What you'll learn
- Computer security, including its operations and components
- Set basic security settings
- Develop your skills as a company security technician.
Who is this course for
- Students who want to pass the CompTIA Security+ certification exam
- Students interested in learning computer security terminology and nomenclature
- Students interested in a career in cybersecurity
After finishing this course, you will have a thorough understanding of computer security and be able to protect your company's data better.
With this, you can get free access to
- Course Materials for Life
- Expertise in all elements of computer security and CompTIA Security+ certification
About Us
Over 100,000 students have received instruction from this online academy in topics including Lift Style, Fitness Training, Cyber Security, Ethical Hacking, Facebook Ads, SEO, Email Marketing, eCommerce, Business Investing, Social Media Marketing, Launching Your Own Business, and Marketing/Ad Agency!
We provide a wide variety of top-notch online courses that educate through real-world examples from subject matter experts and tried-and-true research, all supported by top-notch, studio vocally narrated videos! Teaching practical life skills, which are crucial in today's environment, is the focus.
Every course offered by this online learning academy is instructed by subject-matter specialists who genuinely love what they do and want to share it with others.
Course Curriculum
- 001 Welcome (5:34)
- 002 CompTIA Security 601 Study Guide
- 002 CompTIA-Security-Study-Notes-501
- 003 Overview of Security (2:58)
- 004 CIA Triad (3:57)
- 005 AAA of Security (OBJ 2.4) (3:08)
- 006 Security Threats (OBJ 1.1 & 1.2) (2:59)
- 007 Mitigating Threats (OBJ 5.1) (2:49)
- 008 Hackers (OBJ 1.5) (4:56)
- 009 Threat Actors (1.5) (3:15)
- 010 Threat Intelligence and Sources (OBJ 1.5) (8:55)
- 011 Threat Hunting (OBJ 1.7) (6:54)
- 012 Attack Frameworks (OBJ 4.2) (11:13)
- 013 Malware (OBJ 1.2) (0:42)
- 014 Viruses (OBJ 1.2) (6:24)
- 015 Worms (OBJ 1.2) (2:12)
- 016 Trojans (OBJ 1.2) (2:51)
- 017 Demo Viruses and Trojans (OBJ 1.2) (6:19)
- 018 Ransomware (OBJ 1.2) (2:33)
- 019 Spyware (OBJ 1.2) (2:42)
- 020 Rootkits (OBJ 1.2 & 1.3) (3:32)
- 021 Spam (OBJ 1.1) (2:59)
- 022 Summary of Malware (2:05)
- 023 Malware Infections (4:15)
- 024 Common Delivery Methods (OBJ 1.1 & 1.5) (4:29)
- 025 Demo Phishing (OBJ 1.1 & 5.3) (5:22)
- 026 Botnets and Zombies (OBJ 1.2 & 1.4) (3:33)
- 027 Active Interception and Privilege Escalation (OBJ 1.3 & 1.4) (2:31)
- 028 Demo Privilege Escalation (OBJ 1.3 & 1.8) (5:44)
- 029 Backdoors and Logic Bombs (OBJ 1.2) (3:51)
- 030 Symptoms of Infection (OBJ 1.2) (4:13)
- 031 Removing Malware (OBJ 4.2) (5:04)
- 032 Preventing Malware (OBJ 1.6 & 3.2) (5:59)
- 033 Malware Exploitation (OBJ 1.2 & 1.4) (7:39)
- 034 Security Applications and Devices (0:35)
- 035 Software Firewalls (OBJ 3.2) (4:18)
- 036 Demo Software Firewalls (OBJ 3.2) (6:47)
- 037 IDS (OBJ 3.2 & 3.3) (5:05)
