4.62 out of 5
4.62
20076 reviews on Udemy

TOTAL: CompTIA Security+ Certification (SY0-501).

Everything you need to pass the CompTIA Security+ SY0-501 Exam, from Mike Meyers. CompTIA expert and bestselling author.
Instructor:
Total Seminars • 500,000+ Enrollments
78,330 students enrolled
English More
This is a complete and comprehensive CompTIA Security+ Certification (SY0-501) course. It is designed to prepare you to be able to take and pass the exam to become CompTIA Security+ Certified.
Once you complete the course, you will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech. This course is ideal as both a study tool and an on-the-job reference.
Your new skills and the CompTIA Security+ Certification will help you land a great IT security tech job. Or, if you are already a security tech, get that raise or advancement you are after.

Welcome to the TOTAL: CompTIA Security+ Certification (SY0-501) course. from Mike Meyers and Total Seminars.

This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-501 Exam. The first goal of the course is to make you a good IT security tech and, in the process, make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.

WHAT OUR STUDENTS ARE SAYING:

“I used these courses to pass the A+, Security+, and Network+ in a span of 2.5 months. I had no IT experience 4 months ago. Now I am a network engineer at a managed service provider with a great salary and solid upward mobility.” – Ryan D.

The course covers all the CompTIA Security+ SY0-501 objective domains:

1.0 Threats, Attacks, and Vulnerabilities                                  21%

2.0 Technologies and Tools                                                     22%

3.0 Architecture and Design                                                    15%

4.0 Identity and Access Management                                     16%

5.0 Risk Management                                                             14%

6.0 Cryptography and PKI                                                       12%

Topics include:

  •   Risk management

  •   Cryptography

  •   Authentication and authorization

  •   Host, LAN, and application security

  •   Wireless, cloud, and mobile security

  •   Environmental security and controls

See what our customers are saying:

“This is a great course! Mike is funny and explains each security topic very well. I feel this has really prepared me for the exam. And although this course is designed to prepare you for the Security+ exam, I think it is also great if you’re just interested in learning more about cyber security.” – Spencer G

This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.

Risk Management

1
Introduction to the CompTIA Security+ Exam SY0-501

In this introduction to the CompTIA Security+ SY0-501 exam, Mike explains what the exam is all about, including an overview of IT security.

Download the CompTIA Security+ objectives attached to this lecture.

2
The CIA of Security

In this episode, Mike discusses the CIA goals of security: confidentiality, integrity, and availability.

3
What is Risk?

In this episode, Mike explains risk and related concepts.

4
Threat Actors

Mike explains the types of man-made threats that can attack a system.

5
Managing Risk

In this episode, Mike explains the terms and processes to manage risk.

6
Using Guides for Risk Assessment

Mike discusses how to use benchmarks and other measurements to implement hardware and software in an environment.

7
Security Controls

In this episode, Mike explains the three categories of security controls.

8
Interesting Security Controls

In this episode, Mike discusses other related security controls.

9
Defense in Depth

In this episode, Mike reviews the concepts of defense in depth, as well as combining or fortifying security controls.

10
IT Security Governance

In this episode, Mike explains the concept of security governance: policies, standards, and procedures.

11
Security Policies

In this episode, Mike addresses various examples of security policies.

12
Frameworks

Mike shares the benefits of using frameworks and how to apply them to a security program.

13
Quantitative Risk Calculations

In this episode, Mike looks at the impact of risk.

14
Business Impact Analysis

In this episode, Mike identifies what methods can directly address issues for a company and how to categorize impact types to maintain business continuity.

15
Organizing Data

In this episode, Mike discusses data handling and how data is protected within an organization.

16
Security Training

In this episode, Mike goes through the controls and roles that make security training work.

17
Third Party Agreements

In this episode, Mike discusses the different types of third-party agreements, why they’re important, and how they affect IT security.

18
Risk Management Quiz

Cryptography

1
Cryptography Basics

In this episode, Mike goes over the goals and methods used in cryptography.

2
Cryptographic Methods

Mike shares various methods used in cryptography, and the various methods used to protect the keys.

3
Symmetric Cryptosystems

In this episode, Mike describes encrypting and decrypting data with the same key.

4
Symmetric Block Modes

Mike talks about the usage and benefits of block modes when used in symmetric encryption.

5
RSA Cryptosystems

In this episode, Mike describes encrypting and decrypting data with different keys.

6
Diffie-Hellman

Learn the Diffie-Hellman key exchange agreement and methods as Mike conceptualizes this very complex algorithm.

7
PGP/GPG

Mike works though the ups and downs of the PGP/GPG encryption methods.

8
Hashing

In this episode, Mike shows how a hash provides integrity to data.

9
HMAC

In this episode, Mike explains how hashing can improve message security.

10
Steganography

In this episode, Mike illustrates that information can be hidden within other data.

Note - if the video is garbled, change the resolution down one setting (or two if it persists) and that should solve the problem.  We're working on a permanent fix but this will make it function in the short term.


11
Certificates and Trust

In this episode, Mike explains certificates and how they are used to establish trust.

12
Public Key Infrastructure

In this episode, Mike discusses the public key infrastructure (PKI), used to enable commerce and other secure activities over the Internet.

13
Cryptographic Attacks

In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.

14
Cryptography Quiz

Identity and Access Management

1
Identification

In this episode, Mike explains the issues of proving you are who you are.

2
Authorization Concepts

Mike continues the discussion on the issues of proving you are who you are.

3
Access Control List

In this episode, Mike discusses how to govern access to resources.

4
Password Security

In this episode, Mike shows methods to keep passwords secure.

