![](https://resources.reed.co.uk/courses/coursemedia/464310/7ea30839-cd0f-4c90-9fe7-69f5a017d775_cover.webp)
Complete CompTIA Bundle
Comptia ITF+(FC0-U61) | CompTIA A+ 220-1101 - 1102 |Comptia Network Plus (N10-008) | Comptia Security+ (701)
Oak Academy
Summary
- Reed Courses Certificate of Completion - Free
- Tutor is available to students
Add to basket or enquire
Overview
Hello there,
Welcome to the “Security+ | CompTIA Security Plus SY0-701 Certification Prep” course.
CompTIA Security Plus | Embrace the latest Cybersecurity trends, pass CompTIA security+ exam & get a cyber security job
Every internet-connected person is affected by issues pertaining to cybersecurity. As a result, cybersecurity professionals are increasingly in-demand. That’s why OAK Academy offers top-rated CompTIA Security+exam prep courses to help you prepare for the job market.
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
Comptia Security+ validates certified professionals have the skills required to recommend and implement security solutions.
Join thousands of learners in preparing for the CompTIA Security+ certification with real-world cybersecurity at OAK Academy. You’ll get step-by-step video tutorials along with hands-on exercises and practice tests that mirror real-world problems you’ll encounter in a typical IT security job.
This course walks you through all the things you need to pass the CompTIA Security + (SY0-601) exam, step by step.
You can pass the CompTIA Security + exam by studying the topics covered throughout the course.
By the way, you don't need to know anything about CompTIA security +.
We will tell you all the things you need to pass the comtia security plus (SY0-701) exam.
Our course consists of 11 basic parts.
However, in order to better understand the topics, these basic topics are divided into parts and explained in 39 small chapters in CompTIA Security+ (SY0-701).
Each of the sections is important on its own. It also relates to other departments.
As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects. cybersecurity, comptia security plus, security+, comptia, cyber security, comptia security, security plus, security +, comptia security+
Certificates
Reed Courses Certificate of Completion
Digital certificate - Included
Will be downloadable when all lectures have been completed.
Curriculum
-
Introduction to IT Fundamentals 07:50
- 1: History of Computer 01:40
- 2: FAQ about IT Fundamentals 02:00
- 3: What is Computer 01:26
- 4: Benefits of Using Computer_1 00:37
- 5: Types of Computer 01:07
- 6: Quiz 01:00
-
Components of Computer 18:11
- 7: Input Processing - Output Cycle 06:14
- 8: Computer Inputs 00:57
- 9: What is Processing 01:18
- 10: Cyber Attacks to CPU 01:04
- 11: What is Storing 00:53
- 12: Output 01:23
- 13: Computer Components 02:54
- 14: Input Devices 02:28
- 15: Quiz 01:00
-
Storage Devices 15:52
- 16: Primary and Secondary Memory 04:20
- 17: RAM 01:18
- 18: SRAM and DRAM 01:28
- 19: ROM 01:12
- 20: PROM, EPROM, EEPROM 01:04
- 21: Storage Devices 02:19
- 22: Network Attached Storage 01:40
- 23: Cloud Storage 01:31
- 24: Quiz 01:00
-
Processing Devices 08:37
- 25: Processing Devices 02:59
- 26: GPU 02:46
- 27: Motherboard 01:14
- 28: Output Devices 00:38
- 29: Quiz 01:00
-
IoT & Mobile 30:07
- 30: What is IoT 03:28
- 31: Where does IoT Exist in Our Lives 01:47
- 32: How Does IOT Work 00:47
- 33: Connection Standarts 09:06
- 34: IOT Security 06:59
- 35: Mobile Security Threats 08:00
-
Network Components 26:27
- 36: Network Interface Card 02:06
- 37: What is Hub 01:22
- 38: What is Switch 01:46
- 39: How does switch work 02:21
- 40: What is Router 01:33
- 41: What is Bridge 02:25
- 42: Modem Types 02:59