- 038 Pop-up Blockers (OBJ 1.1, 3.3, 4.4) (3:12)
- 039 Data Loss Prevention (DLP) (OBJ 2.1, 3.2, 4.4) (3:46)
- 040 Securing the BIOS (OBJ 3.2) (3:59)
- 041 Securing Storage Devices (OBJ 2.1, 2.5, & 3.3) (3:29)
- 042 Disk Encryption (OBJ 2.1, 2.8 & 3.2) (4:54)
- 043 Endpoint Analysis (OBJ 3.1 & 3.3) (5:47)
- 044 Mobile Device Security (OBJ 1.5) (1:17)
- 045 Securing Wireless Devices (OBJ 3.4 & 3.5) (1:33)
- 046 Mobile Malware (OBJ 1.1 & 3.5) (6:22)
- 047 SIM Cloning & ID Theft (OBJ 1.1, 2.4, & 2.6) (4:03)
- 048 Bluetooth Attacks (OBJ 1.4 & 3.4) (2:11)
- 049 Mobile Device Theft (OBJ 3.5) (3:13)
- 050 Security of Apps (OBJ 3.1 & 3.5) (5:09)
- 051 BYOD (OBJ 3.5) (4:59)
- 052 Hardening Mobile Devices (OBJ 3.5) (3:54)
- 053 Hardening (OBJ 3.2) (1:50)
- 054 Unnecessary Applications (OBJ 1.6) (3:14)
- 055 Restricting Applications (OBJ 3.2 & 4.4) (2:59)
- 056 Demo Unnecessary Services (OBJ 3.2 & 3.3) (5:38)
- 057 Trusted Operating System (OBJ 3.2) (1:59)
- 058 Updates and Patches (OBJ 1.6 & 3.2) (3:29)
- 059 Patch Management (OBJ 1.6 & 3.2) (3:52)
- 060 Group Policies (OBJ 2.1) (2:36)
- 061 Demo Group Policies (OBJ 3.2) (4:09)
- 062 File Systems and Hard Drives (OBJ 2.1 & 3.2) (3:21)
- 078 Software Development (OBJ 2.1 & 2.3) (8:36)
- 079 SDLC Principles (OBJ 1.6, 2.3, 3.2, & 5.3) (6:25)
- 080 Testing Methods (OBJ 2.3 & 3.2) (7:02)
- 081 Software Vulnerabilities and Exploits (OBJ 1.2, 1.3, & 1.6) (3:47)
- 082 Buffer Overflows (OBJ 1.3) (6:18)
- 083 Demo Buffer Overflow Attack (OBJ 1.3) (6:28)
- 084 XSS and XSRF (OBJ 1.3) (3:10)
- 085 SQL Injection (OBJ 1.3) (6:28)
- 086 Demo SQL Injection (OBJ 1.2 & 1.3) (7:16)
- 087 XML Vulnerabilities (OBJ 1.3) (5:10)
- 088 Race Conditions (OBJ 1.3) (5:50)
- 089 Design Vulnerabilities (OBJ 1.3) (4:16)
- 090 Network Security (0:47)
- 091 The OSI Model (OBJ 3.3 & 3.6) (6:03)
- 092 Switches (OBJ 1.4 & 2.7) (3:35)
- 093 Routers (OBJ 3.3) (2:30)
- 094 Network Zones (OBJ 3.3) (3:29)
- 095 Jumpbox (OBJ 3.5) (5:04)
- 096 Network Access Control (OBJ 3.3 & 4.4) (2:43)
- 097 VLANs (OBJ 3.3) (1:32)
- 098 Subnetting (OBJ 3.6) (1:53)
- 099 Network Address Translation (OBJ 3.3) (2:35)
- 100 Telephony (OBJ 3.1) (6:00)
- 101 Perimeter Security (0:49)
- 102 Firewalls (OBJ 3.3 & 4.4) (8:04)
- 103 Demo SOHO Firewall (OBJ 3.3 & 4.4) (4:07)
- 104 Proxy Servers (OBJ 3.3 & 4.4) (4:15)
- 105 Honeypots and Honeynets (OBJ 2.1) (1:25)
- 106 Data Loss Prevention (OBJ 2.1, 3.2, & 4.4) (1:38)
- 107 NIDS and NIPS (OBJ 3.3) (4:13)
- 108 Unified Threat Management (OBJ 3.2 & 3.3) (1:55)
- 109 Cloud Computing (OBJ 1.5, 2.2, 3.5, & 3.6) (3:32)
- 110 Cloud Types (OBJ 2.2 & 3.6) (2:54)
- 111 As a Service (OBJ 2.2) (7:07)
- 112 Cloud Security (OBJ 2.5 & 3.6) (2:28)
- 113 Defending Servers (OBJ 1.7, 3.1, and 3.2) (4:35)
- 114 Cloud-based Infrastructure (OBJ 1.2, 1.6, 2.2, 2.4, 2.5, & 3.6) (7:22)
- 115 CASB (OBJ 2.1) (4:28)
- 116 API (OBJ 2.1) (6:09)
- 117 FAAS and Serverless (OBJ 2.2) (8:08)
- 118 Cloud Threats (OBJ 1.3, 1.6, 2.1, & 2.2) (8:11)
- 124 Network Attacks (OBJ 1.4) (0:40)
