TOTAL: CompTIA Security+ Cert (SY0-701) (SNEAK PREVIEW!)
- Description
- Curriculum
- FAQ
- Reviews
Start your studies early!! The new CompTIA Security+ exam launches November 7th, 2023, but we wanted to give you a SNEAK PEEK at our upcoming course before the official exam launch. Now you can start your studies today for the SY0-701 exam, and we’ll be adding new objectives covered so you can prepare to take the newest Security+ exam.
Welcome to the TOTAL: CompTIA Security+ Certification (SY0-701), a course from the production studios of Total Seminars with subject matter experts Mike Meyers, Dan Lachance, and Lyndon Williams.
This course covers everything you need to know to pass your CompTIA Security+ (SY0-701) certification exam. This course will ensure you have the knowledge and skills to be a great entry-level cybersecurity tech AND help make sure you are ready to pass the CompTIA Security+ exam. Mike Meyers is well known as the “Alpha Geek“. Mike is widely known as the #1 CompTIA author and instructor with over 1 million books in print. Dan Lachance is a highly motivated and passionate IT evangelist. He is a consultant, trainer, and author with over 20 years of experience in the IT security industry. Lyndon Williams creates innovative cybersecurity solutions with Cisco, Palo Alto, and Juniper platforms to provide business acceleration and produce intelligent, resilient automated response and remediation systems. He is also an instructor for CyberNow Labs, teaching students the necessary skills to start their journey toward becoming Cybersecurity Analysts.
This course shows you how to:
-
Apply the three “A’s” of security: authentication, authorization, and accounting
-
Scan your wired or wireless network and assess it for various weaknesses
-
Use cryptography to assure integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)
-
Understand critical concepts in risk management, like setting up alerts, responding to incidents, and mitigating vulnerabilities
-
Identify how hackers are trying to get into your network, IT infrastructure, and physical assets and how security techs help prevent those breaches
-
Prevent attacks ranging from simple malware to sophisticated exploits to social engineering that take advantage of people’s trust, relationships, and lack of knowledge
-
Secure an enterprise environment, including creating incident response reports and disaster recovery plans as well as establishing business continuity
WHY SHOULD I TAKE THIS COURSE?
Total Seminars has an excellent reputation in the IT training industry, offering a wide variety of training tools. This course’s subject matter experts, Mike Meyers, Dan Lachance, and Lyndon Williams, have a combined 60+ years of experience. Mike has created training materials for thousands of schools, corporations, and government agencies, and has taught numerous seminars for the FBI, DEA, and many other corporate partners; he also wrote several bestselling CompTIA certification guides. Dan is the owner of Lachance IT Consulting, Inc., and has taught many online IT training courses in addition to his work as a network and server consultant and IT security auditor. Lyndon Williams is a dedicated instructor and CISO of a top-level company. He uses his on-the-job knowledge to teach students how to use their new cybersecurity proficiency in real-world scenarios.
This course will also prepare you for the CompTIA Security+ exam, which is an industry-standard certification, compliant with ISO 17024 standards, accredited by ANSI, and approved by the U.S. Department of Defense. If you’re looking to advance your career, this certification is a great place to start. 96% of HR managers use IT certifications as screening or hiring criteria during recruitment.
WHAT’S COVERED?
The course covers all the CompTIA Security+ (SY0-701) objective domains:
-
General Security Concepts – 12%
-
Threats, Vulnerabilities, and Mitigations – 22%
-
Security Architecture – 18%
-
Security Operations – 28%
-
Security Program Management and Oversight – 20%
EXAM INFO
-
Exam code: SY0-701
-
Max. 90 questions (performance-based and multiple choice)
-
Length of exam: 90 minutes
-
Passing score: 750 (on a scale of 100-900)
-
Exam voucher cost: $392 USD (be sure to go to Total Seminars’ website for discount vouchers!)
-
Recommended experience: CompTIA Network+ and two years of experience working in a security/ systems administrator job role
-
Testing provider: Pearson VUE (in-person and online at-home options available)
HOW DO I TAKE THE COMPTIA SECURITY+ EXAM?
Buy an exam voucher (get your discount voucher at Total Seminars’ website), schedule your exam on the Pearson VUE website, and then take the exam at a qualifying Pearson VUE testing center or virtually using their OnVue option.
-
Schedule through a testing center: pearsonvue. com
-
Schedule an at-home (or at-work) exam: onvue. com
WHAT KIND OF JOB CAN I GET WITH A COMPTIA SECURITY+ CERTIFICATION?