- 43: Wireless Access Point (WAP) 01:06
- 44: Firewall and Network Components 07:49
- 45: Quiz 03:00
-
Operating Systems 38:34
- 46: What is Operating System 02:35
- 47: Functions Of Operating Systems 10:25
- 48: Kinds of Operating System 01:47
- 49: Server Operating Systems 07:53
- 50: Classification of Operating Systems 02:01
- 51: Linux Systems 05:12
- 52: Windows and MacOS 03:28
- 53: Virtualbox Virtualization Software 03:13
- 54: Quiz 02:00
-
Libraries and Virtualization 37:40
- 55: What is a Library - 1 04:40
- 56: What is Virtualization 01:06
- 57: Types of Virtualization 01:37
- 58: Functions of Virtualization 01:06
- 59: Security of the Virtualization 03:01
- 60: Virtualization Lab Exercise - 1 08:14
- 61: Virtualization Lab Exercise - 2 12:35
- 62: What is a Library - 2 04:21
- 63: Quiz 01:00
-
Programming Languages 14:13
- 64: Programming Languages 04:54
- 65: Types of Programming 09:19
-
Introduction to CompTIA A+(220-1101) Complete Course & Lab 04:01
- 66: CompTIA A+ Course Introduction 01:06
- 67: What is the CompTIA A+ 01:24
- 68: How Can We Get CompTIA A+ 01:31
-
Processing Devices in Comptia A+ 35:37
- 69: CPUs 18:38
- 70: GPU 02:46
- 71: Motherboard 01:14
- 72: Network Interface Cards (NICs) 10:21
- 73: Output Devices 00:38
- 74: Quiz 02:00
-
Output Devices in Comptia A+ 220-1001 16:22
- 75: What is Monitor 03:39
- 76: What is Printer 01:59
- 77: What are Headphones 03:15
- 78: What is Computer Speaker 01:48
- 79: What is Projector 01:13
- 80: What is GPS 02:28
- 81: Quiz 02:00
-
Cables 39:04
- 82: Ethernet 02:01
- 83: VGA 02:03
- 84: Fiber Optic Cables 25:25
- 85: HDMI 01:31
- 86: DisplayPort 01:50
- 87: DVI 01:32
- 88: SATA cables 01:21
- 89: USB 02:21
- 90: Quiz 01:00
-
Network Fundamentals in Comptia A+ 2:59:34
- 91: What is a Network 05:33
- 92: Network Architecture 02:41
- 93: Physical Network Topologies 04:54
- 94: OSI Reference Model 10:45
- 95: Network Components 00:39
- 96: Physical Media - Coaxial - Twisted Pair - Fiber Optic Cable 04:09
- 97: Network Devices 00:20
- 98: Basic Terms of Networking 05:36
- 99: Reference Model 00:24
- 100: TCP/IP (Networking) Basics 13:43
- 101: OSI Reference Model vs. TCP/IP Reference Model 02:32
- 102: Network Layers in Real World 08:03
- 103: Layer 2 - Data Link Layer 03:50
- 104: Layer 2: Ethernet - Principles, Frames & Headers 04:06
- 105: Layer 2: ARP - Address Resolution Protocol 06:10
- 106: Layer 2: Analysing ARP Packets 03:14
- 107: Layer 2: VLANs (Virtual Local Area Networks) 04:03
- 108: Layer 2: WLANs (Wireless Local Area Networks) 07:01
- 109: Layer 3 - Network Layer 01:36
- 110: Layer 3: IP (Internet Protocol) 02:49
- 111: Layer 3: IPv4 Addressing System 01:55
- 112: Layer 3: IPv4 Packet Header 02:56
- 113: Layer 3: Subnetting - Classful Networks 02:35
- 114: Layer 3: Subnetting Masks 02:58
- 115: Layer 3: Understanding IPv4 Subnets 03:09
- 116: Layer 3: IPv4 Address Shortage 01:41
- 117: Layer 3: Private Networks 03:59
- 118: Layer 3: Private Networks - Demonstration 03:01
- 119: Layer 3: NAT (Network Address Translation) 04:30
- 120: Layer 3: IPv6, Packet Header & Addressing 08:30
- 121: Layer 3: DHCP - How the Mechanism Works 09:23
- 122: Layer 3: ICMP (Internet Control Message Protocol) 02:02
- 123: Layer 3: Traceroute 09:50
- 124: Layer 4 - Transport Layer 02:39
- 125: Layer 4: TCP (Transmission Control Protocol) 06:59
- 126: Layer 4: TCP Header 02:27
- 127: Layer 4: UDP (User Datagram Protocol) 03:56
- 128: Layer 5-7 - Application Layer 00:55
- 129: Layer 7: DNS (Domain Name System) 05:56
- 130: Layer 7: HTTP (Hyper Text Transfer Protocol) 03:09
- 131: Layer 7: HTTPS 01:56
- 132: Quiz 03:00
-
Wi-fi Network Fundamentals 42:12
- 133: IEEE-802.11 03:54
- 134: Basic Terminologies and Concepts 04:50
