CompTIA Security+ (SY0-701) Complete Course & Practice Exam
- الوصف
- أقسام الدرس
- رأي
** Taught by a Best Selling IT Certification Instructor **
Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.
You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.
CompTIA Security+ (SY0-701) is the world’s most popular cybersecurity certification today!
This course is designed to help prepare you for the CompTIA Security (SY0-701) certification exam and covers all the domains the Security+ (SY0-701) certification exam:
CompTIA Security+ (SY0-701):
-
General Security Concepts
-
Threats, Vulnerabilities, and Mitigations
-
Security Architecture
-
Security Operations
-
Security Program Management and Oversight
What You Will Receive In The Course:
-
Video lectures with the essential information needed to pass the Security+ (SY0-701) exam
-
A complete downloadable study guide in PDF format based on the lessons
-
Practice quizzes to ensure mastery of each section of the course
-
A full-length practice exam with multiple choice and mock simulations
This course stays current and up-to-date with the latest release of the CompTIA Security+ exam (SY0-701), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!
What Other Students Are Saying About My CompTIA Security+ Course:
-
Solid information, acronym break downs throughout the course (allows for better note taking). Jason is easy to follow, listen to, and understand during your study period (I sit for hours listening and taking notes and replaying the section) (Mark Guillen, 5 stars)
-
Just passed my security+ today! Dion’s course was excellent. It was all I needed, and I took his practice tests I also purchased. The only thing I think would help other testers is more sophisticated and harder performance-based questions as I experienced ones today that were pretty tough and required more hands-on experience. Overall, though completely worth the money. (Duran navarro, 5 stars)
-
The course is very informative and good for people that has no knowledge about cybersecurity so far. It teaches us about the harm caused by attacks and how to prevent them. I would suggest everyone to take this course, even if they don’t wan the certificate from Comptia. (Mahmoud Choumar, 5 stars)
-
Jason is a great pedagogue. He is thorough and amiable. The course has very minimal errors and you can tell he is very strict with the format of his lessons. I had very few questions during the lectures and only experience one issue throughout the whole experience. I will definitely buy more courses from him. I also bought the voucher from his website to get the retake for only 100 bucks! Good job Dion Training! Keep up the great job! (Victor Cabrales, 5 stars)
-
Passed the exam in December of 2022 using this course – FIRST TRY!! This course gave the back bone of everything I needed to pass the Sec. + exam. When the time came to study up a day or two before the actual exam, I used all the practice quizzes/tests from the CompTIA Sec. + study book. Seems thoughtless or stupid to not use the book for actual studying, but I found I learn slightly better in a class environment and this course/videos allowed me that. Thank you for this course and I look forward to many more in the future! Honestly, I haven’t taken an ACTUAL exam in years – many years. If I can do it, you all can too! Good luck and God speed! (Nathaniel Shumaker, 5 stars)
