Skip to content
Play overlay
Preview this course

CompTIA Security+(SY0-601) Complete Course | comptia

Dive into comptia security. Learn CompTIA Security plus topics and sample questions for the Comptia security+ SY601 exam


Oak Academy

Summary

Price
£49 inc VAT
Study method
Online, On Demand What's this?
Duration
20.6 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed courses certificate of completion - Free

Overview

Let's dive into comptia security. Learn CompTIA Security + topics and sample questions for the comptia security+ SY601 exam.
Everything you need to pass the CompTIA Security+(SY0-601) is here.

Hello there,

Welcome to the “CompTIA Security+(SY0-601) Complete Course | comptia 2021” course.

Every internet-connected person is affected by issues pertaining to cybersecurity. As a result, cybersecurity professionals are increasingly in-demand.

This course walks you through all the things you need to pass the CompTIA Security + (SY601) exam, step by step.

You can pass the CompTIA Security + exam by studying the topics covered throughout the course.

By the way, you don't need to know anything about CompTIA security +.

We will tell you all the things you need to pass the comtia security plus (SY601) exam.

Our course consists of 11 basic parts.

However, in order to better understand the topics, these basic topics are divided into parts and explained in 44 small chapters in CompTIA Security+(SYo-601).

Each of the sections is important on its own. It also relates to other departments.

As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects.

For example, the subject of encryption is mentioned in many places.

Although the basic meaning is the same, usage types can gain different meanings on different platforms.

The narration of the topics is brief and for the exam.

If you wish, you can improve yourself by using the topics covered in the lessons.

Because at the end of the course, you will see all the topics used in the field of Security.

All you have to do is search the subject on the internet and continue learning in comptia security.

During the course, sample questions were given at the end of each section in comptia.

These questions are generally similar to questions that were previously found in the CompTIA Security + exam.

There is no such thing as the same question will always appear in the exam in CompTIA.

However, the questions to be asked on a certain subject are also close to each other in comtia.

This course is for Comptia Security + (SY0-601).

CompTIA updates its exams every 3 years.

SY0-601 exam has been updated in 2020.
CompTIA Security+(SYO-601)

Basically in CompTIA Security + (SY0-601) exam;

1. Attacks, Threats, and Vulnerabilities

2. Architecture and Design

3. Implementation

4. Operations and Incident Response

5. Governance, Risk, and Compliance

Questions are asked from the fields. Throughout the course, topics related to these areas are explained.

In this course you will learn;

  • Passing the CompTIA Security+ certification exam with confidence

  • Understand computer security, its functions, and its components

  • Performing basic security configurations

  • Become an effective security technician in a business environment

  • Network topologies

  • Threat analysis

No prior knowledge is needed!

Why would you want to take this course?

Our answer is simple: The quality of teaching.

OAK Academy based in London is an online education company. OAK Academy gives education in the field of IT, Software, Design, development in English, Portuguese, Spanish, Turkish and a lot of different language on Udemy platform where it has over 1000 hours of video education lessons. OAK Academy both increase its education series number by publishing new courses, and it makes students aware of all the innovations of already published courses by upgrading.

When you enroll, you will feel the OAK Academy`s seasoned developers expertise. Questions sent by students to our instructors are answered by our instructors within 48 hours at the latest.

Video and Audio Production Quality

All our videos are created/produced as high-quality video and audio to provide you the best learning experience.

You will be,

  • Seeing clearly

  • Hearing clearly

  • Moving through the course without distractions

You'll also get:

  • Lifetime Access to The Course

  • Fast & Friendly Support in the Q&A section

Dive in now “CompTIA Security+(SY0-601) Complete Course | comptia 2021”.

We offer full support, answering any questions.

See you in the course!