- 135: Wireless Operating Modes 06:11
- 136: MAC Frame Structure 02:58
- 137: Wireless Packet Types 05:21
- 138: Wireless Encryption Protocols: WEP vs. WPA 03:58
- 139: WPA 4-Way Handshake 05:45
- 140: WPA2 Personal and Enterprise 03:16
- 141: Wireshark: WEP and WPA 01:10
- 142: Wi-Fi Protected Setup (WPS) 03:49
- 143: Quiz 01:00
-
Operating Systems in CompTIA A+220-1102 49:03
- 144: Functions Of Operating Systems 10:25
- 145: Kinds of Operating System 01:47
- 146: VPNs 14:11
- 147: 32-Bit vs. 64-Bit File Systems 03:24
- 148: FAT32 01:33
- 149: FAT64 02:21
- 150: Windows 02:17
- 151: Apple Macintosh OS 01:52
- 152: Linux Systems 05:12
- 153: Android 01:25
- 154: iOS 01:23
- 155: Chrome OS 01:13
- 156: Quiz 02:00
-
Linux Fundamentals 49:43
- 157: What is Linux? 01:35
- 158: Distributions 01:22
- 159: Pieces of Linux 02:56
- 160: Shell 02:04
- 161: Linux Signs: $, #, %, ~ 00:58
- 162: Linux Desktop Environments 01:52
- 163: Linux File Hierarchy 02:56
- 164: Configuring Services 03:42
- 165: User Management 02:37
- 166: Package Management Concepts 03:25
- 167: Foremost Linux Package Managers 02:30
- 168: Repository (a.k.a. Repo) 00:49
- 169: “apt-get” Package Manager 06:08
- 170: Debian packages "dpkg" 02:26
- 171: Install from Source Code 04:35
- 172: System Monitoring 06:59
- 173: Status of Network 01:49
- 174: Quiz 01:00
-
Windows Fundamentals in CompTIA A+ Certification 20:08
- 175: Introduction to Users and Groups 02:47
- 176: Managing Users and Groups 01:21
- 177: NTFS Permissions 01:54
- 178: File Explorer 01:24
- 179: MSCONFIG 02:05
- 180: Services (Services.msc) 01:30
- 181: Performance Monitor 01:56
- 182: Task Manager 02:58
- 183: Disk Management 01:50
- 184: MSTSC 01:23
- 185: Quiz 01:00
-
Hardware and Network Troubleshooting in Comptia A+ 220-1101 19:49
- 186: Troubleshooting Methodology 03:24
- 187: System Lockups 02:52
- 188: Troubleshooting Internet Connections 03:33
- 189: Check the Wi-Fi Settings 01:11
- 190: Who Else Is Using the Internet? 01:32
- 191: BIOS Time and Setting Resets 02:53
- 192: Attempts to Boot to Incorrect Device 02:24
- 193: Quiz 02:00
-
Software Troubleshooting in Comptia A+ Certification 12:02
- 194: Slow System Performance 01:56
- 195: Common Symptoms of Malware Infections 02:42
- 196: macOS Boot Errors 01:53
- 197: Windows Boot Errors 02:22
- 198: Linux Boot Errors 02:09
- 199: Quiz 01:00
-
Database Fundamentals 35:08
- 200: What is database 03:19
- 201: RDBMS(Relational Database Management System) 02:24
- 202: What is SQL/Query? 02:47
- 203: Install MS SQL Server Express Edition 2019 04:35
- 204: Insert Data to Table 10:06
- 205: Update Data in A Table 05:41
- 206: Delete Data and AdventureWorks 06:16
-
Cloud Computing 39:19
- 207: Cloud Service Models-1 01:52
- 208: Cloud Service Models-2 03:25
- 209: Cloud Characteristics and Terms 06:23
- 210: Cloud Deployment Models and Services 11:29
- 211: Storage Types and Technologies 06:41
- 212: Storage Technologies 09:29
-
Security in Comptia A+ 4:22:28
- 213: What is Security 02:22
- 214: Privacy-Integrity-Availability 03:15
- 215: A Rule (Authentication, Authorization and Accounting) 03:52
- 216: What is a Hacker 06:27
- 217: What is Attack? What are the Stages? 03:19
- 218: Terms: Asset, Threat, Vulnerability, Risk, Exploit 03:08
- 219: What are Bot/Botnet and Zombies? 01:45
- 220: What are DoS and DDoS Attacks? 02:56
- 221: Malware Types 01:44
- 222: Who Needs Data Security? 09:42
- 223: Protecting Data at Rest vs Data in Motion 08:17
- 224: Types of Encryption for in Motion, in Use, at Rest Data 11:00
- 225: Data Retention 09:11
- 226: Data Access Control 19:23
- 227: Controlling Access to the Property 11:42
- 228: Securing the Building 04:33