-
Security or systems administrator
-
Security engineer/analyst
-
Security IT auditor
-
IT project manager
-
Beginner cybersecurity specialist
-
Junior IT auditor
-
Junior penetration tester
-
1Threat IntelligenceVideo lesson
With the ever-changing IT threat landscape, how can you keep up with the latest security issues? Threat intelligence refers to the wide variety of open-source intelligence (OSINT) and proprietary IT security sources that use standards such as STIX and TAXII for cybersecurity intelligence sharing.
-
2Risk Management ConceptsVideo lesson
A risk management framework aids in identifying and managing risk and is sometimes required for compliance with data privacy regulations such as GDPR and HIPAA. Organization security policies are often influenced by data privacy regulations.
-
3Security ControlsVideo lesson
Various security standards such as PCI DSS and the Cloud Controls Matrix (CCM) define what typesQ of security controls to put in place to mitigate risk both on-premises and in the cloud. The specific type of attack vector determines whether managerial, operational, or technical controls should be deployed.
-
4Risk Assessments and TreatmentsVideo lesson
How can you determine whether assets are adequately protected from threats? One way is running periodic risk assessments to address the ever-changing threat landscape to define the likelihood and impact of security incidents.
-
5Quantitative Risk AssessmentsVideo lesson
Is the cost of a security control justified? A quantitative risk assessment uses various calculations against an asset to determine the maximum yearly spend for protecting that asset.
-
6Qualitative Risk AssessmentsVideo lesson
The same risk can have a different impact to various organizations. Qualitative risk assessment use subjective priority ratings for risks rather than dollar values.
-
7Security and the Information Life CycleVideo lesson
Security must be applied to all phases of the information life cycle, from collection to its eventual archiving and deletion. This includes data security techniques such as tokenization and masking while considering how laws apply to data based on its location (data sovereignty).
-
8Data DestructionVideo lesson
Digital data resides on physical storage devices. Secure storage media disposal mechanisms, such as shredding, cryptographic erasure, degaussing, and disk wiping, must be put in place to ensure sensitive data cannot be retrieved by unauthorized users.
-
9Chapter 1 Exam Question ReviewVideo lesson
Threats are executed by a variety of different threat actors, each type having a different motivation for executing attacks. This episode presents a scenario where correct type of threat actor must be selected.
-
10Wiping Disks with the dd Command LabVideo lesson
When storage media has reached the end of its useful life, data must be wiped from it in a secure manner which can include using some built-in operating system tools. Linux administrators can use the dd command to wipe disk partitions by overwriting them with random data.
-
11Chapter 1 Ask Me Anything (AMA)Video lesson
The use of social media platforms has skyrocketed in recent years. Organizations must take the appropriate steps to ensure that sensitive data is not leaked through this mechanism.
-
12Cryptography BasicsVideo lesson
Cryptography is the practice of disguising information in a way that looks random. This episode explores the history of cryptography and how it has evolved into the complex systems today.
-
13HashingVideo lesson
Hashes provide assurance of data integrity using fascinating mathematical calculations. Passwords are a very common use for hashing.
-
14Cryptographic AttacksVideo lesson
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.
-
15Password CrackingVideo lesson
Passwords are often stored in hash format but can still be susceptible to attacks. The various password attacks include brute force, dictionary, and rainbow table. Salting and key stretching add another layer of security to hashed passwords.
-
16Password Cracking DemoVideo lesson
Dan demonstrates how to use a password cracking tool to turn hashed passwords into cleartext.
-
17SSH Public Key Authentication LabVideo lesson
Multifactor authentication should always be used for administratrive accounts. In this demo, SSH public key authentication is configured for a Linux host.
-
18Chapter 2 Ask Me Anything (AMA)Video lesson
Digital cryptocurrencies provide a centralized public way to pay for goods and services. This video explains the relationship between cryptocurrency, public ledgeres and the blockchain.
-
19Physical Security OverviewVideo lesson
Physical security matters because all digital IT systems and data rely upon physical equipment somewhere.
-
20Physical SecurityVideo lesson
This episode covers physical security controls such as door lock types and bollards, as well as encryption of data at rest.
-
21Keylogger DemoVideo lesson
Limited access to network computers can prevent malicious actors from installing components such as hardware key loggers, which can capture all user keystrokes and make them available to an attacker over a Wi-Fi network.
-
22Environmental ControlsVideo lesson
Computing equipment must be kept at the correct temperature and humidity levels to function efficiently. This episode covers air flow management using hot and cold aisles as well as environmental monitoring.
