CompTIA Security+ Certification Preparation: CyberSecurity
4.0 (68 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
639 students enrolled
Wishlisted Wishlist

Please confirm that you want to add CompTIA Security+ Certification Preparation: CyberSecurity to your Wishlist.

Add to Wishlist

CompTIA Security+ Certification Preparation: CyberSecurity

Launch yourself into an IT security career. Learn essential principles for network security and risk management.
4.0 (68 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
639 students enrolled
Last updated 12/2016
English
Curiosity Sale
Current price: $10 Original price: $160 Discount: 94% off
30-Day Money-Back Guarantee
Includes:
  • 10.5 hours on-demand video
  • 3 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Identify the fundamental concepts of computer security.
  • Identify security threats and vulnerabilities.
  • Manage data, application, and host security.
  • Implement network security.
  • Identify and implement access control and account management security measures.
  • Manage certificates.
  • Identify and implement compliance and operational security measures.
  • Manage risk.
  • Troubleshoot and manage security incidents.
  • Plan for business continuity and disaster recovery.
View Curriculum
Requirements
  • Basic IT Skills
Description

Course Description

CompTIA’s S+ certificate is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. Led by certified instructors, students gain essential knowledge of the principles for network security and risk management with competency in the following:

  • Organizational security
  • System security
  • Access controls
  • Network infrastructure 

The S+ certification by CompTIA is an internationally recognized credential ensuring ground-level security proficiency as well as skills for organization and security professionals to provide information, infrastructure, application and operational security. These courses prepare the student for the CompTIA S+ Certification Exam SY0-401.

What You Will Learn

The curriculum for CompTIA’s S+ Certification Course begins with supplemental material covering pre-requisites to complete the SY0-401 exam course work. After a thorough breakdown of what Security and Information are, we discuss Attacks and Defenses as well as Information Security Careers and the Security+ Certification to give students a wealth of background knowledge before diving into Systems Threats and Risks. This section covers Software-Based Attacks as well as Hardware-Based Attacks and Attacks on Virtual Systems. Once an understanding of various attacks are developed, we look at Protecting Systems by Hardening The Operating System and Preventing Attacks That Target the Web Browser; studying Network Vulnerabilities, Categories of Attacks, Methods of Network Attacks, and Other Attacks and Frauds leads us to Network Security. In the Network Security section, students learn how to Craft a Secure Network and Apply Network Security Devices. Following similar study formats about Wireless Network Security and Access Control Fundamentals brings us to more practical subjects such as Authentication, Performing Vulnerability Assessments and Conducting Security Audits. We finish the course with comprehensive overviews of Cryptography, Business Continuity and, finally, Security Policies and Training. At the end of this course, a student walks away having had practical experience and comprehensive knowledge allowing confident execution of the CompTIA S+ SY0-401 exam.

Who is the target audience?
  • Security Engineers
  • Security Consultants
  • Network Administrators
  • Early Career Security Professionals
  • IT Technicians Or Managers
  • Those Desiring Vendor-Neutral Knowledge Of Information Security
Students Who Viewed This Course Also Viewed
Curriculum For This Course
106 Lectures
10:29:14
+
Security Fundamentals
11 Lectures 01:03:35

This lecture covers pre-requisites and supplemental material to complete the Security+ Certification.

Preview 07:32

This lecture covers Challenges of Securing Information and Today’s Security Attacks

Introduction to Security Part 1
06:40

This lecture continues covering today’s Security Attacks and Difficulties in Defending against Attacks

Introduction to Security Part 2
07:07

This lecture defines Information Security, Information Security Layers, and Information Security Terminology.

What is Information Security? Part 1
04:40

This lecture covers Information Security Terminology.

What is Information Security? Part 2
05:10

This lecture covers Data Theft and Identity Theft, Avoiding Legal Consequences, and Maintaining Productivity

Understanding the Importance of Information Security Part 1
05:40

Understanding the Importance of Information Security Part 2
06:43

Understanding the Importance of Information Security Part 3
04:18

Understanding the Importance of Information Security Part 4
05:02

This lecture covers Steps of an Attack and the Defenses against Attacks.

