Paths

CompTIA Security+ (SY0-501)

Author: Christopher Rees

In this series, you will expand your knowledge of threats, attacks, and vulnerabilities; security technologies and tools; security architecture and design, identity and access... Read more

CompTIA Security+ (SY0-501)

In this series, you will learn how to install and configure systems to secure applications, networks and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws and regulations. These courses will also help you prepare for the CompTIA Security+ SY0-501 certification exam.

1

Threats, Attacks, and Vulnerabilities for CompTIA Security+

by Christopher Rees

Oct 24, 2017 / 3h 23m

Beginner • 3h 23m

Start Course
Description

This course covers domain one of the CompTIA Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for CompTIA Security+, you'll learn about the various types of threats and attacks every company faces. First, you'll learn the ins and outs of Malware, ransom-ware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks. Next, you'll also learn the characteristics of the various types of threat actors, the skills they have and the tools they use. Finally, you'll learn about penetration testing and vulnerability scanning and how they're used to help tighten security and mitigate potential breaches. By the end of this course, you'll have a solid understanding of the various threats you're likely to face and what tools are available to mitigate these threats.

Table of contents
  1. Analyzing Indicators of Compromise & Determining Malware Types
    28m 37s
  2. Comparing & Contrasting Attacks Types
    1h 29m
  3. Exploring Threat Actor Types and Attributes
    13m 26s
  4. Defining the Penetration Testing Process
    19m 59s
  5. Defining the Vulnerability Scanning Process
    12m 57s
  6. Impacts Associated with Types of Vulnerabilities
    39m 46s
2

Technologies and Tools for CompTIA Security+

by Christopher Rees

Oct 24, 2017 / 3h 52m

Beginner • 3h 52m

Start Course
Description

IT Security comprises many different areas and organizations that need skilled IT security personnel who understand the tools and technologies required to architect, deploy, maintain, and troubleshoot the infrastructure required to keep a company's data secure. In this course, Technologies and Tools for CompTIA Security+, you'll learn the networking components (hardware and software) required to maintain organizational security. First, you'll explore the concepts required to troubleshoot and remediate issues. Next, you'll discover the tools required to properly assess a company's security posture, including network scanners, protocol analyzers, vulnerability scanning, and exploitation frameworks. Finally, you'll learn the infrastructure and security concerns dealing with mobile device deployment, including the protocols, devices, and infrastructure needed to secure a company's assets. By the end of this course, you'll understand the various technologies and tools required to assess a company's security posture, identify gaps in their defenses, and recommend solutions to mitigate those risks.

Table of contents
  1. Course Overview
    1m 49s
  2. Installing and Configuring Network Components
    1h 11m 39s
  3. Assessing the Security Posture of an Organization
    46m 12s
  4. Troubleshooting Common Security Issues
    29m 34s
  5. Analyzing and Interpreting Output from Security Technologies
    19m 49s
  6. Deploying Mobile Devices Securely
    37m
  7. Implementing Secure Protocols
    26m 7s
3

Architecture and Design for CompTIA Security+

by Christopher Rees

Oct 24, 2017 / 4h 15m

Beginner • 4h 15m

Start Course
Description

Security is the number one thing that every company needs, and with each massive breach this becomes more and more apparent. IT security is a multi-pronged approach and employs defense-in-depth principles. In this course, Architecture and Design for CompTIA Security+, you'll learn architecture and design for CompTIA Securty+. First, you'll start by learning the best practices and frameworks required for creating a secure environment. Next, you'll discover designing secure networks, honeypots, VPNs, firewalls, and various security infrastructure. Then, you'll explore the virtualization techniques, and how IaaS and PaaS, coupled with cloud technologies can increase security. Finally, you'll learn about the importance of physical security and how that can strengthen or weaken your overall security posture. By the end of this course, you'll have a better understanding of critical components to maintaining a successful security posture.

Table of contents
  1. Course Overview
    1m 54s
  2. Frameworks, Best Practices, and Secure Configuration Guides
    27m 31s
  3. Implementing Secure Network Architecture
    18m 43s
  4. Implementing Secure Systems Design
    34m 46s
  5. Secure Staging Deployment
    13m 58s
  6. Security Implications of Embedded Systems
    24m 57s
  7. Secure Application Development and Deployment
    38m 27s
  8. Cloud and Virtualization
    37m 45s
  9. Reducing Risk with Resiliency and Automation Strategies
    21m 41s
  10. Physical Security Controls
    35m 42s
4

Identity and Access Management for CompTIA Security+

by Christopher Rees

Oct 24, 2017 / 1h 40m

Beginner • 1h 40m

Start Course
Description

Organizations are constantly faced with the ongoing threat of breaches and data comprise from both internal and external threats. In this course, Identity and Access Management for CompTIA Security+, you'll learn the critical foundational concepts that form the building blocks of every company's information security posture. First, you'll explore the various methods of identification, authentication, and authorization, including the technologies that enable secure access to resources both locally and remotely. Next, you'll delve into the various technologies that enable identity and access management, including physical controls, group policy based controls, and biometric controls. Finally, you'll learn user account and access best practices, including various account types, account maintenance, and policy enforcement. By the end of this course, you'll have a better understanding of user account and access management, and you'll be able to take this knowledge into the Security+ exam.

