CompTIA Security+ (SY0-501) Complete Course & Practice Exam
4.6 (8,558 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
29,612 students enrolled

CompTIA Security+ (SY0-501) Complete Course & Practice Exam

CompTIA Security+ (SY0-501) Bootcamp - Your preparation course for the most popular cyber security certification!
Bestseller
4.6 (8,558 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
29,612 students enrolled
Last updated 5/2020
English
English, French [Auto-generated], 5 more
  • German [Auto-generated]
  • Indonesian [Auto-generated]
  • Italian [Auto-generated]
  • Portuguese [Auto-generated]
  • Spanish [Auto-generated]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 15 hours on-demand video
  • 1 article
  • 1 downloadable resource
  • 1 Practice Test
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Passing the CompTIA Security+ certification exam with confidence
  • Understand computer security, its functions, and its components
  • Performing basic security configurations
  • Become an effective security technician in a business environment
Requirements
  • Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course)
  • (Helpful, but not required) Completion of the CompTIA A+ and Network+ certifications
Description

**You can pass the CompTIA Security+ (SY0-501) Exam **

Taught by an expert in information technology and cyber security with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.

My name is Jason Dion, and I have personally helped over 60,000 students earn their IT certifications, and now I can help you, too!

This course is designed to help prepare you for the CompTIA Security+ (SY0-501) certification exam and covers the six domains for the Security+ (SY0-501) certification exam:

  1. Threats, Attacks, and Vulnerabilities

  2. Technologies and Tools

  3. Architecture and Design

  4. Identity and Access Management

  5. Risk Management

  6. Cryptography and PKI

You will learn the fundamentals of cyber security  and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks.

What You Will Receive In The Course:

  • Video lectures with the essential information needed to pass the Security+ (SY0-501) exam

  • Downloadable copies of our Study Notes based on the lessons

  • Practice questions to ensure mastery of each section of the course

  • A full-length practice exam with multiple choice and mock simulations

What Other Students Are Saying About My CompTIA Security+ (SY0-501) Course:

  • I passed the Security+ exam. This course was absolutely essential to passing that exam. Only the Dion Security+ covered the topics comprehensively and thoroughly enough. No other resource I used came close. (Kolya, 5 stars)

  • I have just completed watching two different instructor corses on the same subject. I must say, Dion's has more information in a better constructed manner. This course is not easy, it is heavy with information and having you sit through shorter videos was the best part. Having watched more than just Dion's, I can say he goes over the content much better. Very glad I chose to watch a second course! (Rutger, 5 stars)

  • I love taking this wonderful course. It's full of important tips and amazing steps in order to pass CompTIA Security+. Thank you, Jason Dion, for making this incredible course! (Paul, 5 stars)

Who this course is for:
  • Students wanting to pass the CompTIA Security+ certification exam
  • Students wanting to learn the terminology and nomenclature of computer security
  • Students seeking a career in cyber security
Course content
Expand all 228 lectures 15:11:11
+ Overview of Security
9 lectures 28:16

A short welcome to the course, a brief background of the instructor, information on the exam itself, and where to buy your exam voucher at a discount.

Preview 04:25

This lesson includes the downloadable study guide as a resource for your offline studies and note taking.

Download the Study Guide
00:07

This lesson talks about the difference in information security and information systems security.

Preview 02:58

This lesson discusses the CIA Triad: confidentiality, integrity, and availability.

Preview 03:57

This lesson covers the AAA of security: authentication, authorization, and accounting.

Preview 03:08

This lesson covers the different types of security threats that will be discussed in the course.

Preview 02:59

This lesson covers the three basic types of security controls and how to mitigate threats.

Preview 02:31

This lesson covers the 5 different types of hackers: white hats, black hats, gray hats, blue hats, and elite.

Preview 04:56

This lesson covers the four types of threat actors covered by the Security+ exam: script kiddies, hacktivists, organized crime groups, and advanced persistent threats (APTs).

Preview 03:15

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Overview of Security
4 questions
+ Malware
10 lectures 32:17

This lesson provides an overview of the 7 types of malicious software that will be covered in this section.

