Skip to content
Play overlay
Preview this course

TOTAL: CompTIA Security+ Certification (SY0-601)

Everything you need to pass the CompTIA Security+ (SY0-601) exam from Mike Meyers and Dan Lachance


Total Seminars, LLC

Summary

Price
£19 inc VAT
Study method
Online, On Demand What's this?
Duration
23.9 hours
Qualification
No formal qualification
Certificates
  • Reed courses certificate of completion - Free

5 students purchased this course

Add to basket or enquire

Overview

Welcome to the TOTAL: CompTIA Security+ Certification (SY0-601), a course from the production studios of Total Seminars with subject matter experts Mike Meyers and Dan Lachance.

This course covers everything you need to know to pass your CompTIA Security+ (SY0-601) certification exam. With over 17 hours of in-depth and fascinating content and 125 video lectures, this course will not only make you a good IT security tech, but make sure you are ready to pass the CompTIA Security+ exam. Mike Meyers is the President of Total Seminars and well known as the "Alpha Geek". Mike is widely known at the #1 CompTIA author and instructor with over 1 million books in print. Dan Lachance is a highly motivated and passionate IT evangelist. He is a consultant, trainer, and author with over 20 years of experience in the IT security industry.

This course shows you how to:

  • Apply the three “A’s” of security: authentication, authorization, and accounting

  • Scan your wired or wireless network and assess it for various weaknesses

  • Use cryptography to assure integrity of data through hashing and confidentiality of data through symmetric/asymmetric cryptosystems and public key infrastructure (PKI)

  • Understand critical concepts in risk management, like setting up alerts, responding to incidents, and mitigating vulnerabilities

  • Identify how hackers are trying to get into your network, IT infrastructure, and physical assets and how security techs help prevent those breaches

  • Prevent attacks ranging from simple malware to sophisticated exploits to social engineering that takes advantage of people’s trust, relationships, and lack of knowledge

  • Apply the techniques used in penetration testing, including passive and active reconnaissance

  • Secure an enterprise environment, including creating incident response, business continuity, and disaster recovery plans

The course also includes:

  • Hands-on Labs. You get a handout with the lab and Dan walks you through the lab so you can practice what you learned in the Chapter.
  • Practice Test Question Walkthrough: Dan selects some practice on content for each Chapter and goes over some practice questions, showing you how to think about answering the questions, plus the right and wrong answers.
  • Ask-me-Anything (AMA) Q&As: Students ask questions on the content for each Chapter and Mike and Dan answer them giving you additional explanations on some commonly asked about topics.

