🎉 BLACK FRIDAY GIVEAWAY 🎉

CompTIA® Security+ (701) Complete Course, Labs, & Practice Exams

CompTIA® Security+ (701) Complete Course, Labs, & Practice Exams

You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks for your organization.

Course Details

$349USD

Course Highlights

  • Course Price$349
  • InstructorsMazen Salama, Jamario Kelly, Jason Dion
  • Total Duration25h 38m
  • Total Lessons330
  • Total Quizzes12
  • Total Enrollments15 Students
  • Access to material12 Months
  • Official LabsIncluded
  • Official TextbookIncluded
  • Full Practice ExamsIncluded
  • 100% Pass GuaranteeIncluded

Disclaimer

Prices may vary depending on local currency and exchange rates.

License

Description

Taught by an expert in Information Technology and Cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security. CompTIA Security+ (SY0-701) is globally renowned as a leading cybersecurity certification!

The CompTIA Security+ (SY0-701) certification is an entry-level, vendor-neutral credential validating your knowledge and skills in assessing enterprise security posture, recommending/implementing security solutions, securing hybrid environments, operating with awareness of laws and policies, and responding to security incidents.

This course lays a foundation in cybersecurity, covering basic attacks, threats, vulnerabilities, architecture, design, security implementations, operations, incident response, and governance, risk, and compliance concepts. It is tailored for security administrators, systems administrators, help desk managers/analysts, security engineers/analysts, IT auditors, IT project managers, DevOps/Software Developers, network or cloud engineers, and anyone aiming to understand cybersecurity concepts.

By the end of the course, you'll be well-versed in security technician tasks and ready to take on a cybersecurity role in your organization! This course is your stepping stone towards the CompTIA Security+ (SY0-701) certification exam, covering all five domains:

  • Attacks, Threats, and Vulnerabilities (24%)
  • Architecture and Design (21%)
  • Implementation (25%)
  • Operations and Incident Response (16%)
  • Governance, Risk, and Compliance (14%)

Who is this for:

  • Students preparing for the CompTIA Security+ (SY0-701) Certification Exam.
  • Individuals wanting to learn the terminology and nomenclature of computer security.
  • Aspiring professionals seeking a career in cybersecurity.

Learning Objectives:

  • Take and pass the CompTIA Security+ (SY0-701) certification exam.
  • Understand computer security, its functions, and its components.
  • Perform basic security configurations.
  • Become an effective security technician in a business environment.

Course Overview:

You will learn the fundamentals of cybersecurity and gain hands-on experience in configuring, managing, and troubleshooting networks for your organization.

Prerequisites:

  • Basic familiarity with computer networks, administration, and security (All required information will be covered during the course).
  • Understanding of the concepts covered by the A+ and Network+ exams.

Course Outline:

Frequently Asked Questions

No.TitleTypeStatus
1.IntroductionVIDEO
2.Download your free study guidePDF
3.Exam TipsVIDEO
4.60 Day Pass GuaranteeVIDEO
5A.Lab: Exploring the Lab EnvironmentLAB
6.Checkpoint: IntroductionQUIZ
No.TitleTypeStatus
1.Fundamentals of SecurityVIDEO
2.Threats and VulnerablitiesVIDEO
3.ConfidentialityVIDEO
4.IntegrityVIDEO
5.AvailabilityVIDEO
6.Non-repudiationVIDEO
7.AuthenticationVIDEO
8.AuthorizationVIDEO
9.AccountingVIDEO
10.Security Control CategoriesVIDEO
11.Security Control TypesVIDEO
12A.Lab Configuring Examples of Security Control TypesLAB
13.Gap AnalysisVIDEO
14A.Lab: Perform System Configruation Gap AnalysisLAB
15.Zero TrustVIDEO
16.Checkpoint: Fundamentals of SecurityQUIZ
No.TitleTypeStatus
1.Threat ActorsVIDEO
2.Threat Actor MotivationsVIDEO
3.Threat Actor AttributesVIDEO
4.Unskilled AttackersVIDEO
5.HacktivistsVIDEO
6.Organized CrimeVIDEO
7.Nation-state ActorVIDEO
8.Insider ThreatsVIDEO
9.Shadow ITVIDEO
10.Threat Vectors and Attack SurfacesVIDEO
11.Outsmarting Threat ActorsVIDEO
12.Checkpoint: Threat ActorsQUIZ
No.TitleTypeStatus
1.Physical SecurityVIDEO
2.Fencing and BollardsVIDEO
3.Attacking with Brute ForceVIDEO
4.Surveillance SystemsVIDEO
5.Bypassing Surveillance SystemsVIDEO
6.Access Control VestibulesVIDEO
7.Door LocksVIDEO
8.Access Badge CloningVIDEO
9.Checkpoint: Physical SecurityQUIZ
No.TitleTypeStatus
1.Social EngineeringVIDEO
2.Motivational TriggersVIDEO
3.ImpersonationVIDEO
4.PretextingVIDEO
5.Phishing AttacksVIDEO
6.Preventing Phishing AttacksVIDEO
7.Conducting an Anti-Phishing CampaignVIDEO
8.Frauds and ScamsVIDEO
9.Influence CampaignsVIDEO
10.Other Social Engineering AttacksVIDEO
11A.Lab: Using SET to Perform Social EngineeringLAB
12.Checkpoint: Social EngineeringQUIZ
No.TitleTypeStatus
1.MalwareVIDEO
2.VirusesVIDEO
3.WormsVIDEO
4.TrojansVIDEO
5.Viruses and TrojansVIDEO
6.RansomwareVIDEO
7.Zombies and BotnetsVIDEO
8.RootkitsVIDEO
9.Backdoors and Logic BombsVIDEO
10.KeyloggerVIDEO
11.Spyware and BloatwareVIDEO
12.Malware Attack TechniquesVIDEO
13.Indications of Malware AttacksVIDEO
14A.Lab: Detecting and Responding to MalwareLAB
15.Checkpoint: MalwareQUIZ
No.TitleTypeStatus
1.Data ProtectionVIDEO
2.Data ClassificationsVIDEO
3.Data OwnershipVIDEO
4.Data StatesVIDEO
5.Data TypesVIDEO
6.Data SoverigntyVIDEO
7.Securing DataVIDEO
8.Data Loss Prevention (DLP)VIDEO
9.Configuring a DLPVIDEO
10.Checkpoint: Data ProtectionQUIZ
No.TitleTypeStatus
1.Cryptographic SolutionsVIDEO
2.Symmetric vs AsymmetricVIDEO
3.Symmetric AlgorithmsVIDEO
4.Asymmetric AlgorithmsVIDEO
5.HashingVIDEO
6.Increasing Hash SecurityVIDEO
7A.Lab: Using Hashing and SaltingLAB
8.Public Key Infrastructure (PKI)VIDEO
9.Digital CertificatesVIDEO
10.Exploring Digital CertificatesVIDEO
11.BlockchainVIDEO
12.Encryption ToolsVIDEO
13.ObfuscationVIDEO
14.Cryptographic AttacksVIDEO
15.Checkpoint: Cryptographic SolutionsQUIZ
No.TitleTypeStatus
1.Risk ManagementVIDEO
2.Risk Assessment FrequencyVIDEO
3.Risk IdentificationVIDEO
4.Risk RegisterVIDEO
5.Qualitative Risk AnalysisVIDEO
6.Quantiative Risk AnalysisVIDEO
7.Risk Management StrategiesVIDEO
8.Risk Monitoring and ReportingVIDEO
