CompTIA Security+ (SY0-601) Complete Course & Exam
CompTIA Security+ (SY0-601) Complete Course & Exam, available at $89.99, has an average rating of 4.67, with 274 lectures, 32 quizzes, based on 3190 reviews, and has 16353 subscribers.
You will learn about Passing the CompTIA Security+ certification exam with confidence Understand computer security, its functions, and its components Performing basic security configurations Become an effective security technician in a business environment This course is ideal for individuals who are Students wanting to pass the CompTIA Security+ certification exam or Students wanting to learn the terminology and nomenclature of computer security or Students seeking a career in cyber security It is particularly useful for Students wanting to pass the CompTIA Security+ certification exam or Students wanting to learn the terminology and nomenclature of computer security or Students seeking a career in cyber security.
Enroll now: CompTIA Security+ (SY0-601) Complete Course & Exam
Summary
Title: CompTIA Security+ (SY0-601) Complete Course & Exam
Price: $89.99
Average Rating: 4.67
Number of Lectures: 274
Number of Quizzes: 32
Number of Published Lectures: 274
Number of Published Quizzes: 32
Number of Curriculum Items: 306
Number of Published Curriculum Objects: 306
Number of Practice Tests: 1
Number of Published Practice Tests: 1
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- Passing the CompTIA Security+ certification exam with confidence
- Understand computer security, its functions, and its components
- Performing basic security configurations
- Become an effective security technician in a business environment
Who Should Attend
- Students wanting to pass the CompTIA Security+ certification exam
- Students wanting to learn the terminology and nomenclature of computer security
- Students seeking a career in cyber security
Target Audiences
- Students wanting to pass the CompTIA Security+ certification exam
- Students wanting to learn the terminology and nomenclature of computer security
- Students seeking a career in cyber security
** Taught by a Best Selling IT Certification Instructor **
Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.
My name is Jason Dion, and I have personally helped over 500,000 students earn their IT certifications, and now I can help you, too!
You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.
CompTIA Security+ (SY0-601)is the world’s most popular cybersecurity certification today!
This course is designed to help prepare you for the CompTIA Security+ (SY0-601) certification examand covers all the domains for the certification exam:
-
Attacks, Threats, and Vulnerabilities
-
Architecture and Design
-
Implementation
-
Operations and Incident Response
-
Governance, Risk, and Compliance
What You Will Receive In The Course:
-
Video lectures with the essential information needed to pass the Security+ (SY0-601) exam
-
A complete downloadable study guide in PDF format based on the lessons
-
Practice quizzes to ensure mastery of each section of the course
-
A full-length practice exam with multiple choice and mock simulations
This course stays current and up-to-date with the SY0-601 versionof the exam, and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!
Upon completion of this course, you will earn 21 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.
Course Curriculum
Chapter 1: Overview of Security
Lecture 1: Welcome
Lecture 2: Download the Study Guide
Lecture 3: Overview of Security
Lecture 4: CIA Triad
Lecture 5: AAA of Security (OBJ 2.4)
Lecture 6: Security Threats (OBJ 1.1 & 1.2)
Lecture 7: Mitigating Threats (OBJ 5.1)
Lecture 8: Hackers (OBJ 1.5)
Lecture 9: Threat Actors (1.5)
Lecture 10: Threat Intelligence and Sources (OBJ 1.5)
Lecture 11: Threat Hunting (OBJ 1.7)
