Skip to content

Complete CompTIA Bundle

Comptia ITF+(FC0-U61) | CompTIA A+ 220-1101 - 1102 |Comptia Network Plus (N10-008) | Comptia Security+ (701)


Oak Academy

Summary

Price
£600 inc VAT
Or £50.00/mo. for 12 months...
Study method
Online, On Demand What's this?
Duration
51.8 hours · Self-paced
Qualification
No formal qualification
Certificates
  • Reed Courses Certificate of Completion - Free
Additional info
  • Tutor is available to students

Add to basket or enquire

Overview

Hello there,

Welcome to the “Security+ | CompTIA Security Plus SY0-701 Certification Prep” course.
CompTIA Security Plus | Embrace the latest Cybersecurity trends, pass CompTIA security+ exam & get a cyber security job

Every internet-connected person is affected by issues pertaining to cybersecurity. As a result, cybersecurity professionals are increasingly in-demand. That’s why OAK Academy offers top-rated CompTIA Security+exam prep courses to help you prepare for the job market.

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

Comptia Security+ validates certified professionals have the skills required to recommend and implement security solutions.

Join thousands of learners in preparing for the CompTIA Security+ certification with real-world cybersecurity at OAK Academy. You’ll get step-by-step video tutorials along with hands-on exercises and practice tests that mirror real-world problems you’ll encounter in a typical IT security job.

This course walks you through all the things you need to pass the CompTIA Security + (SY0-601) exam, step by step.

You can pass the CompTIA Security + exam by studying the topics covered throughout the course.

By the way, you don't need to know anything about CompTIA security +.

We will tell you all the things you need to pass the comtia security plus (SY0-701) exam.

Our course consists of 11 basic parts.

However, in order to better understand the topics, these basic topics are divided into parts and explained in 39 small chapters in CompTIA Security+ (SY0-701).

Each of the sections is important on its own. It also relates to other departments.

As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects. cybersecurity, comptia security plus, security+, comptia, cyber security, comptia security, security plus, security +, comptia security+

Certificates

Reed Courses Certificate of Completion

Digital certificate - Included

Will be downloadable when all lectures have been completed.

