Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Comptia Security+ (Sy0-601) Course With Practice Exam

    Posted By: ELK1nG
    Comptia Security+ (Sy0-601) Course With Practice Exam

    Comptia Security+ (Sy0-601) Course With Practice Exam
    Published 4/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 19.51 GB | Duration: 24h 15m

    Full Practice Exam | Simulated PBQs | Video Lessons | Everything you need to pass the CompTIA Security+ SY0-601 exam

    What you'll learn

    Get access to this complete and high-quality course for the CompTIA Security+ SY0-601 certification exam

    Pass the CompTIA Security+ with confidence and learn practical skills you can directly apply on-the-job

    Common threats, attacks, and vulnerabilities (social engineering, malware, network-based, cloud-based, supply-chain, etc…) and how to defend against them

    Proper security architecture and design for: enterprise environments, cloud computing, app development, authentication & authorization, and more

    How to properly implement secure protocols, host & app security solutions, secure network designs, mobile solutions, cloud solutions, PKI, and more

    Incident response approaches: selecting the right tools, policies, processes, and procedures, key aspects of digital forensics, and mitigation techniques

    Governance, Risk, and Compliance concepts: controls, frameworks, regulations & standards, policies, risk management, and privacy for the enterprise

    Full practice exam (multiple choice Q&A) and Performance-Based Questions (PBQs) with explanations included!

    Requirements

    Basic familiarity with computers

    The course covers all topics in detail, but a general understanding of networking is helpful

    No prior certifications required

    Windows / Mac OS / Linux machine with internet access

    Description

    Welcome! I'm here to help you prepare for and PASS the CompTIA Security+ SY0-601 exam!Whether you are new to IT or you already have experience, my course is designed to help you learn all of the topics you need.–––––––––––-Are you trying to get started in cybersecurity? Or are you looking to get a higher-paying job?The CompTIA Security+ certification is one of the most well-known cybersecurity certifications. It can not only provide you with more job opportunities, but it also provides you with a learning path of important cybersecurity topics you need to understand in order to have a successful career in this space. In fact, certain jobs require that you have at least one IT certification, and the Security+ can often qualify as one of those certifications.By the way, my name is Christophe Limpalair and I’m the founder of Cybr, a cybersecurity training platform, and the author of this all-in-one Security+ course. I have over 7 years of training experience, and I’ve been in IT for about 20 years. I’ve taught tens of thousands of students in cybersecurity, cloud computing, and web development, and I look forward to helping you get certified.I've personally taken and passed this exam, so I know exactly what you need to learn and how, and I've sprinkled in tips and tricks throughout the course that will help you get ready for the real exam. I specifically designed this course syllabus to match the official CompTIA Exam Objectives so that you can keep track of what you’ve learned and what you still need to learn.This exam has 5 different domains:Domain 1 is about Attacks, Threats, and Vulnerabilities – which is 24% of the examDomain 2 is about Architecture and Design – which is 21% of the examDomain 3 is about Implementation – which is 25% of the examDomain 4 is about Operations and Incident Response – which is 16% of the examDomain 5 is about Governance, Risk, and Compliance – which is 14% of the examWithin these domains, you will learn about malware, web/cloud/network attacks, cryptography, network configurations, authentication, and much, much more.If any of those topics sound overwhelming to you — don’t worry! I walk you through it all lesson by lesson.In fact, this course has over 300 video lessons which is over 23 hours of high-quality video content as well as additional learning materials including a study template you can customize, a full list of Security+ acronyms and their definitions, and knowledge check quizzes.I’ve even included a multiple-choice practice exam at the end of the course to validate your knowledge and understanding, and I provide free access to multiple Performance-Based Questions (PBQs) that you can take and that mimic PBQs you can expect to see on the exam.On top of the training you receive, you get access to Cybr’s free Discord community where you can meet others who are actively studying for the Security+ or who have passed it and can provide you with tips and tricks.If you still have doubts, by the way, I provide a 30-day money-back policy pursuant to Udemy's refund policies.With an increasing demand for cybersecurity jobs, getting started with this course is a no-brainer. Let’s get started, and let’s take your career to the next level!I’ll see you in the course!–––––––––––-About the InstructorHi, my name is Christophe Limpalair, and I will be your instructor for this course. I got my start in IT at the age of 11 building websites for organizations. This is where I first learned the importance of writing secure code because some of my websites got hacked and I had to figure out how. Back then, there weren't very many affordable learning resources for this topic, so figuring this out was very painful at times. That's when I first started to realize that more training was needed in IT. Fast-forward a few years, and this thing called "AWS" was becoming more and more popular. I started learning how it worked by migrating a few of my projects to it, and I fell in love. Cloud computing was the real deal and I knew it was going to become more and more important over time, so I learned as much of it as I could. Around the same time, I founded a training platform for developers which got acquired by Linux Academy in 2016. There, I authored multiple AWS courses including: AWS Lambda Deep Dive, AWS Certified Developer Associate (certification course), AWS Certified DevOps Engineer Professional (certification course), AWS Backup Strategies, and more. I also helped build and secure our Hands-On Labs platform which was constantly under attack because malicious actors wanted to abuse our lab platform to mine cryptocurrency or to launch external attacks from our infrastructure. At the same time, many of our business customers were also sharing that they had issues and concerns with making sure their cloud environments and resources were secure, especially as they were migrating from on-prem.Once Linux Academy was acquired and merged with ACloudGuru in 2019, I decided to launch my own training platform called Cybr to provide affordable cybersecurity training, including this course and AWS cloud security courses, as well as ethical hacking courses.Long story short, I've been in IT for about 20 years and I've gotten exposure to web development, cloud computing, and cybersecurity. These are all topics I'm passionate about and that are needed to understand for the Security+ exam, and I love giving back because so many people have helped me along my journey. That's why I've been creating both free and affordable training material for over 7 years, and that's why I created a free community that all are welcome to join. I hope to see you in my community and in my course!–––––––––––-This course also comes with:Lifetime access to the contentUdemy Certificate of CompletionFree access to a cybersecurity communityNotion study template you can fully customizeFull list of Security+ acronyms and their definitionsFull practice exam (multiple choice Q&A) with explanationsPerformance-Based Questions (PBQs) with explanationsLet's get you CompTIA Security+ certified!

    Overview

    Section 1: About the course and exam

    Lecture 1 About the course and certification

    Lecture 2 About the course author

    Lecture 3 Pre-requisites

    Lecture 4 Tools and tips to help you study more efficiently

    Lecture 5 Study techniques that will help you pass

    Lecture 6 What surprised me the most about the exam

    Lecture 7 Join our Discord community for support and interaction

    Lecture 8 Acronym definitions and study template

    Section 2: Domain 1: Threats, Attacks, and Vulnerabilities

    Lecture 9 About threats, attacks, and vulnerabilities

    Section 3: 1.1: Compare and contrast social engineering techniques

    Lecture 10 What is social engineering?

    Lecture 11 Principles

    Lecture 12 Spam

    Lecture 13 Blocking and Managing Spam

    Lecture 14 Phishing

    Lecture 15 Smishing

    Lecture 16 Vishing

    Lecture 17 Spear phishing

    Lecture 18 Whaling

    Lecture 19 Impersonation

    Lecture 20 Dumpster diving

    Lecture 21 Shoulder surfing

    Lecture 22 Pharming

    Lecture 23 Tailgating

    Lecture 24 Eliciting information

    Lecture 25 Prepending

    Lecture 26 Identity fraud

    Lecture 27 Invoice scams

    Lecture 28 Credentials harvesting

    Lecture 29 Reconnaissance

    Lecture 30 Hoax

    Lecture 31 Watering hole attack

    Lecture 32 Typo squatting and URL Hijacking

    Lecture 33 Influence campaigns

    Lecture 34 Hybrid warfare

    Section 4: 1.2: Analyze potential indicators to determine the type of attack

    Lecture 35 What is malware?

    Lecture 36 Malware classification

    Lecture 37 Virus

    Lecture 38 Worms

    Lecture 39 Backdoor

    Lecture 40 Trojans

    Lecture 41 Remote access Trojan (RAT)

    Lecture 42 Ransomware and Crypto Malware

    Lecture 43 How does ransomware work?