- 229: Fire Suppression 04:37
- 230: Access Control Models and Methods 13:53
- 231: File and Folder Permissions 12:21
- 232: Cloud Accounting 17:34
- 233: Multi-Factor Authentication (MFA) 07:49
- 234: Types of Backups 12:20
- 235: Backup Media and Cycle 08:25
- 236: High Availability (HA) 14:29
- 237: Disaster Recovery (DR) 17:49
- 238: Hardware Hardening 06:13
- 239: Operating System (OS) Hardening 09:04
- 240: Application Hardening 08:15
- 241: Firewalls and IDS/IPS 08:20
- 242: Updating the OS 16:43
- 243: Quiz 02:00
-
Social Engineering 30:59
- 244: Shoulder Surfing 01:08
- 245: Tricking Users with Hoaxes 01:19
- 246: Tailgating and Mantraps 01:12
- 247: Dumpster Diving 01:30
- 248: Watering Hole Attacks 01:06
- 249: Whaling 02:45
- 250: Why Social Engineering Works 09:28
- 251: Password Crackers 01:59
- 252: Network Scanners 05:24
- 253: Wireless Scanners / Cracker 03:20
- 254: Banner Grabbing 00:48
- 255: qUIZ 01:00
-
Introduction to Network+ | Comptia Network Plus (N10-008) Certification Prep 03:13
- 256: Introduction to CompTIA Network 03:13
-
Networking Fundamentals 14:52
- 257: What is a network 05:33
- 258: PAN Personal Area Network 00:43
- 259: MAN Metropolitan Area Network 00:40
- 260: Network Architecture 02:41
- 261: Physical Network Topologies 04:54
- 262: Protocol T connections 00:21
-
The OSI Reference Model 10:45
- 263: OSI Reference Model 10:45
-
Network Components 12:55
- 264: Network Components 00:39
- 265: Physical Media - Coaxial - Twisted Pair - Fiber Optic Cable 04:09
- 266: UTP Cable Properties 04:52
- 267: Wiring Standards 03:15
-
Networking Devices in comptia network+ 20:35
- 268: Network Devices 00:20
- 269: Common Network Devices 08:02
- 270: Other Network Devices 03:04
- 271: IoT- Internet of Things 06:09
- 272: Quiz 03:00
-
TCP/IP in comptia network plus 2:39:18
- 273: Basic Terms of Networking 05:36
- 274: Reference Models 00:24
- 275: TCP - IP Basics - Layers and Protocols 09:26
- 276: OSI Reference Model vs. TCP - IP Reference Model 02:32
- 277: TCP - IP Basics - An Example DNS Query 05:19
- 278: Layer 2 - Data Link Layer 03:50
- 279: Layer 2: Ethernet - Principles, Frames & Headers 04:06
- 280: Layer 2: ARP - Address Resolution Protocol 06:10
- 281: ARP Wireshark Example 09:32
- 282: Layer 2: VLANs (Virtual Local Area Networks) 04:03
- 283: Layer 2: WLANs (Wireless Local Area Networks) 07:02
- 284: Network Layer and Protocols 01:36
- 285: Layer 3: IP (Internet Protocol) 02:49
- 286: Layer 3: IPv4 Addressing System 01:56
- 287: Layer 3: IPv4 Packet Header 02:56
- 288: Layer 3: Subnetting - Classful Networks 02:35
- 289: Layer 3: Subnetting Masks 02:59
- 290: Layer 3: Understanding IPv4 Subnets 03:09
- 291: Layer 3: IPv4 Address Shortage 01:41
- 292: Layer 3: Private Networks 03:59
- 293: Layer 3: Private Networks - Demonstration 03:01
- 294: Layer 3: NAT (Network Address Translation) 04:30
- 295: NAT Static Cisco Packet Tracer Example 09:21
- 296: Layer 3: IPv6, Packet Header & Addressing 08:30
- 297: IPv6 Address Types 10:41
- 298: Layer 3: DHCP - How the Mechanism Works 09:23
- 299: Layer 3: ICMP (Internet Control Message Protocol) 02:02
- 300: Transport Layer and Protocols 02:39
- 301: Layer 4: TCP (Transmission Control Protocol) 06:59
- 302: Layer 4: TCP Header 02:27
- 303: Layer 4: UDP (User Datagram Protocol) 03:56
- 304: Application Layer and Protocols 00:55
- 305: Layer 7: DNS (Domain Name System) 05:56
- 306: Layer 7: HTTP (Hyper Text Transfer Protocol) 03:09
- 307: Layer 7: HTTPS 01:56
- 308: Layer 7 : Telnet - SSH 02:13
-
Routing - Network Implementations 41:05
- 309: Routing 00:38
- 310: IP - Mac 01:01
- 311: Router’s Role 01:24
- 312: Routing Table 01:54
- 313: Static and Dynamic Route 03:34
