Use Code TRYNOW15 for a One-Time, Extra 15% OFF at KodeKloud
Certification
Security

CompTIA Security+ Certification

Ace CompTIA Security+ Certification with engaging lectures and hands-on labs.
Matthew Burch
Cybersecurity, AWS, and Networking Professor
DevOps Pre-Requisite Course
Play Button
Fill this form to get a notification when course is released.
book
7
Lessons
book
Challenges
Article icon
131
Topics

What you’ll learn

Our students work at..

Description

The CompTIA Security+ certification is a foundational step in advancing your cybersecurity career. This course provides essential knowledge, skills, and hands-on lab to excel in information security. Our training covers key security domains to help you protect organizational assets and respond to threats. Below are the primary sections covered in this course:

Controls and Security Concepts

Learn core information security principles and implement essential security controls:

  • Confidentiality, Integrity, and Availability (CIA) triad
  • Access control measures: authentication, authorization, accounting
  • Encryption and hashing techniques
  • Security policies, standards, and best practices

Threats, Vulnerabilities, and Mitigations

Identify, understand, and mitigate various threats and vulnerabilities:

  • Cyber threats: malware, phishing, social engineering, APTs
  • Common system vulnerabilities
  • Threat modeling and risk assessment
  • Countermeasures and mitigation strategies

Security Operations

Maintain an organization's security stance with effective operations:

  • - Security monitoring and event management best practices
  • - Incident response and Security Operations Center (SOC) roles
  • - Disaster recovery and business continuity plans
  • - Forensic analysis of security incidents

Security Architecture

Design secure IT environments and integrate security into architecture:

  • Secure network design: DMZs, firewall placement, segmentation
  • Secure software development and lifecycle management
  • Cloud security solutions and virtualization technologies
  • Identity and Access Management (IAM) solutions

Security Management

Ensure long-term protection and compliance with effective management:

  • Governance, Risk Management, and Compliance (GRC)
  • Security audits and assessments
  • Managing security budgets and resources
  • Leading security awareness and training programs

This CompTIA Security+ course equips you with the knowledge and skills needed for cybersecurity. You'll be ready to tackle security challenges and achieve CompTIA Security+ certification. Enroll now to advance your career and become a certified cybersecurity professional!

Read More

What our students say

About the instructor

Matthew Burch is a distinguished professor specializing in cybersecurity, AWS, and networking. He currently serves as a Cybersecurity Program Coordinator and AWS Academy and Cisco Academy Professor at Northwest Vista College. His expertise in machine learning and network infrastructure is a cornerstone of his teaching.

Burch's experience includes founding and leading The Skills Improvement League. He also served as an Adjunct Professor in Cybersecurity at Alamo Colleges District, contributing significantly to the field of IT education for over 17 years.

His industry experience is extensive, including roles such as IT Supervisor/Sr. Manager at Marathon Petroleum Corporation/Andeavor, and Manager of Network Engineering at USAA. At IntraEdge, he was a Cisco Certification Exam Question Writer/SME, showcasing his deep understanding of Cisco systems.

Matthew's career reflects a blend of leadership in academia and practical industry experience, making him a valuable educator in the fields of cybersecurity, cloud computing, and networking.

No items found.

Introduction

lock
lock
2
Topics
Lesson Content

Module Content

Course Introduction
Join Our Community

Controls and Security Concepts

lock
lock
16
Topics
Lesson Content

Module Content

Security Controls 03:01
Categories of Controls 03:25
Types of Controls 03:33
The CIA triad 04:37
Non-repudiation & AAA 07:20
Zero Trust 03:41
Physical Security 10:56
Honey Pots 07:05
Gap Analysis 11:10
Change Management Processes 03:45
Cryptography 04:00
Encryption 09:58
PKI 05:29
Demo: Steganography 06:54
LAB: Steganography
Quiz: Controls and Security Concepts