Curriculum

80
sections
713
lectures
51h 50m
total
    • 1: History of Computer 01:40
    • 2: FAQ about IT Fundamentals 02:00
    • 3: What is Computer 01:26
    • 4: Benefits of Using Computer_1 00:37
    • 5: Types of Computer 01:07
    • 6: Quiz 01:00
    • 7: Input Processing - Output Cycle 06:14
    • 8: Computer Inputs 00:57
    • 9: What is Processing 01:18
    • 10: Cyber Attacks to CPU 01:04
    • 11: What is Storing 00:53
    • 12: Output 01:23
    • 13: Computer Components 02:54
    • 14: Input Devices 02:28
    • 15: Quiz 01:00
    • 16: Primary and Secondary Memory 04:20
    • 17: RAM 01:18
    • 18: SRAM and DRAM 01:28
    • 19: ROM 01:12
    • 20: PROM, EPROM, EEPROM 01:04
    • 21: Storage Devices 02:19
    • 22: Network Attached Storage 01:40
    • 23: Cloud Storage 01:31
    • 24: Quiz 01:00
    • 25: Processing Devices 02:59
    • 26: GPU 02:46
    • 27: Motherboard 01:14
    • 28: Output Devices 00:38
    • 29: Quiz 01:00
    • 30: What is IoT 03:28
    • 31: Where does IoT Exist in Our Lives 01:47
    • 32: How Does IOT Work 00:47
    • 33: Connection Standarts 09:06
    • 34: IOT Security 06:59
    • 35: Mobile Security Threats 08:00
    • 36: Network Interface Card 02:06
    • 37: What is Hub 01:22
    • 38: What is Switch 01:46
    • 39: How does switch work 02:21
    • 40: What is Router 01:33
    • 41: What is Bridge 02:25
    • 42: Modem Types 02:59
    • 43: Wireless Access Point (WAP) 01:06
    • 44: Firewall and Network Components 07:49
    • 45: Quiz 03:00
    • 46: What is Operating System 02:35
    • 47: Functions Of Operating Systems 10:25
    • 48: Kinds of Operating System 01:47
    • 49: Server Operating Systems 07:53
    • 50: Classification of Operating Systems 02:01
    • 51: Linux Systems 05:12
    • 52: Windows and MacOS 03:28
    • 53: Virtualbox Virtualization Software 03:13
    • 54: Quiz 02:00
    • 55: What is a Library - 1 04:40
    • 56: What is Virtualization 01:06
    • 57: Types of Virtualization 01:37
    • 58: Functions of Virtualization 01:06
    • 59: Security of the Virtualization 03:01
    • 60: Virtualization Lab Exercise - 1 08:14
    • 61: Virtualization Lab Exercise - 2 12:35
    • 62: What is a Library - 2 04:21
    • 63: Quiz 01:00
    • 64: Programming Languages 04:54
    • 65: Types of Programming 09:19
    • 66: CompTIA A+ Course Introduction 01:06
    • 67: What is the CompTIA A+ 01:24
    • 68: How Can We Get CompTIA A+ 01:31
    • 69: CPUs 18:38
    • 70: GPU 02:46
    • 71: Motherboard 01:14
    • 72: Network Interface Cards (NICs) 10:21
    • 73: Output Devices 00:38
    • 74: Quiz 02:00
    • 75: What is Monitor 03:39
    • 76: What is Printer 01:59
    • 77: What are Headphones 03:15
    • 78: What is Computer Speaker 01:48
    • 79: What is Projector 01:13
    • 80: What is GPS 02:28
    • 81: Quiz 02:00
    • 82: Ethernet 02:01
    • 83: VGA 02:03
    • 84: Fiber Optic Cables 25:25
    • 85: HDMI 01:31
    • 86: DisplayPort 01:50
    • 87: DVI 01:32
    • 88: SATA cables 01:21
    • 89: USB 02:21
    • 90: Quiz 01:00
    • 91: What is a Network 05:33
    • 92: Network Architecture 02:41
    • 93: Physical Network Topologies 04:54
    • 94: OSI Reference Model 10:45
    • 95: Network Components 00:39
    • 96: Physical Media - Coaxial - Twisted Pair - Fiber Optic Cable 04:09
    • 97: Network Devices 00:20
    • 98: Basic Terms of Networking 05:36
    • 99: Reference Model 00:24
    • 100: TCP/IP (Networking) Basics 13:43
    • 101: OSI Reference Model vs. TCP/IP Reference Model 02:32
    • 102: Network Layers in Real World 08:03
    • 103: Layer 2 - Data Link Layer 03:50
    • 104: Layer 2: Ethernet - Principles, Frames & Headers 04:06
    • 105: Layer 2: ARP - Address Resolution Protocol 06:10
    • 106: Layer 2: Analysing ARP Packets 03:14
    • 107: Layer 2: VLANs (Virtual Local Area Networks) 04:03
    • 108: Layer 2: WLANs (Wireless Local Area Networks) 07:01
    • 109: Layer 3 - Network Layer 01:36
    • 110: Layer 3: IP (Internet Protocol) 02:49
    • 111: Layer 3: IPv4 Addressing System 01:55
    • 112: Layer 3: IPv4 Packet Header 02:56
    • 113: Layer 3: Subnetting - Classful Networks 02:35
    • 114: Layer 3: Subnetting Masks 02:58
    • 115: Layer 3: Understanding IPv4 Subnets 03:09
    • 116: Layer 3: IPv4 Address Shortage 01:41
    • 117: Layer 3: Private Networks 03:59
    • 118: Layer 3: Private Networks - Demonstration 03:01
    • 119: Layer 3: NAT (Network Address Translation) 04:30
    • 120: Layer 3: IPv6, Packet Header & Addressing 08:30
    • 121: Layer 3: DHCP - How the Mechanism Works 09:23
    • 122: Layer 3: ICMP (Internet Control Message Protocol) 02:02
    • 123: Layer 3: Traceroute 09:50
    • 124: Layer 4 - Transport Layer 02:39
