image
The Ultimate Drawing Course Beginner to Advanced...
$179
$79
image
User Experience Design Essentials - Adobe XD UI UX...
$179
$79
Total:
$659

Description

Welcome to the
TOTAL: CompTIA Security+ Certification (SY0-601)
, a course from the production studios of Total Seminars with subject matter experts
Mike Meyers and Dan Lachance
.
Since the requirements and costs are high (the exam voucher is $392), you'll want to make sure you're prepared to pass the exam the first time and never pay full price. This course will prepare you and then you can get
discounted exam vouchers at the Total Seminars website
This course covers everything you need to know to pass your CompTIA Security+ (SY0-601) certification exam. With over 17 hours of in-depth and fascinating content and 125 video lectures, this course will not only make you a good IT security tech, but make sure you are ready to pass the CompTIA Security+ exam.
Mike Meyers
is the President of Total Seminars and well known as the "
Alpha Geek
". Mike is widely known at the #1 CompTIA author and instructor with over 1 million books in print.
Dan Lachance
is a highly motivated and passionate IT evangelist. He is a consultant, trainer, and author with over 20 years of experience in the IT security industry.
This course shows you how to:
Apply the three “A’s” of security: authentication, authorization, and accounting
Scan your wired or wireless network and assess it for various weaknesses
Use cryptography to assure integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)
Understand critical concepts in risk management, like setting up alerts, responding to incidents, and mitigating vulnerabilities
Identify how hackers are trying to get into your network, IT infrastructure, and physical assets and how security techs help prevent those breaches
Prevent attacks ranging from simple malware to sophisticated exploits to social engineering that takes advantage of people’s trust, relationships, and lack of knowledge
Apply the techniques used in penetration testing, including passive and active reconnaissance
Secure an enterprise environment, including creating incident response, business continuity, and disaster recovery plans
WHY SHOULD I TAKE THIS COURSE?
Total Seminars has an excellent reputation in the IT training industry, offering a wide variety of training tools. This course’s subject matter experts, Mike Meyers and Dan Lachance, have a combined 50+ years of experience. Mike has created training materials for thousands of schools, corporations, and government agencies, and has taught numerous seminars for the FBI, DEA, and many other corporate partners; he also wrote several bestselling CompTIA certification guides. Dan is the owner of Lachance IT Consulting, Inc. and has taught many online IT training courses in addition to his work as a network and server consultant and IT security auditor.
This course will also prepare you for the CompTIA Security+ exam, which is industry standard certification, compliant with ISO 17024 standards, accredited by ANSI, and approved by the U.S. Department of Defense.
The average beginner IT security salary is $74,000, and
an information security analyst can make a much as is $117,000 starting out
. If you’re looking to advance your career, this certification is a great place to start. 96% of HR managers use IT certifications as screening or hiring criteria during recruitment.
WHAT’S COVERED?
The course covers all the CompTIA Security+ (SY0-601) objective domains:
Threats, Attacks, and Vulnerabilities (24%)
Architecture and Design (21%)
Implementation (25%)
Operations and Incident Response (16%)
Governance, Risk, and Compliance (14%)
EXAM INFO
Exam code: SY0-601
Max. 90 questions (performance-based and multiple choice)
Length of exam: 90 minutes
Passing score: 750 (on a scale of 100-900)
Exam voucher cost: $349 USD (be sure to go to Total Seminars' website for discount vouchers!)
Recommended experience: CompTIA Network+ and two years of experience in IT administration with a security focus
Testing provider: Pearson VUE (in-person and online at-home options available)
HOW DO I TAKE THE COMPTIA SECURITY+ EXAM?
Buy an exam voucher (get your discount voucher at Total Seminars' website), schedule your exam on the Pearson VUE Web site, then take the exam at a qualifying Pearson VUE testing center or virtually using their OnVue option.
Schedule through a testing center: pearsonvue. com
Schedule an at-home (or at-work) exam: onvue. com
WHAT KIND OF JOB CAN I GET WITH A COMPTIA SECURITY+ CERTIFICATION?
Security or systems administrator
Security engineer/analyst
Security IT auditor
IT project manager
Beginner cybersecurity specialist
Junior IT auditor
Junior penetration tester
Who this course is for:
This course is intended for anyone that is preparing for an IT Security position or looking to improve their security skills and become CompTIA Security+ certified. However, it goes beyond that and will give you the skills you need to be a better security tech on the job.