Threats, Vulnerabilities, and Mitigations

lock
lock
32
Topics
Lesson Content

Module Content

Threat Actors and Motivations 04:44
Threat Actor Motivations 05:10
Threat Vectors and Attack Surfaces 01:53
Social Engineering 05:32
Other Threat Vectors 00:48
Malicious Activities 04:10
Application Attacks 02:31
Other Application Attacks 04:28
Password Attacks 01:44
Physical Attacks 07:23
Cryptographic Attacks 06:39
Demo: Password Cracking 15:47
LAB: Password Cracking
Network Attacks 02:07
Indicators of Malicious Activity 07:16
Demo: Network Analysis Using Wireshark 13:43
LAB: Network Analysis Using Wireshark
Demo: Rogue DHCP 14:42
LAB: Rogue DHCP
Software Vulnerabilities 02:00
Operating System Vulnerabilities 02:02
Hardware Vulnerabilities 01:41
Cloud and Supply Chain Vulnerabilities 03:44
Mobile Vulnerabilities 02:02
Virtualization Vulnerabilities 08:21
Zero Day Vulnerability 02:55
Misconfiguration Vulnerabilities 02:58
Demo: Perform an nmap Port Scan 16:55
LAB: Perform an nmap Port Scan
Mitigation Techniques 04:33
Other Mitigation Techniques 06:28
Quiz: Threats, Vulnerabilities, and Mitigations

Security Operations

lock
lock
38
Topics
Lesson Content

Module Content

Security Techniques 00:45
Secure Baselines 06:05
Wireless Security 06:55
Wireless Security Settings - Radius 13:13
Mobile Security 01:11
Mobile Security Techniques 09:40
Hardening Targets 00:40
Application Security 04:17
Other Common Security Techniques 01:01
Hardware, Software, and Data Asset Management 01:19
Asset Management 13:49
Vulnerability Management 02:38
Vulnerability Analysis 02:00
Other Vulnerabilities Analysis Management 08:44
Response, Remediation, and Reporting 01:44
Security Alerting and Monitoring 01:23
Methods and Activities 01:18
Enterprise Security 02:09
Web Filters 02:00
Other Enterprise Security Methods 03:10
Identity and Access Management 01:10
Access Methods 06:22
Permission Assignments and Implications 06:33
Single Sign On (SSO) 03:03
Demo: Social Engineering using SET 09:17
Lab: Social Engineering using SET
Federation 07:08
Multi Factor Authentication (MFA) 01:16
Passwords 01:01
Privilege Access Management Tools 04:51
Automation Use Cases 07:49
Security Automation and approaches 00:38
Automation Other Considerations 07:01
Digital Forensics 07:59
Demo: Install Open Source Firewall 14:21
Lab: Install Open Source Firewall
Section Conclusion 00:27
Quiz: Security Operations

Security Architecture

lock
lock
18
Topics
Lesson Content

Module Content

Architectural Models 02:48
Infrastructure Concepts 01:38
Infrastructure Considerations 11:18
Security Principles 03:32
Secure Communication and Access 07:38
Data Protection 03:19
Data Classifications 02:33
Data Considerations 01:18
Data States and GeoLocation 07:35
Resilience and Disaster Recovery 00:24
Platform Diversity and Multi-cloud 10:27
Testing Methods 07:25
Backups 07:34
Backup Power 05:51
Tools and Methods 01:23
Demo: Encrypting Data at Rest 06:56
LAB: Encrypting Data at Rest
Quiz: Security Architecture

Security Management

lock
lock
23
Topics
Lesson Content

Module Content

Change Management Guidelines and Procedures 07:05
Standards and Procedures 01:55
External Considerations 02:13
Monitoring and Revisions 07:40
Risk Management 00:49
Risk Assessments 03:40
Risk Analysis 03:05
Risk Indicators and Tolerance 08:48
Risk Management Strategies 04:12
Business Impact Analysis (BIA) 03:05
Vendor Assessments 03:10
Vendor Monitoring and Questionnaires 08:12
Consequences of Non Compliance 02:47
Data Privacy 07:00
External Audits 02:26
Penetration Testing 02:25
Demo: Open Source Intelligence 07:45
Lab: Open Source Intelligence
User Guidance and Training 04:07
Reporting and Monitoring 02:23
Demo: Security Combination 07:53
Lab: Security Combination
Quiz: Security Management

Practice Exams

lock
lock
2
Topics
Lesson Content

Module Content

Practice Exam 1
Practice Exam 2
Play Button
Fill this form to get a notification when course is released.
This course comes with hands-on cloud labs
book
7
Modules
book
Lessons
Article icon
131
Lessons
check mark
Course Certificate
Videos icon
09.53
Hours of Video
laptop
Hours of Labs
Story Format
Videos icon
Videos
Case Studies
ondemand_video icon
Demo
laptop
Labs
laptop
Cloud Labs
checklist
Mock exams
Quizzes
slack icon
Slack channel support
people icon
Community support
language icon
English
Closed Captions