    Lecture 44 Potentially unwanted programs (PUPs)

    Lecture 45 Spyware

    Lecture 46 Adware & Malvertising

    Lecture 47 Keyloggers

    Lecture 48 Fileless malware

    Lecture 49 Logic bombs

    Lecture 50 Rootkit

    Lecture 51 Bots and Botnets

    Lecture 52 Command and control

    Lecture 53 What are password attacks?

    Lecture 54 Plaintext, encrypted, and hashed passwords

    Lecture 55 Brute force

    Lecture 56 Dictionary attacks

    Lecture 57 Spraying attacks

    Lecture 58 Rainbow and hash tables

    Lecture 59 Credential stuffing

    Lecture 60 What are physical attacks?

    Lecture 61 Malicious universal serial bus (USB) cable

    Lecture 62 Malicious flash drive

    Lecture 63 Card cloning

    Lecture 64 Skimming

    Lecture 65 What is adversarial AI and tainted training for ML?

    Lecture 66 Supply-chain attacks

    Lecture 67 Cloud-based vs. on-premises attacks

    Lecture 68 Cryptography concepts

    Lecture 69 Cryptographic attacks

    Section 5: 1.3: Analyze potential indicators associated with application attacks

    Lecture 70 Privilege escalation

    Lecture 71 Improper input handling

    Lecture 72 Improper error handling

    Lecture 73 Cross-Site Scripting (XSS)

    Lecture 74 Structured query language (SQL Injections)

    Lecture 75 Dynamic Link Library (DLL Injections)

    Lecture 76 Lightweight directory access protocol (LDAP Injections)

    Lecture 77 Extensible Markup Language (XML) and XPATH Injections

    Lecture 78 XXE Injections

    Lecture 79 Directory traversal

    Lecture 80 Request forgeries

    Lecture 81 Application Programming Interface (API) attacks

    Lecture 82 Secure Sockets Layer (SSL) stripping

    Lecture 83 Replay attack (session replays)

    Lecture 84 Pass the hash

    Lecture 85 Race conditions (time of check and time of use)

    Lecture 86 Resource exhaustion

    Lecture 87 Memory leak

    Lecture 88 Pointer/object dereference

    Lecture 89 Integer overflow

    Lecture 90 Buffer overflows

    Lecture 91 Driver manipulation (shimming and refactoring)

    Section 6: 1.4: Analyze potential indicators of network attacks

    Lecture 92 What are wireless attacks?

    Lecture 93 Distributed Denial of Service (DDoS)

    Lecture 94 Rogue access point and Evil Twin

    Lecture 95 Bluesnarfing and Bluejacking

    Lecture 96 Disassociation and Jamming

    Lecture 97 Radio Frequency Identifier (RFID) attacks

    Lecture 98 Near Field Communication (NFC) attacks

    Lecture 99 Initialization Vector (IV)

    Lecture 100 Man in the middle

    Lecture 101 Man in the browser

    Lecture 102 What are layer 2 attacks?

    Lecture 103 Address resolution protocol (ARP) poisoning

    Lecture 104 Media access control (MAC) flooding

    Lecture 105 MAC cloning & spoofing

    Lecture 106 What are Domain Name System (DNS) attacks and defenses?

    Lecture 107 Domain hijacking

    Lecture 108 DNS poisoning

    Lecture 109 Universal resource locator (URL) redirection

    Lecture 110 Domain reputation

    Section 7: 1.5: Explain threat actors, vectors, and intelligence sources

    Lecture 111 What are actors and threats?

    Lecture 112 Attributes of actors

    Lecture 113 Vectors

    Lecture 114 Insider threats

    Lecture 115 State actors

    Lecture 116 Hacktivists

    Lecture 117 Script kiddies

    Lecture 118 Hackers (white hat, black hat, gray hat)

    Lecture 119 Criminal syndicates

    Lecture 120 Advanced persistent threat (APT)

    Lecture 121 Shadow IT

    Lecture 122 Competitors

    Lecture 123 Threat intelligence sources (OSINT and others)