- 314: Static Routing Cisco Packet Tracer Example 14:48
- 315: EIGRP Dynamic Routing Cisco Packet Tracer Example 14:16
- 316: RIP - OSPF - BGP 03:30
-
Switching and VLANs 10:26
- 317: Switching and VLANs 00:29
- 318: Networking Before Layer 2 Switching 01:16
- 319: Switching Services 01:21
- 320: Spanning Tree Protocol 01:54
- 321: VLANs (Virtual Local Area Networks) 04:03
- 322: VTP – VLAN Trunking Protocol 01:23
-
Wireless Technologies in CompTIA Network Plus 57:21
- 323: IEE-802.11 03:54
- 324: Basic Terminologies Concepts 04:50
- 325: Wireless Operating Modes 06:11
- 326: MAC Frame Structure 02:58
- 327: Wireless Packet Types 05:21
- 328: Wireshark Analysing Packet Types 06:32
- 329: Wifi Network Interaction 05:03
- 330: Wireless Encryption Protocols WEP-WPA 03:58
- 331: WPA-4 Way Handshake 05:45
- 332: Personal Enterprise 03:16
- 333: Wireshark WEP and WPA 01:10
- 334: Wifi Protected Setup 03:49
- 335: Wireless Reconnaissance Bettercap 03:34
- 336: Quiz 01:00
-
Network Security and Authentication | CompTIA Network+ 57:53
- 337: AUTHENTICATION and ACCESS CONTROL 01:02
- 338: Filtering 02:13
- 339: Access Control Lists 03:44
- 340: Tunneling 01:30
- 341: Virtual Private Network (VPN) 03:21
- 342: Secure Sockets Layer (SSL) 01:50
- 343: Secure Sockets Layer Virtual Private Network (SSL VPN) 00:53
- 344: Datagram Transport Layer Security (DTLS) 00:32
- 345: Layer 2 Tunneling Protocol (L2TP) 00:43
- 346: Point-to-Point Tunneling Protocol (PPTP) 00:36
- 347: Generic Routing Encapsulation (GRE) 01:35
- 348: IPsec 01:39
- 349: ENCRYPTION 02:28
- 350: Symmetric Encryption Algorithms 02:56
- 351: Asymmetric Key Algorithms 02:07
- 352: DH (Diffie-Helman) 01:08
- 353: RSA (Rivest-Shamir-Adleman) 00:35
- 354: Remote Access-RDP 02:18
- 355: Remote Access-PPP - PPPoE 01:07
- 356: Remote Access-SSH 00:42
- 357: Remote Access-VNS 01:07
- 358: User Accounts and Password Security 02:40
- 359: Password Management 03:27
- 360: Single Sign - On 01:43
- 361: Local Authentication 00:43
- 362: LDAP (Lightweight Directory Access Protocol) 01:32
- 363: Authentication Methods 08:49
- 364: Multi-Factor Authentication 01:01
- 365: AAA 03:52
-
Network Threats CompTIA Network + 1:11:12
- 366: Dos and DDos 02:56
- 367: ARP Spoofing 03:40
- 368: DNS Spoofing 00:55
- 369: Ransomware 00:34
- 370: Brute Force 04:35
- 371: Session Fixation 05:37
- 372: VLAN Hopping 02:04
- 373: VLAN Hopping: Switch Spoofing 01:39
- 374: VLAN Hopping: Double Tagging 03:17
- 375: Malware Types 01:45
- 376: War Driving 06:45
- 377: Evil Twin 06:42
- 378: Packet Sniffers 06:22
- 379: Port Scanners 03:34
- 380: Man-in-the-Middle Attacks 01:47
- 381: Social Engineering Terms 05:19
- 382: Social Engineering Terminologies 06:08
- 383: Social Engineering Toolkit 06:33
- 384: Quiz 01:00
-
Virtualization and Cloud Computing 1:16:10
- 385: What is Virtualization 01:06
- 386: Types of Virtualization 01:36
- 387: Functions of Virtualization 01:06
- 388: Security of the Virtualization 03:04
- 389: Virtualization Lab Exercise - 1 08:20
- 390: Virtualization Lab Exercise - 2 12:35
- 391: Characteristics of Cloud Computing 09:19
- 392: What is Cloud Computing 03:31
- 393: Cloud Service Modules - 1 07:31
- 394: Cloud Service Modules - 2 06:26
- 395: Network Attached Storage (NAS) 01:40
- 396: What is Cloud Security 03:33
- 397: How does cloud security work 03:19
- 398: What makes cloud security different 03:24
- 399: Why is cloud security important 02:26
- 400: Cloud Security Benefits-Disadvantages 07:14
-
Network Monitoring - Network Operations 15:15
- 401: What is SNMP 05:44
- 402: Finding Community Names Using NMAP Scripts 03:06
- 403: Write Access Check Using SNMP-Check Tool 02:18