9.Checkpoint: Risk ManagementQUIZ
No.TitleTypeStatus
1.Third-party Vendor RisksVIDEO
2.Supply Chain RisksVIDEO
3.Supply Chain AttacksVIDEO
4.Vendor AssessmentVIDEO
5.Vendor Selection and MonitoringVIDEO
6.Contracts and AgreementsVIDEO
7.Checkpoint: Third-party Vendor RisksQUIZ
No.TitleTypeStatus
1.Governance and ComplianceVIDEO
2.GovernanceVIDEO
3.Governance StructuresVIDEO
4.PoliciesVIDEO
5.StandardsVIDEO
6.ProceduresVIDEO
7.Governance ConsiderationsVIDEO
8.ComplianceVIDEO
9.Non-compliance ConsequencesVIDEO
10.Checkpoint: Governance and ComplianceQUIZ
No.TitleTypeStatus
1.Asset and Change ManagementVIDEO
2.Acqusition and ProcurementVIDEO
3.Mobile Asset DeploymentsVIDEO
4.Asset ManagementVIDEO
5.Asset Disposal and DecommissioningVIDEO
6A.Lab: Performing Drive SanitizationLAB
7.Change ManagementVIDEO
8.Change Management ProcessesVIDEO
9.Technical Implictions of ChangesVIDEO
10.Documenting ChangesVIDEO
11.Checkpoint: Asset and Change ManagementQUIZ
No.TitleTypeStatus
1.Audits and AssessmentsVIDEO
2.Internal Audits and AssessmentsVIDEO
3.Performing an Internal AssessmentVIDEO
4.External Audits and AssessmentsVIDEO
5.Performing an External AsessmentVIDEO
6.Penetration TestingVIDEO
7.Reconnaissance in PentestingVIDEO
8A.Lab: Performing ReconnaissanceLAB
9.Performing a Basic PenTestVIDEO
10A.Lab: Performing Penetration TestingLAB
11.Attestation of FindingsVIDEO
12.Checkpoint: Audits and AssessmentsQUIZ
No.TitleTypeStatus
1.Cyber Resilience and RedundancyVIDEO
2.High AvailabilityVIDEO
3.Data RedundnacyVIDEO
4.Configuring a RAIDVIDEO
5.Capacity PlanningVIDEO
6.Powering Data CentersVIDEO
7.Data BackupsVIDEO
8A.Lab: Implement BackupsLAB
9.Continuity of Operations PlanVIDEO
10.Redundant Site ConsiderationsVIDEO
11.Resilience and Recovery TestingVIDEO
12.Checkpoint: Cyber Resilience and RedundancyQUIZ
No.TitleTypeStatus
1.Security ArchitectureVIDEO
2.On-premise versus the CloudVIDEO
3.Cloud SecurityVIDEO
4.Virtualization and ContainerizationVIDEO
5A.Lab: Using VirtualizationLAB
5B.Lab: Using ContainersLAB
6.ServerlessVIDEO
7.MicroservicesVIDEO
8.Network InfrastructureVIDEO
9.Software-Defined Network (SDN)VIDEO
10.Infrastructure as Code (IaC)VIDEO
11.Centralized vs Decentralized ArchitecturesVIDEO
12.Internet of Things (IoT)VIDEO
13.ICS and SCADAVIDEO
14.Embedded SystemsVIDEO
15.Checkpoint: Security ArchitectureQUIZ
No.TitleTypeStatus
1.Security InfrastructureVIDEO
2.Ports and ProtocolsVIDEO
3.FirewallsVIDEO
4.Configuring FirewallsVIDEO
5A.Lab: Implementing a FirewallLAB
6.IDS and IPSVIDEO
7.Network AppliancesVIDEO
8.Port SecurityVIDEO
9.Securing Network CommunicationsVIDEO
10A.Lab: Setting Up Remote AccessLAB
10B.Lab: Using IPSec TunnelingLAB
11.SD-WAN and SASEVIDEO
12.Infrastructure ConsiderationsVIDEO
13.Selecting Infrastructure ControlsVIDEO
14.Checkpoint: Security InfrastructureQUIZ
No.TitleTypeStatus
1.Identity and Access Management (IAM) SolutionsVIDEO
2.Identity and Access Management (IAM)VIDEO
3.Multifactor AuthenticationVIDEO
4.Password SecurityVIDEO
5A.Lab: Managing Password SecurityLAB
6.Password AttacksVIDEO
7.Single Sign-On (SSO)VIDEO
8.FederationVIDEO