    Lecture 124 Using threat intelligence

    Lecture 125 Research sources

    Section 8: 1.6: Security concerns associated with various vulnerabilities

    Lecture 126 Cloud-based vs. on-premises vulnerabilities

    Lecture 127 Zero-day vulnerabilities

    Lecture 128 Weak configurations

    Lecture 129 Weak encryption, hashing, and digital signatures

    Lecture 130 Third-party risks

    Lecture 131 Improper or weak patch management

    Lecture 132 Legacy platforms

    Lecture 133 Impacts

    Section 9: 1.7 Summarizing techniques used in security assessments

    Lecture 134 Threat hunting

    Lecture 135 Vulnerability scans

    Lecture 136 Syslog/Security information and event management (SIEM)

    Lecture 137 Security orchestration, automation, response (SOAR)

    Section 10: 1.8 Explaining techniques used in penetration testing

    Lecture 138 Important pentesting concepts

    Lecture 139 Bug bounties

    Lecture 140 Exercise types (red, blue, white, and purple teams)

    Lecture 141 Passive and active reconnaissance

    Section 11: Domain 2: Architecture and Design

    Lecture 142 About architecture and design

    Section 12: 2.1: Explaining the importance of security concepts in an enterprise environment

    Lecture 143 Configuration management

    Lecture 144 Data sovereignty

    Lecture 145 Data protection

    Lecture 146 Hardware security module (HSM) and Trusted Platform Module (TPM)

    Lecture 147 Geographical considerations

    Lecture 148 Cloud access security broker (CASB)

    Lecture 149 Response and recovery controls

    Lecture 150 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) inspection

    Lecture 151 Hashing

    Lecture 152 API considerations

    Lecture 153 Site resiliency

    Lecture 154 Deception and disruption

    Section 13: 2.2: Virtualization and cloud computing concepts

    Lecture 155 Comparing cloud models

    Lecture 156 Cloud service providers

    Lecture 157 Virtualization

    Lecture 158 Containers

    Lecture 159 Microservices and APIs

    Lecture 160 Serverless architecture

    Lecture 161 MSPs and MSSPs

    Lecture 162 On-premises vs. off-premises

    Lecture 163 Edge computing

    Lecture 164 Fog computing

    Lecture 165 Thin client

    Lecture 166 Infrastructure as Code (IaC)

    Lecture 167 Services integration

    Lecture 168 Resource policies

    Lecture 169 Transit gateway

    Section 14: 2.3: Secure application development, deployment, and automation concepts

    Lecture 170 Understanding development environments

    Lecture 171 Automation and scripting

    Lecture 172 Version control

    Lecture 173 Secure coding techniques

    Lecture 174 Open Web Application Security Project (OWASP)

    Lecture 175 Integrity measurement

    Lecture 176 Software diversity

    Lecture 177 Provisioning and deprovisioning

    Lecture 178 Elasticity

    Lecture 179 Scalability

    Section 15: 2.4: Authentication and authorization design concepts

    Lecture 180 Important authentication and authorization concepts

    Lecture 181 Multifactor authentication (MFA) factors and attributes

    Lecture 182 Authentication technologies

    Lecture 183 Biometrics techniques and concepts

    Lecture 184 Authentication, authorization, and accounting (AAA)

    Lecture 185 Cloud vs. on-premises requirements

    Section 16: 2.5: Implementing cybersecurity resilience

    Lecture 186 What is redundancy

    Lecture 187 Disk redundancy (RAID levels)

    Lecture 188 Network redundancy

    Lecture 189 Power redundancy

    Lecture 190 Replication

    Lecture 191 Backup types (full, incremental, differential, and snapshot)

    Lecture 192 Backup types practice scenarios

    Lecture 193 Backup devices and strategies

    Lecture 194 Non-persistence

    Lecture 195 Restoration order

    Lecture 196 Diversity

    Section 17: 2.6: Security implications of embedded and specialized systems

    Lecture 197 What are embedded systems?

