Video training course for the CompTIA Security+ network technician exam. This course is the perfect follow-up to the Network+. The Security+ is a required qualification with most government IT departments and is a great start to a career in network security.
Completely revised for the 2018 exam updates (SY0-501) with 13 hands-on labs added. You follow along with the instructor using free-to-download software and tools. You configure:
- Port security
- Access control lists
- Packet sniffers
- Firewalls
- VPNs
- Command line tools
- and much more
CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in:
- Network security
- Compliance and operational security
- Threats and vulnerabilities
- Application, data, and host security
- Access control and identity management
- Cryptography
This qualification requires you to pass the SY0-501Â exam.
Your Instructors
Lives in Ohio (USA) and has a wife, four kids and a hound dog; spends his leisure time golfing, reading and playing with his computers.Ernie has worked as a Network Administrator and for the past 15 years has worked as a Consultant and Trainer.
Ernie has been an MCT since 1998, teaching Windows Server technologies and in 2005 began his fascination with and subsequent focus on Security.Twice named to EC-Councils Circle of Excellence, Ernie spends a good bit of his classroom time teaching Ethical Hacking and Countermeasures courses and Computer Hacking Forensic Investigation.
Is a technology lover who has always been intrigued by Security. He has many years of experience in the design, implementation, and support of network and security technologies.
He's also CCIE (Security)Â with a new found love in writing and teaching.
- Over 11 hours of video training
- End-of-module exams
- End-of-course certificate
- Captions available
- Exam vendor – Pearson Vue
- Prerequisites – None
- Recommended – Network+
Module 1 | Security Fundamentals |
---|---|
Unit 1 | Information Security |
Unit 2 | Cryptography |
Module 2 | Vulnerabilities and Attack Vectors |
Unit 1 | Physical Security |
Unit 2 | Network Based Threats I |
Unit 3 | Network Based Threats II |
Unit 4 | Passwords |
Unit 5 | Malware |
Unit 6 | Social Engineering |
Module 3 | Network Security |
Unit 1 | Network Devices I |
Unit 2 | Network Devices II |
Unit 3 | Network Protocols I |
Unit 4 | Network Protocols II |
Unit 5 | Network Protocols III |
Unit 6 | Securing Wireless |
Module 4 | Security Management |
Unit 1 | Network Design Elements |
Unit 2 | Device/Host Security |
Unit 3 | Application Security |
Unit 4 | Data Security |
Module 5 | AAA |
Unit 1 | Authentication |
Unit 2 | Account Management |
Unit 3 | Remote Access |
Module 6 | Public-Key Infrastructure (PKI) |
Unit 1 | Certificate Authorities |
Unit 2 | Securing Network Traffic |
Module 7 | Operational and Statutory Compliance |
Unit 1 | Legal Compliance |
Module 8 | Risk Management |
Unit 1 | Risk Analysis and Calculation |
Unit 2 | Penetration Testing |
Unit 3 | Mitigation and Deterrence |
Module 9 | Incident Handling |
Unit 1 | Incident Management and Response |
Module 10 | Business Continuity Planning |
Unit 1 | Business Continuity |
Unit 2 | Contingency Planning |
Module 11 | Introduction to SY0-401 and Network Security |
Unit 1 | Introduction to the New Security+ - SY0-401 |
Unit 2 | Acronyms to Know |
Unit 3 | Network Security |
Unit 4 | Network Devices |
Unit 5 | Network Design Elements |
Unit 6 | Common Protocols and Services |
Unit 7 | Wireless Networking |
Module 12 | Compliance and Operational Security |
Unit 1 | Compliance and Operational Security |
Unit 2 | Risk Related Concepts |
Unit 3 | Integrating Systems and Data With Third Parties |
Unit 4 | Basic Forensic Procedures |
Unit 5 | Incident Response Procedures |
Unit 6 | Physical Security and Environmental Controls |
Unit 7 | Risk Management Best Practices |
Module 13 | Threats and Vulnerabilities |
Unit 1 | Threats and Vulnerabilities |
Unit 2 | Malware Types |
Unit 3 | Attack Types |
Unit 4 | Social Engineering Attacks |
Unit 5 | Wireless Attack Types |
Unit 6 | Application Attack Types |
Unit 7 | Mitigation and Deterrent Techniques |
Unit 8 | Tools and Techniques to Discover Threats and Vulnerabilities |
Unit 9 | Penetration Testing vs. Vulnerability Scanning |
Module 14 | Application, Host and Data Security |
Unit 1 | Application, Host and Data Security |
Unit 2 | Application Security Controls and Techniques |
Unit 3 | Mobile Security Concepts and Technologies |
Unit 4 | Host Security |
Unit 5 | Data Security |
Unit 6 | Mitigate Security Risks in Static Environments |
Module 15 | Access Control and Identity Management |
Unit 1 | Access Control and Identity Management |
Unit 2 | Authentication Services |
Unit 3 | Authentication, Authorization and Access Control |
Unit 4 | Account Management Best Practices |
Module 16 | Cryptography |
Unit 1 | Cryptography |
Unit 2 | General Cryptography Concepts |
Unit 3 | Cryptographic Methods |
Unit 4 | PKI and Certificate Management |
Module 17 | SY0-502 Exam Updates and Bonuses |
Unit 1 | Introduction to the SY0-501 Exam Updates |
Unit 2 | Acronyms for the 501 Exam |
Module 18 | Threats, Attacks, and Vulnerabilities 2 |
Unit 1 | Malware, Attack and Vulnerability Types |
Unit 2 | Threat Actor Types |
Module 19 | Technologies and Tools - Hands-on Labs |
Unit 1 | Lab 1 - Firewall Deep-dive |
Unit 2 | Lab 2 - Access Control Lists |
Unit 3 | Lab 3 - Site-to-Site VPNs |
Unit 4 | Lab 4 - Remote Access VPNs |
Unit 5 | Lab 5 - Layer 2 versus Layer 3 switches |
Unit 6 | Lab 6 - Switch Loop Prevention |
Unit 7 | Lab 7 - Port Security |
Unit 8 | Lab 8 - Other Network Components |
Unit 9 | Lab 9 - Wireshark Deep Dive |
Unit 10 | Lab 10 - Command Line Tools |
Unit 11 | Lab 11 - Nmap |
Unit 12 | Lab 12 - Other Security Posture Assessment Tools |
Unit 13 | Lab 13 - Secure Mobile Deployment |
Module 20 | Architecture and Design |
Unit 1 | Frameworks, Best practices, and Secure Configuration Guides |
Unit 2 | Secure Application Development and Deployment |
Unit 3 | Virtualization |
Unit 4 | Resiliency and Automation |
Module 21 | Identity and Access Management |
Unit 1 | Account Management Practices |
Module 22 | Risk Management 2 |
Unit 1 | Data Backup |
Unit 2 | Data Security and Privacy |
Module 23 | Cryptography and PKI 2 |
Unit 1 | Data Security and Privacy |