Lecture 12: Attack Frameworks (OBJ 4.2)
Chapter 2: Malware
Lecture 1: Malware (OBJ 1.2)
Lecture 2: Viruses (OBJ 1.2)
Lecture 3: Worms (OBJ 1.2)
Lecture 4: Trojans (OBJ 1.2)
Lecture 5: Demo: Viruses and Trojans (OBJ 1.2)
Lecture 6: Ransomware (OBJ 1.2)
Lecture 7: Spyware (OBJ 1.2)
Lecture 8: Rootkits (OBJ 1.2 & 1.3)
Lecture 9: Spam (OBJ 1.1)
Lecture 10: Summary of Malware
Chapter 3: Malware Infections
Lecture 1: Malware Infections
Lecture 2: Common Delivery Methods (OBJ 1.1 & 1.5)
Lecture 3: Demo: Phishing (OBJ 1.1 & 5.3)
Lecture 4: Botnets and Zombies (OBJ 1.2 & 1.4)
Lecture 5: Active Interception and Privilege Escalation (OBJ 1.3 & 1.4)
Lecture 6: Demo: Privilege Escalation (OBJ 1.3 & 1.8)
Lecture 7: Backdoors and Logic Bombs (OBJ 1.2)
Lecture 8: Symptoms of Infection (OBJ 1.2)
Lecture 9: Removing Malware (OBJ 4.2)
Lecture 10: Preventing Malware (OBJ 1.6 & 3.2)
Lecture 11: Malware Exploitation (OBJ 1.2 & 1.4)
Chapter 4: Security Applications and Devices
Lecture 1: Security Applications and Devices
Lecture 2: Software Firewalls (OBJ 3.2)
Lecture 3: Demo: Software Firewalls (OBJ 3.2)
Lecture 4: IDS (OBJ 3.2 & 3.3)
Lecture 5: Pop-up Blockers (OBJ 1.1, 3.3, 4.4)
Lecture 6: Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4)
Lecture 7: Securing the BIOS (OBJ 3.2)
Lecture 8: Securing Storage Devices (OBJ 2.1, 2.5, & 3.3)
Lecture 9: Disk Encryption (OBJ 2.1, 2.8 & 3.2)
Lecture 10: Endpoint Analysis (OBJ 3.1 & 3.3)
Chapter 5: Mobile Device Security
Lecture 1: Mobile Device Security (OBJ 1.5)
Lecture 2: Securing Wireless Devices (OBJ 3.4 & 3.5)
Lecture 3: Mobile Malware (OBJ 1.1 & 3.5)
Lecture 4: SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6)
Lecture 5: Bluetooth Attacks (OBJ 1.4 & 3.4)
Lecture 6: Mobile Device Theft (OBJ 3.5)
Lecture 7: Security of Apps (OBJ 3.1 & 3.5)
Lecture 8: BYOD (OBJ 3.5)
Lecture 9: Hardening Mobile Devices (OBJ 3.5)
Chapter 6: Hardening
Lecture 1: Hardening (OBJ 3.2)
Lecture 2: Unnecessary Applications (OBJ 1.6)
Lecture 3: Restricting Applications (OBJ 3.2 & 4.4)
Lecture 4: Demo: Unnecessary Services (OBJ 3.2 & 3.3)
Lecture 5: Trusted Operating System (OBJ 3.2)
Lecture 6: Updates and Patches (OBJ 1.6 & 3.2)
Lecture 7: Patch Management (OBJ 1.6 & 3.2)
Lecture 8: Group Policies (OBJ 2.1)
Lecture 9: Demo: Group Policies (OBJ 3.2)
Lecture 10: File Systems and Hard Drives (OBJ 2.1 & 3.2)
Chapter 7: Supply Chain Management
Lecture 1: Supply Chain Assessment (OBJ 1.2, 1.5, & 1.6)
Lecture 2: Root of Trust (OBJ 3.2)
Lecture 3: Trusted Firmware (OBJ 3.2)
Lecture 4: Secure Processing (OBJ 3.2)
Chapter 8: Virtualization
Lecture 1: Virtualization (OBJ 2.2)
Lecture 2: Hypervisors (OBJ 2.2)
Lecture 3: Demo: How to create a VM (OBJ 2.2)
Lecture 4: Threats to VMs (OBJ 2.2)
Lecture 5: Securing VMs (OBJ 2.2)
Lecture 6: Demo: Securing VMs
Chapter 9: Application Security
Lecture 1: Application Security
Lecture 2: Web Browser Security (OBJ 3.2 & 3.3)
Lecture 3: Web Browser Concerns (OBJ 3.2 & 3.3)
Lecture 4: Demo: Web Browser Configuration (OBJ 3.2 & 3.3)
Lecture 5: Securing Applications (OBJ 1.4 & 3.2)
Chapter 10: Secure Software Development
Lecture 1: Software Development (OBJ 2.1 & 2.3)
Lecture 2: SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3)
Lecture 3: Testing Methods (OBJ 2.3 & 3.2)
Lecture 4: Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6)
Instructors
-
Jason Dion • 1.8 Million+ Enrollments Worldwide
CISSP, CEH, Pentest+, CySA+, Sec+, Net+, A+, PRINCE2, ITIL -
Dion Training Solutions • ATO for ITIL & PRINCE2
Courses in IT Ops, Cyber Security, and Project Management -
Dion Training Solutions • ATO for ITIL & PRINCE2
Courses in IT Ops, Cyber Security, and Project Management
Rating Distribution
- 1 stars: 23 votes
- 2 stars: 18 votes
- 3 stars: 156 votes
- 4 stars: 826 votes
- 5 stars: 2167 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024