-
23Chapter 3 Exam Question ReviewVideo lesson
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem.
-
24Physical Security LabVideo lesson
A full IT security audit always includes physical security. In this episode, physical security considerations are presented.
-
25Chapter 3 Ask Me Anything (AMA)Video lesson
Some physical security controls protect physical property which includes harware IT devices. In this episode, IP cameras and CCTV are discussed.
-
26Identification, Authentication, and AuthorizationVideo lesson
Authorization to access resources occurs after the successful proving of one’s identity through authentication.
-
27Enabling Multifactor AuthenticationVideo lesson
Multifactor authentication (MFA) hardens user sign-in by requiring more than one factor, or category of authentication, such as something you know combined with something you have.
-
28AuthorizationVideo lesson
What role does authorization play in identity and access management (IAM)? Authorization relates to resource permissions granted to a security principal such as a user or device.
-
29AccountingVideo lesson
The 3 As – authentication, authorization, and accounting/auditing, play a big role in IT security. Tracking activity through auditing provides accountability for access to resources such as files on a file server or database rows.
-
30Authentication MethodsVideo lesson
Have you ever had trouble remembering usernames and passwords for multiple web apps? Password vaults serve as a protected credential repository in addition to common authentication methods such as one-time password codes, certificate-based authentication and SSH public key authentication.
-
31Access Control SchemesVideo lesson
Controlling access to resources begins with policies governing how credentials are managed. Permissions to use resources can be configured through attribute-based access control (ABAC), role-based access control (RBAC), discretionary access control (DAC), and for high security environments, mandatory access control (MAC).
-
32Account ManagementVideo lesson
Accountability for resource access is possible only with people using their own unique user accounts where the principle of least privilege has been applied, ideally through group-assigned permissions. Account policies can determine conditions that allow or deny resource access, such as the location of a user.
-
33Network AuthenticationVideo lesson
Older network authentication protocols such as password authentication protocol (PAP) and challenge handshake authentication protocol (CHAP) have been deprecated in favor of protocols such as Kerberos and extensible authentication protocol (EAP). Variations of the RADIUS authentication protocol are still used to authenticate users and devices to networks.
-
34Identity Management SystemsVideo lesson
How can authentication be removed from individual apps? The answer is identity federation, which uses a centralized identity provider that is trusted by resources, such as Web apps, and can also support single sign-on (SSO).
-
35Chapter 4 Exam Question ReviewVideo lesson
There are a variety of ways in which user authentication can be implemented prior to allowing the user access to the Internet. This question presents a scenario that requires a user to sign off on the terms of agreement before gaining Internet access.
-
36Creating Linux Users and Groups LabVideo lesson
User and group management in Linux can be performed at the command line. This demo makes use of the useradd and groupadd commands to create authentication identities.
-
37Chapter 4 Ask Me Anything (AMA)Video lesson
Authentication can be configured and managed within a single organization to control access to IT resources. This episode covers identity federation and its relationship to identity and resource providers.
-
38Touring the CLIVideo lesson
The command-line interface (CLI) allows technicians to interact with Windows, Linux, and macOS systems by typing in commands such as ping and ipconfig. Windows uses a command prompt, macOS uses a terminal shell and Linux can use a variety of shells including bash. Microsoft PowerShell is an object-oriented CLI supported on Windows, Linux, and macOS.
-
39ShellsVideo lesson
Shells allow technicians to enter commands, such as a Linux bash shell or a Windows command prompt. Reverse shells are the result of infected victim machines that reach out to an attacker station.
-
40The Windows Command LineVideo lesson
-
41Microsoft PowerShellVideo lesson
Is there a better way to automate operating system commands than through scripts and text manipulation? Yes! Microsoft PowerShell is an object-oriented cross-platform command environment that uses a verb-noun type of syntax, such as with the Get-Service cmdlet.
-
42Linux ShellsVideo lesson
A Linux shell is a case-sensitive command line environment that supports scripting and comes in various flavors including bash, Korn and C shells.
-
43Network ScannersVideo lesson
How do attackers discover networks and hosts? Network scanners such as Nmap are used by attackers as well as legitimate security technicians to perform network reconnaissance.
-
44Network Scanning with NmapVideo lesson
Nmap is the most commonly used network scanning tool. Scans can be saved as XML files. Nmap can be used at the command line but it also has a frontend GUI named Zenmap.