Upon completion of this course, you will earn 31 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.
-
5Fundamentals of Securityدرس فيديو
-
6Threats and Vulnerabilitiesدرس فيديو
-
7Confidentiality (OBJ 1.2)درس فيديو
-
8Integrity (OBJ 1.2)درس فيديو
-
9Availability (OBJ 1.2)درس فيديو
-
10Non-repudiation (OBJ 1.2)درس فيديو
-
11Authentication (OBJ 1.2)درس فيديو
-
12Authorization (OBJ 1.2)درس فيديو
-
13Accounting (OBJ 1.2)درس فيديو
-
14Security Control Categories (OBJ 1.1)درس فيديو
-
15Security Control Types (OBJ 1.1)درس فيديو
-
16Zero Trust (OBJ 1.2)درس فيديو
-
17Gap Analysis (OBJ 1.2)درس فيديو
-
18Checkpoint: Fundamentals of Securityاختبار
-
19Threat Actors (OBJ 1.2, 2.1, & 2.2)درس فيديو
-
20Threat Actor Motivations (OBJ 2.1)درس فيديو
-
21Threat Actor Attributes (OBJ 2.1)درس فيديو
-
22Unskilled Attackers (OBJ 2.1)درس فيديو
-
23Hacktivists (OBJ 2.1)درس فيديو
-
24Organized Crime (OBJ 2.1)درس فيديو
-
25Nation-state Actor (OBJ 2.1)درس فيديو
-
26Insider Threats (OBJ 2.1)درس فيديو
-
27Shadow IT (OBJ 2.1)درس فيديو
-
28Threat Vectors and Attack Surfaces (OBJ 2.2)درس فيديو
-
29Outsmarting Threat Actors (OBJ 1.2)درس فيديو
-
30Checkpoint: Threat Actorsاختبار
-
31Physical Security (OBJ 1.2 & 2.4)درس فيديو
-
32Fencing and Bollards (OBJ 1.2)درس فيديو
-
33Attacking with Brute Force (OBJ 2.4)درس فيديو
-
34Surveillance Systems (OBJ 1.2)درس فيديو
-
35Bypassing Surveillance Systems (OBJ 2.4)درس فيديو
-
36Access Control Vestibules (OBJ 1.2)درس فيديو
-
37Door Locks (OBJ 1.2)درس فيديو
-
38Access Badge Cloning (OBJ 2.4)درس فيديو
-
39Checkpoint: Physical Securityاختبار
-
40Social Engineering (OBJ 2.2 & 5.6)درس فيديو
-
41Motivational Triggers (OBJ 5.6)درس فيديو
-
42Impersonation (OBJ 2.2)درس فيديو
-
43Pretexting (OBJ 2.2)درس فيديو
-
44Phishing Attacks (OBJ 2.2)درس فيديو
-
45Preventing Phishing Attacks (OBJ 5.6)درس فيديو
-
46Conducting an Anti-Phishing Campaign (OBJ 5.6)درس فيديو
-
47Frauds and Scams (OBJ 2.2)درس فيديو
-
48Influence Campaigns (OBJ 2.2)درس فيديو
-
49Other Social Engineering Attacks (OBJ 2.2)درس فيديو
-
50Checkpoint: Social Engineeringاختبار
-
51Malware (OBJ 2.4)درس فيديو
-
52Viruses (OBJ 2.4)درس فيديو
-
53Worms (OBJ 2.4)درس فيديو
-
54Trojans (OBJ 2.4)درس فيديو
-
55Viruses and Trojans (OBJ 2.4)درس فيديو
-
56Ransomware (OBJ 2.4)درس فيديو
-
57Zombies and Botnets (OBJ 2.4)درس فيديو
-
58Rootkits (OBJ 2.4)درس فيديو
-
59Backdoors and Logic Bombs (OBJ 2.4)درس فيديو
-
60Keylogger (OBJ 2.4)درس فيديو
-
61Spyware and Bloatware (OBJ 2.4)درس فيديو
-
62Malware Attack Techniques (OBJ 2.4)درس فيديو
-
63Indications of Malware Attacks (OBJ 2.4)درس فيديو
-
64Checkpoint: Malwareاختبار
-
65Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1)درس فيديو
-
66Data Classifications (OBJ 3.3)درس فيديو
-
67Data Ownership (OBJ 4.2 & 5.1)درس فيديو
-
68Data States (OBJ 3.3)درس فيديو
-
69Data Types (OBJ 3.3 & 1.4)درس فيديو
-
70Data Sovereignty (OBJ 3.3)درس فيديو
-
71Securing Data (OBJ 3.3)درس فيديو
-
72Data Loss Prevention (DLP) (OBJ 4.4)درس فيديو
-
73Configuring a DLP (OBJ 4.5)درس فيديو
-
74Checkpoint: Data Protectionاختبار
-
75Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4)درس فيديو
-
76Symmetric vs Asymmetric (OBJ 1.4)درس فيديو
-
77Symmetric Algorithms (OBJ 1.4)درس فيديو
-
78Asymmetric Algorithms (OBJ 1.4)درس فيديو
-
79Hashing (OBJ 1.4)درس فيديو
-
80Increasing Hash Security (OBJ 1.4)درس فيديو
-
81Public Key Infrastructure (PKI) (OBJ 1.4)درس فيديو
-