Preview 00:42

This lesson discusses the different types of computer viruses.

Preview 06:23

This lesson discusses what a computer worm is.

Preview 02:12

This lesson discusses how Trojans work.

Preview 02:51

This lesson provides a demonstration of how to create and distribute viruses and Trojans in a lab environment.

Preview 06:18

This lesson discusses ransomware.

Preview 02:33

This lesson discusses spyware.

Preview 02:42

This lesson discusses rootkits.

Preview 03:32

This lesson discusses the concept of spam.

Preview 02:59

This lesson summarizes this section and provides you with the key information you need to know for the exam.

Preview 02:05

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Malware
3 questions
+ Malware Infections
10 lectures 45:01

This lesson provides an overview of the methods of malware infection.

Malware Infections
04:15

This lesson covers the most common infection vectors: software, messaging, and media.

Common Delivery Methods
04:29

This demonstration will show you how easy it is to be tricked by a phishing email and how to prevent it.

Demo: Phishing
05:22

This lesson covers botnets and zombies.

Botnets and Zombies
03:33

This lesson covers active interception and privilege escalation.

Active Interception and Privilege Escalation
02:31

This demonstration will show you how an attacker might gain access to a system by using an exploit that provides privilege escalation.

Demo: Privilege Escalation
05:44

This lesson covers backdoors and logic bombs.

Backdoors and Logic Bombs
03:51

This lesson covers the symptoms of a malware infection.

Symptoms of Infection
04:13

This lesson provides the steps to take to remove malware.

Removing Malware
05:04

This lesson provides tips for preventing malware from infecting your systems.

Preventing Malware
05:59

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Malware Infection
4 questions
+ Security Applications and Devices
9 lectures 36:04

This lesson provides an overview of this section of the course.

Security Applications and Devices
00:35

This lesson describes software firewalls, how they are different from our network firewalls, and the most commonly used software firewalls in today's computers.

Software Firewalls
04:18

This demonstration shows how to set up Windows and OSX firewalls.

Demo: Software Firewalls
06:47

This lesson covers the concepts of host-based intrusion detection systems and how they are used in our enterprise networks.

IDS
05:05

This lesson covers the use of pop-up blockers and how they can help us avoid adware and malware.

Pop-up Blockers
03:12

This lesson covers the concepts of Data Loss Prevention systems.

Data Loss Prevention (DLP)
03:46

This lesson covers the different ways to implement security features from your computer's BIOS.

Securing the BIOS
03:58

This lesson discusses how removable storage and network storage can be better secured.

Securing Storage Devices
03:29

This lesson discusses how the contents of your hard drive can be encrypted to secure your files.

Disk Encryption
04:54

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Security Applications and Devices
3 questions
+ Mobile Device Security
9 lectures 32:40

This lesson provides an overview of this section of the course.

Mobile Device Security
01:17

This lesson discusses the importance of securing your wireless devices and peripherals.

Securing Wireless Devices
01:33

This lesson covers mobile malware and botnets.

Mobile Malware
06:21

This lesson covers SIM Cloning and how an attacker can bypass two-factor authentication by taking over your phone number.

SIM Cloning & ID Theft
04:03

This lesson covers bluejacking and bluesnarfing.

Bluetooth Attacks
02:11

This lesson covers the issues involved with mobile device theft.

Mobile Device Theft
03:13

This lesson covers the dangers of mobile apps.

Security of Apps
05:09

This lesson covers the dangers of Bring Your Own Device (BYOD) policies.

BYOD
04:59

This lesson provides a summary of the type of actions you can take to best harden your mobile devices.

Hardening Mobile Devices
03:54

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Mobile Device Security
3 questions
+ Hardening
10 lectures 33:07

This lesson discusses the concept of hardening and how it applies to our operating systems and organizations.

Hardening
01:50

This lesson discusses the concept of least functionality and how it is applied by removing unnecessary applications. 

Unnecessary Applications
03:14

This lesson describes the concepts of application whitelist and blacklist. 

Restricting Applications
02:59

This demonstration will teach you how to stop and disable a service in Windows and Linux. 