Table of contents
  1. Course Overview
    1m 45s
  2. Comparing and Contrasting Identity and Access Management Concepts
    14m 33s
  3. Installing and Configuring Identity and Access Services
    28m 9s
  4. Implementing Identity and Access Management Controls
    26m 52s
  5. Differentiating Common Account Management Practices
    28m 59s
5

Risk Management for CompTIA Security+

by Christopher Rees

Oct 30, 2017 / 3h 21m

Beginner • 3h 21m

Start Course
Description

Managing risk is a critical component of an organizations security posture. In this course, Risk Management for CompTIA Security+, you'll learn how to assess a company's risk across each area within IT. First, you'll explore the various methods used to assess risk like SLE, ALE, and ARO. Next, you'll learn the fundamentals of computer forensics, including maintaining chain of custody, legal holds, and data acquisition techniques. Finally, you'll discover the principals of disaster recovery, maintaining highly available infrastructure, and business continuity basics. By the end of the course, you'll understand what's required to assess an organization's operational risk, the methods used to conduct a forensic investigation, and how to keep a business operational leveraging disaster recovery and business continuity concepts.

Table of contents
  1. Course Overview
    1m 48s
  2. Understanding Organizational Policies, Plans, and Procedures
    27m 19s
  3. Business Impact Analysis Concepts
    20m 29s
  4. Understanding Risk Management Processes and Concepts
    27m 15s
  5. Following Incident Response Procedures
    27m 22s
  6. Reviewing the Fundamentals of Digital Forensics
    41m 7s
  7. Defining Disaster Recovery and Continuity of Operation
    28m 44s
  8. Comparing and Contrasting Various Types of Controls
    7m 9s
  9. Performing Data Security and Privacy Practices
    20m 40s
6

Cryptography and PKI for CompTIA Security+

by Christopher Rees

Nov 16, 2017 / 1h 53m

Beginner • 1h 53m

Start Course
Description

Providing secure communication, access to data, and disposal of assets is no longer essential to every company's overall IT security plan. In this course, Cryptography and PKI for CompTIA Security+, you'll learn the various concepts and components that make up a company's Public Key Infrastructure (PKI). First, you'll delve into the basics of cryptography, including symmetric and asymmetric algorithms, and cipher types. Next, you'll explore the various methods to encrypt data and how to verify a file's integrity. Then, you'll discover how to secure wireless communication using encryption. Finally, you'll learn about the components that make up a PKI. By the end of this course, you'll have the information necessary to discuss and assess your company's PKI, wireless security posture, and identify gaps both internally and externally.

Table of contents
  1. Course Overview
    1m 52s
  2. Comparing and Contrasting Basic Cryptography Concepts
    38m 34s
  3. Deciphering Cryptographic Algorithms
    19m 10s
  4. Installing and Configuring Wireless Security Settings
    24m 40s
  5. Implementing Public Key Infrastructure
    29m 13s

What you will learn

  • How to analyze indicators of compromise and determine the type of malware
  • How to compare and contrast types of attacks and explain threat actor types and attributes
  • How to explain penetration testing and vulnerability scanning concepts
  • How to explain the impact associated with types of vulnerabilities
  • How to install and configure network components, both hardware and software-based, to support organizational security
  • How to use appropriate software tools to assess the security posture of an organization
  • How to troubleshoot common security issues
  • How to analyze and interpret output from security technologies
  • How to deploy mobile devices securely
  • How to implement secure protocols
  • How to explain use cases and purpose for frameworks, best practices and secure configuration guides
  • How to implement secure network architecture concepts and secure systems design
  • How to explain the importance of secure staging deployment concepts
  • How to explain the security implications of embedded systems
  • How to summarize secure application development and deployment concepts
  • How to summarize cloud and virtualization concepts
  • How to explain how resiliency and automation strategies reduce risk
  • How to explain the importance of physical security controls
  • How to compare and contrast identity and access management concepts
  • How to install and configure identity and access services
  • How to implement identity and access management controls and how to differentiate common account management practices
  • How to explain the importance of policies, plans and procedures related to organizational security
  • How to summarize business impact analysis concepts
  • How to explain risk management processes and concepts
  • How to follow incident response procedures
  • How to summarize basic concepts of forensics
  • How to explain disaster recovery and continuity of operation concepts
  • How to compare and contrast various types of controls
  • How to carry out data security and privacy practices
  • How to compare and contrast basic concepts of cryptography and how to explain cryptography algorithms and their basic characteristics
  • How to install and configure wireless security settings
  • How to implement public key infrastructure

Pre-requisites

CompTIA recommends CompTIA Security+ candidates have a minimum of two years of experience in IT administration with a focus on security, day-to-day technical information security experience, and broad knowledge of security concerns and implementation. It’s also recommended that candidates hold the CompTIA Network+ certification or have the equivalent networking experience. This path does not require any prior knowledge or experience.

Knowledge is power

A Professional or Enterprise Pluralsight account is required to access Transcender®* practice exams. Sign in below or sign up for a free team trial.