Certificates

Reed courses certificate of completion

Digital certificate - Included

Will be downloadable when all lectures have been completed

Curriculum

47
sections
274
lectures
20h 34m
total
    • 2: What is Security? Preview 02:23
    • 3: Privacy-Integrity-Availability 03:20
    • 4: Encryption and Access Control 03:00
    • 5: 3 A Rule (Authentication, Authorization and Accounting) 03:55
    • 6: Threat 03:48
    • 7: What is a Hacker? 06:35
    • 8: What is Attack? What are the Stages? 03:22
    • 9: Single Point Of Failure (SPOF) 03:22
    • 10: Introducing Basic Risk Concepts 03:25
    • 11: Quiz - 1 05:00
    • 12: What is Identity Management 02:15
    • 13: KERBEROS _ NTLM_LDAP 07:32
    • 14: Single Sign-On (SSO) 11:02
    • 15: Smart Cards 02:58
    • 16: Tokens or Key Fobs 05:30
    • 17: Biometric Methods 07:39
    • 18: Dual-Factor and Multifactor Authentication 01:45
    • 19: PAP CHAP MS-CHAP 02:47
    • 20: RADIUS 06:27
    • 21: Quiz - 2 04:00
    • 22: Summary -1 03:26
    • 23: Create a User in comptia 03:04
    • 24: Managing Accounts - 1 11:45
    • 25: Managing Accounts - 2 09:21
    • 26: Passwords 09:18
    • 27: Password Policy 09:03
    • 28: Quiz - 3 04:00
    • 29: Comparing Access Control Models 02:19
    • 30: Role-Based Access Control 03:15
    • 31: Establishing Access with Group-Based Privileges 04:42
    • 32: Rule Based and Discretionary Access Control 05:40
    • 33: Mandatory Access Control 02:46
    • 34: Establishing Access 06:07
    • 35: Quiz - 4 02:00
    • 36: What is Virtualization 03:46
    • 37: Virtualization Technologies 02:55
    • 38: Benefits of Virtualization 05:00
    • 39: Security Issues of Virtualization 03:51
    • 40: Quiz - 5 05:00
    • 41: Basic Network Concepts 15:38
    • 42: Domain Name Services(DNS) 09:47
    • 43: What is the port_ How does it work 05:11
    • 44: What is the Network Address 07:05
    • 45: Combining the IP Address and the Port 04:38
    • 46: Switches 05:04
    • 47: Bridge 03:07
    • 48: Routers 09:29
    • 49: Understanding NAT and PAT 02:38
    • 50: Network Separation 03:17
    • 51: Proxy Servers 07:13
    • 52: Types of Using Network Technologies - 1 09:12
    • 53: Types of Using Network Technologies - 2 08:26
    • 54: Quiz - 6 04:00
    • 55: Reviewing Basic Wireless Network Information 06:29
    • 56: Wireless Cryptographic Protocols 07:38
    • 57: Authentication Protocols for Wireless Networks 06:24
    • 58: Quiz - 7 02:00
    • 59: Summary-2 03:03
    • 60: Firewalls 09:28
    • 61: Network Access Control 09:28
    • 62: Implementing a Secure Network 05:16
    • 63: Quiz - 8 04:00
    • 64: Understanding IDSs and IPSs 04:46
    • 65: Detection Methods 11:49
    • 66: Honeypots 04:42
    • 67: Quiz - 9 03:00
    • 68: Using VPNs for Remote Access 03:54
    • 69: VPN Tunnel Protocols 06:18
    • 70: Site-to-Site VPNs 02:36
    • 71: Quiz - 10 03:00
    • 72: Understanding Threat Actors 12:37
    • 73: Viruses 02:11
    • 74: Logic Bombs 03:22
    • 75: Trojans 05:31
    • 76: Ransomware 03:24
    • 77: Spyware 03:04
    • 78: Bots and Botnets 04:17
    • 79: Unified Threat Management(UTM) 05:55
    • 80: Quiz - 11 02:00
    • 81: Disable SSID Broadcasting or Not 01:27
    • 82: Enable MAC Filtering 01:54
    • 83: Quiz - 12 03:00
    • 84: Disassociation Attacks 01:58
    • 85: WPS and WPS Attacks 01:51
    • 86: Rogue AP 02:14
    • 87: Evil Twin 02:08
    • 88: Jamming Attacks 03:48