82Digital Certificates (OBJ 1.4)درس فيديو
-
83Exploring Digital Certificates (OBJ 1.4)درس فيديو
-
84Blockchain (OBJ 1.4)درس فيديو
-
85Encryption Tools (OBJ 1.4)درس فيديو
-
86Obfuscation (OBJ 1.4)درس فيديو
-
87Cryptographic Attacks (OBJ 2.3 & 2.4)درس فيديو
-
88Checkpoint: Cryptographic Solutionsاختبار
-
89Risk Management (OBJ 5.2)درس فيديو
-
90Risk Assessment Frequency (OBJ 5.2)درس فيديو
-
91Risk Identification (OBJ 5.2)درس فيديو
-
92Risk Register (OBJ 5.2)درس فيديو
-
93Qualitative Risk Analysis (OBJ 5.2)درس فيديو
-
94Quantitative Risk Analysis (OBJ 5.2)درس فيديو
-
95Risk Management Strategies (OBJ 5.2)درس فيديو
-
96Risk Monitoring and Reporting (OBJ 5.2)درس فيديو
-
97Checkpoint: Risk Managementاختبار
-
98Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3)درس فيديو
-
99Supply Chain Risks (OBJ 2.3 & 5.3)درس فيديو
-
100Supply Chain Attacks (OBJ 2.2 & 5.3)درس فيديو
-
101Vendor Assessment (OBJ 5.3)درس فيديو
-
102Vendor Selection and Monitoring (OBJ 5.3)درس فيديو
-
103Contracts and Agreements (OBJ 5.3)درس فيديو
-
104Checkpoint: Third-party Vendor Risksاختبار
-
105Governance and Compliance (OBJ 5.1 & 5.4)درس فيديو
-
106Governance (OBJ 5.1)درس فيديو
-
107Governance Structures (OBJ 5.1)درس فيديو
-
108Policies (OBJ 5.1)درس فيديو
-
109Standards (OBJ 5.1)درس فيديو
-
110Procedures (OBJ 5.1)درس فيديو
-
111Governance Considerations (OBJ 5.1)درس فيديو
-
112Compliance (OBJ 5.4)درس فيديو
-
113Non-compliance Consequences (OBJ 5.4)درس فيديو
-
114Checkpoint: Governance and Complianceاختبار
-
115Asset and Change Management (OBJ 1.3, 4.1, & 4.2)درس فيديو
-
116Acquisition and Procurement (OBJ 4.2)درس فيديو
-
117Mobile Asset Deployments (OBJ 4.1)درس فيديو
-
118Asset Management (OBJ 4.2)درس فيديو
-
119Asset Disposal and Decommissioning (OBJ 4.2)درس فيديو
-
120Change Management (OBJ 1.3)درس فيديو
-
121Change Management Processes (OBJ 1.3)درس فيديو
-
122Technical Implications of Changes (OBJ 1.3)درس فيديو
-
123Documenting Changes (OBJ 1.3)درس فيديو
-
124Checkpoint: Asset and Change Managementاختبار
-
125Audits and Assessments (OBJ 5.5)درس فيديو
-
126Internal Audits and Assessments (OBJ 5.5)درس فيديو
-
127Performing an Internal Assessment (OBJ 5.5)درس فيديو
-
128External Audits and Assessments (OBJ 5.5)درس فيديو
-
129Performing an External Assessment (OBJ 5.5)درس فيديو
-
130Penetration Testing (OBJ 5.5)درس فيديو
-
131Reconnaissance in Pentesting (OBJ 5.5)درس فيديو
-
132Performing a Basic PenTest (OBJ 5.5)درس فيديو
-
133Attestation of Findings (OBJ 5.5)درس فيديو
-
134Checkpoint: Audits and Assessmentsاختبار
-
135Cyber Resilience and Redundancy (OBJ 3.4)درس فيديو
-
136High Availability (OBJ 3.4)درس فيديو
-
137Data Redundancy (OBJ 3.4)درس فيديو
-
138Configuring a RAID (OBJ 3.4)درس فيديو
-
139Capacity Planning (OBJ 3.4)درس فيديو
-
140Powering Data Centers (OBJ 3.4)درس فيديو
-
141Data Backups (OBJ 3.4)درس فيديو
-
142Continuity of Operations Plan (OBJ 3.4)درس فيديو
-
143Redundant Site Considerations (OBJ 3.4)درس فيديو
-
144Resilience and Recovery Testing (OBJ 3.4)درس فيديو
-
145Checkpoint: Cyber Resilience and Redundancyاختبار
-
146Security Architecture (OBJ 3.1 & 4.1)درس فيديو
-
147On-premise versus the Cloud (OBJ 3.1)درس فيديو
-
148Cloud Security (OBJ 3.1 & 4.1)درس فيديو
-
149Virtualization and Containerization (OBJ 2.3 & 3.1)درس فيديو
-
150Serverless (OBJ 3.1)درس فيديو
-
151Microservices (OBJ 3.1)درس فيديو
-
152Network Infrastructure (OBJ 3.1)درس فيديو
-