    • 125: Layer 4: TCP (Transmission Control Protocol) 06:59
    • 126: Layer 4: TCP Header 02:27
    • 127: Layer 4: UDP (User Datagram Protocol) 03:56
    • 128: Layer 5-7 - Application Layer 00:55
    • 129: Layer 7: DNS (Domain Name System) 05:56
    • 130: Layer 7: HTTP (Hyper Text Transfer Protocol) 03:09
    • 131: Layer 7: HTTPS 01:56
    • 132: Quiz 03:00
    • 133: IEEE-802.11 03:54
    • 134: Basic Terminologies and Concepts 04:50
    • 135: Wireless Operating Modes 06:11
    • 136: MAC Frame Structure 02:58
    • 137: Wireless Packet Types 05:21
    • 138: Wireless Encryption Protocols: WEP vs. WPA 03:58
    • 139: WPA 4-Way Handshake 05:45
    • 140: WPA2 Personal and Enterprise 03:16
    • 141: Wireshark: WEP and WPA 01:10
    • 142: Wi-Fi Protected Setup (WPS) 03:49
    • 143: Quiz 01:00
    • 144: Functions Of Operating Systems 10:25
    • 145: Kinds of Operating System 01:47
    • 146: VPNs 14:11
    • 147: 32-Bit vs. 64-Bit File Systems 03:24
    • 148: FAT32 01:33
    • 149: FAT64 02:21
    • 150: Windows 02:17
    • 151: Apple Macintosh OS 01:52
    • 152: Linux Systems 05:12
    • 153: Android 01:25
    • 154: iOS 01:23
    • 155: Chrome OS 01:13
    • 156: Quiz 02:00
    • 157: What is Linux? 01:35
    • 158: Distributions 01:22
    • 159: Pieces of Linux 02:56
    • 160: Shell 02:04
    • 161: Linux Signs: $, #, %, ~ 00:58
    • 162: Linux Desktop Environments 01:52
    • 163: Linux File Hierarchy 02:56
    • 164: Configuring Services 03:42
    • 165: User Management 02:37
    • 166: Package Management Concepts 03:25
    • 167: Foremost Linux Package Managers 02:30
    • 168: Repository (a.k.a. Repo) 00:49
    • 169: “apt-get” Package Manager 06:08
    • 170: Debian packages "dpkg" 02:26
    • 171: Install from Source Code 04:35
    • 172: System Monitoring 06:59
    • 173: Status of Network 01:49
    • 174: Quiz 01:00
    • 175: Introduction to Users and Groups 02:47
    • 176: Managing Users and Groups 01:21
    • 177: NTFS Permissions 01:54
    • 178: File Explorer 01:24
    • 179: MSCONFIG 02:05
    • 180: Services (Services.msc) 01:30
    • 181: Performance Monitor 01:56
    • 182: Task Manager 02:58
    • 183: Disk Management 01:50
    • 184: MSTSC 01:23
    • 185: Quiz 01:00
    • 186: Troubleshooting Methodology 03:24
    • 187: System Lockups 02:52
    • 188: Troubleshooting Internet Connections 03:33
    • 189: Check the Wi-Fi Settings 01:11
    • 190: Who Else Is Using the Internet? 01:32
    • 191: BIOS Time and Setting Resets 02:53
    • 192: Attempts to Boot to Incorrect Device 02:24
    • 193: Quiz 02:00
    • 194: Slow System Performance 01:56
    • 195: Common Symptoms of Malware Infections 02:42
    • 196: macOS Boot Errors 01:53
    • 197: Windows Boot Errors 02:22
    • 198: Linux Boot Errors 02:09
    • 199: Quiz 01:00
    • 200: What is database 03:19
    • 201: RDBMS(Relational Database Management System) 02:24
    • 202: What is SQL/Query? 02:47
    • 203: Install MS SQL Server Express Edition 2019 04:35
    • 204: Insert Data to Table 10:06
    • 205: Update Data in A Table 05:41
    • 206: Delete Data and AdventureWorks 06:16
    • 207: Cloud Service Models-1 01:52
    • 208: Cloud Service Models-2 03:25
    • 209: Cloud Characteristics and Terms 06:23
    • 210: Cloud Deployment Models and Services 11:29
    • 211: Storage Types and Technologies 06:41
    • 212: Storage Technologies 09:29
    • 213: What is Security 02:22
    • 214: Privacy-Integrity-Availability 03:15
    • 215: A Rule (Authentication, Authorization and Accounting) 03:52
    • 216: What is a Hacker 06:27
    • 217: What is Attack? What are the Stages? 03:19
    • 218: Terms: Asset, Threat, Vulnerability, Risk, Exploit 03:08
    • 219: What are Bot/Botnet and Zombies? 01:45
    • 220: What are DoS and DDoS Attacks? 02:56
    • 221: Malware Types 01:44
    • 222: Who Needs Data Security? 09:42
    • 223: Protecting Data at Rest vs Data in Motion 08:17
    • 224: Types of Encryption for in Motion, in Use, at Rest Data 11:00
    • 225: Data Retention 09:11
    • 226: Data Access Control 19:23
    • 227: Controlling Access to the Property 11:42
    • 228: Securing the Building 04:33
    • 229: Fire Suppression 04:37
    • 230: Access Control Models and Methods 13:53
    • 231: File and Folder Permissions 12:21
    • 232: Cloud Accounting 17:34
    • 233: Multi-Factor Authentication (MFA) 07:49
    • 234: Types of Backups 12:20
    • 235: Backup Media and Cycle 08:25
    • 236: High Availability (HA) 14:29
    • 237: Disaster Recovery (DR) 17:49
    • 238: Hardware Hardening 06:13
    • 239: Operating System (OS) Hardening 09:04
    • 240: Application Hardening 08:15
    • 241: Firewalls and IDS/IPS 08:20
    • 242: Updating the OS 16:43