- 404: SNMP Protocol Security 04:07
-
Network Troubleshooting - Physical Networks 46:04
- 405: Network Troubleshooting Methodology 01:53
- 406: Standart Copper Cables 14:46
- 407: Fiber Cable 25:25
- 408: Quiz 04:00
-
Network Troubleshoot - Wireless Networks 33:11
- 409: Wireless Network Issues 07:48
- 410: Wireless Transmission 10:10
- 411: Wireless Network Cisco Packet Tracer Example 13:13
- 412: Quiz 02:00
-
Network Troubleshooting - Software Tools and Commands 1:15:17
- 413: ICMP Cisco Packet Tracer Example 06:16
- 414: ICMP Wireshark Example 02:34
- 415: Tracert Wireshark Example 08:36
- 416: IPv6 Ping and Tracert Cisco Packet Tracer Example 02:59
- 417: Nslookup Windows-Linux Example 06:16
- 418: dig Linux Example 02:03
- 419: Netstat Windows-Linux Example 07:10
- 420: ipconfig Cisco Packet Tracer Example 05:03
- 421: RIP Dynamic Routing Cisco Packet Tracer Commands Example 13:51
- 422: OSPF Dynamic Routing Cisco Packet Tracer Commands Example 16:16
- 423: iperf Windows Example 01:13
- 424: Quiz 03:00
-
Network Troubleshooting - Network Issues 2:52:10
- 425: Traceroute 09:50
- 426: ARP Mechanism, ARP Tables, ARP Packets 06:10
- 427: ARP Hand-On Practices 03:15
- 428: ARP Cisco Packet Tracer Example 16:06
- 429: DHCP Server Cisco Packet Tracer Example 07:58
- 430: DHCP Server Wireshark Example 06:24
- 431: DNS Cisco Packet Tracer Example 28:39
- 432: DNS Wireshark Windows Example 04:48
- 433: VLAN Cisco Packet Tracer Example 09:26
- 434: VLAN Trunk Cisco Packet Tracer Example 10:53
- 435: Broadcast 07:52
- 436: STP Spanning Tree Protocol Cisco Packet Tracer Example 11:56
- 437: Port Security Cisco Packet Tracer Example 06:14
- 438: Firewall 01:14
- 439: Proxyservice 00:19
- 440: Tcpdump 05:23
- 441: TCPDump in Action 08:58
- 442: What Is Nmap 04:14
- 443: Nmap First Scan 04:47
- 444: Interpretation of Nmap 02:04
- 445: Scanning Specific IPs or Specific Targets With Nmap 01:40
- 446: Scanning Top 20, Top 100 Ports With Nmap 04:43
- 447: Nmap Integration and Port Scanning 06:17
- 448: Quiz 03:00
-
Introduction to Security+ | CompTIA Security Plus SY0-701 Certification Prep 11:34
- 449: Introduction to security+ 11:34
-
Basic Security Concepts 36:32
- 450: What is Security? 02:22
- 451: Privacy-Integrity-Availability 03:15
- 452: Encryption and Access Control 02:54
- 453: 3 A Rule (Authentication, Authorization and Accounting) 03:52
- 454: Threat 03:45
- 455: What is a Hacker? 06:31
- 456: What is Attack? What are the Stages? 03:19
- 457: Single Point Of Failure (SPOF) 03:12
- 458: Introducing Basic Risk Concepts 03:22
- 459: Quiz 04:00
-
Identity Management 51:22
- 460: What is Identity Management? 02:14
- 461: KERBEROS & NTLM&LDAP 07:31
- 462: Single Sign-On (SSO) 10:54
- 463: Smart Cards 02:56
- 464: Tokens or Key Fobs 05:20
- 465: Biometric Methods 07:36
- 466: Dual-Factor and Multifactor Authentication 01:37
- 467: PAP / CHAP / MS-CHAP 02:48
- 468: RADIUS 06:26
- 469: Quiz 04:00
-
Users in CompTIA 46:26
- 470: Create a User in comptia 03:03
- 471: Managing Accounts - 1 11:42
- 472: Managing Accounts - 2 09:21
- 473: Passwords 09:18
- 474: Password Policy 09:02
- 475: Quiz 04:00
-
Comparing Access Control Models 26:46
- 476: Comparing Access Control Models 02:18
- 477: Role-Based Access Control 03:15
- 478: Establishing Access with Group-Based Privileges 04:42
- 479: Rule Based and Discretionary Access Control 05:39
- 480: Mandatory Access Control 02:46
- 481: Establishing Access 06:06
- 482: Quiz 02:00
-
Virtualization 20:28
- 483: What is Virtualization? 03:46
- 484: Virtualization Technologies 02:55
- 485: Benefits of Virtualization 04:58
- 486: Security Issues of Virtualization 03:49
- 487: Quiz 05:00
-
Network Technologies 1:34:37