153Software-Defined Network (SDN) (OBJ 3.1)درس فيديو
-
154Infrastructure as Code (IaC) (OBJ 3.1)درس فيديو
-
155Centralized vs Decentralized Architectures (OBJ 3.1)درس فيديو
-
156Internet of Things (IoT) (OBJ 3.1 & 4.1)درس فيديو
-
157ICS and SCADA (OBJ 3.1 & 4.1)درس فيديو
-
158Embedded Systems (OBJ 3.1 & 4.1)درس فيديو
-
159Checkpoint: Security Architectureاختبار
-
160Security Infrastructure (OBJ 3.2 & 4.5)درس فيديو
-
161Ports and Protocols (OBJ 4.5)درس فيديو
-
162Firewalls (OBJ 3.2)درس فيديو
-
163Configuring Firewalls (OBJ 4.5)درس فيديو
-
164IDS and IPS (OBJ 3.2)درس فيديو
-
165Network Appliances (OBJ 3.2)درس فيديو
-
166Port Security (OBJ 3.2)درس فيديو
-
167Securing Network Communications (OBJ 3.2)درس فيديو
-
168SD-WAN and SASE (OBJ 3.2)درس فيديو
-
169Infrastructure Considerations (OBJ 3.2)درس فيديو
-
170Selecting Infrastructure Controls (OBJ 3.2)درس فيديو
-
171Checkpoint: Security Infrastructureاختبار
-
172Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6)درس فيديو
-
173Identity and Access Management (IAM) (OBJ 4.6)درس فيديو
-
174Multifactor Authentication (OBJ 4.6)درس فيديو
-
175Password Security (OBJ 4.6)درس فيديو
-
176Password Attacks (OBJ 2.4)درس فيديو
-
177Single Sign-On (SSO) (OBJ 4.6)درس فيديو
-
178Federation (OBJ 4.6)درس فيديو
-
179Privileged Access Management (PAM) (OBJ 4.6)درس فيديو
-
180Access Control Models (OBJ 4.6)درس فيديو
-
181Assigning Permissions (OBJ 4.6)درس فيديو
-
182Checkpoint: Identity and Access Management (IAM) Solutionsاختبار
-
183Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1)درس فيديو
-
184Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5)درس فيديو
-
185Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)درس فيديو
-
186Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1)درس فيديو
-
187Zero-day Vulnerabilities (OBJ 2.3)درس فيديو
-
188Operating System Vulnerabilities (OBJ 2.3 & 2.5)درس فيديو
-
189SQL and XML Injections (OBJ 2.3 & 2.4)درس فيديو
-
190Conducting an SQL Injection (OBJ 2.3 & 2.4)درس فيديو
-
191XSS and XSRF (OBJ 2.3 & 2.4)درس فيديو
-
192Buffer Overflow (OBJ 2.3 & 2.4)درس فيديو
-
193Race Conditions (OBJ 2.3)درس فيديو
-
194Checkpoint: Vulnerabilities and Attacksاختبار
-
195Malicious Activity (OBJ 2.4)درس فيديو
-
196Distributed Denial of Service (OBJ 2.4)درس فيديو
-
197Domain Name System (DNS) Attacks (OBJ 2.4)درس فيديو
-
198Directory Traversal Attack (OBJ 2.4)درس فيديو
-
199Execution and Escalation Attack (OBJ 2.4)درس فيديو
-
200Replay Attacks (OBJ 2.4)درس فيديو
-
201Session Hijacking (OBJ 2.4)درس فيديو
-
202On-Path Attacks (OBJ 2.4)درس فيديو
-
203Injection Attacks (OBJ 2.4)درس فيديو
-
204Indicators of Compromise (IoC) (OBJ 2.4)درس فيديو
-
205Checkpoint: Malicious Activityاختبار
-
206Hardening (OBJ 2.5, 4.1, & 4.5)درس فيديو
-
207Changing Default Configurations (OBJ 2.5)درس فيديو
-
208Restricting Applications (OBJ 2.5)درس فيديو
-
209Unnecessary Services (OBJ 2.5)درس فيديو
-
210Trusted Operating Systems (OBJ 2.5)درس فيديو
-
211Updates and Patches (OBJ 2.5)درس فيديو
-
212Patch Management (OBJ 2.5)درس فيديو
-
213Group Policies (OBJ 2.5 & 4.5)درس فيديو
-
214SELinux (OBJ 2.5 & 4.5)درس فيديو
-
215Data Encryption Levels (2.5)درس فيديو
-
216Secure Baselines (OBJ 2.5 and 4.1)درس فيديو
-
217Checkpoint: Hardeningاختبار
-
218Security Techniques (OBJ 4.1 & 4.5)درس فيديو
-
219Wireless Infrastructure Security (OBJ 4.1)درس فيديو
-
220Wireless Security Settings (OBJ 4.1)درس فيديو
-