    • 89: Bluetooth Attacks 02:51
    • 90: RFID Attacks 02:40
    • 91: Wireless Replay Attacks 01:50
    • 92: Quiz - 13 05:00
    • 93: Summary-3 02:44
    • 94: Network Attacks 03:39
    • 95: SYN Flood Attack 02:55
    • 96: MAC Flood Attacks 02:54
    • 97: Man-in-the-Middle Attacks 01:33
    • 98: ARP Poisoning Attacks 03:49
    • 99: DNS Attacks 06:17
    • 100: Quiz - 14 06:00
    • 101: Brute Force Attacks 03:32
    • 102: Password Hashes 04:54
    • 103: Birthday Attacks 04:51
    • 104: Replay Attacks 03:25
    • 105: Hijacking and Related Attacks 05:59
    • 106: Driver Manipulation 02:08
    • 107: Quiz - 15 04:00
    • 108: Zero-Day Attacks 04:19
    • 109: Quiz - 16 03:00
    • 110: Code Reuse and SDKs 04:31
    • 111: Code Quality and Testing 02:52
    • 112: Development Life-Cycle Models 03:42
    • 113: Secure DevOps 03:20
    • 114: Version Control and Change Management 02:17
    • 115: Provisioning and Deprovisioning 01:48
    • 116: Quiz - 17 05:00
    • 117: Web Servers 02:08
    • 118: SQL Injection Attacks 04:33
    • 119: Protecting Against SQL Injection Attacks 02:38
    • 120: DLL Injection 02:25
    • 121: Cross-Site Scripting 06:41
    • 122: Quiz - 18 02:00
    • 123: Social Engineering 04:09
    • 124: Shoulder Surfing 01:07
    • 125: Tricking Users with Hoaxes 01:18
    • 126: Tailgating and Mantraps 01:13
    • 127: Dumpster Diving 01:26
    • 128: Watering Hole Attacks 01:07
    • 129: Spam 02:05
    • 130: Phishing 06:24
    • 131: Whaling 02:45
    • 132: Vishing 03:08
    • 133: Beware of Email from Friends 02:01
    • 134: Why Social Engineering Works 09:31
    • 135: Quiz - 19 06:00
    • 136: Summary-4 03:32
    • 137: Memory Leak 02:42
    • 138: Buffer Overflow Attacks 04:16
    • 139: Pointer Dereference 02:08
    • 140: Compiled Versus Runtime Code 01:21
    • 141: Proper Input Validation 04:08
    • 142: Side Input Validation 03:20
    • 143: Avoiding Race Conditions 02:14
    • 144: Proper Error Handling 02:14
    • 145: Cryptographic Techniques 01:43
    • 146: Quiz - 20 05:00
    • 147: Protecting Systems from Malware 02:05
    • 148: Antivirus and Anti-Malware Software 08:22
    • 149: Advanced Malware Tools 03:31
    • 150: Educating Users 01:53
    • 151: Implementing Defense in Depth 03:35
    • 152: Quiz - 21 04:00
    • 153: Implementing Secure Systems 04:11
    • 154: Operating systems 04:12
    • 155: Secure Operating System Configurations 06:33
    • 156: Resiliency and Automation Strategies 04:57
    • 157: Change Management Policy 07:10
    • 158: Secure Staging and Deployment 05:27
    • 159: Peripherals 04:10
    • 160: EMI and EMP 07:47
    • 161: Hardware Security Module 02:26
    • 162: Cloud Deployment Models 05:29
    • 163: Cloud Services 06:21
    • 164: Security Responsibilities with Cloud Models 01:52
    • 165: Quiz - 22 03:00
    • 166: Deploying Mobile Devices Securely 02:15
    • 167: Deployment Models 08:35
    • 168: Mobile Device Management 09:27
    • 169: Unauthorized Software 05:04
    • 170: Hardware Control 02:43
    • 171: Unauthorized Connections 02:32
    • 172: Quiz - 23 05:00
    • 173: Exploring Embedded Systems 07:07
    • 174: Understanding Stuxnet 02:14
    • 175: Real-Time Operating Systems 03:16
    • 176: Quiz - 24 02:00
    • 177: Summary-5 04:14
    • 178: Protecting Data 11:24
    • 179: Data Loss Prevention 05:31
    • 180: Quiz - 25 04:00
    • 181: Database Concepts 02:48
    • 182: Normalization 05:26
