The Comp TIA Security+ course is a great first step for anyone who wants to become certified in security technology. It covers the industry-standard technologies and methodologies including basic level computer knowledge, networking, and organizational security.
Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Regulators and government rely on ANSI accreditation, because it provides confidence and trust in the outputs of an accredited program. Over 2.3 million CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.
Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
- Identify, analyze, and respond to security events and incidents
The goal of this course is to provide you with all the tools you need to prepare for the Comp TIA Security + certification exam — including text explanations, self-assessment questions, and two practice exams— to increase your chances of passing the exam on your first try.
Lesson 1: Summarize Fundamental Security Concepts
-
1CompTIA CertMaster Learn for Security+ Exam SY0-701
-
2Using CertMaster Learn
-
3Lesson 1 Summarize Fundamental Security Concepts
-
4Topic 1A Security Concepts
-
5Information Security
-
6Cybersecurity Framework
-
7Gap Analysis
-
8Access Control
-
9Topic 1B Security Controls
-
10Security Control Categories
-
11Security Control Functional Types
-
12Information Security Roles and Responsibilities
-
13Information Security Competencies
-
14Information Security Business Units
-
15Lesson 1 Summary
Lesson 2: Introduction & Objectives
-
16Lesson 2: Introduction & Objectives
-
17Introduction: Threat Actors
-
18Vulnerability, Threat, and Risk
-
19Attributes of Threat Actors
-
20Motivations of Threat Actors
-
21Hackers and Hacktivists
-
22Nation-State Actors
-
23Organized Crime and Competitors
-
24Internal Threat Actors
-
25Topic 2B Attack Surfaces
-
26Attack Surface and Threat Vectors
-
27Vulnerable Software Vectors
-
28Network Vectors
-
29Lure-Based Vectors
-
30Message-Based Vectors
-
31Supply Chain Attack Surface
-
32Topic 2C Social Engineering
-
33Human Vectors
-
34Impersonation and Pretexting
-
35Phishing and Pharming
-
36Typosquatting
-
37Business Email Compromise
-
38Lesson 2 Summary
Lesson 3 Explain Cryptographic Solutions
-
39Lesson 3 Explain Cryptographic Solutions
-
40Topic 3A Cryptographic Algorithms
-
41Cryptographic Concepts
-
42Symmetric Encryption
-
43Key Length
-
44Asymmetric Encryption
-
45Hashing
-
46Digital Signatures
-
47Topic 3B Public Key Infrastructure
-
48Certificate Authorities
-
49Digital Certificates
-
50Root of Trust
-
51Certificate Signing Requests
-
52Subject Name Attributes
-
53Certificate Revocation
-
54Key Management
-
55Cryptoprocessors and Secure Enclaves
-
56Key Escrow
-
57Topic 3C Cryptographic Solutions
-
58Encryption Supporting Confidentiality
-
59Disk and File Encryption
-
60Database Encryption
-
61Transport Encryption and Key Exchange
-
62Perfect Forward Secrecy
-
63Salting and Key Stretching
-
64Blockchain
-
65Obfuscation
-
66Lesson 3 Summary
Lesson 4 Implement Identity and Access Management
-
67Lesson 4: Introduction & Objectives
-
68Topic 4A Authentication
-
69Authentication Design
-
70Password Concepts
-
71Password Managers
-
72Multifactor Authentication
-
73Biometric Authentication
-
74Hard Authentication Tokens
-
75Soft Authentication Tokens
-
76Passwordless Authentication
-
77Topic 4B Authorization
-
78Discretionary and Mandatory Access Control
-
79Role- and Attribute-Based Access Control
-
80Rule-Based Access Control
-
81Least Privilege Permission Assignments
-
82User Account Provisioning
-
83Account Attributes and Access Policies
-
84Account Restrictions
-
85Privileged Access Management
-
86Topic 4C Identity Management
-
87Local, Network, and Remote Authentication
-
88Directory Services
-
89Single Sign-on Authentication
-
90Single Sign-on Authorization
-
91Federation
-
92Security Assertion Markup Language
-
93Open Authorization
-
94Lesson 4 Summary
Lesson 5 Secure Enterprise Network Architecture
-
95Lesson 5: Introduction & Objectives
-
96Topic 5A Enterprise Network Architecture
-
97Architecture and Infrastructure Concepts
-
98Network Infrastructure
-
99Switching Infrastructure Considerations
-
100Routing Infrastructure Considerations
-
101Security Zones
-
102Attack Surface
-
103Port Security
-
104Physical Isolation
-
105Architecture Considerations
-
106Topic 5B Network Security Appliances
-
107Device Placement
-
108Device Attributes
-
109Firewalls
-
110Layer 4 and Layer 7 Firewalls
-
111Proxy Servers
-
112Intrusion Detection Systems
-
113Next-Generation Firewalls and Unified Threat Management
-
114Load Balancers
-
115Web Application Firewalls