CompTIA Security+ Certification (SY0-501): The Total Course
Pass CompTIA Security+ SY0-501 Exam. Master Risk Management, Cryptography, Authentication & Authorization in Networking. Start CompTIA Security+ Now!
- Self-paced with Life Time Access
- Certificate on Completion
- Access on Android and iOS App
CompTIA Security+ Certification (SY0-501): A Comprehensive Course
Welcome to the CompTIA Security+ Certification; SY0-501. The Total Course from Mike Meyers and Total Seminars.
This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-501 Exam. The first goal of the course is to make you a good IT security tech and, in the process, make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.
WHAT OUR STUDENTS ARE SAYING:
"I used these courses to pass the A+, Security+, and Network+ in a span of 2.5 months. I had no IT experience 4 months ago. Now I am a network engineer at a managed service provider with a great salary and solid upward mobility." - Ryan D.
The course covers all the CompTIA Security+ SY0-501 objective domains: 1.0 Threats, Attacks, and Vulnerabilities 21% 2.0 Technologies and Tools 22% 3.0 Architecture and Design 15% 4.0 Identity and Access Management 16% 5.0 Risk Management 14% 6.0 Cryptography and PKI 12%
Topics include:
- Risk management
- Cryptography
- Authentication and authorization
- Host, LAN, and application security
- Wireless, cloud, and mobile security
- Environmental security and controls
See what our customers are saying:
"This is a great course! Mike is funny and explains each security topic very well. I feel this has really prepared me for the exam. And although this course is designed to prepare you for the Security+ exam, I think it is also great if you're just interested in learning more about cyber security." - Spencer G
This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.
- Basic familiarity with PCs and networks
- There are no specific prerequisites, since the course covers all the topics in detail
- It is a good idea to have an understanding of CompTIA A+ and Network+, or to be certified in these topics. You can learn more about these certifications from our Mike Meyers – Total Seminars CompTIA A+ and Network+ Certification courses on Simpliv
- This is a complete and comprehensive CompTIA Security+ Certification (SY0-501) course. It is designed to prepare you to be able to take and pass the exam to become CompTIA Security+ Certified
- Once you complete the course, you will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech. This course is ideal as both a study tool and an on-the-job reference
- Your new skills and the CompTIA Security+ Certification will help you land a great IT security tech job. Or, if you are already a security tech, get that raise or advancement you are after
In this introduction to the CompTIA Security+ SY0-501 exam, Mike explains what the exam is all about, including an overview of IT security.
Download the CompTIA Security+ objectives attached to this lecture.
In this episode, Mike discusses the CIA goals of security: confidentiality, integrity, and availability.
In this episode, Mike reviews the concepts of defense in depth, as well as combining or fortifying security controls.
In this episode, Mike explains the concept of security governance: policies, standards, and procedures.
Mike shares the benefits of using frameworks and how to apply them to a security program.
In this episode, Mike identifies what methods can directly address issues for a company and how to categorize impact types to maintain business continuity.
In this episode, Mike goes through the controls and roles that make security training work.
In this episode, Mike discusses the different types of third-party agreements, why they’re important, and how they affect IT security.
Mike shares various methods used in cryptography, and the various methods used to protect the keys.
In this episode, Mike describes encrypting and decrypting data with the same key.
Mike talks about the usage and benefits of block modes when used in symmetric encryption.
In this episode, Mike describes encrypting and decrypting data with different keys.
Learn the Diffie-Hellman key exchange agreement and methods as Mike conceptualizes this very complex algorithm.
In this episode, Mike illustrates that information can be hidden within other data.
Note - if the video is garbled, change the resolution down one setting (or two if it persists) and that should solve the problem. We're working on a permanent fix but this will make it function in the short term.
In this episode, Mike explains certificates and how they are used to establish trust.
In this episode, Mike discusses the public key infrastructure (PKI), used to enable commerce and other secure activities over the Internet.
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.
In this episode, Mike looks at how to control access to files in a Linux system.
In this episode, Mike looks at how to control access to files in a Windows system.
In this episode, Mike discusses common protocols used to identify proper users, such as PAP, CHAP, Kerberos, LDAP, and more.
In this episode, Mike describes how to log in to one computer and gain access to many.
In this episode, Mike goes through the command-line utilities to view network traffic and traffic patterns.