    Lecture 198 System on a Chip (SoC)

    Lecture 199 SCADA and ICS

    Lecture 200 Internet of Things (IoT)

    Lecture 201 Specialized systems

    Lecture 202 VoIP, HVAC, Drones/AVs, MFP, RTOS, Surveillance systems

    Lecture 203 Communication considerations

    Lecture 204 Important constraints

    Section 18: 2.7: Importance of physical security controls

    Lecture 205 Bollards/barricades, Mantraps, Badges, Alarms, Signage

    Lecture 206 Lighting and fencing

    Lecture 207 Cameras and Closed-circuit television (CCTV)

    Lecture 208 Industrial camouflage

    Lecture 209 Personnel, robots, drones/UAVs

    Lecture 210 Locks

    Lecture 211 Different sensors

    Lecture 212 Fire suppression

    Lecture 213 Protected cable distribution (PCD)

    Lecture 214 Secure areas (air gap, faraday cages, DMZ, etc…)

    Lecture 215 Hot and cold aisles

    Lecture 216 Secure data destruction

    Lecture 217 USB data blocker

    Section 19: 2.8: Basics of cryptography

    Lecture 218 Common use cases

    Lecture 219 Key length

    Lecture 220 Key stretching

    Lecture 221 Salting, hashing, digital signatures

    Lecture 222 Perfect forward secrecy

    Lecture 223 Elliptic curve cryptography

    Lecture 224 Ephemeral

    Lecture 225 Symmetric vs. asymmetric encryption

    Lecture 226 Key exchange

    Lecture 227 Cipher suites

    Lecture 228 Modes of operation

    Lecture 229 Lightweight cryptography and Homomorphic encryption

    Lecture 230 Steganography

    Lecture 231 Blockchain

    Lecture 232 Quantum and post-quantum

    Lecture 233 Limitations

    Section 20: Domain 3: Implementation

    Lecture 234 About implementation

    Section 21: 3.1: Implement Secure Protocols

    Lecture 235 Important protocols to know and use cases

    Lecture 236 Important email secure protocols

    Lecture 237 IPsec and VPN

    Lecture 238 FTPS, SFTP, SCP

    Lecture 239 DNSSEC

    Lecture 240 SRTP and NTPsec

    Lecture 241 DHCP

    Lecture 242 SNMP and SNMPv3

    Section 22: 3.2: Implement host or application security solutions

    Lecture 243 Endpoint protection

    Lecture 244 Self-encrypting drive (SED), full disk encryption (FDE), and file-level encrypti

    Lecture 245 Boot integrity

    Lecture 246 Database and data security

    Lecture 247 Application security

    Lecture 248 Hardening hosts

    Lecture 249 Sandboxing

    Section 23: 3.3: Implement secure network designs

    Lecture 250 DNS

    Lecture 251 Load balancing

    Lecture 252 Network segmentation

    Lecture 253 East-West and North-South

    Lecture 254 Jump servers (bastion hosts)

    Lecture 255 NAT Gateways

    Lecture 256 Proxy servers

    Lecture 257 Out-of-band management

    Lecture 258 Virtual Private Networks (VPNs) and IPsec

    Lecture 259 Network Access Control (NAC)

    Lecture 260 Port security

    Lecture 261 Network-based intrusion detection and prevention system (NIDS and NIPS)

    Lecture 262 Firewalls

    Lecture 263 Next-Generation Firewalls

    Lecture 264 Access Control List (ACL) and Security Groups (SGs)

    Lecture 265 Quality of Service (QoS)

    Lecture 266 Implications of IPv6

    Lecture 267 Port scanning and port mirroring

    Lecture 268 File integrity monitors

    Section 24: 3.4: Install and configure wireless security settings

    Lecture 269 Cryptographic protocols

    Lecture 270 Methods

    Lecture 271 Authentication protocols

    Lecture 272 Installation considerations

    Section 25: 3.5: Implement secure mobile solutions

    Lecture 273 Connection methods and receivers

    Lecture 274 Mobile deployment models

    Lecture 275 Mobile device management (MDM)

    Lecture 276 Mobile devices

    Lecture 277 Enforcement and monitoring

    Section 26: 3.6: Apply cybersecurity solutions to the cloud

    Lecture 278 Cloud security controls

    Lecture 279 Secure cloud storage

    Lecture 280 Secure cloud networking

    Lecture 281 Secure cloud compute resources

    Lecture 282 Secure cloud solutions

    Section 27: 3.7: Implement identity and account management controls

    Lecture 283 Understanding identity

    Lecture 284 Account types to consider

    Lecture 285 Account policies to consider

    Section 28: 3.8: Implement authentication and authorization solutions

    Lecture 286 Authentication management

    Lecture 287 Authentication protocols and considerations

    Lecture 288 Extensible Authentication Protocol (EAP)

    Lecture 289 RADIUS and TACACS+

    Lecture 290 Kerberos, LDAP, and NTLM

    Lecture 291 Federated Identities

    Lecture 292 Access control schemes

    Section 29: 3.9: Implement public key infrastructure

    Lecture 293 What is public key infrastructure?

