zombies

VIDEO

5.

Active Interception and Privilege Escalation

VIDEO

6.

Demo: Privilege Escalation

VIDEO

7.

Backdoors and Logic Bombs

VIDEO

8.

Symptoms of Infection

VIDEO

9.

Labs: Identifying Malicious Code

LAB

10.

Removing Malware

VIDEO

11.

Preventing Malware

VIDEO

12.

Malware Exploitation

VIDEO

13.

Labs: Performing Network Reconnaissance and Vulnerability Scanning

LAB

14.

Quiz: Malware Infection

QUIZ

No.

Title

Type

Status

1.

Security Applications and Devices

VIDEO

2.

Software Firewalls

VIDEO

3.

Demo: Software Firewalls

VIDEO

4.

IDS

VIDEO

5.

Pop-up Blockers

VIDEO

6.

Data Loss Prevention (DLP)

VIDEO

7.

Securing the BIOS

VIDEO

8.

Securing Storage Devices

VIDEO

9.

Disk Encryption

VIDEO

10.

Endpoint Analysis

VIDEO

11.

Labs: Implementing Endpoint Protection

LAB

12.

Quiz: Security Applications and Devices

QUIZ

No.

Title

Type

Status

1.

Mobile Device Security

VIDEO

2.

Securing Wireless Devices

VIDEO

3.

Mobile Malware

VIDEO

4.

SIM Cloning & ID Theft

VIDEO

5.

Bluetooth Attacks

VIDEO

6.

Mobile Device Theft

VIDEO

7.

Security of Apps

VIDEO

8.

BYOD

VIDEO

9.

Hardening Mobile Devices

VIDEO

10.

Quiz: Mobile Device Security

QUIZ

No.

Title

Type

Status

1.

Hardening

VIDEO

2.

Unnecessary Applications

VIDEO

3.

Restricting Applications

VIDEO

4.

Demo: Unnecessary Services

VIDEO

5.

Trusted Operating System

VIDEO

6.

Updates and Patches

VIDEO

7.

Patch Management

VIDEO

8.

Group Policies

VIDEO

9.

Demo: Group Policies

VIDEO

10.

Labs: Implementing PowerShell Security

LAB

11.

File Systems and Hard Drives

VIDEO

12.

Labs: Configuring Mitigation Controls

LAB

13.

Quiz: Hardening

QUIZ

No.

Title

Type

Status

1.

Supply Chain Assessment

VIDEO

2.

Root of Trust

VIDEO

3.

Trusted Firmware

VIDEO

4.

Secure Processing

VIDEO

5.

Quiz: Supply Chain Management

QUIZ

No.

Title

Type

Status

1.

Virtualization

VIDEO

2.

Hypervisors

VIDEO

3.

Demo: How to create a VM

VIDEO

4.

Threats to VMs

VIDEO

5.

Securing VMs

VIDEO

6.

Demo: Securing VMs

VIDEO

7.

Quiz: Virtualization

QUIZ

No.

Title

Type

Status

1.

Application Security

VIDEO

2.

Web Browser Security

VIDEO

3.

Web Browser Concerns

VIDEO

4.

Demo: Web Browser Configuration

VIDEO

5.

Labs: Identifying a Browser Attack

LAB

6.

Securing Applications

VIDEO

7.

Labs: Identifying Application Attack Indicators

LAB

8.

Quiz: Application Security

QUIZ

No.

Title

Type

Status

1.

Software Development

VIDEO

2.

SDLC Principles

VIDEO

3.

Testing Methods

VIDEO

4.

Software Vulnerabilities and Exploit

VIDEO

5.

Buffer Overflows

VIDEO

6.

Demo: Buffer Overflow Attack

VIDEO

7.

XSS and XSRF

VIDEO

8.

SQL Injection

VIDEO

9.

Demo: SQL Injection

VIDEO

10.

XML Vulnerabilities

VIDEO

11.

Race Conditions

VIDEO

12.

Design Vulnerabilities

VIDEO

13.

Labs: Identifying Application Attacks

LAB

14.

Quiz: Secure Software Development

QUIZ

No.

Title

Type

Status

1.