-
45Network Protocol AnalyzersVideo lesson
Network traffic can be captured, saved, and analyzed using a properly placed hardware or software network protocol analyzer such as the free Wireshark tool. Capture analysis can result in identifying indicators of compromise or the use of insecure protocols.
-
46Using Wireshark to Analyze Network TrafficVideo lesson
Wireshark is a free open-source network traffic analyzer that can capture, analyze, filter, and save captured network packets.
-
47Using tcpdump to Analyze Network TrafficVideo lesson
tcpdump is a built-in Unix and Linux command-line tool that can capture, analyze, filter, and save captured network packets.
-
48Log FilesVideo lesson
Log files can provide valuable insights related to suspicious network, host or application activity, but only if log file integrity can be ensured. Centralized logging in the enterprise on a secured logging host ensures an accurate copy of log files can be used for security and performance analysis.
-
49Centralized LoggingVideo lesson
Network infrastructure and host and application logs can be stored centrally such as with Linux or Windows log forwarding. This can then be fed into a centralized log ingestion and analysis system, otherwise called SIEM.
-
50Configuring Linux Log ForwardingVideo lesson
Centralized Linux log hosts can be configured using the rsyslog daemon on Linux hosts.
-
51Chapter 5 Exam Question ReviewVideo lesson
Managing Linux host authentication can involve the use of many command-line utilities. This episode focuses on the sequence of steps needed to enable SSH public key authentication.
-
52Linux Shell Script LabVideo lesson
Shell scripts contain Linux command that can be invoked simply by calling upon the script name. In this demo, a simple utility menu loop is created in a bash shell script.
-
53Nmap LabVideo lesson
IT network reconnaissance begins with discover hosts and services on the network. This episode uses the nmap command to map out hosts on the network.
-
54Chapter 5 Ask Me Anything (AMA)Video lesson
Malware is malicious software that comes in many different shapes and sizes. This episode tackles examples of malicious code and how it related to Visual Basic for Applications (VBA).
-
55MalwareVideo lesson
Malicious software is referred to as malware and includes various types including ransomware, fileless viruses, worms, keyloggers, and trojan horses. Infected computers that periodically contact command and control servers are called bots or zombies.
-
56Weak ConfigurationsVideo lesson
A lack of secure configurations for networks, devices, and hosts results in an increased attack surface. Default settings, especially credentials, should not be used. Deprecated security protocols such as WEP and SSL should also be avoided.
-
57Common AttacksVideo lesson
Staying up-to-date with the latest types of security attacks is form of attack mitigation. Keeping systems hardened helps protect against zero-day attacks. Software develops must adhere to secure coding practices to ensure deployed code does not contain security flaws.
-
58Password AttacksVideo lesson
Username and password authentication remains common, as do related dictionary and brute-force attacks. Account lockout threshold can mitigate password attacks other than password spraying attacks.
-
59Bots and BotnetsVideo lesson
Distributed Denial of Service (DDoS) attacks use collections of infected bots, or zombies in a botnet, to flood victims hosts or networks. Bots periodically contact a malicious-user controlled command and control server.
-
60Disk RAID LevelsVideo lesson
Data availability, including through disk redundancy, is an aspect of IT security. There are various RAID levels that organize physical disks together to provide performance and/or fault tolerant benefits.
-
61Securing HardwareVideo lesson
All IT solutions, in the end, run on hardware somewhere. Restricting physical access to IT hardware such as through locked server rooms and encryption of data at rest provide a layer of security.
-
62Securing EndpointsVideo lesson
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the engine for this type of solution and can be configured with allow/deny lists.
-
63Chapter 6 Exam Question ReviewVideo lesson
Monitoring the network for intrusions is paramount to ensure a timely mitigation. This episode presents a monitoring scenario that requires the view to identify which type of attack took place.
-
64Linux Software RAID LabVideo lesson
RAID configurations can enhance the performance and availability of stored data, depending on the level of RAID used. In this demo, software RAID level 1 (disk mirroring) is configured in Linux.
-
65Chapter 6 Ask Me Anything (AMA)Video lesson
Securing hosts properly should involve both a proactive and a reactive approach. This episode discusses what can be done about zero-day attacks.
-
66Cryptographic MethodsVideo lesson
This episode introduces various methods used to protect the critical keys in cryptography that keep communication secure.
-
67Symmetric CryptosystemsVideo lesson
In this episode, Mike describes encrypting and decrypting data with the same key. He also covers how symmetric algorithms can either be block or streaming and use various types of ciphers depending on which one is used.