    Lecture 294 Types of certificates

    Lecture 295 Certificate formats

    Lecture 296 Important concepts

    Section 30: Domain 4: Operations and Incident Response

    Lecture 297 About operations and incident response

    Section 31: 4.1: Use the appropriate tools to assess organizational security

    Lecture 298 Network reconnaissance and discovery part 1

    Lecture 299 Network reconnaissance and discovery part 2

    Lecture 300 File manipulation

    Lecture 301 Shell and script environments

    Lecture 302 Packet capture and replay

    Lecture 303 Forensics tools

    Lecture 304 Exploitation frameworks

    Lecture 305 Password crackers

    Lecture 306 Data sanitization

    Section 32: 4.2: Policies, processes, and procedures for incident response

    Lecture 307 Incident response plans

    Lecture 308 Incident response process

    Lecture 309 Important exercises

    Lecture 310 Important attack frameworks

    Lecture 311 BCP, COOP, and DRP

    Lecture 312 Incident response team and stakeholder management

    Lecture 313 Retention policies

    Section 33: 4.3: Using appropriate data sources to support investigations after an incident

    Lecture 314 Vulnerability scan outputs

    Lecture 315 SIEM dashboards

    Lecture 316 Log files

    Lecture 317 Syslog, rsyslog, syslog-ng

    Lecture 318 Journald and journalctl

    Lecture 319 NXLog

    Lecture 320 Bandwidth and network monitors

    Lecture 321 Important and useful metadata

    Section 34: 4.4: Applying mitigation techniques or controls to secure environments during an

    Lecture 322 Reconfiguring endpoint security solutions

    Lecture 323 Configuration changes

    Lecture 324 Isolation, containment, and segmentation

    Lecture 325 Secure Orchestration, Automation, and Response (SOAR)

    Section 35: 4.5: Key aspects of digital forensics

    Lecture 326 Documentation and evidence

    Lecture 327 E-discovery, data recovery, and non-repudiation

    Lecture 328 Integrity and preservation of information

    Lecture 329 Acquisition

    Lecture 330 On-premises vs. cloud

    Lecture 331 Strategic intelligence and counterintelligence

    Section 36: Domain 5: Governance, Risk, and Compliance

    Lecture 332 About governance, risk and compliance

    Section 37: 5.1: Compare and contrast various types of controls

    Lecture 333 Categories

    Lecture 334 Control types

    Section 38: 5.2 Applicable regulations/standards/frameworks that impact security posture

    Lecture 335 Regulations, standards, and legislation

    Lecture 336 Key frameworks to know about

    Lecture 337 Benchmarks and secure configuration guides

    Section 39: 5.3: Importance of policies to organizational security

    Lecture 338 Personnel

    Lecture 339 User training

    Lecture 340 Third-party risk management

    Lecture 341 Data

    Lecture 342 Credential policies

    Lecture 343 Organizational policies

    Section 40: 5.4: Risk management processes and concepts

    Lecture 344 Types of risks

    Lecture 345 Risk management strategies

    Lecture 346 Risk analysis

    Lecture 347 Disasters

    Lecture 348 Business impact analysis

    Section 41: 5.5: Privacy and sensitive data concepts in relation to security

    Lecture 349 Organizational consequences of privacy breaches

    Lecture 350 Notifications of breaches

    Lecture 351 Data types

    Lecture 352 Privacy enhancing technologies

    Lecture 353 Roles and responsibilities

    Section 42: Practice Exams and Next Steps

    Lecture 354 What should you do next?

    Lecture 355 Bonus: FREE Performance-Based Questions (PBQs)

    Learners who want to pass the CompTIA Security+ certification,Learners who want to build a solid foundation for cybersecurity by learning best practices,Learners who are seeking a career in cybersecurity,Learners who wish to learn more about common threats facing IT systems, networks, applications, and the cloud