CompTIA Security+: SY0-401

Learn to design, implement, maintain, and restore computer hardware and network security.
4.2 (17 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
101 students enrolled
$50
Take This Course
  • Lectures 75
  • Contents Video: 10.5 hours
    Other: 1 min
  • Skill Level Intermediate Level
  • Languages English, captions
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 5/2015 English Closed captions available

Course Description

CompTIA Security+, powered by Calibrate, is online, self-paced course that teaches the fundamentals of IT security. Students will learn about network and network device security, compliance and operational security, certificate management, application and social engineering security, access control and identity management, cryptography, incident response and risk management, third party data security and cloud computing, and host and physical security measures. When a student passes the CompTIA Security+ SY0-401 exam, they gain an internationally recognized credential in one of the most in-demand IT fields. In the next decade, the security administration field is set to grow by 37%!

What are the requirements?

  • One to two years experience in IT administration with an emphasis on security and a broad understanding of security issues and implementations

What am I going to get from this course?

  • Network and network device security
  • Compliance and operational security
  • Certificate management
  • Application and social engineering security
  • Access control and identity management
  • Cryptography
  • Incident response and risk management
  • Third party data security and cloud computing
  • Host and physical security measures

What is the target audience?

  • Existing and prospective IT professionals wishing to develop the knowledge and skills to design and utilize computer hardware and network security.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Mitigating Threats
Introduction: Mitigating threats
Preview
00:33
System maintenance
Preview
14:32
System maintenance
4 questions
Application security
08:04
Application security
3 questions
Physical security
13:17
Physical security
3 questions
Malware
10:46
Malware
3 questions
Social engineering
14:34
Social engineering
3 questions
Summary: Mitigating threats
00:38
Section 1 Final
8 questions
Thanks for choosing our course!
Article
Section 2: Cryptography
Introduction: Cryptography
00:30
Symmetric cryptography
18:02
Symmetric cryptography
4 questions
Public-key cryptography
19:38
Public-key cryptography
5 questions
Additional cryptographic concepts
07:08
Additional cryptographic concepts
4 questions
Summary: Cryptography
00:37
Section 2 Final
8 questions
Section 3: Authentication
Introduction: Authentication
00:30
Authentication factors and requirements
11:42
Authentication factors and requirements
4 questions
Authentication systems
15:30
Authentication systems
4 questions
Authentication system vulnerabilities
09:34
Authentication system vulnerabilities
4 questions
Summary: Authentication
00:39
Section 3 Final
8 questions
Section 4: User- and role-based security
Introduction: User- and role-based security
00:42
Baseline security policies
11:55
Baseline security policy
4 questions
Resource access
11:04
Resource access
4 questions
Summary: User- and role-based security
00:47
Section 4 Final
8 questions
Section 5: Peripheral security
Introduction: Peripheral security
00:38
File and disk encryption
10:32
File and disk encryption
4 questions
Peripheral and component security
06:37
Peripheral and component security
3 questions
Mobile device security
15:13
Mobile device security
3 questions
Summary: Peripheral security
00:35
Section 5 Final
6 questions
Section 6: Public-key infrastructure
Introduction: Public-key infrastructure
00:48
Public-key cryptography
17:16
Public-key cryptography
4 questions
Implementing public-key infrastructure
12:35
Implementing public-key infrastructure
4 questions
Web server security with PKI
08:04
Web server security with PKI
2 questions
Summary: Public-key infrastructure
00:41
Section 6 Final
8 questions
Section 7: Application and message security
Introduction: Application and message security
00:46
Application security
17:59
Application security
3 questions
Email security
14:43
Email security
4 questions
Social networking and messaging
10:10
Social networking and messaging
3 questions
Summary: Application and message security
00:40
Section 7 Final
8 questions
Section 8: Ports and protocols
Introduction: Ports and protocols
00:34
TCP/IP basics
16:21
TCP/IP basics
4 questions
The TCP/IP Internet layer
07:56
The TCP/IP internet layer
3 questions
Protocol-based attacks
17:47
Protocol-based attacks
4 questions
Summary: Ports and protocols
00:34
Section 8 Final
6 questions
Section 9: Network security
Introduction: Network security
00:35
Network devices
17:04
Network devices
4 questions
Network device security
14:55
Network device security
4 questions
Secure network topologies
13:11
Secure network topologies
4 questions
Secure networking
12:03
Secure networking
3 questions
Virtualization and cloud computing
15:17
Virtualization and cloud computing
3 questions
Summary: Network security
00:40
Section 9 Final
7 questions
Section 10: Wireless security
Introduction: Wireless security
00:35
Wireless network security, Part I
17:59

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Medallion Learning, Efficient and Effective Job Skills Instruction

Medallion Learning provides organizations with engaging eLearning courses that utilize best-practices in instructional design, delivery, and assessment. By tailoring instruction to the needs of each individual, we bring your learners to content mastery in less time and at lower cost. Courses combine high quality, engaging content with a proven, individualized instructional model to bring learners to content mastery as efficiently and effectively as possible.

Ready to start learning?
Take This Course