Curriculum

14
sections
207
lectures
23h 56m
total
    • 5: Chapter 1 Handouts 24:00 PDF
    • 6: Defining Risk 08:24
    • 7: Threats and Vulnerabilities 07:05
    • 8: Threat Intelligence 11:00
    • 9: Risk Management Concepts 07:24
    • 10: Security Controls 09:23
    • 11: Risk Assessments and Treatments 05:45
    • 12: Quantitative Risk Assessments 06:38
    • 13: Qualitative Risk Assessments 03:55
    • 14: Business Impact Analysis 09:18
    • 15: Data Types and Roles 11:29
    • 16: Security and the Information Life Cycle 09:04
    • 17: Data Destruction 06:05
    • 18: Personnel Risk and Policies 10:22
    • 19: Third-Party Risk Management 08:30
    • 20: Agreement Types 06:31
    • 21: Chapter 1 Exam Question Review 01:40
    • 22: Chapter 1 Lab Handout 01:00 PDF
    • 23: Wiping Disks with the dd Command Lab 05:39
    • 24: Chapter 1 Ask Me Anything (AMA) 02:13
    • 25: Chapter 1 - Risk Management Quiz 07:00
    • 26: Chapter 2 - Handouts 11:00 PDF
    • 27: Cryptography Basics 15:57
    • 28: Data Protection 08:37
    • 29: Cryptographic Methods 07:19
    • 30: Symmetric Cryptosystems 12:42
    • 31: Symmetric Block Modes 08:15
    • 32: Asymmetric Cryptosystems 12:48
    • 33: Diffie-Hellman 06:35
    • 34: Hashing 08:43
    • 35: Understanding Digital Certificates 07:40
    • 36: Trust Models 04:45
    • 37: Public Key Infrastructure 03:39
    • 38: Certificate Types 14:11
    • 39: Touring Certificates 08:48
    • 40: Cryptographic Attacks 05:23
    • 41: Password Cracking 10:13
    • 42: Password Cracking Demo 06:09
    • 43: Chapter 2 Exam Question Review 02:27
    • 44: Chapter 2 Lab Handout.pdf 01:00 PDF
    • 45: SSH Public Key Authentication Lab 09:03
    • 46: Chapter 2 Ask Me Anything (AMA) 01:44
    • 47: Chapter 2 - Cryptography Quiz 06:00
    • 48: Chapter 3 - Handouts 12:00 PDF
    • 49: Identification, Authentication, and Authorization 08:01
    • 50: Enabling Multifactor Authentication 04:46
    • 51: Authorization 04:51
    • 52: Accounting 05:25
    • 53: Authentication Methods 14:07
    • 54: Access Control Schemes 06:50
    • 55: Account Management 13:05
    • 56: Network Authentication 09:04
    • 57: Identity Management Systems 05:53
    • 58: Chapter 3 Exam Question Review 02:16
    • 59: Chapter 3 Lab Handout.pdf 01:00 PDF
    • 60: Creating LInux Users and Groups Lab 05:45
    • 61: Chapter 3 Ask Me Anything (AMA) 01:16
    • 62: Chapter 3 - Identity and Account Management Quiz 06:00
    • 63: Chapter 4 - Handouts 16:00 PDF
    • 64: Touring the CLI 16:28
    • 65: Shells 06:17
    • 66: The Windows Command Line 04:37
    • 67: Microsoft PowerShell 12:33
    • 68: Linux Shells 11:48
    • 69: Python Scripts 07:25
    • 70: Windows Command-Line Tools 16:23
    • 71: Linux Command-Line Tools 09:36
    • 72: Network Scanners 05:15
    • 73: Network Scanning with Nmap 08:59
    • 74: Network Protocol Analyzers 08:01
    • 75: Using Wireshark to Analyze Network Traffic 09:04
    • 76: Using tcpdump to Analyze Network Traffic 08:17
    • 77: Log Files 08:57
    • 78: Centralized Logging 09:04
    • 79: Configuring Linux Log Forwarding 08:28
    • 80: Chapter 4 Exam Question Review 02:58
    • 81: Chapter 4 Lab Handout Part 1.pdf 01:00 PDF
    • 82: Lunux Shell Script Lab 07:10
    • 83: Chapter 4 Lab Handout Part 2.pdf 01:00 PDF
    • 84: Nmap Lab 04:32
    • 85: Chapter 4 Ask Me Anything (AMA) 02:13
    • 86: Chapter 4 - Tools of the Trade Quiz 07:00
    • 87: Chapter 5 - Handouts 16:00 PDF
    • 88: Malware 13:43
    • 89: Weak Configurations 11:37
    • 90: Common Attacks 09:05
    • 91: Driver and Overflow Attacks 07:55
    • 92: Password Attacks 08:05
    • 93: Bots and Botnets 06:14
    • 94: Disk RAID Levels 10:20
    • 95: Securing Hardware 11:04
    • 96: Securing Endpoints 09:03
    • 97: Chapter 5 Exam Question Review 02:20
    • 98: Chapter 5 Lab Handout Part 1.pdf 01:00 PDF
    • 99: Chapter 5 Lab Handout Part 2.pdf 01:00 PDF
    • 100: Linux Software RAID Lab 07:32
    • 101: Chapter 5 Ask Me Anything (AMA) 01:44
    • 102: Chapter 5 - Securing Individual Systems Quiz 05:00
    • 103: Chapter 6 - Handouts 19:00 PDF
    • 104: The OSI Model 12:31
    • 105: ARP Cache Poisoning 08:45
    • 106: Other Layer 2 Attacks 05:22
    • 107: Network Planning 07:05
    • 108: Load Balancing 05:40
    • 109: Securing Network Access 06:23
    • 110: Honeypots 06:02
    • 111: Firewalls 11:17
