TOTAL: CompTIA Security+ Certification (SY0-501).
4.6 (23,399 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
89,810 students enrolled

TOTAL: CompTIA Security+ Certification (SY0-501).

Everything you need to pass the CompTIA Security+ SY0-501 Exam, from Mike Meyers. CompTIA expert and bestselling author.
Bestseller
4.6 (23,386 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
89,758 students enrolled
Last updated 3/2020
English
English, French [Auto], 7 more
  • German [Auto]
  • Indonesian [Auto]
  • Italian [Auto]
  • Polish [Auto]
  • Portuguese [Auto]
  • Romanian [Auto]
  • Thai [Auto]
Current price: $135.99 Original price: $194.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 19 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • This is a complete and comprehensive CompTIA Security+ Certification (SY0-501) course. It is designed to prepare you to be able to take and pass the exam to become CompTIA Security+ Certified.
  • Once you complete the course, you will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA Security+ Certification will help you land a great IT security tech job. Or, if you are already a security tech, get that raise or advancement you are after.
Requirements
  • Basic familiarity with PCs and networks.
  • There are no specific prerequisites, since the course covers all the topics in detail.
  • It is a good idea to have an understanding of CompTIA A+ and Network+, or to be certified in these topics. You can learn more about these certifications from our Mike Meyers – Total Seminars CompTIA A+ and Network+ Certification courses on Udemy.
Description

Welcome to the TOTAL: CompTIA Security+ Certification (SY0-501) course. from Mike Meyers and Total Seminars.

This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-501 Exam. The first goal of the course is to make you a good IT security tech and, in the process, make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.


WHAT OUR STUDENTS ARE SAYING:

"I used these courses to pass the A+, Security+, and Network+ in a span of 2.5 months. I had no IT experience 4 months ago. Now I am a network engineer at a managed service provider with a great salary and solid upward mobility." - Ryan D.

The course covers all the CompTIA Security+ SY0-501 objective domains: 1.0 Threats, Attacks, and Vulnerabilities                                  21% 2.0 Technologies and Tools                                                     22% 3.0 Architecture and Design                                                    15% 4.0 Identity and Access Management                                     16% 5.0 Risk Management                                                             14% 6.0 Cryptography and PKI                                                       12%


Topics include:

  •   Risk management

  •   Cryptography

  •   Authentication and authorization

  •   Host, LAN, and application security

  •   Wireless, cloud, and mobile security

  •   Environmental security and controls


See what our customers are saying:

"This is a great course! Mike is funny and explains each security topic very well. I feel this has really prepared me for the exam. And although this course is designed to prepare you for the Security+ exam, I think it is also great if you're just interested in learning more about cyber security." - Spencer G


This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.

Who this course is for:
  • This course is intended for anyone that is preparing for an IT Security position or looking to improve their security skills and become CompTIA Security+ Certified. However, it goes beyond that and will give you the skills you need to be a better security tech on the job.
Course content
Expand all 121 lectures 18:57:19
+ Risk Management
17 lectures 02:11:19

In this introduction to the CompTIA Security+ SY0-501 exam, Mike explains what the exam is all about, including an overview of IT security.

Download the CompTIA Security+ objectives attached to this lecture.

Preview 03:21

In this episode, Mike discusses the CIA goals of security: confidentiality, integrity, and availability.

Preview 03:46

In this episode, Mike explains risk and related concepts.

What is Risk?
09:53

Mike explains the types of man-made threats that can attack a system.

Preview 06:39

In this episode, Mike explains the terms and processes to manage risk.

Managing Risk
11:56

Mike discusses how to use benchmarks and other measurements to implement hardware and software in an environment.

Using Guides for Risk Assessment
06:23

In this episode, Mike explains the three categories of security controls.

Security Controls
07:23

In this episode, Mike discusses other related security controls.

Interesting Security Controls
03:15

In this episode, Mike reviews the concepts of defense in depth, as well as combining or fortifying security controls.

Defense in Depth
04:56

In this episode, Mike explains the concept of security governance: policies, standards, and procedures.

IT Security Governance
08:18

In this episode, Mike addresses various examples of security policies.