221Application Security (OBJ 4.1)درس فيديو
-
222Network Access Control (NAC) (OBJ 4.5)درس فيديو
-
223Web and DNS Filtering (OBJ 4.5)درس فيديو
-
224Email Security (OBJ 4.5)درس فيديو
-
225Endpoint Detection and Response (OBJ 4.5)درس فيديو
-
226User Behavior Analytics (OBJ 4.5)درس فيديو
-
227Selecting Secure Protocols (OBJ 4.5)درس فيديو
-
228Checkpoint: Security Techniquesاختبار
-
229Vulnerability Management (OBJ 4.3)درس فيديو
-
230Identifying Vulnerabilities (OBJ 4.3)درس فيديو
-
231Threat Intelligence Feeds (OBJ 4.3)درس فيديو
-
232Responsible Disclosure Programs (OBJ 4.3)درس فيديو
-
233Analyzing Vulnerabilities (OBJ 4.3)درس فيديو
-
234Conducting Vulnerability Scans (OBJ 4.3)درس فيديو
-
235Assessing Vulnerability Scan Results (OBJ 4.3)درس فيديو
-
236Vulnerability Response and Remediation (OBJ 4.3)درس فيديو
-
237Validating Vulnerability Remediation (OBJ 4.3)درس فيديو
-
238Vulnerability Reporting (OBJ 4.3)درس فيديو
-
239Checkpoint: Vulnerability Managementاختبار
-
240Alerting and Monitoring (OBJ 4.4)درس فيديو
-
241Monitoring Resources (OBJ 4.4)درس فيديو
-
242Alerting and Monitoring Activities (OBJ 4.4)درس فيديو
-
243Simple Network Management Protocol (SNMP) (OBJ 4.4)درس فيديو
-
244Security Information and Event Management (SIEM) (OBJ 4.4)درس فيديو
-
245Data from Security Tools (OBJ 4.4)درس فيديو
-
246Security Content Automation and Protocol (SCAP) (OBJ 4.4)درس فيديو
-
247NetFlow and Flow Analysisدرس فيديو
-
248Single Pane of Glass (OBJ 4.4)درس فيديو
-
249Checkpoint: Alerting and Monitoringاختبار
-
250Incident Response (OBJ 4.8)درس فيديو
-
251Incident Response Process (OBJ 4.8)درس فيديو
-
252Threat Hunting (OBJ 4.8)درس فيديو
-
253Root Cause Analysis (OBJ 4.8)درس فيديو
-
254Incident Response Training and Testing (OBJ 4.8)درس فيديو
-
255Digital Forensic Procedures (OBJ 4.8)درس فيديو
-
256Data Collection Procedures (OBJ 4.8)درس فيديو
-
257Disk Imaging and Analysis (OBJ 4.8)درس فيديو
-
258Checkpoint: Incident Responseاختبار
-
259Investigating an Incident (OBJ 4.9)درس فيديو
-
260Investigating with Data (OBJ 4.9)درس فيديو
-
261Dashboards (OBJ 4.9)درس فيديو
-
262Automated Reports (OBJ 4.9)درس فيديو
-
263Vulnerability Scans (OBJ 4.9)درس فيديو
-
264Packet Captures (OBJ 4.9)درس فيديو
-
265Firewall Logs (OBJ 4.9)درس فيديو
-
266Application Logs (OBJ 4.9)درس فيديو
-
267Endpoint Logs (OBJ 4.9)درس فيديو
-
268OS-specific Security Logs (OBJ 4.9)درس فيديو
-
269IPS/IDS Logs (OBJ 4.9)درس فيديو
-
270Network Logs (OBJ 4.9)درس فيديو
-
271Metadata (OBJ 4.9)درس فيديو
-
272Checkpoint: Investigating an Incidentاختبار
-
273Automation and Orchestration (OBJ 4.7)درس فيديو
-
274When to Automate and Orchestrate (OBJ 4.7)درس فيديو
-
275Benefits of Automation and Orchestration (OBJ 4.7)درس فيديو
-
276Automating Support Tickets (OBJ 4.7)درس فيديو
-
277Automating Onboarding (OBJ 4.7)درس فيديو
-
278Automating Security (OBJ 4.7)درس فيديو
-
279Automating Application Development (OBJ 4.7)درس فيديو
-
280Integrations and APIs (OBJ 4.7)درس فيديو
-
281Checkpoint: Automation and Orchestrationاختبار
-
282Security Awareness (OBJ 5.6)درس فيديو
-
283Recognizing Insider Threats (OBJ 5.6)درس فيديو
-
284Password Management (OBJ 5.6)درس فيديو
-
285Avoiding Social Engineering (OBJ 5.6)درس فيديو
-
286Policy and Handbooks (OBJ 5.6)درس فيديو
-
287Remote and Hybrid Work Environments (OBJ 5.6)درس فيديو
-
288Creating a Culture of Security (OBJ 5.6)درس فيديو
-
289Checkpoint: Security Awarenessاختبار