5
Linux File Permissions

In this episode, Mike looks at how to control access to files in a Linux system.

6
Windows File Permissions

In this episode, Mike looks at how to control access to files in a Windows system.

7
User Account Management

In this episode, Mike discusses the security of user accounts.

8
AAA

In this episode, Mike explores two common methods used for AAA, RADIUS, and TACACS+.

9
Authentication Methods

In this episode, Mike discusses common protocols used to identify proper users, such as PAP, CHAP, Kerberos, LDAP, and more.

10
Single Sign-On

In this episode, Mike describes how to log in to one computer and gain access to many.

11
Identity and Access Management Quiz

Tools of the Trade

1
OS Utilities, Part 1

In this episode, Mike goes through the command-line utilities to view network traffic and traffic patterns.

2
OS Utilities, Part 2

In this episode, Mike demonstrates how to find out the IP and MAC addresses of a host, as well as the DNS server.

3
Network Scanners

In this episode, Mike explores with the tools used to scan network machines.

4
Protocol Analyzers

In this episode, Mike discusses how traffic is analyzed via a host computer.

5
SNMP

In this episode, Mike describes how the Simple Network Management Protocol (SNMP) can make the lives of network administrators very, very easy.

6
Logs

In this episode, Mike explores the purposes and secrets of log files.

7
Tools of the Trade Quiz

Securing Individual Systems

1
Denial of Service

In this episode, Mike discusses attacks that prevent servers from providing their essential services.

2
Host Threats

In this episode, Mike looks at some of the things that threaten computers and users.

3
Man-in-the-Middle

In this episode, Mike shows attacks where bad actors function between encrypting hosts.

4
System Resiliency

In this episode, Mike shares how resiliency is integrated into security plans, and how to deal with scaling, elasticity, and other system design  considerations to ensure availability of systems.

5
RAID

In this episode, Mike explores using multiple disks to improve reliability and performance.

6
NAS and SAN

In this episode, Mike discusses secure methods to save and access data on a network device.

7
Physical Hardening

Mike explores how to protect a system and the components used with various controls and policies.

8
RFI, EMI and ESD

In this episode, Mike discusses the interference that can affect the functionality of equipment.

9
Host Hardening

In this episode, Mike talks about techniques to protect a host computer from threats.

10
Data and System Security

In this episode, Mike explains how to ensure that stored data is safe from physical loss.

11
Disk Encryption

In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.

12
Hardware/Firmware Security

Mike discusses methods that can be used to protect hardware-based authentication, disks, and firmware.

13
Secure OS Types

In this episode, Mike discusses the OS types, characteristics, and usages.

14
Securing Peripherals

Mike discusses how to work with different types of connections for peripheral and security considerations.

15
Malware

In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.

16
Analyzing Output

In this episode, Mike explores how to review utility outputs to discern the validity and make an action plan.

17
IDS and IPS

In this episode, Mike addresses the difference between detecting network intruders and preventing intrusions.

18
Automation Strategies

Mike examines some of the automation strategies used and their best practices.

19
Data Destruction

In this episode, Mike discusses data destruction and media sanitization, and what these methods do to the media.

20
Securing Individual Systems Quiz

The Basic LAN

1
LAN Review

In this episode, Mike reviews elements of local area networks.

2
Network Topologies Review

In this episode, Mike reviews the data flow concept of the basic network topologies.

3
Network Zone Review

In this episode, Mike works through the concepts of zones and typical configurations.

4
Network Access Controls

In this episode, Mike talks about how to access and control access to networks.

5
The Network Firewall

Learn as Mike discusses firewall concepts and explores the configurations for stateless and stateful configurations.

6
Proxy Servers

In this episode, Mike discusses the different types of proxy servers and their purpose.

7
Honeypots

Mike discusses the concept of honeypots and how they are used in a security program.

8
Virtual Private Networks
In this episode, Mike discusses the purposes and protocols behind virtual private networks (VPNs).
9
IPSec

In this episode, Mike addresses IPsec, the first standardized Internet encryption.

10
NIDS/NIPS

Learn the difference between NIDS and NIPS and the characteristics of each.

11
SIEM

In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.

12
The Basic LAN Quiz

Beyond the Basic LAN

1
Wireless Review

In this episode, Mike reviews basic wireless terms and protocols.

2
Living in Open Networks

In this episode, Mike describes how to remain secure in a non-secure, open-network world.

3
Vulnerabilities with Wireless Access Points

In this episode, Mike discusses rogue access points and their nefarious cousins, the evil twins.

4
Cracking 802.11 – WEP

In this episode, Mike talks about WEP wireless security attacks and methods for cracking WEP passwords.

5
Cracking 802.11 – WPA

In this episode, Mike talks about WPA wireless security attacks.

6
Cracking 802.11 – WPS

In this episode, Mike talks about WPS wireless security attacks and methods for cracking WPS passwords.

7
Wireless Hardening

In this episode, Mike explores the processes behind securing wireless networks.

8
Wireless Access Points

In this episode, Mike explains the different wireless devices and how the antenna signal effects the placement and usage.

9
Virtualization Basics

In this episode, Mike explores virtualization technologies.

10
Virtual Security

In this episode, Mike talks about some of the security aspects of virtualization.

11
Containers

Mike discusses containers, their attributes, and the benefits that can be obtained from using containers.

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.6
4.6 out of 5
20076 Ratings

Detailed Rating

Stars 5
11949
Stars 4
6392
Stars 3
1479
Stars 2
168
Stars 1
88
bd189fc02ef8ec0696947fde8a607adb
30-Day Money-Back Guarantee

Includes

19 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion