CompTIA Security+ Certification Training
Video training course for the brand new version of the CompTIA Security+ (SY0-601) exam.
CompTIA Security+ is the first security certification a candidate should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
- Identify, analyze, and respond to security events and incidents
Through a combination of lectures, hands-on labs, and practice exams, you will learn the essential skills, concepts, and technologies to be a contributing member of a cybersecurity operations center (SOC) including understanding the IT infrastructure, operations, and vulnerabilities.
CompTIA Security+ Exam Pass

Nick Proper
Nick used our CompTIA Security+ training course to pass his exam on the first try. Most students take two or three attempts to pass the Sec+ exam ($370 per attempt).
Passing the SY0-601 exam requires at least three months of study. You need to master the theory but also complete many hands-on labs so you really understand the software and protocols.
Passing the Security Plus certification provides the perfect starting point for a career in IT security including Cyber Ops operations, security support, wireless security engineer, or security analyst.
Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.
Your Instructor
Jay Ocampo
Jay is CCIE 59340 and is a seasoned Solution Network Architect/Engineer with 15 years of total experience in IT service management, operations, system integration, network engineering, and enterprise architecture. He obtained a Cisco CCIE Data Center certification and holds a Bachelor's degree in Electronics and Communications Engineering.
He currently lives in the Philippines..
- Over 16 hours of video training
- Instructor guided labs
- End-of-module exams
- End-of-course certificate
- Access to members-only forum
- Exam vendor – N/A
- Prerequisites – None
- Recommended – Network+
Module 1 | Attacks, Threats, and Vulnerabilities |
---|---|
Unit 1 | Welcome to the Course |
Unit 2 | Social Engineering Techniques |
Unit 3 | Types of Attacks |
Unit 4 | Application Attacks |
Unit 5 | Network Attacks |
Unit 6 | Threat Actors, Vectors and Intelligent Sources |
Unit 7 | Vulnerabilities |
Unit 8 | Security Assessment Techniques |
Unit 9 | Penetration Testing Techniques |
Unit 10 | Exam |
Module 2 | Architecture and Design |
Unit 1 | Enterprise Security - Overview |
Unit 2 | Enterprise Security - Configuration Management |
Unit 3 | Enterprise Security - Data Confidentiality - Data Loss Prevention |
Unit 4 | Enterprise Security - Data Confidentiality - Cloud Access Security Brokers |
Unit 5 | Enterprise Security - Data Confidentiality - Encryption and Data Obfuscations |
Unit 6 | Enterprise Security - Data Confidentiality - Rights Management |
Unit 7 | Enterprise Security - Data Confidentiality - Hardware Security Module and Encrypted Traffic Management |
Unit 8 | Enterprise Security - Data Confidentiality - Data Integrity and Data Availability |
Unit 9 | Enterprise Security - Data Confidentiality - Site Resiliency and Geographic Considerations |
Unit 10 | Enterprise Security - Deception and Disruption |
Unit 11 | Virtualization & Cloud Computing - Hypervisors, Containers, SDN |
Unit 12 | Virtualization & Cloud Computing - On_Premises vs Off-Premises |
Unit 13 | Virtualization & Cloud Computing - Cloud Models |
Unit 14 | Secure Application Development, Deployment and Automation |
Unit 15 | Secure Application Development, Deployment and Automation 2 |
Unit 16 | Authentication and Authorization |
Unit 17 | Cybersecurity Resilience |
Unit 18 | Security Implications of Embedded and Specialized Systems |
Unit 19 | Physical Security Controls |
Unit 20 | Cryptography |
Unit 21 | Exam |
Module 3 | Implementation |
Unit 1 | Secure Protocols |
Unit 2 | Host and Application Security Solutions |
Unit 3 | Secure Network Design |
Unit 4 | Wireless Security Settings |
Unit 5 | Secure Mobile Solutions |
Unit 6 | Cloud Cybersecurity Solutions |
Unit 7 | Identify and Account Management Controls |
Unit 8 | Authentication and Authorization Solutions |
Unit 9 | Public Key infrastructure |
Unit 10 | Exam |
Module 4 | Operations and Incident Response |
Unit 1 | Organizational Security |
Unit 2 | Incident Response |
Unit 3 | Incident Investigation |
Unit 4 | Incident Mitigation |
Unit 5 | Digital Forensics |
Unit 6 | Exam |
Module 5 | Governance, Risk, and Compliance |
Unit 1 | Control Categories and Types |
Unit 2 | Regulations, Standards and Frameworks |
Unit 3 | Organizational Security Policies |
Unit 4 | Risk Management |
Unit 5 | Sensitive Data and Privacy |
Unit 6 | Exam |
Module 6 | Labs |
Unit 1 | Cisco Packet Tracer Tour |
Unit 2 | Lab 1 - Implementing Common Network Services |
Unit 3 | Lab 2 - Enable Local and Server Based AAA Authentication |
Unit 4 | Lab 3 - Implement IPSEC Site-to-Site VPN |
Unit 5 | Lab 4 - Configure Firewall Settings |
Unit 6 | Lab 5 - Preparation (Vmware Workstation, Windows and Kali Linux VM installation) |
Unit 7 | Lab 6 - Cyber Attack Lab - Force High CPU and Memory on a Windows Machine |
Unit 8 | Lab 7 - Cyber Attack - Creating Standalone Payloads in Kali Linux |
Unit 9 | Lab 8 - Social Engineering - Performing Reconnaissance |
Module 7 | Bonus Exams |
Unit 1 | Bonus Exam 1 |
Unit 2 | Bonus Exam 2 |
Unit 3 | Bonus Exam 3 |
Unit 4 | Bonus Exam 4 |