- 125 Ports and Protocols (OBJ 3.1) (4:27)
- 126 Memorization of Ports (OBJ 3.1) (11:33)
- 127 Unnecessary Ports (OBJ 1.6 & 3.2) (3:24)
- 128 Denial of Service (OBJ 1.3 & 1.4) (7:59)
- 129 DDoS (OBJ 1.2, 1.3, & 1.4) (1:39)
- 130 Stopping a DDoS (OBJ 2.1 & 2.3) (2:29)
- 131 Spoofing (OBJ 1.4 & 3.3) (1:19)
- 132 Hijacking (OBJ 1.3 & 1.4) (3:47)
- 133 Replay Attack (OBJ 1.3) (1:29)
- 134 Demo Null Sessions (OBJ 1.6) (2:27)
- 135 Transitive Attacks (OBJ 2.4) (1:27)
- 136 DNS Attacks (OBJ 1.1, 1.4 & 3.1) (4:36)
- 137 ARP Poisoning (OBJ 1.4) (1:33)
- 138 Securing Networks (OBJ 3.3) (0:52)
- 139 Securing Network Devices (OBJ 1.2, 1.6, 3.3, & 3.7) (6:45)
- 140 Securing Network Media (OBJ 2.7) (8:51)
- 141 Securing WiFi Devices (OBJ 1.4 & 3.4) (4:25)
- 142 Wireless Encryption (OBJ 1.6 & 3.4) (5:33)
- 143 Wireless Access Points (OBJ 1.4 & 3.4) (6:14)
- 144 Wireless Attacks (OBJ 1.2, 1.4 & 1.8) (4:18)
- 145 Demo Wireless Attack (OBJ 1.4) (7:42)
- 146 WPA3 (OBJ 3.4) (6:08)
- 147 Other Wireless Technologies (OBJ 1.4 & 3.5) (6:05)
- 153 Facilities Security (OBJ 2.7) (0:39)
- 154 Fire Suppression (OBJ 2.7) (6:24)
- 155 HVAC (OBJ 2.5, 2.6, & 2.7) (2:26)
- 156 Shielding (OBJ 2.7) (2:37)
- 157 Vehicular Vulnerabilities (OBJ 2.6 & 2.7) (6:53)
- 158 IoT Vulnerabilities (OBJ 2.6) (3:29)
- 159 Embedded System Vulnerabilities (OBJ 2.6) (6:52)
- 160 ICS and SCADA Vulnerabilities (OBJ 2.6) (8:19)
- 161 Mitigating Vulnerabilities (OBJ 2.6) (3:30)
- 162 Premise System Vulnerabilities (OBJ 1.2, 1.3, 1.7, & 2.6) (6:14)
- 163 Authentication (OBJ 2.4, 3.5, & 3.8) (5:56)
- 164 Authentication Models (OBJ 2.4, 3.5, 3.8, & 3.9) (5:22)
- 165 802.1x (OBJ 3.4 & 3.8) (3:47)
- 166 LDAP and Kerberos (OBJ 3.1 & 3.8) (2:29)
- 167 Remote Desktop Services (OBJ 3.1) (1:54)
- 168 Remote Access Service (OBJ 3.1 & 3.8) (2:06)
- 169 VPN (OBJ 3.3) (3:05)
- 170 RADIUS vs TACACS+ (OBJ 3.8) (2:20)
- 171 Authentication Summary (OBJ 3.8) (2:06)
- 172 Authentication Attacks (OBJ 1.2) (7:12)
- 173 Access Control (OBJ 3.8) (0:53)
- 174 Access Control Models (OBJ 3.8) (8:17)
- 175 Best Practices (OBJ 2.7, 3.8, & 5.3) (5:46)
- 176 Users and Groups (OBJ 3.7 & 3.8) (9:15)
- 177 Permissions (OBJ 3.8) (3:44)
- 178 Usernames and Passwords (OBJ 1.6 & 3.7) (2:39)
- 179 Demo Policies (OBJ 3.7) (4:37)
- 180 User Account Control (OBJ 3.7 & 3.8) (1:56)
- 187 Vulnerability Management (OBJ 1.7, 4.1, & 5.4) (7:53)
- 188 Penetration Testing (OBJ 1.8) (4:29)
- 189 Training and Exercises (OBJ 1.8 & 4.2) (4:48)
- 190 OVAL (OBJ 1.7) (1:37)
- 191 Vulnerability Assessments (OBJ 1.7 & 4.1) (6:55)
- 192 Demo Nmap Scanning (OBJ 4.1) (8:53)
- 193 Demo Vulnerability Scanning (OBJ 1.7, 4.1, & 4.3) (9:36)
- 194 Password Analysis (OBJ 1.2) (5:57)
- 195 Demo Password Cracking (OBJ 4.1) (2:39)
- 196 Monitoring Types (OBJ 3.3) (2:57)
- 197 Performance Baselining (OBJ 2.1) (4:38)
- 198 Protocol Analyzers (OBJ 3.3 & 4.1) (3:01)
- 199 SNMP (OBJ 3.1) (3:43)
- 200 Demo Analytical Tools (OBJ 4.1) (4:29)
- 201 Auditing (OBJ 1.7) (1:57)