    • 183: SQL Queries 01:56
    • 184: Database Security 00:58
    • 185: Quiz - 26 05:00
    • 186: Understanding Risk Management 02:40
    • 187: Risk Management 02:46
    • 188: Threats and Threat Assessments 04:23
    • 189: Vulnerabilities 02:03
    • 190: Risk Assessment 13:07
    • 191: Risk Registers 05:51
    • 192: Quiz - 27 04:00
    • 193: Checking for Vulnerabilities 01:52
    • 194: Password Crackers 01:59
    • 195: Network Scanners 05:24
    • 196: Wireless Scanners - Cracker 03:18
    • 197: Banner Grabbing 00:47
    • 198: Vulnerability Scanning 11:24
    • 199: Quiz - 28 04:00
    • 200: Penetration Tests 02:45
    • 201: Passive Active Reconnaissance 02:02
    • 202: Initial Exploitation 03:46
    • 203: White, Gray and Black Box Testing 03:01
    • 204: Intrusive and Non-Intrusive Testing 01:22
    • 205: Passive Versus Active Tools 11:42
    • 206: Quiz - 29 05:00
    • 207: Comparing Physical Security Controls 03:29
    • 208: Comparing Door Lock Types 05:33
    • 209: Preventing Tailgating with Mantraps 02:00
    • 210: Increasing Physical Security with Guards 08:21
    • 211: Using Hardware Locks 02:56
    • 212: Asset Management 02:34
    • 213: Implementing Environmental Controls 14:02
    • 214: Quiz - 30 03:00
    • 215: Summary-6 02:00
    • 216: Single Point of Failure 01:47
    • 217: Disk Redundancies 04:25
    • 218: Server Redundancy and High Availability 09:12
    • 219: Backup 15:18
    • 220: Quiz - 31 05:00
    • 221: Comparing Business Continuity Elements 06:10
    • 222: Impact 03:55
    • 223: Recovery Time Objective 04:55
    • 224: Recovery Sites 05:53
    • 225: Disaster Recovery 08:11
    • 226: Quiz - 32 05:00
    • 227: Monitoring Logs for Event Anomalies 08:44
    • 228: OtherLogs-SIEM 07:13
    • 229: Continuous Monitoring 06:08
    • 230: Quiz - 33 04:00
    • 231: Understanding Control Types 07:13
    • 232: Control Goals 10:53
    • 233: Quiz - 34 02:00
    • 234: Introducing Cryptography Concepts 03:08
    • 235: Hashing 04:43
    • 236: MD5 00:54
    • 237: SHA 02:56
    • 238: HMAC 02:49
    • 239: Hashing Files 02:57
    • 240: Digital Signatures, Certificates and Non-repudiation 02:53
    • 241: Hashing Messages 04:35
    • 242: Providing Confidentiality with Encryption 08:16
    • 243: Block Versus Stream Ciphers 04:10
    • 244: Symmetric Encryption 01:56
    • 245: Symmetric Encryption Methods 06:19
    • 246: Asymmetric Encryption 01:56
    • 247: Certificates 03:59
    • 248: Steganography And Obfuscation 02:41
    • 249: Using Cryptographic Protocols 01:50
    • 250: Cipher Suites 03:39
    • 251: Exploring PKI Components 08:04
    • 252: Recovery Agent 01:09
    • 253: Comparing Certificate Types 04:38
    • 254: Certificate Formats 03:10
    • 255: Quiz - 35 04:00
    • 256: Protecting Email 01:51
    • 257: Encrypting Email 03:40
    • 258: Quiz - 36 03:00
    • 259: HTTPS Transport Encryption 05:09
    • 260: Quiz - 37 03:00
    • 261: Exploring Security Policies 01:14
    • 262: Personnel Management Policies 10:42
    • 263: Background Check 02:50
    • 264: NDA 04:41
    • 265: Policy Violations and Adverse Actions 01:37
    • 266: Agreement Types 03:02
    • 267: PII and PHI 05:14
    • 268: Responding to Incidents 02:33
    • 269: Providing Training 05:32
    • 270: Troubleshooting Personnel Issues 02:28
    • 271: Quiz - 38 05:00
    • 272: Summary-7 01:41
    • 273: Conclusion 11:23
    • 274: Questions for CompTIA Security + Exam 01:00

