Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Zero To Mastery

CompTIA Security+ Certification Bootcamp

via Zero To Mastery

Overview

Go from complete beginner to acing the globally-recognized CompTIA Security+ certification exam. You'll learn the latest best practices and how to pass the exam so that you can springboard into your Cybersecurity career. No previous knowledge required.
  • Learn how to ace the CompTIA Security+ exam from scratch
  • Deeply understand the information tested by the Security+ certification
  • Use the Security+ certification to springboard your career into entry and intermediate-level Cyber Security jobs
  • Have the skills and understanding to confidently apply for Cyber Security jobs
  • Become a Security Engineer, Systems Administrator, Network Administrator, Security Administrator, Security Consultant, Security Specialist, or IT Auditor
  • Master Cyber Security best practices and techniques to become a Top 10% Cyber Security Engineer

Syllabus

  •   Introduction
    • CompTIA Security+ Certification Bootcamp
    • Exercise: Meet Your Classmates and Instructor
    • Security+ Cheatsheet
    • ZTM Plugin + Understanding Your Video Player
    • Set Your Learning Streak Goal
  •   Introduction to Security Basics
    • Introduction
    • What Is Security+?
    • How To Succeed
    • Security Basics and CIA Triangle
    • Let's Have Some Fun (+ Free Resources)
  •   Authentication and Access Control
    • The Power of Control, Different Types of Control
    • Different Types of Identity / Identification
    • Account Access Control and Privilege Management
    • File Access Control (Windows, Linux)
    • AAA Servers
    • Different Types of Authentication and Authentication Management
    • Different Existing Authentication and Authorization Mechanisms
    • Account Control Practices and Policies
    • Unlimited Updates
  •   Secure Network Design and Concept
    • OSI Model
    • Honeypots, Proxy Servers, Jump Servers, Load Balancers
    • Routers, Switches, ACL, Loop Protection
    • Firewalls
    • Network Segmentation
    • IDS, IPS, NAC
    • DNS, DNS Security
    • IP Addresses
    • Dynamic Host Configuration Protocol (DHCP)
    • Virtual Private Network (VPN)
    • Networking Tools / Commands
    • File Manipulation Tools / Commands
    • Forensic Tools / Commands
    • Course Check-In
  •   Security Protocols
    • Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)
    • Unsecure Protocols
    • Secure Protocols
  •   Wireless and Mobile Security
    • Wireless Infrastructure
    • Wireless Encryption and Threats
    • Wireless Authentication Protocols
    • Mobile Device Connection and Communication Methods
    • Mobile Device Management
    • Mobile Device Monitoring and Protection
    • Implement a New Life System
  •   Virtualization and Cloud Security
    • Virtualization Theory
    • Virtual Box Demonstration
    • Cloud Technology
    • Cloud Services
    • Storing Data in Cloud and Cloud Security
  •   Physical Security and Facilities Security
    • Physical Security
  •   Monitoring, Scanning, Hacking
    • What is Penetration Testing?
    • Different Phases of a Penetration Test
    • Different Teams in Cyber Security
    • Vulnerabilities
    • Monitoring
    • Exercise: Imposter Syndrome
  •   Threats, Attacks, Vulnerabilities
    • Different Types of Attackers
    • Different Types of Malware
    • Social Engineering, Phishing
    • Network Attacks
    • Physical Attacks
    • Password Attacks
    • Overflow Attacks, Pointer Dereference, Error Handling
    • Application Attacks, Injection Attacks
    • Zero Days and Weak Configurations
    • Hijacking Attacks
    • Cryptographic Attacks
    • Third Party Attacks
  •   System Hardening and Application Testing
    • Host Security Boot
    • Endpoint Protection Strategy
    • System Hardening
    • Inbuilt Devices and Specialized Devices
    • Secure Application Development and Secure Coding
  •   Risk Management
    • Concept of Risk and Risk Types
    • Risk Control and Analysis
    • Business Impact Analysis
    • Security Information Groups and Sources
    • Facility Policies and Rules
    • Laws and Standards
    • Data Handling
  •   Incident Responding and Forensics
    • Incident Response and Recovery Practices
    • Information Gathering for Incident Response
    • Controls and Techniques for Lowering Risk
    • Redundancy and Tolerance
  •   Cryptography and Public Key Infrastructure (PKI)
    • Concept of Public Key Infrastructure
    • Symmetric and Asymmetric Encryption
    • Important Cryptographic Terms and Concepts
  •   Practice Test
    • Test Instructions
    • CompTIA Security+ Practice Test
  •   Where To Go From Here?
    • Thank You!
    • Review This Course!
    • Become An Alumni
    • Learning Guideline
    • ZTM Events Every Month
    • LinkedIn Endorsements

Taught by

Aleksa Tamburkovski

Reviews

Start your review of CompTIA Security+ Certification Bootcamp

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.