9.Privileged Access Management (PAM)VIDEO
10.Access Control ModelsVIDEO
11.Assigning PermissionsVIDEO
12A.Lab: Managing PermissionsLAB
13.Checkpoint: Identity and Access Management (IAM) SolutionsQUIZ
No.TitleTypeStatus
1.Vulnerabilities and AttacksVIDEO
2.Hardware VulnerabilitiesVIDEO
3.Bluetooth Vulnerabilities and AttacksVIDEO
4.Mobile Vulnerabilities and AttacksVIDEO
5.Zero-day VulnerabilitiesVIDEO
6.Operating System VulnerabilitiesVIDEO
7.SQL and XML InjectionsVIDEO
8.Conducting an SQL InjectionVIDEO
9A.Lab: Exploiting and Detecting SQLiLAB
10.XSS and XSRFVIDEO
11.Buffer OverflowVIDEO
12.Race ConditionsVIDEO
13.Checkpoint: Vulnerabilities and AttacksQUIZ
No.TitleTypeStatus
1.Malicious ActivityVIDEO
2.Distributed Denial of ServiceVIDEO
3.Domain Name Server(DNS) AttacksVIDEO
4.Directory Traversal AttackVIDEO
5.Privilege Escalation AttackVIDEO
6.Replay AttacksVIDEO
7.Session HijackingVIDEO
8.On-path AttacksVIDEO
9A.Lab: Understanding On-Path AttacksLAB
10.Injection AttacksVIDEO
11.Indicators of Compromise (IoC)VIDEO
12.Checkpoint: Vulnerabilities and AttacksQUIZ
No.TitleTypeStatus
1.HardeningVIDEO
2.Changing Default ConfigurationsVIDEO
3.Restricting ApplicationsVIDEO
4A.Lab: Implementing Allow Lists and Deny ListsLAB
4B.Lab: HardeningLAB
5.Unnecessary ServicesVIDEO
6A.Lab: Finding Open Service PortsLAB
7.Trusted Operating SystemsVIDEO
8.Updates and PatchesVIDEO
9.Patch ManagementVIDEO
10.Group PoliciesVIDEO
11A.Lab: Using Group PolicyLAB
12.SELinuxVIDEO
13.Data Encryption LevelsVIDEO
14A.Lab: Using Storage EncryptionLAB
15.Secure BaselinesVIDEO
16A.Lab: Understanding Security BaselinesLAB
17.Checkpoint: HardeningQUIZ
No.TitleTypeStatus
1.Security TechniquesVIDEO
2.Wireless Infrastructure SecurityVIDEO
3.Wireless Security SettingsVIDEO
4.Application SecurityVIDEO
5.Network Access Control (NAC)VIDEO
6.Web and DNS FilteringVIDEO
7A.Lab: Performing DNS FilteringLAB
8.Email SecurityVIDEO
9.Endpoint Detection and ResponseVIDEO
10.User Behavior AnalyticsVIDEO
11.Selecting Secure ProtocolsVIDEO
12.Checkpoint: Security TechniquesQUIZ
No.TitleTypeStatus
1.Vulnerabliity ManagementVIDEO
2.Identifying VulnerabilitiesVIDEO
3.Threat Intelligence FeedsVIDEO
4A.Lab: Eworking with Threat FeedsLAB
5.Responsible Disclosure ProgramsVIDEO
6.Analyzing VulnerabilitiesVIDEO
7.Conducting Vulnerablity ScansVIDEO
8.Assessing Vulnerability Scan ResultsVIDEO
9A.Lab: Performing Vulnerability ScansLAB
10.Vulnerability Response and RemediationVIDEO
11.Validating Vulnerability RemediationVIDEO
12.Vulnerability ReportingVIDEO
13.Checkpoint: Vulnerabliity ManagementQUIZ
No.TitleTypeStatus
1.Alerting and MonitoringVIDEO
2.Monitoring ResourcesVIDEO
3.Alerting and Monitoring ActivitiesVIDEO
4.Simple Network Management Protocol (SNMP)VIDEO
5.Security Information and Event Management (SIEM)VIDEO
6A.Lab: Configuring System MonitoringLAB
7.Data from Security ToolsVIDEO
8.Security Content Automation and Protocol (SCAP)VIDEO
9.Netflow and Flow AnalysisVIDEO
10A.Lab: Using Network SniffersLAB
11.Single Pane of GlassVIDEO
12.Checkpoint: Alerting and MonitoringQUIZ
No.TitleTypeStatus
1.Incident ResponseVIDEO