Network Security

VIDEO

2.

The OSI Model

VIDEO

3.

Switches

VIDEO

4.

Routers

VIDEO

5.

Network Zones

VIDEO

6.

Jumpbox

VIDEO

7.

Network Access Control

VIDEO

8.

VLANs

VIDEO

9.

Subnetting

VIDEO

10.

Network Address Translation

VIDEO

11.

Telephony

VIDEO

12.

Labs: Implementing a Secure Network Design

LAB

13.

Quiz: Network Design

QUIZ

No.

Title

Type

Status

1.

Perimeter Security

VIDEO

2.

Firewalls

VIDEO

3.

Demo: SOHO Firewall

VIDEO

4.

Labs: Configuring a Firewall

LAB

5.

Proxy Servers

VIDEO

6.

Honeypots and Honeynets

VIDEO

7.

Data Loss Prevention

VIDEO

8.

NIDS and NIPS

VIDEO

9.

Labs: Configuring an Intrusion Detection Systems

LAB

10.

Unified Threat Management

VIDEO

11.

Quiz: Perimeter Security

QUIZ

No.

Title

Type

Status

1.

Cloud Computing

VIDEO

2.

Cloud Types

VIDEO

3.

As a Service

VIDEO

4.

Cloud Security

VIDEO

5.

Defending Servers

VIDEO

6.

Cloud-based Infrastructure

VIDEO

7.

CASB

VIDEO

8.

API

VIDEO

9.

FAAS and Serverless

VIDEO

10.

Cloud Threats

VIDEO

11.

Quiz: Cloud Security

QUIZ

No.

Title

Type

Status

1.

Workflow Orchestration

VIDEO

2.

CI/CD

VIDEO

3.

DevSecOps

VIDEO

4.

IAC

VIDEO

5.

Machine Learning

VIDEO

6.

Quiz: Automation

QUIZ

No.

Title

Type

Status

1.

Network Attacks

VIDEO

2.

Ports and Protocols

VIDEO

3.

Memorization of Ports

VIDEO

4.

Unnecessary Ports

VIDEO

5.

Denial of Service

VIDEO

6.

DDoS

VIDEO

7.

Stopping a DDoS

VIDEO

8.

Spoofing

VIDEO

9.

Hijacking

VIDEO

10.

Replay Attack

VIDEO

11.

Demo: Null Sessions

VIDEO

12.

Transitive Attacks

VIDEO

13.

DNS Attacks

VIDEO

14.

ARP Poisoning

VIDEO

15.

Labs: Implementing Secure Network Addressing Services

LAB

16.

Quiz: Network Attacks

QUIZ

No.

Title

Type

Status

1.

Securing Networks

VIDEO

2.

Securing Network Devices

VIDEO

3.

Labs: Securing the Network Infrastructure

LAB

4.

Securing Network Media

VIDEO

5.

Securing WiFi Devices

VIDEO

6.

Wireless Encryption

VIDEO

7.

Wireless Access Points

VIDEO

8.

Wireless Attacks

VIDEO

9.

Demo: Wireless Attack

VIDEO

10.

WPA3

VIDEO

11.

Other Wireless Technologies

VIDEO

12.

Quiz: Securing Networks

QUIZ

No.

Title

Type

Status

1.

Physical Security

VIDEO

2.

Surveillance

VIDEO

3.

Door Locks

VIDEO

4.

Demo: Lock Picking

VIDEO

5.

Biometric Readers

VIDEO

6.

Quiz: Physical Security

QUIZ

No.

Title

Type

Status

1.

Facilities Security

VIDEO

2.

Fire Suppression

VIDEO

3.

HVAC

VIDEO

4.

Shielding

VIDEO

5.

Vehicular Vulnerabilities

VIDEO

6.

IoT Vulnerabilities

VIDEO

7.

Embedded System Vulnerabillities

VIDEO

8.

ICS and SCADA Vulnerabilities

VIDEO

9.

Mitigating Vulnerabilities

VIDEO

10.

Premise System Vulnerabilities

VIDEO

11.

Quiz: Facilities Security

QUIZ

No.

Title

Type

Status

1.

Authentication

VIDEO

2.