- 488: Basic Network Concepts 15:38
- 489: Domain Name Services(DNS) 09:47
- 490: What is the port? How does it work? 05:10
- 491: What is the Network Address 07:05
- 492: Combining the IP Address and the Port 04:37
- 493: Switches 05:03
- 494: Bridge 03:07
- 495: Routers 09:29
- 496: Understanding NAT and PAT 02:37
- 497: Network Separation 03:15
- 498: Proxy Servers 07:11
- 499: Types of Using Network Technologies-1 09:12
- 500: Types of Using Network Technologies-2 08:26
- 501: Quiz 04:00
-
Wireless Networks 22:29
- 502: Reviewing Basic Wireless Network Information 06:29
- 503: Wireless Cryptographic Protocols 07:37
- 504: Authentication Protocols for Wireless Networks 06:23
- 505: Quiz 02:00
-
Network Security Technologies 28:12
- 506: Firewalls 09:28
- 507: Network Access Control 09:29
- 508: Implementing a Secure Network 05:15
- 509: Quiz 04:00
-
Intrusion Detection Systems 24:13
- 510: Understanding IDSs and IPSs 04:42
- 511: Detection Methods 11:49
- 512: Honeypots 04:42
- 513: Quiz 03:00
-
Virtual Private Network (VPN) Technologies 15:46
- 514: Using VPNs for Remote Access 03:52
- 515: VPN Tunnel Protocols 06:18
- 516: Site-to-Site VPNs 02:36
- 517: Quiz 03:00
-
Security Threats 42:10
- 518: Understanding Threat Actors 12:36
- 519: Viruses 02:09
- 520: Logic Bombs 03:18
- 521: Trojans 05:29
- 522: Ransomware 03:23
- 523: Spyware 03:03
- 524: Bots and Botnets 04:17
- 525: Unified Threat Management(UTM) 05:55
- 526: Quiz 02:00
-
Securing Wireless Networks 06:19
- 527: Disable SSID Broadcasting or Not 01:26
- 528: Enable MAC Filtering 01:53
- 529: Quiz 03:00
-
Understanding Wireless Attacks 24:20
- 530: Disassociation Attacks 01:58
- 531: WPS and WPS Attacks 01:52
- 532: Rogue AP 02:14
- 533: Evil Twin 02:08
- 534: Jamming Attacks 03:47
- 535: Bluetooth Attacks 02:52
- 536: RFID Attacks 02:40
- 537: Wireless Replay Attacks 01:49
- 538: Quiz 05:00
-
Network Attacks 27:05
- 539: Network Attacks 03:39
- 540: SYN Flood Attack 02:55
- 541: MAC Flood Attacks 02:52
- 542: Man-in-the-Middle Attacks 01:34
- 543: ARP Poisoning Attacks 03:52
- 544: DNS Attacks 06:13
- 545: Quiz 06:00
-
Password Attacks 28:36
- 546: Brute Force Attacks 03:32
- 547: Password Hashes 04:54
- 548: Birthday Attacks 04:46
- 549: Replay Attacks 03:18
- 550: Hijacking and Related Attacks 05:59
- 551: Driver Manipulation 02:07
- 552: Quiz 04:00
-
Zero-Day Attacks 07:18
- 553: Zero-Day Attacks 04:18
- 554: Quiz 03:00
-
Code Attacks 23:27
- 555: Code Reuse and SDKs 04:28
- 556: Code Quality and Testing 02:49
- 557: Development Life-Cycle Models 03:41
- 558: Secure DevOps 03:21
- 559: Version Control and Change Management 02:18
- 560: Provisioning and Deprovisioning 01:50
- 561: Quiz 05:00
-
Web Servers 20:25
- 562: Web Servers 02:07
- 563: SQL Injection Attacks 04:31
- 564: Protecting Against SQL Injection Attacks 02:39
- 565: DLL Injection 02:25
- 566: Cross-Site Scripting 06:43
- 567: Quiz 02:00
-
Social Engineering Attacks 26:35
- 568: Social Engineering 04:08
- 569: Shoulder Surfing 01:08
- 570: Tricking Users with Hoaxes 01:19
- 571: Tailgating and Mantraps 01:12
- 572: Dumpster Diving 01:30
- 573: Watering Hole Attacks 01:06
- 574: Spam 02:04
- 575: Phishing 06:25
- 576: Whaling 02:45
- 577: Vishing 02:58
- 578: Quiz 02:00
-
Memory Buffer Vulnerabilities 26:21
- 579: Buffer Overflow Attacks 04:10
- 580: Pointer Dereference 02:09
- 581: Compiled Versus Runtime Code 01:23
- 582: Proper Input Validation 04:09
- 583: Side Input Validation 03:20
- 584: Avoiding Race Conditions 02:15
- 585: Proper Error Handling 02:13
- 586: Cryptographic Techniques 01:42
- 587: Quiz 05:00
-
Preventing Attacks 19:51
- 588: Protecting Systems from Malware 02:06
- 589: Antivirus and Anti-Malware Software 08:19