What you'll learn

This is a complete and comprehensive CompTIA Security+ Certification (SY0-601) course. It is designed to prepare you to take and pass the CompTIA exam

You will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech.

Your new skills and the CompTIA Security+ Cert will help you land a great IT security tech job or, get that raise or advancement you are after.

This course is ideal as both a study tool and an on-the-job reference for IT Security tasks.

Requirements

  • You will need a copy of Adobe XD 2019 or above. A free trial can be downloaded from Adobe.
  • No previous design experience is needed.
  • No previous Adobe XD skills are needed.

Course Content

27 sections • 95 lectures
Expand All Sections
1-Introduction
2
1.1-Introduction to CompTIA Security+ SY0-601
1.2-About the CompTIA Security+ SY0-601 Exam
2-Chapter 1: Risk Management
19
2.1-Defining Risk
2.2-Threats and Vulnerabilities
2.3-Threat Intelligence
2.4-Risk Management Concepts
2.5-Security Controls
2.6-Risk Assessments and Treatments
2.7-Quantitative Risk Assessments
2.8-Qualitative Risk Assessments
2.9-Business Impact Analysis
2.10-Data Types and Roles
2.11-Security and the Information Life Cycle
2.12-Data Destruction
2.13-Personnel Risk and Policies
2.14-Third-Party Risk Management
2.15-Agreement Types
2.16-Chapter 1 Exam Question Review
2.17-Wiping Disks with the dd Command Lab
2.18-Chapter 1 Ask Me Anything (AMA)
2.19-Chapter 1 Quiz
3-Chapter 2: Cryptography
20
3.1-Cryptography Basics
3.2-Data Protection
3.3-Cryptographic Methods
3.4-Symmetric Cryptosystems
3.5-Symmetric Block Modes
3.6-Asymmetric Cryptosystems
3.7-Diffie-Hellman
3.8-Hashing
3.9-Understanding Digital Certificates
3.10-Trust Models
3.11-Public Key Infrastructure
3.12-Certificate Types
3.13-Touring Certificates
3.14-Cryptographic Attacks
3.15-Password Cracking
3.16-Password Cracking Demo
3.17-Chapter 2 Exam Question Review
3.18-SSH Public Key Authentication Lab
3.19-Chapter 2 Ask Me Anything (AMA)
3.20-Chapter 2 Quiz
4-Chapter 3: Identity and Account Management
13
4.1-Identification, Authentication, and Authorization
4.2-Enabling Multifactor Authentication
4.3-Authorization
4.4-Accounting
4.5-Authentication Methods
4.6-Access Control Schemes
4.7-Account Management
4.8-Network Authentication
4.9-Identity Management Systems
4.10-Chapter 3 Exam Question Review
4.11-Creating LInux Users and Groups Lab
4.12-Chapter 3 Ask Me Anything (AMA)
4.13-Chapter 3 Quiz
5-Chapter 4: Tools of the Trade
21
5.1-Touring the CLI
5.2-Shells
5.3-The Windows Command Line
5.4-Microsoft PowerShell
5.5-Linux Shells
5.6-Python Scripts
5.7-Windows Command-Line Tools
5.8-Linux Command-Line Tools
5.9-Network Scanners
5.10-Network Scanning with Nmap
5.11-Network Protocol Analyzers
5.12-Using Wireshark to Analyze Network Traffic
5.13-Using tcpdump to Analyze Network Traffic
5.14-Log Files
5.15-Centralized Logging
5.16-Configuring Linux Log Forwarding
5.17-Chapter 4 Exam Question Review
5.18-Linux Shell Script Lab
5.19-Nmap Lab
5.20-Chapter 4 Ask Me Anything (AMA)
5.21-Chapter 4 Quiz
6-Chapter 5: Securing Individual Systems
13
6.1-Malware
6.2-Weak Configurations
6.3-Common Attacks
6.4-Driver and Overflow Attacks
6.5-Password Attacks
6.6-Bots and Botnets
