Comptia Security+ Sy0-701

Posted By: ELK1nG

Comptia Security+ Sy0-701
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 13.46 GB | Duration: 30h 24m

Core Cybersecurity Skills for the CompTIA Security+ (SY0-701) Exam

What you'll learn

Students will gain a solid understanding of fundamental security concepts, including Zero Trust and deception disruption strategies.

Student will be able to identify and understand common threats and vulnerabilities, and learn how to mitigate them using practical activities.

Students will learn to apply the basics of cryptography, including symmetric and asymmetric encryption, hashing, and digital certificates.

Students will understand the architecture of secure systems, including network segmentation, high availability, virtualization, and cloud computing.

Students will develop skills in security operations, including wireless security, asset management, vulnerability management, and intrusion detection.

Students will learn to reduce attack surfaces, manage application security, and monitor activities using various tools.

Requirements

No prior experience or prerequisites required.

Description

Welcome to the CompTIA Security+ Certification Course (SY0-701). This comprehensive training is designed to equip you with the skills required to pass the Security+ certification exam and excel in your cyber security career. This course is structured into five detailed modules including General Security Concepts, Threats, Vulnerabilities, and Mitigations, Security Architecture, Security Operations, and Security Program Management and Oversight. In addition to theoretical knowledge, this course includes a variety of hands-on activities to ensure you can practically apply the learned concepts, making it ideal for both beginners and experienced IT professionals.As a student of this course, you will dive deep into fundamental security concepts such as cryptography, access control, and risk management. You’ll also learn to identify and mitigate potential threats and vulnerabilities and understand the principles of secure architecture and operations. The course includes hands-on activities like testing a honeypot, examining symmetric encryption, and operating a SCADA system, providing you with a real-world understanding of these concepts. By the end of this course, you will not only be fully prepared for the CompTIA Security+ certification exam, but also equipped with a solid foundation in cybersecurity concepts, making you a valuable asset in the IT industry.Whether your goal is to become a security administrator, a systems administrator, or a network engineer, the CompTIA Security+ Certification Course (SY0-701) will provide you with the requisite skills and knowledge to succeed. Don’t miss this opportunity to invest in your future and boost your cybersecurity career.