Attacks and Defenses
06:17

This lecture covers the Security+ Certification, the 6 domains covered by the exam, and Types of Information Security Jobs.

Information Security Careers and the Security+ Certification.
04:26
+
Systems Threats and Risks
8 Lectures 45:58

This lecture continues covering the types of computer viruses, Worms, Trojans, and Rootkits.

Preview 05:36

This lecture covers Malware (Malicious software), Viruses, and Types of computer viruses

Software-based Attacks Part 2
06:42

This lecture covers Logic Bombs, Privilege Escalation, and Spam.

Software-based Attacks Part 3
05:11

This lecture covers Evading Spam Filters, Malware for Profit, Blocking Spam, and Spyware.

Software-based Attacks Part 4
05:20

This lecture covers Adware, Hardware Keyloggers, Software Keyloggers, and Botnets.

Software-based Attacks Part 5
05:10

This lecture covers BIOS Attacks, USB Devices, IEEE 1667, Network Attached Storage (NAS), Storage Area Network (SAN), NAS and SAN Security, and Cell Phone Attacks.

Hardware-based Attacks
07:02

This lecture covers What is Virtualization and Virtual Machines.

Attacks on Virtual Systems Part 1
05:09

This lecture covers Virtual Servers, how Attackers use Virtual Machines, Security of Virtual Machines.

Attacks on Virtual Systems Part 2
05:48
+
Protecting Systems
11 Lectures 01:10:58

This lecture covers a case study of Drive-by downloads and Objectives of the course.

Preview 08:29

This lecture covers Managing Operating System Updates.

Hardening the Operating System Part 1
06:26

This lecture covers Updated Terminology, Patch Management Techniques, and Automated Patch Updated Services

Hardening the Operating System Part 2
05:18

This lecture covers Buffer Overflow Protection.

Hardening the Operating System Part 3
06:26

This lecture covers Date Execution Prevention (DEP), Address Space Layout Randomization (ASLR), and Configuring Operating System Protection.

Hardening the Operating System Part 4
07:35

This lecture covers attack techniques that target the browser including Cookies and JavaScript

Preventing Attacks that Target the Web Browser Part 1
06:47

This lecture covers Java, ActiveX, and Cross-site scripting.

Preventing Attacks that Target the Web Browser Part 2
07:29

This lecture continues covering Cross-site scripting along with, SQL Injection, Hardening Web Servers, and SMTP Open Relays.

Preventing Attacks that Target the Web Browser Part 3
08:05

This lecture continues covering SMTP Open Relays along with, Instant Messaging, and Peer-to-Peer (P2P) Networks.

Preventing Attacks that Target the Web Browser Part 4
05:59

This lecture continues covering Peer-to-Peer (P2P) Networks along with, Applying Software Security Applications like Antivirus, Popup Blockers, and Anti-Spam.

Preventing Attacks that Target the Web Browser Part 5
04:22

This lecture continues covering Anti-Spam, Personal Software Firewalls and Host Intrusion Detection Systems (HIDS).

Preventing Attacks that Target the Web Browser Part 6
04:02
+
Network Defenses
8 Lectures 51:07

This lecture covers Media-Based Vulnerabilities, Port Mirroring, Sniffers, Network Taps, and Sniffing Attacks.

Preview 07:14

This lecture covers Ways to Redirect Switched Traffic, Network Device Vulnerabilities, Characteristics of Weak Passwords, Network Device Vulnerabilities, ATM Passwords, Hardware Trojans, Network Device Vulnerabilities.

Network Vulnerabilities Part 2
06:42

This lecture covers Denial of Service (DoS), Real DDoS Attack, Wireless DoS, and an Easier Wireless DoS.

Categories of Attacks Part 1
07:00

This lecture covers Spoofing, Man-in-the-Middle Attacks, Replay Attacks, Wall of Sheep, and Sidejacking.

Categories of Attacks Part 2
05:00

This lecture covers SNMP (Simple Network Management Protocol), DNS (Domain Name System), DNS Poisoning, Local DNS Poisoning, DNS Cache Poisoning, and Sending Extra DNS Records.