-
68Symmetric Block ModesVideo lesson
Symmetric block algorithms have limitations depending on which kind of cipher is used. This episode explores the different block modes.
-
69Asymmetric CryptosystemsVideo lesson
In this episode, Mike describes encrypting and decrypting data with different keys and the magic that happens when key pairs are generated.
-
70Understanding Digital CertificatesVideo lesson
Digital certificates are used in many different places to verify the identity of a public key owner. They can also include verification from third parties for an added layer of security.
-
71Trust ModelsVideo lesson
Web of trust is a mostly outdated method of proving identities, however it is helpful to understand as the predecessor of public key infrastructure (PKI) which is widely used today.
-
72Public Key InfrastructureVideo lesson
In this episode, Mike discusses public key infrastructure (PKI), used to enable commerce and other secure activities over the Internet.
-
73Certificate TypesVideo lesson
Mike reviews different types of certificates including Web, e-mail, code-signing, machine/computer, and user.
-
74The OSI ModelVideo lesson
Is there a standard model for describing and mapping network hardware and software? Yes, the 7-layer conceptual OSI model! Understanding network security and selecting the appropriate security solutions requires a solid understanding of the OSI model.
-
75ARP Cache PoisoningVideo lesson
ARP is used to resolve an IP address to a 48-bit hexadecimal hardware MAC address. Attackers with network access can fraudulently send ARP updates to hosts in order to force network traffic through the attacker station.
-
76Other Layer 2 AttacksVideo lesson
Layer 2 of the OSI model (Data Link layer) accessing network media and addressing using MAC addresses. MAC address flooding attacks and broadcast storms can be mitigated with network switches configuring with BPDU and STP.
-
77Network PlanningVideo lesson
Which security considerations are important when planning your network design? IP addressing and network segmentation using screened subnets can be used for hosting public servers. VLANs can improve network performance and provide network isolation for security purposes.
-
78Securing Network AccessVideo lesson
-
79FirewallsVideo lesson
Packet filtering firewalls apply to layer 4 (Transport layer) of the OSI model and examine only packet headers to allow or deny network traffic. Content filtering firewalls apply to OSI layer 7 (Application layer) and can examine packet headers as well as content to allow or deny traffic. A Web application firewall (WAF) protected Web apps from common Web application attacks.
-
80Proxy ServersVideo lesson
Forward proxies sit between internal user devices and the Internet and fetch Internet content on behalf of internal users. Reverse proxies map public network service IPs to private IPs; they route client requests for a network service to the backend server private IP.
-
81Network and Port Address TranslationVideo lesson
Network address translation (NAT) maps external public IPs to internal private IPs to protect the true identity of servers. Port address translation (PAT) allows multiple internal network clients with private IPs to access the Internet using a single public IP assigned the NAT device public interface.
-
82IP Security (IPsec)Video lesson
The IPsec network security protocol suite can be used to secure any type of network traffic through integrity, authentication and encryption. Many VPNs use IPsec to establish an encrypted network tunnel.
-
83Virtual Private Networks (VPNs)Video lesson
VPNs provide an encrypted network tunnel over the Internet to provide secure access to a remote network. Client-to-site VPNs allow individual device access where site-to-site VPNs can securely link branch offices over the Internet or securely link an on-premises network to the cloud through a L2TP or TLS VPN.
-
84Intrusion Detection and Prevention Systems (IDS/IPS)Video lesson
Intrusion detection can detect, log, report, and send alerts when suspicious activity is detected on a host or on the network, whereas intrusion prevention can be configured to stop the suspicious activity. Anomaly detection can be signature-based or heuristic/behavior-based. Unified threat management (UTM) solutions combine firewall, IDS, IPS, and other security functions.
-
85Chapter 7 Exam Question ReviewVideo lesson
Address Resolution Protocol (ARP) is used by the TCP/IP protocol suite. This episode discussed ARP poisonning attacks and potential mitigations.
-
86Linux Snort IDS LabVideo lesson
An Intrusion Detection System (IDS) is designed to detect suspicious network or host activity and then log or notify the incident. In this episode, the Snort IDS is configured and tested in Linux.
-
87Chapter 7 Ask Me Anything (AMA)Video lesson
Secure Sockets Layer (SSL) has long been used to secure network communication on LANs and WANs. This episode discusses how Transport Layer Security (TLS) supersedes SSL in addition to continued backwards-compatibility support that remains for SSL.
External Links May Contain Affiliate Links read more