6.7-Disk RAID Levels
6.8-Securing Hardware
6.9-Securing Endpoints
6.10-Chapter 5 Exam Question Review
6.11-Linux Software RAID Lab
6.12-Chapter 5 Ask Me Anything (AMA)
6.13-Chapter 5 Quiz
7-Chapter 6: The Basic LAN
17
7.1-The OSI Model
7.2-ARP Cache Poisoning
7.3-Other Layer 2 Attacks
7.4-Network Planning
7.5-Load Balancing
7.6-Securing Network Access
7.7-Honeypots
7.8-Firewalls
7.9-Proxy Servers
7.10-Network and Port Address Translation
7.11-IP Security (IPsec)
7.12-Virtual Private Networks (VPNs)
7.13-Intrusion Detection and Prevention Systems (IDS/IPS)
7.14-Chapter 6 Exam Question Review
7.15-Linux Snort IDS Lab
7.16-Chapter 6 Ask Me Anything (AMA)
7.17-Chapter 6 Quiz
8-Chapter 7: Securing Wireless LANs
10
8.1-Wi-Fi Encryption Standards
8.2-RFID, NFC, and Bluetooth
8.3-Wi-Fi Coverage and Performance
8.4-Wi-Fi Discovery and Attacks
8.5-Cracking WPA2
8.6-Wi-Fi Hardening
8.7-Chapter 7 Exam Question Review
8.8-WPA2 Cracking Lab
8.9-Chapter 7 Ask Me Anything (AMA)
8.10-Chapter 7 Quiz
9-Chapter 8: Securing Public Servers
11
9.1-Defining a Public Server
9.2-Common Attacks and Mitigations
9.3-Containers and Software-Defined Networking
9.4-Hypervisors and Virtual Machines
9.5-Cloud Deployment Models
9.6-Cloud Service Models
9.7-Securing the Cloud
9.8-Chapter 8 Exam Question Review
9.9-Docker Container Lab
9.10-Chapter 8 Ask Me Anything (AMA)
9.11-Chapter 8 Quiz
10-Chapter 9: Securing Dedicated Systems
10
10.1-Embedded Systems
10.2-Industrial Control System (ICS)
10.3-Internet of Things (IoT) Devices
10.4-Connecting to Dedicated and Mobile Systems
10.5-Security Constraints for Dedicated Systems
10.6-Mobile Device Deployment and Hardening
10.7-Chapter 9 Exam Question Review
10.8-Smartphone Hardening Lab
10.9-Chapter 9 Ask Me Anything (AMA)
10.10-Chapter 9 Quiz
11-Chapter 10: Physical Security
8
11.1-Physical Security Overview
11.2-Physical Security
11.3-Keylogger Demo
11.4-Environmental Controls
11.5-Chapter 10 Exam Question Review
11.6-Physical Security Lab
11.7-Chapter 10 Ask Me Anything (AMA)
11.8-Chapter 10 Quiz
12-Chapter 11: Secure Protocols and Applications
11
12.1-DNS Security
12.2-FTP Packet Capture
12.3-Secure Web and E-mail
12.4-Request Forgery Attacks
12.5-Cross-Site Scripting Attacks
12.6-Web Application Security
12.7-Web App Vulnerability Scanning
12.8-Chapter 11 Exam Question Review
12.9-OWASP ZAP Web App Scan Lab
12.10-Chapter 11 Ask Me Anything (AMA)
12.11-Chapter 11 Quiz
13-Chapter 12: Testing Infrastructure
11
13.1-Testing Infrastructure Overview
13.2-Social Engineering
13.3-Social Engineering Attacks
13.4-Vulnerability Assessments
13.5-Penetration Testing
13.6-Security Assessment Tools
13.7-The Metasploit Framework
13.8-Chapter 12 Exam Question Review
13.9-hping3 Forged Packet Lab
13.10-Chapter 12 Ask Me Anything (AMA)
13.11-Chapter 12 Quiz
14-Chapter 13: Dealing with Incidents
11
14.1-Incident Response Overview
14.2-Incident Response Plans (IRPs)
14.3-Threat Analysis and Mitigating Actions
14.4-Digital Forensics
14.5-Gathering Digital Evidence
14.6-Business Continuity and Alternate Sites
14.7-Data Backup
14.8-Chapter 13 Exam Question Review
14.9-Autopsy Forensic Browser Lab
14.10-Chapter 13 Ask Me Anything (AMA)
14.11-Chapter 13 Quiz
15-Bonus Video
1
15.1-Bonus Video