Security Policies
08:17

Mike shares the benefits of using frameworks and how to apply them to a security program.

Frameworks
08:21

In this episode, Mike looks at the impact of risk.

Quantitative Risk Calculations
08:11

In this episode, Mike identifies what methods can directly address issues for a company and how to categorize impact types to maintain business continuity.

Business Impact Analysis
11:58

In this episode, Mike discusses data handling and how data is protected within an organization.

Organizing Data
09:59

In this episode, Mike goes through the controls and roles that make security training work.

Security Training
10:01

In this episode, Mike discusses the different types of third-party agreements, why they’re important, and how they affect IT security.

Third Party Agreements
08:42
Risk Management Quiz
14 questions
+ Cryptography
13 lectures 02:26:45

In this episode, Mike goes over the goals and methods used in cryptography.

Preview 17:11

Mike shares various methods used in cryptography, and the various methods used to protect the keys.

Preview 07:24

In this episode, Mike describes encrypting and decrypting data with the same key.

Symmetric Cryptosystems
11:44

Mike talks about the usage and benefits of block modes when used in symmetric encryption.

Symmetric Block Modes
07:46

In this episode, Mike describes encrypting and decrypting data with different keys.

RSA Cryptosystems
10:18

Learn the Diffie-Hellman key exchange agreement and methods as Mike conceptualizes this very complex algorithm.

Diffie-Hellman
06:42

Mike works though the ups and downs of the PGP/GPG encryption methods.

PGP/GPG
09:45

In this episode, Mike shows how a hash provides integrity to data.

Hashing
07:15

In this episode, Mike explains how hashing can improve message security.

HMAC
03:46

In this episode, Mike illustrates that information can be hidden within other data.

Note - if the video is garbled, change the resolution down one setting (or two if it persists) and that should solve the problem.  We're working on a permanent fix but this will make it function in the short term.


Steganography
05:38

In this episode, Mike explains certificates and how they are used to establish trust.

Certificates and Trust
14:15

In this episode, Mike discusses the public key infrastructure (PKI), used to enable commerce and other secure activities over the Internet.

Public Key Infrastructure
20:48

In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.

Cryptographic Attacks
24:13
Cryptography Quiz
12 questions
+ Identity and Access Management
10 lectures 01:37:27

In this episode, Mike explains the issues of proving you are who you are.

Preview 12:42

Mike continues the discussion on the issues of proving you are who you are.

Authorization Concepts
05:48

In this episode, Mike discusses how to govern access to resources.

Access Control List
06:28

In this episode, Mike shows methods to keep passwords secure.

Password Security
09:13

In this episode, Mike looks at how to control access to files in a Linux system.

Linux File Permissions
14:52

In this episode, Mike looks at how to control access to files in a Windows system.

Windows File Permissions
13:38

In this episode, Mike discusses the security of user accounts.

User Account Management
06:44

In this episode, Mike explores two common methods used for AAA, RADIUS, and TACACS+.

AAA
08:03

In this episode, Mike discusses common protocols used to identify proper users, such as PAP, CHAP, Kerberos, LDAP, and more.

Authentication Methods
09:50

In this episode, Mike describes how to log in to one computer and gain access to many.

Single Sign-On
10:09
Identity and Access Management Quiz
8 questions
+ Tools of the Trade
6 lectures 01:17:00

In this episode, Mike goes through the command-line utilities to view network traffic and traffic patterns.

OS Utilities, Part 1
14:46

In this episode, Mike demonstrates how to find out the IP and MAC addresses of a host, as well as the DNS server.

OS Utilities, Part 2
14:04

In this episode, Mike explores with the tools used to scan network machines.

Network Scanners
10:47

In this episode, Mike discusses how traffic is analyzed via a host computer.

Protocol Analyzers
10:51

In this episode, Mike describes how the Simple Network Management Protocol (SNMP) can make the lives of network administrators very, very easy.

SNMP
15:22

In this episode, Mike explores the purposes and secrets of log files.

Logs
11:10
Tools of the Trade Quiz
6 questions
+ Securing Individual Systems
19 lectures 03:03:34

In this episode, Mike discusses attacks that prevent servers from providing their essential services.