    • 112: Proxy Servers 06:16
    • 113: Network and Port Address Translation 06:50
    • 114: IP Security (IPsec) 09:00
    • 115: Virtual Private Networks (VPNs) 10:07
    • 116: Intrusion Detection and Prevention Systems (IDS/IPS) 13:03
    • 117: Chapter 6 Exam Question Review 03:26
    • 118: Chapter 6 Lab Handout.pdf 01:00 PDF
    • 119: Linux Snort IDS Lab 07:21
    • 120: Chapter 6 Ask Me Anything (AMA) 01:13
    • 121: Chapter 6 - The Basic LAN Quiz 05:00
    • 122: Chapter 7 - Handouts 09:00 PDF
    • 123: Wi-Fi Encryption Standards 09:43
    • 124: RFID, NFC, and Bluetooth 06:51
    • 125: Wi-Fi Coverage and Performance 08:21
    • 126: Wi-Fi Discovery and Attacks 12:10
    • 127: Cracking WPA2 10:25
    • 128: Wi-Fi Hardening 10:31
    • 129: Chapter 7 Exam Question Review 01:43
    • 130: Chapter 7 Lab Handout.pdf 01:00 PDF
    • 131: WPA2 Cracking Lab 06:28
    • 132: Chapter 7 Ask Me Anything (AMA) 01:16
    • 133: Chapter 7 - Securing Wireless LANs Quiz 06:00
    • 134: Chapter 8 - Handouts 11:00 PDF
    • 135: Defining a Public Server 00:45
    • 136: Common Attacks and Mitigations 09:48
    • 137: Containers and Software-Defined Networking 11:28
    • 138: Hypervisors and Virtual Machines 08:25
    • 139: Cloud Deployment Models 08:46
    • 140: Cloud Service Models 08:28
    • 141: Securing the Cloud 10:21
    • 142: Chapter 8 Exam Question Reivew 02:11
    • 143: Chapter 8 Lab Handout.pdf 01:00 PDF
    • 144: Docker Container Lab 04:08
    • 145: Chapter 8 Ask Me Anything (AMA) 02:00
    • 146: Chapter 8 - Securing Public Servers Quiz 04:00
    • 147: Chapter 9 - Handouts 10:00 PDF
    • 148: Embedded Systems 13:20
    • 149: Industrial Control System (ICS) 06:44
    • 150: Internet of Things (IoT) Devices 10:05
    • 151: Connecting to Dedicated and Mobile Systems 10:53
    • 152: Security Constraints for Dedicated Systems 05:09
    • 153: Mobile Device Deployment and Hardening 11:04
    • 154: Chapter 9 Exam Question Review 02:35
    • 155: Chapter 9 Lab Handout.pdf 01:00 PDF
    • 156: Smartphone Hardening Lab 02:32
    • 157: Chapter 9 Ask Me Anything (AMA) 02:14
    • 158: Chapter 9 - Securing Dedicated Systems Quiz 03:00
    • 159: Chapter 10 - Handouts 04:00 PDF
    • 160: Physical Security Overview 00:59
    • 161: Physical Security 09:53
    • 162: Keylogger Demo 04:45
    • 163: Environmental Controls 05:24
    • 164: Chapter 10 - Physical Security Quiz 03:00
    • 165: Chapter 10 Exam Question Review 02:25
    • 166: Physical Security Lab 02:54
    • 167: Chapter 10 Ask Me Anything (AMA) 02:42
    • 168: Chapter 10 Lab Handout.pdf 01:00 PDF
    • 169: Chapter 11 - Handouts 09:00 PDF
    • 170: DNS Security 05:11
    • 171: FTP Packet Capture 03:29
    • 172: Secure Web and E-mail 11:58
    • 173: Request Forgery Attacks 04:57
    • 174: Cross-Site Scripting Attacks 07:16
    • 175: Web Application Security 08:02
    • 176: Web App Vulnerability Scanning 05:44
    • 177: Chapter 11 Exam Question Review 03:22
    • 178: Chapter 11 Lab Handout.pdf 01:00 PDF
    • 179: OWASP ZAP Web App Scan Lab 04:25
    • 180: Chapter 11 Ask Me Anything (AMA) 02:00
    • 181: Chapter 11 - Secure Protocols and Applications Quiz 02:00
    • 182: Chapter 12 - Handouts 08:00 PDF
    • 183: Testing Infrastructure Overview 04:31
    • 184: Social Engineering 05:58
    • 185: Social Engineering Attacks 10:48
    • 186: Vulnerability Assessments 09:00
    • 187: Penetration Testing 09:48
    • 188: Security Assessment Tools 11:39
    • 189: The Metasploit Framework 08:09
    • 190: Chapter 12 Exam Question Review 01:46
    • 191: Chapter 12 Lab Handout.pdf 01:00 PDF
    • 192: hping3 Forged Packet Lab 06:05
    • 193: Chapter 12 Ask Me Anything (AMA) 01:41
    • 194: Chapter 12 - Testing Infrastructure Quiz 02:00
    • 195: Chapter 13 - Handouts 10:00 PDF
    • 196: Incident Response Overview 02:59
    • 197: Incident Response Plans (IRPs) 06:01
    • 198: Threat Analysis and Mitigating Actions 07:40
    • 199: Digital Forensics 12:14
    • 200: Gathering Digital Evidence 09:45
    • 201: Business Continuity and Alternate Sites 06:11
    • 202: Data Backup 09:46
    • 203: Chapter 13 Exam Question Review 01:00
    • 204: Chapter 13 Lab Handout.pdf 01:00 PDF
    • 205: Autopsy Forensic Browser Lab 04:58
    • 206: Chapter 13 Ask Me Anything (AMA) 02:13
    • 207: Chapter 13 - Dealing with Incidents Quiz 04:00