    • 243: Quiz 02:00
    • 244: Shoulder Surfing 01:08
    • 245: Tricking Users with Hoaxes 01:19
    • 246: Tailgating and Mantraps 01:12
    • 247: Dumpster Diving 01:30
    • 248: Watering Hole Attacks 01:06
    • 249: Whaling 02:45
    • 250: Why Social Engineering Works 09:28
    • 251: Password Crackers 01:59
    • 252: Network Scanners 05:24
    • 253: Wireless Scanners / Cracker 03:20
    • 254: Banner Grabbing 00:48
    • 255: qUIZ 01:00
    • 256: Introduction to CompTIA Network 03:13
    • 257: What is a network 05:33
    • 258: PAN Personal Area Network 00:43
    • 259: MAN Metropolitan Area Network 00:40
    • 260: Network Architecture 02:41
    • 261: Physical Network Topologies 04:54
    • 262: Protocol T connections 00:21
    • 263: OSI Reference Model 10:45
    • 264: Network Components 00:39
    • 265: Physical Media - Coaxial - Twisted Pair - Fiber Optic Cable 04:09
    • 266: UTP Cable Properties 04:52
    • 267: Wiring Standards 03:15
    • 268: Network Devices 00:20
    • 269: Common Network Devices 08:02
    • 270: Other Network Devices 03:04
    • 271: IoT- Internet of Things 06:09
    • 272: Quiz 03:00
    • 273: Basic Terms of Networking 05:36
    • 274: Reference Models 00:24
    • 275: TCP - IP Basics - Layers and Protocols 09:26
    • 276: OSI Reference Model vs. TCP - IP Reference Model 02:32
    • 277: TCP - IP Basics - An Example DNS Query 05:19
    • 278: Layer 2 - Data Link Layer 03:50
    • 279: Layer 2: Ethernet - Principles, Frames & Headers 04:06
    • 280: Layer 2: ARP - Address Resolution Protocol 06:10
    • 281: ARP Wireshark Example 09:32
    • 282: Layer 2: VLANs (Virtual Local Area Networks) 04:03
    • 283: Layer 2: WLANs (Wireless Local Area Networks) 07:02
    • 284: Network Layer and Protocols 01:36
    • 285: Layer 3: IP (Internet Protocol) 02:49
    • 286: Layer 3: IPv4 Addressing System 01:56
    • 287: Layer 3: IPv4 Packet Header 02:56
    • 288: Layer 3: Subnetting - Classful Networks 02:35
    • 289: Layer 3: Subnetting Masks 02:59
    • 290: Layer 3: Understanding IPv4 Subnets 03:09
    • 291: Layer 3: IPv4 Address Shortage 01:41
    • 292: Layer 3: Private Networks 03:59
    • 293: Layer 3: Private Networks - Demonstration 03:01
    • 294: Layer 3: NAT (Network Address Translation) 04:30
    • 295: NAT Static Cisco Packet Tracer Example 09:21
    • 296: Layer 3: IPv6, Packet Header & Addressing 08:30
    • 297: IPv6 Address Types 10:41
    • 298: Layer 3: DHCP - How the Mechanism Works 09:23
    • 299: Layer 3: ICMP (Internet Control Message Protocol) 02:02
    • 300: Transport Layer and Protocols 02:39
    • 301: Layer 4: TCP (Transmission Control Protocol) 06:59
    • 302: Layer 4: TCP Header 02:27
    • 303: Layer 4: UDP (User Datagram Protocol) 03:56
    • 304: Application Layer and Protocols 00:55
    • 305: Layer 7: DNS (Domain Name System) 05:56
    • 306: Layer 7: HTTP (Hyper Text Transfer Protocol) 03:09
    • 307: Layer 7: HTTPS 01:56
    • 308: Layer 7 : Telnet - SSH 02:13
    • 309: Routing 00:38
    • 310: IP - Mac 01:01
    • 311: Router’s Role 01:24
    • 312: Routing Table 01:54
    • 313: Static and Dynamic Route 03:34
    • 314: Static Routing Cisco Packet Tracer Example 14:48
    • 315: EIGRP Dynamic Routing Cisco Packet Tracer Example 14:16
    • 316: RIP - OSPF - BGP 03:30
    • 317: Switching and VLANs 00:29
    • 318: Networking Before Layer 2 Switching 01:16
    • 319: Switching Services 01:21
    • 320: Spanning Tree Protocol 01:54
    • 321: VLANs (Virtual Local Area Networks) 04:03
    • 322: VTP – VLAN Trunking Protocol 01:23
    • 323: IEE-802.11 03:54
    • 324: Basic Terminologies Concepts 04:50
    • 325: Wireless Operating Modes 06:11
    • 326: MAC Frame Structure 02:58
    • 327: Wireless Packet Types 05:21
    • 328: Wireshark Analysing Packet Types 06:32
    • 329: Wifi Network Interaction 05:03
    • 330: Wireless Encryption Protocols WEP-WPA 03:58
    • 331: WPA-4 Way Handshake 05:45
    • 332: Personal Enterprise 03:16
    • 333: Wireshark WEP and WPA 01:10
    • 334: Wifi Protected Setup 03:49
    • 335: Wireless Reconnaissance Bettercap 03:34
    • 336: Quiz 01:00
    • 337: AUTHENTICATION and ACCESS CONTROL 01:02
    • 338: Filtering 02:13
    • 339: Access Control Lists 03:44
    • 340: Tunneling 01:30
    • 341: Virtual Private Network (VPN) 03:21
    • 342: Secure Sockets Layer (SSL) 01:50
    • 343: Secure Sockets Layer Virtual Private Network (SSL VPN) 00:53
    • 344: Datagram Transport Layer Security (DTLS) 00:32
    • 345: Layer 2 Tunneling Protocol (L2TP) 00:43
    • 346: Point-to-Point Tunneling Protocol (PPTP) 00:36
    • 347: Generic Routing Encapsulation (GRE) 01:35
    • 348: IPsec 01:39
    • 349: ENCRYPTION 02:28
    • 350: Symmetric Encryption Algorithms 02:56
    • 351: Asymmetric Key Algorithms 02:07
    • 352: DH (Diffie-Helman) 01:08
    • 353: RSA (Rivest-Shamir-Adleman) 00:35
    • 354: Remote Access-RDP 02:18
    • 355: Remote Access-PPP - PPPoE 01:07
    • 356: Remote Access-SSH 00:42
    • 357: Remote Access-VNS 01:07
    • 358: User Accounts and Password Security 02:40
    • 359: Password Management 03:27
    • 360: Single Sign - On 01:43
    • 361: Local Authentication 00:43
    • 362: LDAP (Lightweight Directory Access Protocol) 01:32
    • 363: Authentication Methods 08:49
    • 364: Multi-Factor Authentication 01:01
    • 365: AAA 03:52
    • 366: Dos and DDos 02:56
    • 367: ARP Spoofing 03:40
    • 368: DNS Spoofing 00:55
    • 369: Ransomware 00:34
    • 370: Brute Force 04:35
    • 371: Session Fixation 05:37
    • 372: VLAN Hopping 02:04
    • 373: VLAN Hopping: Switch Spoofing 01:39
    • 374: VLAN Hopping: Double Tagging 03:17
    • 375: Malware Types 01:45
    • 376: War Driving 06:45
    • 377: Evil Twin 06:42
    • 378: Packet Sniffers 06:22
    • 379: Port Scanners 03:34
    • 380: Man-in-the-Middle Attacks 01:47
    • 381: Social Engineering Terms 05:19
    • 382: Social Engineering Terminologies 06:08
    • 383: Social Engineering Toolkit 06:33
    • 384: Quiz 01:00
    • 385: What is Virtualization 01:06
    • 386: Types of Virtualization 01:36
    • 387: Functions of Virtualization 01:06
    • 388: Security of the Virtualization 03:04
    • 389: Virtualization Lab Exercise - 1 08:20
    • 390: Virtualization Lab Exercise - 2 12:35
    • 391: Characteristics of Cloud Computing 09:19
    • 392: What is Cloud Computing 03:31
    • 393: Cloud Service Modules - 1 07:31
    • 394: Cloud Service Modules - 2 06:26
    • 395: Network Attached Storage (NAS) 01:40
    • 396: What is Cloud Security 03:33
    • 397: How does cloud security work 03:19
    • 398: What makes cloud security different 03:24
    • 399: Why is cloud security important 02:26
    • 400: Cloud Security Benefits-Disadvantages 07:14
    • 401: What is SNMP 05:44
    • 402: Finding Community Names Using NMAP Scripts 03:06
    • 403: Write Access Check Using SNMP-Check Tool 02:18
    • 404: SNMP Protocol Security 04:07
    • 405: Network Troubleshooting Methodology 01:53
    • 406: Standart Copper Cables 14:46
    • 407: Fiber Cable 25:25
    • 408: Quiz 04:00
    • 409: Wireless Network Issues 07:48
    • 410: Wireless Transmission 10:10
    • 411: Wireless Network Cisco Packet Tracer Example 13:13
    • 412: Quiz 02:00
    • 413: ICMP Cisco Packet Tracer Example 06:16
    • 414: ICMP Wireshark Example 02:34
    • 415: Tracert Wireshark Example 08:36
    • 416: IPv6 Ping and Tracert Cisco Packet Tracer Example 02:59
    • 417: Nslookup Windows-Linux Example 06:16
    • 418: dig Linux Example 02:03
    • 419: Netstat Windows-Linux Example 07:10
    • 420: ipconfig Cisco Packet Tracer Example 05:03
    • 421: RIP Dynamic Routing Cisco Packet Tracer Commands Example 13:51
    • 422: OSPF Dynamic Routing Cisco Packet Tracer Commands Example 16:16
    • 423: iperf Windows Example 01:13
    • 424: Quiz 03:00
    • 425: Traceroute 09:50
    • 426: ARP Mechanism, ARP Tables, ARP Packets 06:10
    • 427: ARP Hand-On Practices 03:15
    • 428: ARP Cisco Packet Tracer Example 16:06
    • 429: DHCP Server Cisco Packet Tracer Example 07:58
    • 430: DHCP Server Wireshark Example 06:24
    • 431: DNS Cisco Packet Tracer Example 28:39
    • 432: DNS Wireshark Windows Example 04:48
    • 433: VLAN Cisco Packet Tracer Example 09:26
    • 434: VLAN Trunk Cisco Packet Tracer Example 10:53
    • 435: Broadcast 07:52
    • 436: STP Spanning Tree Protocol Cisco Packet Tracer Example 11:56
    • 437: Port Security Cisco Packet Tracer Example 06:14
    • 438: Firewall 01:14
    • 439: Proxyservice 00:19
    • 440: Tcpdump 05:23
    • 441: TCPDump in Action 08:58
    • 442: What Is Nmap 04:14
    • 443: Nmap First Scan 04:47
    • 444: Interpretation of Nmap 02:04
    • 445: Scanning Specific IPs or Specific Targets With Nmap 01:40
    • 446: Scanning Top 20, Top 100 Ports With Nmap 04:43
    • 447: Nmap Integration and Port Scanning 06:17
    • 448: Quiz 03:00
    • 449: Introduction to security+ 11:34
    • 450: What is Security? 02:22
    • 451: Privacy-Integrity-Availability 03:15
    • 452: Encryption and Access Control 02:54
    • 453: 3 A Rule (Authentication, Authorization and Accounting) 03:52
    • 454: Threat 03:45
    • 455: What is a Hacker? 06:31
    • 456: What is Attack? What are the Stages? 03:19
    • 457: Single Point Of Failure (SPOF) 03:12
    • 458: Introducing Basic Risk Concepts 03:22
    • 459: Quiz 04:00
    • 460: What is Identity Management? 02:14