Preview 08:33

In this episode, Mike looks at some of the things that threaten computers and users.

Host Threats
09:01

In this episode, Mike shows attacks where bad actors function between encrypting hosts.

Man-in-the-Middle
22:07

In this episode, Mike shares how resiliency is integrated into security plans, and how to deal with scaling, elasticity, and other system design  considerations to ensure availability of systems.

System Resiliency
11:17

In this episode, Mike explores using multiple disks to improve reliability and performance.

RAID
11:19

In this episode, Mike discusses secure methods to save and access data on a network device.

NAS and SAN
15:58

Mike explores how to protect a system and the components used with various controls and policies.

Physical Hardening
07:26

In this episode, Mike discusses the interference that can affect the functionality of equipment.

RFI, EMI and ESD
03:12

In this episode, Mike talks about techniques to protect a host computer from threats.

Host Hardening
16:17

In this episode, Mike explains how to ensure that stored data is safe from physical loss.

Data and System Security
04:22

In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.

Disk Encryption
06:42

Mike discusses methods that can be used to protect hardware-based authentication, disks, and firmware.

Hardware/Firmware Security
09:11

In this episode, Mike discusses the OS types, characteristics, and usages.

Secure OS Types
07:43

Mike discusses how to work with different types of connections for peripheral and security considerations.

Securing Peripherals
11:03

In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.

Malware
10:11

In this episode, Mike explores how to review utility outputs to discern the validity and make an action plan.

Analyzing Output
14:54

In this episode, Mike addresses the difference between detecting network intruders and preventing intrusions.

IDS and IPS
04:29

Mike examines some of the automation strategies used and their best practices.

Automation Strategies
04:57

In this episode, Mike discusses data destruction and media sanitization, and what these methods do to the media.

Data Destruction
04:52
Securing Individual Systems Quiz
15 questions
+ The Basic LAN
11 lectures 01:43:09

In this episode, Mike reviews elements of local area networks.

Preview 08:00

In this episode, Mike reviews the data flow concept of the basic network topologies.

Network Topologies Review
05:03

In this episode, Mike works through the concepts of zones and typical configurations.

Network Zone Review
10:26

In this episode, Mike talks about how to access and control access to networks.

Network Access Controls
10:31

Learn as Mike discusses firewall concepts and explores the configurations for stateless and stateful configurations.

The Network Firewall
13:05

In this episode, Mike discusses the different types of proxy servers and their purpose.

Proxy Servers
12:44

Mike discusses the concept of honeypots and how they are used in a security program.

Honeypots
04:32
In this episode, Mike discusses the purposes and protocols behind virtual private networks (VPNs).
Virtual Private Networks
13:46

In this episode, Mike addresses IPsec, the first standardized Internet encryption.

IPSec
11:55

Learn the difference between NIDS and NIPS and the characteristics of each.

NIDS/NIPS
06:00

In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.

SIEM
07:07
The Basic LAN Quiz
10 questions
+ Beyond the Basic LAN
23 lectures 03:35:55

In this episode, Mike reviews basic wireless terms and protocols.

Wireless Review
09:43

In this episode, Mike describes how to remain secure in a non-secure, open-network world.

Living in Open Networks
09:41

In this episode, Mike discusses rogue access points and their nefarious cousins, the evil twins.

Vulnerabilities with Wireless Access Points
07:01

In this episode, Mike talks about WEP wireless security attacks and methods for cracking WEP passwords.

Cracking 802.11 – WEP
11:58

In this episode, Mike talks about WPA wireless security attacks.

Cracking 802.11 – WPA
09:24

In this episode, Mike talks about WPS wireless security attacks and methods for cracking WPS passwords.

Cracking 802.11 – WPS
09:47

In this episode, Mike explores the processes behind securing wireless networks.

Wireless Hardening
14:03

In this episode, Mike explains the different wireless devices and how the antenna signal effects the placement and usage.

Wireless Access Points
13:13

In this episode, Mike explores virtualization technologies.

Virtualization Basics
07:15

In this episode, Mike talks about some of the security aspects of virtualization.