Authentication Models

VIDEO

3.

802.1x

VIDEO

4.

LDAP and Kerberos

VIDEO

5.

Labs: Configuring aIdentity and Access Management Controls

LAB

6.

Remote Desktop Services

VIDEO

7.

Remote Access Service

VIDEO

8.

VPN

VIDEO

9.

RADIUS vs TACACS+

VIDEO

10.

Authentication Summary

VIDEO

11.

Labs: Managing Centralized Authentication

LAB

12.

Authentication Attacks

VIDEO

13.

Quiz: Authentication

QUIZ

No.

Title

Type

Status

1.

Access Control

VIDEO

2.

Access Control Models

VIDEO

3.

Best Practices

VIDEO

4.

Users and Groups

VIDEO

5.

Permissions

VIDEO

6.

Usernames and Passwords

VIDEO

7.

Demo: Policies

VIDEO

8.

User Account Control

VIDEO

9.

Labs: Managing Access Controls in Windows Server

LAB

10.

Labs: Managing Access Controls in Linux

LAB

11.

Quiz: Access Control

QUIZ

No.

Title

Type

Status

1.

Risk Assessments

VIDEO

2.

Qualitative Risk

VIDEO

3.

Quantitative Risk

VIDEO

4.

Methodologies

VIDEO

5.

Security Controls

VIDEO

6.

Types of Risk

VIDEO

7.

Quiz: Risk Assessments

QUIZ

No.

Title

Type

Status

1.

Vulnerability Management

VIDEO

2.

Penetration Testing

VIDEO

3.

Training and Exercises

VIDEO

4.

OVAL

VIDEO

5.

Vulnerability Assessments

VIDEO

6.

Demo: Nmap Scanning

VIDEO

7.

Labs: Scanning and Indentifying Network Nodes

LAB

8.

Demo: Vulnerability Scanning

VIDEO

9.

Labs: Analyzing the Results of a Credentialed Vulnerability Scan

LAB

10.

Password Analysis

VIDEO

11.

Demo: Password Cracking

VIDEO

12.

Labs: Auditing Passwords with a Password Cracking Utility

LAB

13.

Quiz: Vulnerability Management

QUIZ

No.

Title

Type

Status

1.

Monitoring Types

VIDEO

2.

Performance Baselining

VIDEO

3.

Protocol Analyzers

VIDEO

4.

Labs: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools

LAB

5.

SNMP

VIDEO

6.

Demo: Analytical Tools

VIDEO

7.

Auditing

VIDEO

8.

Demo: Auditing Files

VIDEO

9.

Labs: Configuring a Systenm for Auditing Policies

LAB

10.

Logging

VIDEO

11.

Log Files

VIDEO

12.

SIEM

VIDEO

13.

Syslog

VIDEO

14.

SOAR

VIDEO

15.

Quiz: Monitoring and Auditing

QUIZ

No.

Title

Type

Status

1.

Cryptography

VIDEO

2.

Symmetric vs Asymmetric

VIDEO

3.

Symmetric Algorithms

VIDEO

4.

Public Key Cryptography

VIDEO

5.

Asymmetric Algorithms

VIDEO

6.

Pretty Good Privacy

VIDEO

7.

Key Management

VIDEO

8.

One-Time Pad

VIDEO

9.

Demo: Steganography

VIDEO

10.

Cryptography Considerations

VIDEO

11.

Quiz: Cryptography

QUIZ

No.

Title

Type

Status

1.

Hashing

VIDEO

2.

Demo: Hashing

VIDEO

3.

Hashing Attacks

VIDEO

4.

Increasing Hash Security

VIDEO

5.

Quiz: Hashing

QUIZ

No.

Title

Type

Status

1.

Public Key Infrastructure

VIDEO

2.

Digital Certificates

VIDEO

3.

Demo: Certificates

VIDEO

4.

Labs: Managing the Life Cycle of a Certificate

LAB

5.

Certificate Authorities

VIDEO

6.

Web of Trust

VIDEO

7.

Labs: Managing Certificates with OpenSSL

LAB

8.

Quiz: Public Key Infrastructure

QUIZ

No.

Title

Type

Status

1.