2.Incident Response ProcessVIDEO
3A.Lab: Network Incident Investigation and RemediationLAB
4.Threat HuntingVIDEO
5.Root Cause AnalysisVIDEO
6A.Lab: Performing Root Cause AnalysisLAB
7.Incident Response Training and TestingVIDEO
8.Digital Forensic ProceduresVIDEO
9.Data Collection ProceduresVIDEO
10.Disk ImagingVIDEO
11A.Lab: Performing Digital ForensicsLAB
12.Checkpoint: Incident ResponseQUIZ
No.TitleTypeStatus
1.Investigating an IncidentVIDEO
2.Investigative DataVIDEO
3.DashboardsVIDEO
4.Automated ReportsVIDEO
5.Vulnerability ScansVIDEO
6.Packet CapturesVIDEO
7.Firewall LogsVIDEO
8.Application LogsVIDEO
9.Endpoint LogsVIDEO
10.OS-specific Security LogsVIDEO
11.IPS/IDS LogsVIDEO
12.Network LogsVIDEO
13.MetadataVIDEO
14A.Lab: Incident Response DetectionLAB
15.Checkpoint: Investigating an IncidentQUIZ
No.TitleTypeStatus
1.Automation and OrchestrationVIDEO
2.When to Automate and OrchestrateVIDEO
3.Benefits of Automation and OrchestratationVIDEO
4.Automating Support TicketsVIDEO
5.Automating OnboardingVIDEO
6.Automating SecurityVIDEO
7A.Lab: Using a PlaybookLAB
8.Automating Application DevelopmentVIDEO
9.Integrations and APIsVIDEO
10A.Lab: Use Cases of Automation and ScriptingLAB
11.Checkpoint: Automation and OrchestrationQUIZ
No.TitleTypeStatus
1.Security AwarenessVIDEO
2.Recognizing Insider ThreatsVIDEO
3.Password ManagersVIDEO
4.Avoiding Social EngineeringVIDEO
5A.Lab: Training and Awareness through SimulationLAB
6.Policy and HandbooksVIDEO
7.Remote and Hybrid Work EnvironmentsVIDEO
8.Creating a Culture of SecurityVIDEO
9.Checkpoint: Automation and OrchestrationQUIZ
No.TitleTypeStatus
1.ConclusionVIDEO
2.BONUS: Where do I go from here?VIDEO
3.Full-length Practice ExamQUIZ

Customer Reviews

Review Avatar Image

Bartlomiej Kurt

confidential

5 out of 5 stars

Hi there, I just want to confirm that I've had a very intensive and valuable training at "DION Training" course and passed the exam on my try. That really works as promised! I'm sure I'll be back for more. Thanks a lot!
Review Avatar Image

Stefanique S. Russell

Montino Roberts

5 out of 5 stars

The Dion Training was excellent and provided all the necessary tools I needed to successfully attain my certification in ITIL 4 Foundation.
ato Comptia Logo
Accredited Training Organization
Dion Training is an Platinum Partner for CompTIA certification exams.

All of our courses undergo a stringent review by the accreditation body prior to being published. When you take a course through us, you can be assured you are getting the highest quality training and an affordable price.

60 Day Money Back Guarantee

100% Pass Guarantee

All the risk is on us, as it should be. You literally have nothing to lose.

We are so confident that you are going to learn everything you need to know to pass your CompTIA®, ITIL®, PRINCE2®, PRINCE2 Agile®, or Linux certification if you complete our courses at diontraining.com. So, if you do not pass your certification within 60 days of registering for and completing your course, simply send us your test score and your course completion letter, and we will pay for your exam retake.