Course media

Description

Let's dive into comptia security. Learn CompTIA Security + topics and sample questions for the comptia security+ SY601 exam.
Everything you need to pass the CompTIA Security+(SY0-601) is here.

Hello there,

Welcome to the “CompTIA Security+(SY0-601) Complete Course | comptia 2021” course.

Every internet-connected person is affected by issues pertaining to cybersecurity. As a result, cybersecurity professionals are increasingly in-demand.

This course walks you through all the things you need to pass the CompTIA Security + (SY601) exam, step by step.

You can pass the CompTIA Security + exam by studying the topics covered throughout the course.

By the way, you don't need to know anything about CompTIA security +.

We will tell you all the things you need to pass the comtia security plus (SY601) exam.

Our course consists of 11 basic parts.

However, in order to better understand the topics, these basic topics are divided into parts and explained in 44 small chapters in CompTIA Security+(SYo-601).

Each of the sections is important on its own. It also relates to other departments.

As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects.

For example, the subject of encryption is mentioned in many places.

Although the basic meaning is the same, usage types can gain different meanings on different platforms.

The narration of the topics is brief and for the exam.

If you wish, you can improve yourself by using the topics covered in the lessons.

Because at the end of the course, you will see all the topics used in the field of Security.

All you have to do is search the subject on the internet and continue learning in comptia security.

During the course, sample questions were given at the end of each section in comptia.

These questions are generally similar to questions that were previously found in the CompTIA Security + exam.

There is no such thing as the same question will always appear in the exam in CompTIA.

However, the questions to be asked on a certain subject are also close to each other in comtia.

This course is for Comptia Security + (SY0-601).

CompTIA updates its exams every 3 years.

SY0-601 exam has been updated in 2020.
CompTIA Security+(SYO-601)

Basically in CompTIA Security + (SY0-601) exam;

1. Attacks, Threats, and Vulnerabilities

2. Architecture and Design

3. Implementation

4. Operations and Incident Response

5. Governance, Risk, and Compliance

Questions are asked from the fields. Throughout the course, topics related to these areas are explained.

In this course you will learn;

  • Passing the CompTIA Security+ certification exam with confidence

  • Understand computer security, its functions, and its components

  • Performing basic security configurations

  • Become an effective security technician in a business environment

  • Network topologies

  • Threat analysis

No prior knowledge is needed!

Why would you want to take this course?

Our answer is simple: The quality of teaching.

OAK Academy based in London is an online education company. OAK Academy gives education in the field of IT, Software, Design, development in English, Portuguese, Spanish, Turkish and a lot of different language on Udemy platform where it has over 1000 hours of video education lessons. OAK Academy both increase its education series number by publishing new courses, and it makes students aware of all the innovations of already published courses by upgrading.

When you enroll, you will feel the OAK Academy`s seasoned developers expertise. Questions sent by students to our instructors are answered by our instructors within 48 hours at the latest.

Video and Audio Production Quality

All our videos are created/produced as high-quality video and audio to provide you the best learning experience.

You will be,

  • Seeing clearly

  • Hearing clearly

  • Moving through the course without distractions

You'll also get:

  • Lifetime Access to The Course

  • Fast & Friendly Support in the Q&A section

Dive in now “CompTIA Security+(SY0-601) Complete Course | comptia 2021”.

We offer full support, answering any questions.

See you in the course!

Who is this course for?

  1. Those who want to get CompTIA Security + certificate
  2. Anyone interested in cyber security
  3. Those who have a career goal in the field of cyber security
  4. Those who have a basic knowledge of security and want to take it to higher levels
  5. Those who want to step into the world of cybersecurity
  6. Junior Security elements

Requirements

  1. Desire to get CompTIA Security + certification
  2. Watching the lecture videos completely, to the end and in order.
  3. Internet Connection
  4. Any device you can watch the course, such as a mobile phone, computer or tablet
  5. Determination and patience to learn

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.