    • 461: KERBEROS & NTLM&LDAP 07:31
    • 462: Single Sign-On (SSO) 10:54
    • 463: Smart Cards 02:56
    • 464: Tokens or Key Fobs 05:20
    • 465: Biometric Methods 07:36
    • 466: Dual-Factor and Multifactor Authentication 01:37
    • 467: PAP / CHAP / MS-CHAP 02:48
    • 468: RADIUS 06:26
    • 469: Quiz 04:00
    • 470: Create a User in comptia 03:03
    • 471: Managing Accounts - 1 11:42
    • 472: Managing Accounts - 2 09:21
    • 473: Passwords 09:18
    • 474: Password Policy 09:02
    • 475: Quiz 04:00
    • 476: Comparing Access Control Models 02:18
    • 477: Role-Based Access Control 03:15
    • 478: Establishing Access with Group-Based Privileges 04:42
    • 479: Rule Based and Discretionary Access Control 05:39
    • 480: Mandatory Access Control 02:46
    • 481: Establishing Access 06:06
    • 482: Quiz 02:00
    • 483: What is Virtualization? 03:46
    • 484: Virtualization Technologies 02:55
    • 485: Benefits of Virtualization 04:58
    • 486: Security Issues of Virtualization 03:49
    • 487: Quiz 05:00
    • 488: Basic Network Concepts 15:38
    • 489: Domain Name Services(DNS) 09:47
    • 490: What is the port? How does it work? 05:10
    • 491: What is the Network Address 07:05
    • 492: Combining the IP Address and the Port 04:37
    • 493: Switches 05:03
    • 494: Bridge 03:07
    • 495: Routers 09:29
    • 496: Understanding NAT and PAT 02:37
    • 497: Network Separation 03:15
    • 498: Proxy Servers 07:11
    • 499: Types of Using Network Technologies-1 09:12
    • 500: Types of Using Network Technologies-2 08:26
    • 501: Quiz 04:00
    • 502: Reviewing Basic Wireless Network Information 06:29
    • 503: Wireless Cryptographic Protocols 07:37
    • 504: Authentication Protocols for Wireless Networks 06:23
    • 505: Quiz 02:00
    • 506: Firewalls 09:28
    • 507: Network Access Control 09:29
    • 508: Implementing a Secure Network 05:15
    • 509: Quiz 04:00
    • 510: Understanding IDSs and IPSs 04:42
    • 511: Detection Methods 11:49
    • 512: Honeypots 04:42
    • 513: Quiz 03:00
    • 514: Using VPNs for Remote Access 03:52
    • 515: VPN Tunnel Protocols 06:18
    • 516: Site-to-Site VPNs 02:36
    • 517: Quiz 03:00
    • 518: Understanding Threat Actors 12:36
    • 519: Viruses 02:09
    • 520: Logic Bombs 03:18
    • 521: Trojans 05:29
    • 522: Ransomware 03:23
    • 523: Spyware 03:03
    • 524: Bots and Botnets 04:17
    • 525: Unified Threat Management(UTM) 05:55
    • 526: Quiz 02:00
    • 527: Disable SSID Broadcasting or Not 01:26
    • 528: Enable MAC Filtering 01:53
    • 529: Quiz 03:00
    • 530: Disassociation Attacks 01:58
    • 531: WPS and WPS Attacks 01:52
    • 532: Rogue AP 02:14
    • 533: Evil Twin 02:08
    • 534: Jamming Attacks 03:47
    • 535: Bluetooth Attacks 02:52
    • 536: RFID Attacks 02:40
    • 537: Wireless Replay Attacks 01:49
    • 538: Quiz 05:00
    • 539: Network Attacks 03:39
    • 540: SYN Flood Attack 02:55
    • 541: MAC Flood Attacks 02:52
    • 542: Man-in-the-Middle Attacks 01:34
    • 543: ARP Poisoning Attacks 03:52
    • 544: DNS Attacks 06:13
    • 545: Quiz 06:00
    • 546: Brute Force Attacks 03:32
    • 547: Password Hashes 04:54
    • 548: Birthday Attacks 04:46
    • 549: Replay Attacks 03:18
    • 550: Hijacking and Related Attacks 05:59
    • 551: Driver Manipulation 02:07
    • 552: Quiz 04:00
    • 553: Zero-Day Attacks 04:18
    • 554: Quiz 03:00
    • 555: Code Reuse and SDKs 04:28
    • 556: Code Quality and Testing 02:49
    • 557: Development Life-Cycle Models 03:41
    • 558: Secure DevOps 03:21
    • 559: Version Control and Change Management 02:18
    • 560: Provisioning and Deprovisioning 01:50
    • 561: Quiz 05:00
    • 562: Web Servers 02:07
    • 563: SQL Injection Attacks 04:31
    • 564: Protecting Against SQL Injection Attacks 02:39
    • 565: DLL Injection 02:25
    • 566: Cross-Site Scripting 06:43
    • 567: Quiz 02:00
    • 568: Social Engineering 04:08
    • 569: Shoulder Surfing 01:08
    • 570: Tricking Users with Hoaxes 01:19
    • 571: Tailgating and Mantraps 01:12
    • 572: Dumpster Diving 01:30
    • 573: Watering Hole Attacks 01:06
    • 574: Spam 02:04
    • 575: Phishing 06:25
    • 576: Whaling 02:45
    • 577: Vishing 02:58
    • 578: Quiz 02:00
    • 579: Buffer Overflow Attacks 04:10
    • 580: Pointer Dereference 02:09
    • 581: Compiled Versus Runtime Code 01:23
    • 582: Proper Input Validation 04:09
    • 583: Side Input Validation 03:20
    • 584: Avoiding Race Conditions 02:15
    • 585: Proper Error Handling 02:13
    • 586: Cryptographic Techniques 01:42
    • 587: Quiz 05:00
    • 588: Protecting Systems from Malware 02:06
    • 589: Antivirus and Anti-Malware Software 08:19
