Comptia Security+ Sy0-701
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 13.46 GB | Duration: 30h 24m
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 13.46 GB | Duration: 30h 24m
Core Cybersecurity Skills for the CompTIA Security+ (SY0-701) Exam
What you'll learn
Students will gain a solid understanding of fundamental security concepts, including Zero Trust and deception disruption strategies.
Student will be able to identify and understand common threats and vulnerabilities, and learn how to mitigate them using practical activities.
Students will learn to apply the basics of cryptography, including symmetric and asymmetric encryption, hashing, and digital certificates.
Students will understand the architecture of secure systems, including network segmentation, high availability, virtualization, and cloud computing.
Students will develop skills in security operations, including wireless security, asset management, vulnerability management, and intrusion detection.
Students will learn to reduce attack surfaces, manage application security, and monitor activities using various tools.
Requirements
No prior experience or prerequisites required.
Description
Welcome to the CompTIA Security+ Certification Course (SY0-701). This comprehensive training is designed to equip you with the skills required to pass the Security+ certification exam and excel in your cyber security career. This course is structured into five detailed modules including General Security Concepts, Threats, Vulnerabilities, and Mitigations, Security Architecture, Security Operations, and Security Program Management and Oversight. In addition to theoretical knowledge, this course includes a variety of hands-on activities to ensure you can practically apply the learned concepts, making it ideal for both beginners and experienced IT professionals.As a student of this course, you will dive deep into fundamental security concepts such as cryptography, access control, and risk management. You’ll also learn to identify and mitigate potential threats and vulnerabilities and understand the principles of secure architecture and operations. The course includes hands-on activities like testing a honeypot, examining symmetric encryption, and operating a SCADA system, providing you with a real-world understanding of these concepts. By the end of this course, you will not only be fully prepared for the CompTIA Security+ certification exam, but also equipped with a solid foundation in cybersecurity concepts, making you a valuable asset in the IT industry.Whether your goal is to become a security administrator, a systems administrator, or a network engineer, the CompTIA Security+ Certification Course (SY0-701) will provide you with the requisite skills and knowledge to succeed. Don’t miss this opportunity to invest in your future and boost your cybersecurity career.
Overview
Section 1: SY0-701 General Security Concepts
Lecture 1 1.0 Introduction to the Course
Lecture 2 1.1 Fundamental Security Concepts
Lecture 3 1.2 Zero Trust
Lecture 4 1.3 Deception and Disruption
Lecture 5 1.3.1 ACTIVITY - Testing a Honeypot
Lecture 6 1.4 Security Controls
Lecture 7 1.5 Change Management and Security
Lecture 8 1.6 Cryptography Basics
Lecture 9 1.6.1 ACTIVITY - Examining Symmetric Encryption
Lecture 10 1.7 Asymmetric Encryption
Lecture 11 1.7.1 ACTIVITY - Exploring Asymmetric Encryption
Lecture 12 1.8 Hashing
Lecture 13 1.8.1 ACTIVITY - Verifying Integrity with Hashing
Lecture 14 1.9 Digital Certificates
Lecture 15 1.10 Public Key Infrastructure
Lecture 16 1.11 Data and Keys
Lecture 17 1.12 Crypto Implementations
Lecture 18 1.13 Blockchain
Lecture 19 1.14 Non-Cryptographic Data Protection
Section 2: SY0-701 Threats, Vulnerabilities, and Mitigations
Lecture 20 2.1 Threat Actors and Motivations
Lecture 21 2.2 Threat Vectors
Lecture 22 2.2.1 ACTIVITY - O.MG Cable Baiting
Lecture 23 2.2.2 O.MG-No Cable
Lecture 24 2.3 Social Engineering
Lecture 25 2.4 Operating System Vulnerabilities and Attacks
Lecture 26 2.5 Application Vulnerabilities and Attacks
Lecture 27 2.5.1 ACTIVITY - Performing a Buffer Overflow
Lecture 28 2.6 Web-based Vulnerabilities and Attacks
Lecture 29 2.6.1 ACTIVITY - Abusing Unsanitized Input
Lecture 30 2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection
Lecture 31 2.6.3 ACTIVITY - Swiping a Token with XSS
Lecture 32 2.7 Other Vulnerabilities
Lecture 33 2.8 Common Malicious Activity Indicators
Lecture 34 2.9 Insider Threat Indicators
Lecture 35 2.10 Social Engineering Indicators
Lecture 36 2.10.1 ACTIVITY - Capturing Credentials through Social Engineering
Lecture 37 2.11 Malware Activity Indicators
Lecture 38 2.12 Operating System Attack Indicators
Lecture 39 2.13 Application Attack Indicators
Lecture 40 2.13.1 ACTIVITY - Recognizing Directory Traversal
Lecture 41 2.14 Physical Attack Indicators
Lecture 42 2.14.1 ACTIVITY - Quickly Cloning an RFID Badge
Lecture 43 2.15 Network Attack Indicators
Lecture 44 2.15.1 ACTIVITY - Crashing a Target with DoS
Lecture 45 2.16 Cryptographic Attack Indicators
Lecture 46 2.17 Password Attack Indicators
Lecture 47 2.17.1 ACTIVITY - Password Cracking
Lecture 48 2.18 Network Segmentation
Lecture 49 2.19 Access Control
Lecture 50 2.20 Enterprise Device Hardening
Section 3: Module 3 - SY0-701 Security Architecture
Lecture 51 3.1 Network Segmentation
Lecture 52 3.1.1 ACTIVITY - Segementing a Network
Lecture 53 3.2 High Availability
Lecture 54 3.3 Virtualization
Lecture 55 3.3.1 ACTIVITY - Deploying Docker Containers
Lecture 56 3.4 Cloud
Lecture 57 3.5 Serverless Computing
Lecture 58 3.6 IoT
Lecture 59 3.7 ICS SCADA
Lecture 60 3.7.1 ACTIVITY - Operating a SCADA System
Lecture 61 3.8 RTOS and Embedded Systems
Lecture 62 3.9 Reducing the Attack Surface
Lecture 63 3.10 Firewalls
Lecture 64 3.11 IDS IPS.mp4
Lecture 65 3.12 Secure Communications - Access
Lecture 66 3.13 Port Security
Lecture 67 3.14 SD-WAN and SASE
Lecture 68 3.15 Data Classifications
Lecture 69 3.16 Protecting Data Types
Lecture 70 3.17 Data Considerations
Lecture 71 3.18 Redundancy
Lecture 72 3.19 Alternate Sites
Lecture 73 3.20 Multiple Platforms
Lecture 74 3.21 Business Continuity
Section 4: SY0-701 Security Operations
Lecture 75 4.1 Secure Baselines
Lecture 76 4.2 Attack Surface Reduction
Lecture 77 4.3 Wireless Installation
Lecture 78 4.4 Wireless Security Settings
Lecture 79 4.5 Mobile Solutions
Lecture 80 4.5.1 ACTIVITY - Pwning a Mobile Device
Lecture 81 4.6 Application Security Management
Lecture 82 4.7 Asset Management
Lecture 83 4.8 Vulnerability Management
Lecture 84 4.9 Monitoring Activities
Lecture 85 4.10 Monitoring Tools
Lecture 86 4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities
Lecture 87 4.11 Firewall Configuration
Lecture 88 4.11.1 ACTIVITY - Configuring Firewall Rules
Lecture 89 4.12 Intrusion Detection Configuration
Lecture 90 4.13 Web Traffic Filtering
Lecture 91 4.14 Operating System Policy
Lecture 92 4.14.1 ACTIVITY - Examining Windows Group Policy
Lecture 93 4.15 Network Service Security
Lecture 94 4.16 Data Loss Protection
Lecture 95 4.16.1 ACTIVITY - Checking File Integrity
Lecture 96 4.17 Network Access Control
Lecture 97 4.17.1 ACTIVITY - Require Multifactor Authentication
Lecture 98 4.18 Identity Management
Lecture 99 4.19 Access Management
Lecture 100 4.19.1 ACTIVITY - Implementing Access Control
Lecture 101 4.20 Security Automation
Lecture 102 4.21 Incident Response
Lecture 103 4.22 Digital Forensics
Section 5: SY0-701 Security Program Management and Oversight
Lecture 104 5.1 Elements of Effective Security Governance
Lecture 105 5.2 Elements of the Risk Management Process
Lecture 106 5.3 Third Party Risk Assessment and Management
Lecture 107 5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure
Lecture 108 5.4 Effective Security Compliance
Lecture 109 5.5 Audits and Assessments
Lecture 110 5.5.1 ACTIVITY - Conducting OSINT
Lecture 111 5.5.2 ACTIVITY - Performing Active Reconnaissance
Lecture 112 5.6 Security Awareness Practices
Lecture 113 5.7 Course Outro
Section 6: Final Test
IT professionals who want to expand their knowledge in the field of cybersecurity,Individuals considering a career switch into the cybersecurity sector,IT consultants who want to provide informed, up-to-date security advice to clients,Security professionals seeking to validate their skills with a recognized certification,Professionals responsible for risk management and security compliance in their organization,Software developers interested in understanding security architecture and its impact on application development