Methods of Network Attacks Part 1
07:39

This lecture covers DNS Transfers, Protection from DNS Attacks, ARP (Address Resolution Protocol), ARP Cache Poisoning, and Results of ARP Poisoning Attacks.

Methods of Network Attacks Part 2
05:59

This lecture covers TCP/IP Hijacking and Wireless Attacks

Methods of Network Attacks Part 3
08:07

This lecture covers Null Sessions and Domain Name Kiting.

Other Attacks and Frauds
03:26
+
Network Security
7 Lectures 41:41

This lecture covers security through network design, Subnetting at CCSF, and advantages of Subnetting.

Preview 05:42

This lecture covers VLAN Security, Network Convergence, Vulnerabilities in Converged Networks, and Demilitarized Zone (DMZ).

Crafting a Secure Network Part 2
05:34

This lecture covers Network Address Translation (NAT), Port Address Translation (PAT), NAT with PAT, Network Access Control (NAC).

Crafting a Secure Network Part 3
06:27

This lecture covers Network Security Devices, Firewalls, Stateless Firewall Rules, Stateful Firewall Rules, Inbound and Outbound Traffic Filtering.

Applying Network Security Devices Part 1
06:37

This lecture covers Proxy Server, Reverse Proxy, Honeypot, Network Intrusion Detection Systems (NIDS).

Applying Network Security Devices Part 2
06:30

This lecture covers Intrusion Prevention Systems, Host Intrusion Prevention Systems (HIPS), and Network Intrusion Prevention Systems (NIPS).

Applying Network Security Devices Part 3
04:49

This lecture covers Protocol Analyzers, Internet Content Filters, and Integrated Network Security Hardware.

Applying Network Security Devices Part 4
06:02
+
Wireless Network Security
5 Lectures 26:12

This lecture covers the course Objectives, Institute of Electrical and Electronics Engineers (IEEE), IEEE 802.11 WLAN Standard, Controlling Access to a WLAN, Controlling Access, MAC Address Filtering, Wired Equivalent Privacy (WEP), and WEP Keys.

Preview 05:06

This lecture covers WEP Encryption Process, Transmitting with WEP, Device Authentication

IEEE 802.11 Wireless Security Protections Part 2
03:37

This lecture covers Open System Authentication, Turning Off Beaconing, MAC Address Filtering Weaknesses, WEP, and cracking WEP.

Vulnerabilities of IEEE 802.11 Security
03:43

This lecture covers WPA Personal Security, Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC), WPA2 Personal Security, PSK Key Management Weaknesses, Pre-Shared Key Weakness, Cracking WPA, and WPA and WPA2 Compared.

Personal Wireless Security
08:13

This lecture covers IEEE 802.11i, 802.1x Authentication, WPA Enterprise Security, WPA2 Enterprise Security, Enterprise and Personal Wireless Security Models, Enterprise Wireless Security Devices, Rogue Access Point Discovery Tools, and Types of Wireless Probes.

Enterprise Wireless Security
05:33
+
Access Control Fundamentals
6 Lectures 37:47

This lecture covers the course objectives, Access Control, and Access Control Terminology.

Preview 05:47

This lecture covers Access Control Models, Mandatory Access Control (MAC) model, Discretionary Access Control (DAC) model, DAC Weaknesses, User Account Control (UAC), Role Based Access Control (RBAC) model, Rule Based Access Control (RBAC) model, and Best Practices for Access Control.

What is Access Control Part 2
05:53

This lecture cover Access Control Methods, Access Control List (ACL), Windows Access Control Entries (ACEs), Advanced Security Settings in Windows, Group Policy, Account Restrictions, Access Control Terminology: Family Safety filter in Windows, Access Control Terminology: Parent Control, Wireless Access Point Restrictions, Passwords, Password Myths, Attacks on Passwords and How to Get the Hashes.

Logical Access Control Methods Part 1
06:36

This lecture cover Access Control Methods, Access Control List (ACL), Windows Access Control Entries (ACEs), Advanced Security Settings in Windows, Group Policy, Account Restrictions, Access Control Terminology: Family Safety filter in Windows, Access Control Terminology: Parent Control, Wireless Access Point Restrictions, Passwords, Password Myths, Attacks on Passwords and How to Get the Hashes.

Logical Access Control Methods Part 2
07:29

This lecture covers Physical Access Control, Physical Computer Security, Rack-Mounted Server, KVM Switch, Door Security, and Deadbolt locks.

Physical Access Control Part 1
05:32

This lecture covers Lock Best Practices, Lockpicking at DEFCON, Cipher Lock, Cipher Lock Disadvantages, Tailgate Sensor, Physical Tokens, RFID: Radio-frequency identification, Mantrap, Mantrap, Video Surveillance, and Physical Access Logs.

Physical Access Control Part 2
06:30
+
Authentication
7 Lectures 43:07

This lecture covers Objectives, Password-Guessing Attacks Surge, Definition of Authentication, Authentication and Access Control Terminology, Authentication, Authorization, and Accounting (AAA), and Uses of Accounting DATA.

Preview 06:17

This lecture covers Authentication Credentials, One-Time Passwords, and One-Time Passwords: OTP.

Authentication Credentials Part 1
06:13

This lecture covers Challenge-Based OTPs, Standard Biometrics, Dynamic Fingerprint Scanners, Behavioral Biometrics, Keystroke Dynamics, Behavioral Biometrics, Computer Footprinting in Online Banking, and Cognitive Biometrics.

Authentication Credentials Part 2
08:25

This lecture covers Single and multi-factor authentication, Single sign-on, Windows Live ID, Windows CardSpace, OpenID.

Authentication Models
04:25

This lecture covers Authentication Servers, RADIUS (Remote Authentication Dial in User Service), RADIUS Authentication, Kerberos, Terminal Access Control Access Control System (TACACS+), and Lightweight Directory Access Protocol (LDAP).

Authentication Servers
06:36

This lecture covers Extended Authentication Protocols (EAP), Authentication Legacy Protocols, EAP Weak Protocols, and EAP Strong Protocols.

Extended Authentication Protocols (EAP)
03:55

This lecture covers Remote Authentication and Security, Remote Access Services (RAS), Virtual Private Networks (VPNs), VPN Advantages, VPN Disadvantages, and Remote Access Policies.

Remote Authentication and Security
07:16
+
Performing Vulnerability Assessments
7 Lectures 43:36

This lecture covers the course Objectives, Risk Management, Assessment, and Mitigation, What Is Risk, Definition of Risk Management, Steps in Risk Management, Attributes of Assets, Hardware and Software Attributes, Determining Relative Value.

Preview 05:05

This lecture covers Threat Identification, Common Threat Agents, and Attack Trees.

Performing Vulnerability Assessments Part 2
04:43

This lecture covers Vulnerability Appraisals, Risk Assessment, Vulnerability Impact Scale, Anticipated Losses, Risk Mitigation.

Performing Vulnerability Assessments Part 3
06:23

This lecture covers Steps in Risk Management, Identifying Vulnerabilities, Vulnerability Scanning, IP Addresses and Ports, and TCP/IP Ports.

Performing Vulnerability Assessments Part 4
07:59

This lecture covers Port Scanners, Network Mappers, and Network Mapper Graphical Output.

Performing Vulnerability Assessments Part 5
04:43

This lecture covers Protocol Analyzers, Vulnerability Scanners, Acunetix Web Vulnerability Scanner, and Open Vulnerability and Assessment Language (OVAL).

Performing Vulnerability Assessments Part 6
07:20

This lecture continues covering OVAL, Password Crackers, Shadow File, Penetration Testing, and SATAN.

Performing Vulnerability Assessments Part 7
07:23
+
Conducting Security Audits
4 Lectures 21:42

This lecture covers the course Objectives, Privilege Auditing, Privilege Management, Centralized and Decentralized Structures, Assigning Privileges, Auditing System Security Settings, Auditing System Security Settings, User Access and Rights Review (continued), Windows & UNIX File/Folder Permissions, and Group Policies

Preview 05:51

This lecture covers Group Policy Objects (GPOs), Policy Inheritance Flaws, Storage and Retention Policies, HIPPA Sanction for Unlocked Dumpsters, Information Lifecycle Management (ILM), and Data Categories.

Privilege Auditing Part 2
03:16

This lecture covers Usage Auditing, Privilege Inheritance, GPO Inheritance, Log Management, Application and Hardware Logs, Antivirus Logs, DNS Logs, Firewall Logs, Operating System Logs, System Events, Windows 10 Event Logs, Log Management Benefits, Log Management Challenges, Log Management Solutions, Change Management, Change Management Team (CMT), and CMT Duties.

Usage Auditing
08:16

This lecture covers Anomaly-based Monitoring, Signature-based Monitoring, Behavior-based Monitoring, Monitoring Tools, System Monitor, and Protocol Analyzers.

Monitoring Methodologies and Tools
04:19
5 More Sections
About the Instructor
CyberTraining 365
4.1 Average rating
2,263 Reviews
44,836 Students
16 Courses
Best Selling Instructor, 30,000+ Students

 Join the Cyber Security Industry in 2017!

Interested in starting a career in the Cyber Security Industry? 2017 is the time! 

Learning the fundamentals of Cyber Security provides you with a powerful, and very useful, set of skills. Learn to think like a hacker so you can better defend your networks and data by studying Penetration Testing and Ethical Hacking.   

Jobs in Cyber Security are plentiful. Receiving your Certified Ethical Hacker, Certified Hacker Forensic Investigator, Penetration Tester and Security+ certification will give you a strong background to more easily tackle and pick up more advanced exams, such as the CISSP certification.  

Get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over one million Cyber Security job openings globally. Demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take our word for it... take a look at the FREE previews (they are available in all our courses) and see for yourself!

About Us:

CyberTraining 365 is an online academy that offers most in-demand cybersecurity training and certification through different subscription models. Members have access to the ever growing library of quality, engaging videos that are taught by some of industry’s best and most recognized experts.

CyberTraining365 is powered by Social27's patented cloud-based eLearning platform, providing members with an engaging and collaborative learning environment. Through best in class content, social learning tools, and gamification, CyberTraining365 is taking eLearning from Isolation to Collaboration.

Samy Mkacher
4.2 Average rating
1,207 Reviews
36,019 Students
11 Courses
Join my army of 35,000+ superlearners!

(Français plus bas)

Why more than 35,000 students chose me as their instructor?

♜ Enroll in one of my courses and you'll see! ♜ 

1. Each of my courses is organized in a clear and precise manner. I always make sure that you know the prerequisite to teach you a new concept. 

2. I have a background in both humanities and computer science. It gives me an holistic view of teaching and pedagogy. 

3. To me, anything can be learned if you put in enough effort and persistence.

What makes me an ideal instructor?

1. I graduated a Master of Research  in Logics & Epistemology from the Sorbonne, Paris.   2. I have a background in computer sciences and programming languages such as C, C++, Python and Java. 

3. Because I came to learn technical skills quite late in my life, I have a very pedagogical way of teaching things ! 

≫ What can I do for you? Enroll in one of my courses and you'll see! ≪


Pourquoi plus de 35 000 étudiants m'ont choisi comme instructeur ? 

♜ Suis l'un de mes cours et tu verras ! ♜ 

1. Chaque cours que j'instruis est organisé de manière claire et précise. Je m'assure toujours que tu aies les pré-requis pour aborder une notion.
2. J'ai un double background en sciences humaines et sciences informatiques. Cela me permet d'avoir une vision d'ensemble de la pédagogie.
3. À mes yeux, tout peut être appris avec assez de volonté et de persistance.

Qu'est-ce qui fait de moi ton instructeur idéal ?

1. J'ai suivi un cursus universitaire solide et j'ai un Master de recherche de la Sorbonne en Logique et Épistémologie.
2. J'ai un background en sciences informatiques et dans les langages de programmation C, C++, Python et Java.
3. Parce que j'ai appris des sujets techniques assez tard dans ma vie, j'ai une manière très pédagogique d'instruire mes étudiants. 

≫ Que puis-je faire pour toi ? Suis l'un de mes cours et tu verras !