Overview

Section 1: SY0-701 General Security Concepts

Lecture 1 1.0 Introduction to the Course

Lecture 2 1.1 Fundamental Security Concepts

Lecture 3 1.2 Zero Trust

Lecture 4 1.3 Deception and Disruption

Lecture 5 1.3.1 ACTIVITY - Testing a Honeypot

Lecture 6 1.4 Security Controls

Lecture 7 1.5 Change Management and Security

Lecture 8 1.6 Cryptography Basics

Lecture 9 1.6.1 ACTIVITY - Examining Symmetric Encryption

Lecture 10 1.7 Asymmetric Encryption

Lecture 11 1.7.1 ACTIVITY - Exploring Asymmetric Encryption

Lecture 12 1.8 Hashing

Lecture 13 1.8.1 ACTIVITY - Verifying Integrity with Hashing

Lecture 14 1.9 Digital Certificates

Lecture 15 1.10 Public Key Infrastructure

Lecture 16 1.11 Data and Keys

Lecture 17 1.12 Crypto Implementations

Lecture 18 1.13 Blockchain

Lecture 19 1.14 Non-Cryptographic Data Protection

Section 2: SY0-701 Threats, Vulnerabilities, and Mitigations

Lecture 20 2.1 Threat Actors and Motivations

Lecture 21 2.2 Threat Vectors

Lecture 22 2.2.1 ACTIVITY - O.MG Cable Baiting

Lecture 23 2.2.2 O.MG-No Cable

Lecture 24 2.3 Social Engineering

Lecture 25 2.4 Operating System Vulnerabilities and Attacks

Lecture 26 2.5 Application Vulnerabilities and Attacks

Lecture 27 2.5.1 ACTIVITY - Performing a Buffer Overflow

Lecture 28 2.6 Web-based Vulnerabilities and Attacks

Lecture 29 2.6.1 ACTIVITY - Abusing Unsanitized Input

Lecture 30 2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection

Lecture 31 2.6.3 ACTIVITY - Swiping a Token with XSS

Lecture 32 2.7 Other Vulnerabilities

Lecture 33 2.8 Common Malicious Activity Indicators

Lecture 34 2.9 Insider Threat Indicators

Lecture 35 2.10 Social Engineering Indicators

Lecture 36 2.10.1 ACTIVITY - Capturing Credentials through Social Engineering

Lecture 37 2.11 Malware Activity Indicators

Lecture 38 2.12 Operating System Attack Indicators

Lecture 39 2.13 Application Attack Indicators

Lecture 40 2.13.1 ACTIVITY - Recognizing Directory Traversal

Lecture 41 2.14 Physical Attack Indicators

Lecture 42 2.14.1 ACTIVITY - Quickly Cloning an RFID Badge

Lecture 43 2.15 Network Attack Indicators

Lecture 44 2.15.1 ACTIVITY - Crashing a Target with DoS

Lecture 45 2.16 Cryptographic Attack Indicators

Lecture 46 2.17 Password Attack Indicators

Lecture 47 2.17.1 ACTIVITY - Password Cracking

Lecture 48 2.18 Network Segmentation

Lecture 49 2.19 Access Control

Lecture 50 2.20 Enterprise Device Hardening

Section 3: Module 3 - SY0-701 Security Architecture

Lecture 51 3.1 Network Segmentation

Lecture 52 3.1.1 ACTIVITY - Segementing a Network

Lecture 53 3.2 High Availability

Lecture 54 3.3 Virtualization

Lecture 55 3.3.1 ACTIVITY - Deploying Docker Containers

Lecture 56 3.4 Cloud

Lecture 57 3.5 Serverless Computing

Lecture 58 3.6 IoT

Lecture 59 3.7 ICS SCADA

Lecture 60 3.7.1 ACTIVITY - Operating a SCADA System

Lecture 61 3.8 RTOS and Embedded Systems

Lecture 62 3.9 Reducing the Attack Surface

Lecture 63 3.10 Firewalls

Lecture 64 3.11 IDS IPS.mp4

Lecture 65 3.12 Secure Communications - Access

Lecture 66 3.13 Port Security

Lecture 67 3.14 SD-WAN and SASE

Lecture 68 3.15 Data Classifications

Lecture 69 3.16 Protecting Data Types

Lecture 70 3.17 Data Considerations

Lecture 71 3.18 Redundancy

Lecture 72 3.19 Alternate Sites

Lecture 73 3.20 Multiple Platforms

Lecture 74 3.21 Business Continuity

Section 4: SY0-701 Security Operations

Lecture 75 4.1 Secure Baselines

Lecture 76 4.2 Attack Surface Reduction

Lecture 77 4.3 Wireless Installation

Lecture 78 4.4 Wireless Security Settings

Lecture 79 4.5 Mobile Solutions

Lecture 80 4.5.1 ACTIVITY - Pwning a Mobile Device

Lecture 81 4.6 Application Security Management

Lecture 82 4.7 Asset Management

Lecture 83 4.8 Vulnerability Management

Lecture 84 4.9 Monitoring Activities

Lecture 85 4.10 Monitoring Tools

Lecture 86 4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities

Lecture 87 4.11 Firewall Configuration

Lecture 88 4.11.1 ACTIVITY - Configuring Firewall Rules

Lecture 89 4.12 Intrusion Detection Configuration

Lecture 90 4.13 Web Traffic Filtering

Lecture 91 4.14 Operating System Policy

Lecture 92 4.14.1 ACTIVITY - Examining Windows Group Policy

Lecture 93 4.15 Network Service Security

Lecture 94 4.16 Data Loss Protection

Lecture 95 4.16.1 ACTIVITY - Checking File Integrity

Lecture 96 4.17 Network Access Control

Lecture 97 4.17.1 ACTIVITY - Require Multifactor Authentication

Lecture 98 4.18 Identity Management

Lecture 99 4.19 Access Management

Lecture 100 4.19.1 ACTIVITY - Implementing Access Control

Lecture 101 4.20 Security Automation

Lecture 102 4.21 Incident Response

Lecture 103 4.22 Digital Forensics

Section 5: SY0-701 Security Program Management and Oversight

Lecture 104 5.1 Elements of Effective Security Governance

Lecture 105 5.2 Elements of the Risk Management Process

Lecture 106 5.3 Third Party Risk Assessment and Management

Lecture 107 5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure

Lecture 108 5.4 Effective Security Compliance

Lecture 109 5.5 Audits and Assessments

Lecture 110 5.5.1 ACTIVITY - Conducting OSINT

Lecture 111 5.5.2 ACTIVITY - Performing Active Reconnaissance

Lecture 112 5.6 Security Awareness Practices

Lecture 113 5.7 Course Outro

Section 6: Final Test

IT professionals who want to expand their knowledge in the field of cybersecurity,Individuals considering a career switch into the cybersecurity sector,IT consultants who want to provide informed, up-to-date security advice to clients,Security professionals seeking to validate their skills with a recognized certification,Professionals responsible for risk management and security compliance in their organization,Software developers interested in understanding security architecture and its impact on application development