CompTIA Security+ 501
4.3 (36 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,573 students enrolled

CompTIA Security+ 501

Prepare for the next level cyber security training - Clear and concise
4.3 (36 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,573 students enrolled
Created by Anand Nednur
Last updated 12/2019
English
English [Auto-generated]
Current price: $23.99 Original price: $34.99 Discount: 31% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Participants will be introduced to various concepts on Information security. We will be talking about vulnerabilities, exploits, defense strategy, penetration testing, pentest types and methodology, vulnerability management, incident management, and security policy development.
  • This course is not only focuses on the Exam CompTIA Security+ 501 but also shares various case studies and methodologies used in an attack.
  • Learn about Cryptopgraphy and their weaknesses in cryptography and ways to improve your security.
  • Test your knowledge and skills. Prove to yourself, and others, that you are ready ​CompTIA Security+ (​SY0-501) Exam
  • Ensure that you know everything involved in securing a system or network against an attack.
  • Learn through demonstrations and new methods of learning .
Requirements
  • Basic knowledge about hardware and networks will be helpful
  • You will need a computer and internet connection for this course.
Description


**Lean through case studies and hands on demonstrations**


Taught by an expert in information technology and cyber security with over 16 years of experience.


I am Anand and I have training thousands of professionals around the globe and helped them acheive certifications. I am now using this platform to do the knowledge transfer and share all the knowledge that I have learnt through consulting and educating partners.


This course will walk you through the concepts of cyber security focusing on essentials of CompTIA Security+ 501. There are numerous references of well known hacks around he world , for example, the stux net attack, Petya Ransomware attaks , nation wide and ATP's . There are demonstrations of well known tools and techniques are used to ensure that you retain what you learn .

Course Agenda :

-------------------------

Chapter 1 :  Malware and Indicators of Compromise ( Published )


Chapter 3 : Threat Actors ( Published )


Chapter 5 : Vulnerabilities and Impacts ( Published )


More chapters would be published as the recording completes.


Who this course is for:
  • This course is intended for individuals looking to expand their knowledge of different IT Security principals
  • Professionals who would like to prepare themselves for the CompTIA Security+ (​SY0-501) certification exam.
  • Security+ helps IT Professionals around the world advance their careers.
  • Participants looking forward to advance their career and completed A+ and Network+ .
Course content
Expand all 48 lectures 02:52:47
+ Chapter 1 : Malware , Viruses and Indications of Compromise - Introduction
18 lectures 01:14:37

Introduction to Malware , Viruses and Indications of compromise

Preview 01:20
What are RootKits
04:42
What are KeyLoggers
03:38
What are Adwares
04:20
What are Spywares
03:22
What are Bots ?
07:05
Remote Access Trojans or RAT's
05:41
What is a Logic Bomb?
03:40
What are Backdoors?
03:20
Indicators of System and Network Compromise
06:34
Chapter 1 : Review
00:51
+ Chapter 3 : Threat Actors
10 lectures 48:15
Chapter 3 : Introduction to Threats and Threat Actors
02:02
Script Kiddies
02:23
Who are Hactivists?
04:38
How does Organized Crime occur?
11:39
Nations State Actors and APT's
08:02
Insider Threats
07:43
Role of Competitors
02:28
What are the Attributes of Threat Actors
02:02
OSINT
05:43
Chapter Review
01:35
+ Chapter 5 : Vulnerabilities and Impacts
20 lectures 49:55
Introduction
00:45
Race Conditions
04:57
System Vulnerabilities
06:37
Input Validation
02:14
Improper Error Handing
03:07
Misconfiguration or Weak Configuration
01:48
Default System Configuration
01:26
Resource Exhaustion
01:50
Untrained Users
01:59
Improperly Configured Accounts
02:36
Vulnerable Business Processes
01:43
Weak Cipher Suites and Implementations
01:50
What is Memory Leak
02:53
Integer OverFlow
02:56
Buffer Overflow
04:27
Pointer Dereference
02:51
Architecture Design Weakness
00:49
DLL Injection
01:21
New Threats - |Zero Day Attacks|
01:30
System Sprawl - Undocumented Assets
02:16