In this episode, Mike demonstrates how to find out the IP and MAC addresses of a host, as well as the DNS server.
In this episode, Mike describes how the Simple Network Management Protocol (SNMP) can make the lives of network administrators very, very easy.
In this episode, Mike discusses attacks that prevent servers from providing their essential services.
In this episode, Mike shows attacks where bad actors function between encrypting hosts.
In this episode, Mike shares how resiliency is integrated into security plans, and how to deal with scaling, elasticity, and other system design considerations to ensure availability of systems.
In this episode, Mike discusses secure methods to save and access data on a network device.
Mike explores how to protect a system and the components used with various controls and policies.
In this episode, Mike discusses the interference that can affect the functionality of equipment.
In this episode, Mike talks about techniques to protect a host computer from threats.
In this episode, Mike explains how to ensure that stored data is safe from physical loss.
In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.
Mike discusses methods that can be used to protect hardware-based authentication, disks, and firmware.
Mike discusses how to work with different types of connections for peripheral and security considerations.
In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.
In this episode, Mike explores how to review utility outputs to discern the validity and make an action plan.
In this episode, Mike addresses the difference between detecting network intruders and preventing intrusions.
Mike examines some of the automation strategies used and their best practices.
In this episode, Mike discusses data destruction and media sanitization, and what these methods do to the media.
In this episode, Mike reviews the data flow concept of the basic network topologies.
In this episode, Mike works through the concepts of zones and typical configurations.
In this episode, Mike talks about how to access and control access to networks.
Learn as Mike discusses firewall concepts and explores the configurations for stateless and stateful configurations.
In this episode, Mike discusses the different types of proxy servers and their purpose.
In this episode, Mike discusses the purposes and protocols behind virtual private networks (VPNs).
In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.
In this episode, Mike describes how to remain secure in a non-secure, open-network world.
In this episode, Mike discusses rogue access points and their nefarious cousins, the evil twins.
In this episode, Mike talks about WEP wireless security attacks and methods for cracking WEP passwords.
In this episode, Mike talks about WPS wireless security attacks and methods for cracking WPS passwords.
In this episode, Mike explains the different wireless devices and how the antenna signal effects the placement and usage.
Mike discusses containers, their attributes, and the benefits that can be obtained from using containers.
In this episode, Mike discusses the programmers and applications that enable companies to deploy Software as a Service (SaaS).
Mike discusses the ways to distribute software programs, Web services, and electronic data using various cloud models.
In this episode, Mike looks at network-aware devices, appliances, and industrial systems.
In this episode, Mike explores the various methods used to interconnect mobile devices.
In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.
In this episode, Mike works through some of the security issues that need to be considered when putting together security policies on mobile devices.
In this episode, Mike goes through the various device- and application-level management that can take place on mobile devices.
In this episode, Mike gives a quick overview of the importance and basic function of HVAC systems and how they keep servers and other important equipment happy.
In this episode, Mike talks fire, the right ways to fight it and the best systems to have in place to save your equipment.
In this episode, Mike looks at Internet processes that have built-in encryption.
In this episode, Mike reviews common applications, protocols, and port numbers.
In this episode, Mike presents the elements of Transport Layer Security.
In this episode, Mike explores secure protocols used for hardening Internet services.
Mike explores the methods used to develop code, reviewing some of the models, goals, and processes to maintain during the code lifecycle.
In this episode, Mike explores the various considerations used to deploy code.
Mike walks through the different code testing considerations prior to deployment.
In this episode, Mike demonstrates how to properly collect and preserve data when incidents happen, or legal inquiries are made.
In this episode, Mike explains the thought processes necessary to create an effective contingency plan.
In this episode, Mike discusses the importance of and what takes place during vulnerability assessments.
In this episode, Mike delves into the world of vulnerability tools and how they work.
In this episode, Mike explores many aspects of attacks designed to use people to exploit resources.
In this episode, Mike describes specific attack vectors and potentials that manipulate people and circumstances to access or destroy information.
In this episode, Mike builds on the attacks described in "Attacking Applications" and concentrates on attacks unique to Web applications.
In this episode, Mike explores how systems are exploited as well as methods used to test a system for these exploits.
In this episode, Mike looks at the impact of specific security issues on performance and access to services, and their burden on resources.