Security Protocols

VIDEO

2.

S/MIME

VIDEO

3.

SSL and TLS

VIDEO

4.

SSH

VIDEO

5.

Labs: Implement a Secure SSH Server

LAB

6.

VPN Protocols

VIDEO

7.

Demo: Setting up a VPN

VIDEO

8.

Labs: Imnplementing a Virtual Private Network

LAB

9.

Quiz: Security Protocols

QUIZ

No.

Title

Type

Status

1.

Planning for the Worst

VIDEO

2.

Redundant Power

VIDEO

3.

Backup Power

VIDEO

4.

Data Redundancy

VIDEO

5.

Demo: RAIDs

VIDEO

6.

Network Redundancy

VIDEO

7.

Server Redundancy

VIDEO

8.

Redundant Sites

VIDEO

9.

Data Backup

VIDEO

10.

Tape Rotation

VIDEO

11.

Labs: Backing Up and Restoring Data in Windows and Linux

LAB

12.

Disaster Recovery Plan

VIDEO

13.

Business Impact Analysis

VIDEO

14.

Quiz: Planning for the Worst

QUIZ

No.

Title

Type

Status

1.

Social Engineering

VIDEO

2.

Demo: Pretexting

VIDEO

3.

Insider Threat

VIDEO

4.

Phishing

VIDEO

5.

Motivation Factors

VIDEO

6.

More Social Engineering

VIDEO

7.

Fraud and Scams

VIDEO

8.

Influence Campaigns

VIDEO

9.

User Education

VIDEO

10.

Quiz: Social Engineering

QUIZ

No.

Title

Type

Status

1.

Policies and Procedures

VIDEO

2.

Data Classifications

VIDEO

3.

Data Ownership

VIDEO

4.

PII and PHI

VIDEO

5.

Legal Requirements

VIDEO

6.

Privacy Technologies

VIDEO

7.

Security Policies

VIDEO

8.

User Education

VIDEO

9.

Vendor Relationships

VIDEO

10.

Disposal Policies

VIDEO

11.

IT Security Frameworks

VIDEO

12.

Key Frameworks

VIDEO

13.

Quiz: Policies and Procedures

QUIZ

No.

Title

Type

Status

1.

Incident Response Procedures

VIDEO

2.

Incident Response Planning

VIDEO

3.

Investigative Data

VIDEO

4.

Labs: Managing Data Sources for Incident Response

LAB

5.

Labs: Managing Incident Response, Mitigation and Recovery

LAB

6.

Forensic Procedures

VIDEO

7.

Data Collection Procedures

VIDEO

8.

Demo: Disk Imaging

VIDEO

9.

Labs: Acquiring Digital Forensic Evidence

LAB

10.

Security Tools

VIDEO

11.

Quiz: Incident Response and Forensics

QUIZ

No.

Title

Type

Status

1.

Conclusion

VIDEO

2.

BONUS: What's Next?

VIDEO

No.

Title

Type

Status

1.

Practice Exam (SY0-601)

EXAM

Customer Reviews

Review Avatar Image

CLayton

confidential

5 out of 5 stars

With just this bootcamp course I passed Security+ well above the margin needed to pass.
Review Avatar Image

James Bauer

confidential

5 out of 5 stars

I decided to go with Jason Dion's Security+ course after getting amazing results from his Network+ course. I couldn't have been more confident going into exam day and you can't argue with the results! HIGHLY RECOMMEND
ato Comptia Logo
Accredited Training Organization
Dion Training is an Platinum Partner for CompTIA certification exams.

All of our courses undergo a stringent review by the accreditation body prior to being published. When you take a course through us, you can be assured you are getting the highest quality training and an affordable price.

60 Day Money Back Guarantee

100% Pass Guarantee

All the risk is on us, as it should be. You literally have nothing to lose.

We are so confident that you are going to learn everything you need to know to pass your CompTIA®, ITIL®, PRINCE2®, PRINCE2 Agile®, or Linux certification if you complete our courses at diontraining.com. So, if you do not pass your certification within 60 days of registering for and completing your course, simply send us your test score and your course completion letter, and we will pay for your exam retake.