Virtual Security
15:05

Mike discusses containers, their attributes, and the benefits that can be obtained from using containers.

Containers
10:46

In this episode, Mike talks about some of the security aspects of virtualization.

IaaS
09:32

In this episode, Mike describes the purpose of devices used to set up PaaS.

PaaS
09:03

In this episode, Mike discusses the programmers and applications that enable companies to deploy Software as a Service (SaaS).

SaaS
02:39

Mike discusses the ways to distribute software programs, Web services, and electronic data using various cloud models.

Deployment Models
08:41

In this episode, Mike looks at network-aware devices, appliances, and industrial systems.

Static Hosts
07:30

In this episode, Mike explores the various methods used to interconnect mobile devices.

Mobile Connectivity
12:03

In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.

Deploying Mobile Devices
05:24

In this episode, Mike works through some of the security issues that need to be considered when putting together security policies on mobile devices.

Mobile Enforcement
12:32

In this episode, Mike goes through the various device- and application-level management that can take place on mobile devices.

Mobile Device Management
10:24

In this episode, Mike explores preventative controls, such as guards and fences.

Physical Controls
08:44

In this episode, Mike gives a quick overview of the importance and basic function of HVAC systems and how they keep servers and other important equipment happy.

HVAC
07:25

In this episode, Mike talks fire, the right ways to fight it and the best systems to have in place to save your equipment.

Fire Suppression
04:02
Beyond the Basic LAN Quiz
19 questions
+ Secure Protocols
10 lectures 01:21:49

In this episode, Mike looks at Internet processes that have built-in encryption.

Secure Applications and Protocols
10:55

In this episode, Mike looks at the conceptual structure of networks.

Network Models
06:45

In this episode, Mike discusses the elements of TCP/IP networking.

Know Your Protocols - TCP/IP
06:07

In this episode, Mike reviews common applications, protocols, and port numbers.

Know Your Protocols - Applications
05:42

In this episode, Mike presents the elements of Transport Layer Security.

Transport Layer Security (TLS)
12:04

In this episode, Mike explores secure protocols used for hardening Internet services.

Internet Service Hardening
06:43

In this episode, Mike discusses how to protect and defend servers.

Protecting Your Servers
06:12

Mike explores the methods used to develop code, reviewing some of the models, goals, and processes to maintain during the code lifecycle.

Secure Code Development
10:17

In this episode, Mike explores the various considerations used to deploy code.

Secure Deployment Concepts
12:04

Mike walks through the different code testing considerations prior to deployment.

Code Quality and Testing
05:00
Secure Protocols Quiz
7 questions
+ Testing Your Infrastructure
8 lectures 01:04:19

In this episode, Mike delves into the world of vulnerability tools and how they work.

Vulnerability Scanning Tools
09:22

In this episode, Mike discusses the importance of and what takes place during vulnerability assessments.

Vulnerability Scanning Assessment
04:43

In this episode, Mike explores many aspects of attacks designed to use people to exploit resources.

Social Engineering Principles
02:14

In this episode, Mike describes specific attack vectors and potentials that manipulate people and circumstances to access or destroy information.

Social Engineering Attacks
07:54

In this episode, Mike builds on the attacks described in "Attacking Applications" and concentrates on attacks unique to Web applications.

Attacking Web Sites
07:53

In this episode, Mike discusses how applications are attacked.

Attacking Applications
10:56

In this episode, Mike explores how systems are exploited as well as methods used to test a system for these exploits.

Exploiting a Target
11:17

In this episode, Mike looks at the impact of specific security issues on performance and access to services, and their burden on resources.

Vulnerability Impact
10:00
Testing Your Infrastructure Quiz
7 questions
+ Dealing with Incidents
4 lectures 36:02

In this episode, Mike discusses the steps involved in incident response.

Incident Response
06:34

In this episode, Mike demonstrates how to properly collect and preserve data when incidents happen, or legal inquiries are made.

Digital Forensics
11:35

In this episode, Mike explains the thought processes necessary to create an effective contingency plan.

Contingency Planning
10:10

In this episode, Mike describes the when, why, and how of backups.

Backups
07:43
Dealing with Incidents Quiz
4 questions