    • 590: Advanced Malware Tools 03:33
    • 591: Educating Users 01:53
    • 592: Quiz 04:00
    • 593: Implementing Secure Systems 04:13
    • 594: Operating systems 04:09
    • 595: Secure Operating System Configurations 06:24
    • 596: Resiliency and Automation Strategies 04:58
    • 597: Change Management Policy 07:03
    • 598: Secure Staging and Deployment 05:23
    • 599: Peripherals 04:08
    • 600: EMI and EMP 07:41
    • 601: Hardware Security Module 02:27
    • 602: Cloud Deployment Models 05:23
    • 603: Cloud Services 06:07
    • 604: Security Responsibilities with Cloud Models 01:50
    • 605: Advanced Cloud Services 04:52
    • 606: Quiz 03:00
    • 607: Deploying Mobile Devices Securely 02:11
    • 608: Deployment Models 08:31
    • 609: Mobile Device Management 09:21
    • 610: Hardware Control 02:37
    • 611: Unauthorized Connections 02:32
    • 612: Quiz 05:00
    • 613: Protecting Data 11:25
    • 614: Data Loss Prevention 05:31
    • 615: Quiz 03:00
    • 616: Database Concepts 02:45
    • 617: Normalization 05:26
    • 618: SQL Queries 01:55
    • 619: Database Security 00:59
    • 620: Quiz 03:00
    • 621: Understanding Risk Management 02:39
    • 622: Risk Management 02:45
    • 623: Threats and Threat Assessments 04:22
    • 624: Vulnerabilities 02:03
    • 625: Risk Assessment 13:06
    • 626: Risk Registers 05:51
    • 627: Quiz 03:00
    • 628: Finding and Evaluating Cloud Vendors 14:11
    • 629: Job Notification 03:28
    • 630: Conducting Evaluations 04:10
    • 631: Negotiating Contracts and Billing 09:49
    • 632: Professional Services 03:56
    • 633: Chargebacks 12:41
    • 634: Laws, Regulations And Safety Standards 03:19
    • 635: Key Stakeholders 02:45
    • 636: Using Baselines 03:09
    • 637: Conducting Feasibility Study 02:19
    • 638: Making GAP Analysis 02:50
    • 639: Using Reporting 01:30
    • 640: Understanding Benchmarks 03:38
    • 641: Checking for Vulnerabilities 01:52
    • 642: Password Crackers 01:58
    • 643: Network Scanners 05:23
    • 644: Wireless Scanners / Cracker 03:17
    • 645: Banner Grabbing 00:47
    • 646: Vulnerability Scanning 11:23
    • 647: Quiz 03:00
    • 648: Penetration Tests 02:45
    • 649: Passive & Active Reconnaissance 01:59
    • 650: Initial Exploitation 03:45
    • 651: White, Gray and Black Box Testing 02:55
    • 652: Intrusive and Non-Intrusive Testing 01:22
    • 653: Passive Versus Active Tools 11:40
    • 654: Quiz 03:00
    • 655: Comparing Physical Security Controls 03:28
    • 656: Comparing Door Lock Types 05:31
    • 657: Preventing Tailgating with Mantraps 02:00
    • 658: Increasing Physical Security with Guards 08:20
    • 659: Using Hardware Locks 02:56
    • 660: Asset Management 02:33
    • 661: Implementing Environmental Controls 14:02
    • 662: Quiz 02:00
    • 663: Single Point of Failure 01:46
    • 664: Disk Redundancies 04:24
    • 665: Server Redundancy and High Availability 09:11
    • 666: Backup 15:12
    • 667: Quiz 04:00
    • 668: Comparing Business Continuity Elements 06:09
    • 669: Impact 03:49
    • 670: Recovery Time Objective 04:55
    • 671: Recovery Sites 05:53
    • 672: Disaster Recovery 08:10
    • 673: Quiz 04:00
    • 674: Monitoring Logs for Event Anomalies 08:43
    • 675: OtherLogs-SIEM 07:12
    • 676: Continuous Monitoring 06:05
    • 677: Quiz 03:00
    • 678: Understanding Control Types 07:12
    • 679: Control Goals 10:49
    • 680: Quiz 02:00
    • 681: Introducing Cryptography Concepts 03:05
    • 682: Hashing 04:38
    • 683: MD5 00:53
    • 684: SHA 02:54
    • 685: HMAC 02:45
    • 686: Hashing Files 02:56
    • 687: Digital Signatures, Certificates and Non-repudiation 02:54
    • 688: Providing Confidentiality with Encryption 08:14
    • 689: Block Versus Stream Ciphers 04:10
    • 690: Symmetric Encryption 01:55
    • 691: Symmetric Encryption Methods 06:15
    • 692: Asymmetric Encryption 01:57
    • 693: Certificates 03:57
    • 694: Steganography And Obfuscation 02:41
    • 695: Using Cryptographic Protocols 01:47
    • 696: Cipher Suites 03:34
    • 697: Exploring PKI Components 08:03
    • 698: Comparing Certificate Types 04:37
    • 699: Quiz 02:00
    • 700: 223 - HTTPS Transport Encryption.mp4 adli dosyanin kopyasi 05:14
    • 701: Quiz 02:00
    • 702: Exploring Security Policies 01:12
    • 703: Personnel Management Policies 10:41
    • 704: Background Check 02:50
    • 705: NDA 04:40
    • 706: Policy Violations and Adverse Actions 01:37
    • 707: Agreement Types 03:00
    • 708: PII and PHI 05:13
    • 709: Responding to Incidents 02:32
    • 710: Providing Training 05:32
    • 711: Troubleshooting Personnel Issues 02:26
    • 712: Incident Response-Education 06:39
    • 713: Quiz 03:00