Course media

Description

WHY SHOULD I TAKE THIS COURSE?

Total Seminars has an excellent reputation in the IT training industry, offering a wide variety of training tools. This course’s subject matter experts, Mike Meyers and Dan Lachance, have a combined 50+ years of experience. Mike has created training materials for thousands of schools, corporations, and government agencies, and has taught numerous seminars for the FBI, DEA, and many other corporate partners; he also wrote several bestselling CompTIA certification guides. Dan is the owner of Lachance IT Consulting, Inc. and has taught many online IT training courses in addition to his work as a network and server consultant and IT security auditor.

This course will also prepare you for the CompTIA Security+ exam, which is industry standard certification, compliant with ISO 17024 standards, accredited by ANSI, and approved by the U.S. Department of Defense.

The average beginner IT security salary is $74,000, and an information security analyst can make a much as is $117,000 starting out. If you’re looking to advance your career, this certification is a great place to start. 96% of HR managers use IT certifications as screening or hiring criteria during recruitment.

WHAT’S COVERED?

The course covers all the CompTIA Security+ (SY0-601) objective domains:

  • Threats, Attacks, and Vulnerabilities (24%)

  • Architecture and Design (21%)

  • Implementation (25%)

  • Operations and Incident Response (16%)

  • Governance, Risk, and Compliance (14%)

EXAM INFO

  • Exam code: SY0-601

  • Max. 90 questions (performance-based and multiple choice)

  • Length of exam: 90 minutes

  • Passing score: 750 (on a scale of 100-900)

  • Exam voucher cost: $349 USD (be sure to go to Total Seminars' website for discount vouchers!)

  • Recommended experience: CompTIA Network+ and two years of experience in IT administration with a security focus

  • Testing provider: Pearson VUE (in-person and online at-home options available)

HOW DO I TAKE THE COMPTIA SECURITY+ EXAM?

Buy an exam voucher (get your discount voucher at Total Seminars' website), schedule your exam on the Pearson VUE Web site, then take the exam at a qualifying Pearson VUE testing center or virtually using their OnVue option.

  • Schedule through a testing center: pearsonvue. com

  • Schedule an at-home (or at-work) exam: onvue. com

WHAT KIND OF JOB CAN I GET WITH A COMPTIA SECURITY+ CERTIFICATION?

  • Security or systems administrator

  • Security engineer/analyst

  • Security IT auditor

  • IT project manager

  • Beginner cybersecurity specialist

  • Junior IT auditor

  • Junior penetration tester

Who is this course for?

This course is intended for anyone that is preparing for an IT Security position or looking to improve their security skills and become CompTIA Security+ Certified. However, it goes beyond that and will give you the skills you need to be a better security tech on the job.

Requirements

There are no specific prerequisites, since the course covers all the topics in detail.

A basic familiarity with PCs and networks is useful.

It is a good idea to have an understanding of CompTIA A+ and Network+, or to be certified in these topics.

Career path

Security+ is part of a career path to IT Security and Cybersecurity careers. It is part of:

The CompTIA Cybersecurity Pathway:

IT Fundamentals > A+ > Network+ > Security+ > CySA+ Cybersecurity Analyst > PenTest+ Penetration Tester.

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Certificates

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

What does study method mean?

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

What are CPD hours/points?

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

What is a ‘regulated qualification’?

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

What is an ‘endorsed’ course?

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body’s logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.