Demo: Unnecessary Services
05:38

This lesson discusses what makes an operating system a Trusted Operating System. 

Trusted Operating System
01:59

This lesson discusses the importance of updates, patches, and hotfixes.

Updates and Patches
03:29

This lesson discusses how to properly perform patch management.

Patch Management
03:52

This lesson discusses group policies and shows how they are created.

Group Policies
02:36

This demonstration shows how to use the group policy editor to whitelist or blacklist an application. 

Demo: Group Policies
04:09

This lesson discusses the various ways to harden file systems and hard drives.

File Systems and Hard Drives
03:21

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Hardening
3 questions
+ Virtualization
6 lectures 21:50

This lesson discusses the concept of virtualization, its types, and how they are utilized in our organizations.

Virtualization
02:10

This lesson focuses on the hypervisor and its two types.

Hypervisors
02:40

This demonstration shows how to install and create a virtual machine in VirtualBox.

Demo: How to create a VM
04:41

This lesson discusses the security threats related to virtual machines.

Threats to VMs
03:46

This lesson discusses the ways to best secure a virtual machine.

Securing VMs
03:50

This demonstration will show you how to encrypt the virtual machine's files on the host system and to isolate a virtual machine from the network and host computer. 

Demo: Securing VMs
04:43

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Virtualization
2 questions
+ Application Security
5 lectures 22:04

This lesson provides an overview of the topics covered in this section of the course. 

Application Security
01:46

This lesson focuses on how to best secure your web browser.

Web Browser Security
06:42

This lesson focuses on the various threats and concerns associated with web browser security. 

Web Browser Concerns
03:22

This demonstration will show you how to best configure your web browser on Windows for a secure environment. 

Demo: Web Browser Configuration
05:22

This lesson discusses methods to secure Microsoft Office and other applications on your workstation. 

Securing Applications
04:52

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Application Security
3 questions
+ Secure Software Development
9 lectures 55:30

This lesson discusses secure software development and the Software Development Life Cycle (SDLC).

Software Development
08:36

This lesson discusses how the principles of the CIA triad are applied to SDLC and DevOps.

SDLC Principles
06:25

This lesson discusses the various testing methods used in SDLC and DevOps.

Testing Methods
07:02

This lesson discusses some basic software vulnerabilities and exploits, like backdoors, zero day attacks, directory traversals, arbitrary code execution, and remote code execution.

Software Vulnerabilities and Exploits
03:47

This lesson discusses how a buffer overflow attack occurs.

Buffer Overflows
06:18

This demonstration will show how a buffer overflow is manually performed.

Demo: Buffer Overflow Attack
06:28

This lesson discusses cross-site scripting and cross-site request forgery.

XSS and XSRF
03:10

This lesson discusses SQL injections, LDAP injections, and XML injections.

SQL Injection
06:28

This demonstration will show how a SQL injection is performed.

Demo: SQL Injection
07:16

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Secure Software Development
4 questions
+ Network Design
10 lectures 30:20

In this lesson, you will learn what is covered in this section of the course and what you should already know from your Network+ studies before taking the Security+ exam. 

Network Security
Processing..

This lesson provides a quick review of the 7 layers of the OSI model and the various data types used in our networks. 

The OSI Model
06:03

This lesson discusses the role of network switches and what types of attacks they are subject to. 

Switches
03:35

This lesson discusses the role of routers in our networks and how to begin securing them. 

Routers
02:30

In this lesson, we will discuss the different types of network zones, including LANs, WANs, DMZs, extranets, and intranets. 

Network Zones
03:29

This lesson discusses the concepts of Network Access Control (NAC). 

Network Access Control
02:43

This lesson discusses how VLANs are used to secure our networks. 

VLANs
01:32

This lesson discusses how subnetting can be used to secure your network. 

Subnetting
01:53

This lesson discusses how to use NAT to hide an entire network from attackers. 

Network Address Translation
02:35

This lesson discusses telephony in networks, such as modems, PBX equipment, and VoIP devices. 

Telephony
06:00

This quiz will test your knowledge of the topics covered in this section of the course.

Quiz: Network Design
3 questions