Course media

Description

Hello there,

Welcome to the “Security+ | CompTIA Security Plus SY0-701 Certification Prep” course.
CompTIA Security Plus | Embrace the latest Cybersecurity trends, pass CompTIA security+ exam & get a cyber security job

Every internet-connected person is affected by issues pertaining to cybersecurity. As a result, cybersecurity professionals are increasingly in-demand. That’s why OAK Academy offers top-rated CompTIA Security+exam prep courses to help you prepare for the job market.

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

Comptia Security+ validates certified professionals have the skills required to recommend and implement security solutions.

Join thousands of learners in preparing for the CompTIA Security+ certification with real-world cybersecurity at OAK Academy. You’ll get step-by-step video tutorials along with hands-on exercises and practice tests that mirror real-world problems you’ll encounter in a typical IT security job.

This course walks you through all the things you need to pass the CompTIA Security + (SY0-601) exam, step by step.

You can pass the CompTIA Security + exam by studying the topics covered throughout the course.

By the way, you don't need to know anything about CompTIA security +.

We will tell you all the things you need to pass the comtia security plus (SY0-701) exam.

Our course consists of 11 basic parts.

However, in order to better understand the topics, these basic topics are divided into parts and explained in 39 small chapters in CompTIA Security+ (SY0-701).

Each of the sections is important on its own. It also relates to other departments.

As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects. cybersecurity, comptia security plus, security+, comptia, cyber security, comptia security, security plus, security +, comptia security+

For example, the subject of encryption is mentioned in many places.

Although the basic meaning is the same, usage types can gain different meanings on different platforms.

The narration of the topics is brief and for the exam.

If you wish, you can improve yourself by using the topics covered in the lessons.

Because at the end of the course, you will see all the topics used in the field of Security.

All you have to do is search the subject on the internet and continue learning in comptia security.

During the course, sample questions were given at the end of each section in comptia.

These questions are generally similar to questions that were previously found in the CompTIA Security + exam.

There is no such thing as the same question will always appear in the exam in CompTIA.

However, the questions to be asked on a certain subject are also close to each other in comtia.

This course is for Comptia Security + (SY0-701).

CompTIA updates its exams every 3 years.

Comptia Security+ SY0-601 exam has been updated to CompTIA Security+ (SY0-701) in November 2023

The new CompTIA Security+ (SY0-701) addresses the latest cybersecurity trends and techniques – covering the most core technical skills in risk assessment and management, incident response, forensics, enterprise networks, hybrid/cloud operations and security controls, ensuring high performance on the job. These skills include:

  • Assessing the security posture of an enterprise environment and recommend and implement appropriate security solutions.

  • Monitoring and securing hybrid environments, including cloud, mobile, Internet of Things (IoT) and operational technology (OT).

  • Operating with an awareness of applicable regulations and policies, including principles of governance, risk and compliance.

  • Identifying, analyzing and responding to security events and incidents.

And 20% of exam objectives were updated to include:

  • Current trends: The latest trends in threats, attacks, vulnerabilities, automation, zero trust, risk, IoT, OT and cloud environments are emphasized, as well as communication, reporting and teamwork.

  • Hybrid environments: The latest techniques for cybersecurity professionals working in hybrid environments that are located in the cloud and on premises; cybersecurity professionals should be familiar with both worlds.

Basically in CompTIA Security + (SY0-701) exam;

1. General Security Concepts (12%)

2. Threats, Vulnerabilities and Mitigations (22%)

3. Security Architecture (18%)

4. Security Operations (28%)

5. Security Program Management and Oversight (20%)

Questions are asked from the fields. Throughout the course, topics related to these areas are explained.

In this course you will learn;

  • Passing the CompTIA Security+ certification exam with confidence

  • Understand computer security, its functions, and its components

  • Performing basic security configurations

  • Become an effective security technician in a business environment

  • Network topologies

  • Threat analysis

Jobs You Can Land With CompTIA Security+ :

  • Security Architect

  • Web App Penetration

  • Network Security Analyst

  • Penetration Tester

  • Network Security Operations

  • Cloud Penetration Tester

No prior knowledge is needed!

Open the Door to Your Cybersecurity Career with CompTIA Security+

Whats is Comptia Security+?

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career. CompTIA Security+ is the first security certification IT professionals should earn.

Is CompTIA Security+ Worth It?

Security+ is an ideal certification if your goal is to break into cyber security. The knowledge and skills in Security+ apply across most elements of the cyber security industry, including offensive/defensive/management, so it's important to consider your career goals when deciding whether to get Security+ certified.

Why would you want to take this course?

Our answer is simple: The quality of teaching.

When you enroll, you will feel the OAK Academy's seasoned instructors' expertise.

OAK Academy based in London is an online education company. OAK Academy gives education in the field of IT, Software, Design, development in English, Portuguese, Spanish, Turkish and a lot of different language on Reed platform where it has over 1000 hours of video education lessons. OAK Academy both increase its education series number by publishing new courses, and it makes students aware of all the innovations of already published courses by upgrading.

When you enroll, you will feel the OAK Academy`s seasoned developers expertise. Questions sent by students to our instructors are answered by our instructors within 48 hours at the latest.

Fresh Content

It’s no secret how technology is advancing at a rapid rate and it’s crucial to stay on top of the latest knowledge. With this course, you will always have a chance to follow the latest data science trends.

Video and Audio Production Quality

All our videos are created/produced as high-quality video and audio to provide you the best learning experience.

Dive in now into the “Security+ | CompTIA Security Plus SY0-701 Certification Prep” course.
CompTIA Security Plus | Embrace the latest Cybersecurity trends, pass CompTIA security+ exam & get a cyber security job

We offer full support, answering any questions.

See you in the course!

Who is this course for?

Those who want to get CompTIA Security + certificate

Anyone interested in cyber security

Those who have a career goal in the field of cyber security

Those who have a basic knowledge of security and want to take it to higher levels

Those who want to step into the world of cybersecurity

Junior Security elements

Requirements

Desire to get CompTIA Security + certification

Watching the lecture videos completely, to the end and in order.

Internet Connection

Any device you can watch the course, such as a mobile phone, computer or tablet

Determination and patience to learn

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.