CompTIA Security+ SY0-701 Full Course, Labs, and Study Plan
- Description
- Curriculum
- FAQ
- Reviews
This course will prepare you to pass the CompTIA Security+ SY0-701 exam on the first try. In this course, I will be using my 20+ years of experience teaching IT courses to give you a practical, hands-on approach to all of the CompTIA Security+ Certification exams. I will cover all of the exam objectives in detail.
I am a best-selling udemy instructor with over 300,000 students. I have helped thousands of students to pass their certification exams over the last 20 years. My method of teaching is engaging and fun.
I will review how to build your own lab to follow along with me on this journey so you can gain the practical knowledge needed not only to pass your Security+ exam but also how to apply it in the real world of being an IT technician.
This course will cover the following domains:
-
Attacks, Threats, and Vulnerabilities
-
Architecture and Design
-
Implementation
-
Operations and Incident Response
-
Governance, Risk, and Compliance
This course will include:
-
Over 250 lectures.
-
Over 25 Hours of training.
-
We will only be covering the topics on your exam, no-nonsense and personal stories.
-
PDF of the exam objectives from CompTIA for the Security+ exam.
-
Certificate of completion.
-
Lifetime access.
-
30-day money-back guarantee.
-
6Introduction IT Security Fundamentals OB 1.2Video lesson
-
7CIA Triad OB 1.2Video lesson
-
8Confidentiality OB 1.2Video lesson
-
9Integrity OB 1.2Video lesson
-
10Availability OB 1.2Video lesson
-
11DAD Triade OB 1.2Video lesson
-
12Zero Trust OB 1.2Video lesson
-
13Non-Repudiation OB 1.2Video lesson
-
14Authentication OB 1.2Video lesson
-
15Authorization OB 1.2Video lesson
-
16Accounting OB 1.2Video lesson
-
17Accountability OB 1.2Video lesson
-
18Gap analysis OB 1.2Video lesson
-
19Quick QuizQuiz
-
24Threats OB 2.1Video lesson
-
25Attributes of Actors OB 2.1Video lesson
-
26Threats Motivation OB 2.1Video lesson
-
27Nation-state OB 2.1Video lesson
-
28Unskilled Attacker OB 2.1Video lesson
-
29Hacktivist OB 2.1Video lesson
-
30Organized Crime OB 2.1Video lesson
-
31Shadow IT OB 2.1Video lesson
-
32Threat Vectors and Attack Surfaces OB 2.2Video lesson
-
33Quick QuizQuiz
-
34Vulnerabilities OB 2.3Video lesson
-
35Memory injection and buffer overflows OB 2.3Video lesson
-
36Race Conditions OB 2.3Video lesson
-
37Malicious Updates OB 2.3Video lesson
-
38OS-Based Vulnerabilities OB 2.3Video lesson
-
39SQL Injections OB 2.3Video lesson
-
40XSS OB 2.3Video lesson
-
41Hardware Vulnerabilities OB 2.3Video lesson
-
42VM Vulnerabilities OB 2.3Video lesson
-
43Cloud-specific Vulnerabilities OB 2.3Video lesson
-
44Supply Chain Vulnerabilities OB 2.3Video lesson
-
45Cryptographic Vulnerabilities OB 2.3Video lesson
-
46Misconfiguration OB 2.3Video lesson
-
47Mobile Device Vulnerabilities OB 2.3Video lesson
-
48Zero-day Vulnerabilities OB 2.3Video lesson
-
49Quick QuizQuiz
-
50Malware OB 2.4Video lesson
-
51Viruses OB 2.4Video lesson
-
52Worms OB 2.4Video lesson
-
53Trojans OB 2.4Video lesson
-
54Ransomware OB 2.4Video lesson
-
55Spyware OB 2.4Video lesson
-
56Rootkit OB 2.4Video lesson
-
57Logic Bomb OB 2.4Video lesson
-
58Keyloggers OB 2.4Video lesson
-
59Bloatware OB 2.4Video lesson
-
60DDOS OB 2.4Video lesson
-
61DNS OB 2.4Video lesson
-
62Onpath Attack OB 2.4Video lesson
-
63Credential Replay OB 2.4Video lesson
-
64Privilege Escalation OB 2.4Video lesson
-
65Request Forgery OB 2.4Video lesson
-
66Directory Traversal OB 2.4Video lesson
-
67Indicators of Malicious Activity OB 2.4Video lesson
-
68Quick QuizQuiz
External Links May Contain Affiliate Links read more