- 202 Demo Auditing Files (OBJ 1.7) (3:56)
- 203 Logging (OBJ 1.7, 4.3, & 4.5) (3:42)
- 204 Log Files (OBJ 4.3) (5:17)
- 205 SIEM (OBJ 1.7 & 4.3) (8:51)
- 206 Syslog (OBJ 1.7 & 4.3) (5:52)
- 207 SOAR (OBJ 1.7 & 4.4) (3:20)
- 208 Cryptography (OBJ 2.1 & 2.8) (4:58)
- 209 Symmetric vs Asymmetric (OBJ 2.8) (6:14)
- 210 Symmetric Algorithms (OBJ 2.8) (4:59)
- 211 Public Key Cryptography (OBJ 2.8) (3:12)
- 212 Asymmetric Algorithms (OBJ 2.8) (3:47)
- 213 Pretty Good Privacy (OBJ 2.8) (1:49)
- 214 Key Management (OBJ 2.8) (2:14)
- 215 One-Time Pad (OBJ 2.8) (4:21)
- 216 Demo Steganography (OBJ 2.8) (3:54)
- 217 Cryptography Considerations (OBJ 2.8) (12:26)
- 233 Planning for the Worst (OBJ 2.5 & 5.4) (2:13)
- 234 Redundant Power (OBJ 2.5) (3:10)
- 235 Backup Power (OBJ 2.5) (3:09)
- 236 Data Redundancy (OBJ 2.5) (4:42)
- 237 Demo RAIDs (OBJ 2.5) (3:38)
- 238 Network Redundancy (OBJ 2.5) (2:07)
- 239 Server Redundancy (OBJ 2.5 &3.3) (1:45)
- 240 Redundant Sites (OBJ 2.1) (2:23)
- 241 Data Backup (OBJ 2.5) (2:57)
- 242 Tape Rotation (OBJ 2.5) (3:55)
- 243 Disaster Recovery Plan (OBJ 2.1, 2.5, 4.2, & 5.4) (5:41)
- 244 Business Impact Analysis (OBJ 5.4) (15:47)
- 245 Social Engineering (OBJ 1.1) (0:55)
- 246 Demo Pretexting (OBJ 1.1 & 5.3) (4:17)
- 247 Insider Threat (OBJ 1.5) (2:13)
- 248 Phishing (OBJ 1.1 & 5.3) (6:34)
- 249 Motivation Factors (OBJ 1.1) (7:14)
- 250 More Social Engineering (OBJ 1.1 & 1.2) (4:03)
- 251 Fraud and Scams (OBJ 1.1) (5:26)
- 252 Influence Campaigns (OBJ 1.1) (4:14)
- 253 User Education (OBJ 5.3) (4:47)
- 254 Policies and Procedures (OBJ 5.2 & 5.3) (5:56)
- 255 Data Classifications (OBJ 5.3 & 5.5) (6:45)
- 256 Data Ownership (4:06)
- 257 PII and PHI (OBJ 5.2 & 5.5) (6:22)
- 258 Legal Requirements (OBJ 5.2 & 5.5) (5:45)
- 259 Privacy Technologies (OBJ 5.5) (6:29)
- 260 Security Policies (OBJ 5.3 & 5.5) (10:22)
- 261 User Education (OBJ 5.3) (4:05)
- 262 Vendor Relationships (OBJ 5.3) (7:55)
- 263 Disposal Policies (OBJ 2.7 & 4.1) (5:07)
- 264 IT Security Frameworks (OBJ 5.2) (3:21)
- 265 Key Frameworks (OBJ 5.2) (8:37)
- 266 Incident Response Procedures (OBJ 4.2) (4:39)
- 267 Incident Response Planning (OBJ 4.2) (18:19)
- 268 Investigative Data (OBJ 4.3) (12:30)
- 269 Forensic Procedures (OBJ 4.5) (13:55)
- 270 Data Collection Procedures (OBJ 4.1 & 4.5) (7:59)
- 271 Demo Disk Imaging (OBJ 4.1) (6:59)
- 272 Security Tools (OBJ 4.1) (21:03)
Frequently Asked Questions
When does the course start and finish?
The course has begun and will never stop! You set the start and end dates for this entirely self-paced online course.
How long do I have access to the course?
Lifetime access—how does that sound? You receive unrestricted access to this course after registering for as long as you like, on any device you own.
Do I get a certificate?
Yes, when you complete the course, you will receive a certificate of completion which you can happily add to your resume or LinkedIn profile.
Can I cancel my subscription?
Yes you can. You have a 15-days money-back guarantee.