CompTIA Security+ Certification
4.8 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
199 students enrolled
Wishlisted Wishlist

Please confirm that you want to add CompTIA Security+ Certification to your Wishlist.

Add to Wishlist

CompTIA Security+ Certification

Get CompTIA Security+ easily
New
4.8 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
199 students enrolled
Created by Mohamed Atef
Last updated 8/2017
English
Current price: $10 Original price: $35 Discount: 71% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 10 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Security Fundamentals
  • Identifying Security Threats and Vulnerabilities
  • Managing Data, Application, and Host Security
  • Implementing Network Security
  • Implementing Compliance and Operational Security
  • Risk Managment
  • Troubleshooting and Managing Security Incidents
  • Business Continuity and Disaster Recovery Planning
View Curriculum
Requirements
  • Basic Computer Knowledge
Description

This course targeted toward students who want to start learning about information security but they don't know from where to start, the course is covering basic security fundamentals, threats and vulnerabilities, Network security, Host and application security , also the course is covering topics like Risk Management and Business continuity planning.

After the course completion you will learn the knowledge needed
to start working in Information Security field and you will be able to
clear your CompTIA Security + professional exam and get certified from
the first attempt.

Who is the target audience?
  • You
  • nformation Technology (IT) professional
  • Network Administrator
  • System Administrator
  • Security Administrator
  • Individual who wants to further a career in IT
  • Computer Science Students
Students Who Viewed This Course Also Viewed
Curriculum For This Course
65 Lectures
09:51:00
+
Introduction
1 Lecture 12:17

Introduction to CompTIA Security + Course, The value of the certificate and the course outlines and flow. 

Preview 12:17
+
Security Fundamentals
13 Lectures 02:11:50

The definition of Information Security Life 

Preview 14:09

What is Information Security Control and how to implement them. 

Information Security Control
05:00

The First layer of Security is Access control also known as AAA.

Access Control Introduction
06:45

Different Authorization Models. 

Access Control
19:19

Different Authentication Model. 

Authentication
18:46

Cryptography Fundamentals a step by step guide 

Cryptography Fundamentals
01:37

Cryptography Fundamentals a step by step guide

Cryptography
16:26

Symmetric Encryption

​Symmetric Encryption​
12:38

Asymmetric Encryption Private ad Public Key, PKI.Digital Signature , Digital Certificate.

Asymmetric Encryption
13:47

Stenography is a different type of encryption, 

Steganography
07:51

Hashing is a way to confirm the integrity of the information

Hashing
06:05

What is a Policy and the difference between Policy, Procedures and Guidelines, 

Policy
02:38

Information Security Life Cycle 2

Information Security Life Cycle 2
06:49
+
Identifying Security Threats and Vulnerabilities
24 Lectures 04:08:20

What is Social Engineering attack and how it work ? 

Social Engineering
12:19

Hoe hackers are sending fake email ?

Fake Email
06:13

Phishing Attack. 

Phising Credential Harvest
13:11

The Importance of Security awareness, 

Security Awarness
06:37

Different Types of Malware and how they can affect any computer or system 

Maleware
12:30

Types of Malicious Code
14:51

Different types of Software attacks, 

Software attack
04:24

Password guessing is the simplest way to crack a password

Password guessing and cracking
15:09

Rainbow table technique to crack the password 

Rambow table technique
19:20

Application attack. 

Application Attack
04:42

A very common attack which is SQL Injection. 

What is SQL Injection Attack
09:48

XSS Introduction
02:58

Network Basic
12:02

Network Attack
03:34

IP
16:07

OSI Model Part 1
14:39

OSI Model Part 2
14:10

What is Scanning
02:17

Sniffiring 1
15:19

Sniffiring 2
14:53

Wireless Threats
02:41

Wireless Attack
02:33

Wireless Network
07:15

WEP cracking
20:48
+
Managing Data, Application, and Host Security
11 Lectures 01:03:04
Managing Data Security
12:32

Permissions
04:28

Data Policies
06:23

Manage Application security
08:53

Validate application input
04:26

Managing devices and host security
04:36

Operating System
Processing..

Trused Computing base
09:17

Logging
03:12

Microsoft Baseline Security Analyizer
04:44

Mobile device security
04:33
+
Implementing Network Security
3 Lectures 17:31
Implementing Network Security
Processing..

IDS
06:53

Firewall
10:38
+
Implementing Compliance and Operational Security
3 Lectures 16:00
Physical Security
05:31

Lialibilty
03:52

Security awarness
06:37
+
Risk Managment
3 Lectures 38:30
Introduction to Risk
06:17

Asset Evaluation
18:28

Vulnerability Assessment Tools (Nessus)
13:45
+
Troubleshooting and Managing Security Incidents
2 Lectures 15:35
Information Security Incident Managment
10:06

Incident Report Form
05:29
+
Business Continuity and Disaster Recovery Planning
5 Lectures 47:53
BCP
14:32

BIA
10:09

MTD-RTO-RPO
11:39

DRP
03:29

Alternative Sites
08:04
About the Instructor
Mohamed Atef
4.4 Average rating
2,634 Reviews
20,206 Students
14 Courses
Information Security Consultant, Certified Instructor

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.

CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+

Professional Experience:
IBM, Cliveland Clink Abu Dhabi (CCAD), Orascom Telecommunication, UAE Ministry of Interior, Egyptian Ministry of Interior, Saudi Ministry of Interior, Prince Naif University for forensic science - KSA, Khalifa University - UAE, Cairo University - Egypt