- 590: Advanced Malware Tools 03:33
- 591: Educating Users 01:53
- 592: Quiz 04:00
-
Server Security 1:07:38
- 593: Implementing Secure Systems 04:13
- 594: Operating systems 04:09
- 595: Secure Operating System Configurations 06:24
- 596: Resiliency and Automation Strategies 04:58
- 597: Change Management Policy 07:03
- 598: Secure Staging and Deployment 05:23
- 599: Peripherals 04:08
- 600: EMI and EMP 07:41
- 601: Hardware Security Module 02:27
- 602: Cloud Deployment Models 05:23
- 603: Cloud Services 06:07
- 604: Security Responsibilities with Cloud Models 01:50
- 605: Advanced Cloud Services 04:52
- 606: Quiz 03:00
-
Mobile Devices 30:12
- 607: Deploying Mobile Devices Securely 02:11
- 608: Deployment Models 08:31
- 609: Mobile Device Management 09:21
- 610: Hardware Control 02:37
- 611: Unauthorized Connections 02:32
- 612: Quiz 05:00
-
Data Security 19:56
- 613: Protecting Data 11:25
- 614: Data Loss Prevention 05:31
- 615: Quiz 03:00
-
Database Security 14:05
- 616: Database Concepts 02:45
- 617: Normalization 05:26
- 618: SQL Queries 01:55
- 619: Database Security 00:59
- 620: Quiz 03:00
-
Risk Management 33:46
- 621: Understanding Risk Management 02:39
- 622: Risk Management 02:45
- 623: Threats and Threat Assessments 04:22
- 624: Vulnerabilities 02:03
- 625: Risk Assessment 13:06
- 626: Risk Registers 05:51
- 627: Quiz 03:00
-
Cloud Vendors Relationships 51:34
- 628: Finding and Evaluating Cloud Vendors 14:11
- 629: Job Notification 03:28
- 630: Conducting Evaluations 04:10
- 631: Negotiating Contracts and Billing 09:49
- 632: Professional Services 03:56
- 633: Chargebacks 12:41
- 634: Laws, Regulations And Safety Standards 03:19
-
Advising 16:11
- 635: Key Stakeholders 02:45
- 636: Using Baselines 03:09
- 637: Conducting Feasibility Study 02:19
- 638: Making GAP Analysis 02:50
- 639: Using Reporting 01:30
- 640: Understanding Benchmarks 03:38
-
Checking for Vulnerabilities 27:40
- 641: Checking for Vulnerabilities 01:52
- 642: Password Crackers 01:58
- 643: Network Scanners 05:23
- 644: Wireless Scanners / Cracker 03:17
- 645: Banner Grabbing 00:47
- 646: Vulnerability Scanning 11:23
- 647: Quiz 03:00
-
Penetration Tests 27:26
- 648: Penetration Tests 02:45
- 649: Passive & Active Reconnaissance 01:59
- 650: Initial Exploitation 03:45
- 651: White, Gray and Black Box Testing 02:55
- 652: Intrusive and Non-Intrusive Testing 01:22
- 653: Passive Versus Active Tools 11:40
- 654: Quiz 03:00
-
Physical Security Precautions 40:50
- 655: Comparing Physical Security Controls 03:28
- 656: Comparing Door Lock Types 05:31
- 657: Preventing Tailgating with Mantraps 02:00
- 658: Increasing Physical Security with Guards 08:20
- 659: Using Hardware Locks 02:56
- 660: Asset Management 02:33
- 661: Implementing Environmental Controls 14:02
- 662: Quiz 02:00
-
Single Point of Failure 34:33
- 663: Single Point of Failure 01:46
- 664: Disk Redundancies 04:24
- 665: Server Redundancy and High Availability 09:11
- 666: Backup 15:12
- 667: Quiz 04:00
-
Business Continuity Plans 32:56
- 668: Comparing Business Continuity Elements 06:09
- 669: Impact 03:49
- 670: Recovery Time Objective 04:55
- 671: Recovery Sites 05:53
- 672: Disaster Recovery 08:10
- 673: Quiz 04:00
-
Examination of Logs 25:00
- 674: Monitoring Logs for Event Anomalies 08:43
- 675: OtherLogs-SIEM 07:12
- 676: Continuous Monitoring 06:05
- 677: Quiz 03:00
-
Controls 20:01
- 678: Understanding Control Types 07:12
- 679: Control Goals 10:49
- 680: Quiz 02:00
-
Cryptography and PKI 1:09:15
- 681: Introducing Cryptography Concepts 03:05
- 682: Hashing 04:38
- 683: MD5 00:53
- 684: SHA 02:54
- 685: HMAC 02:45
- 686: Hashing Files 02:56
- 687: Digital Signatures, Certificates and Non-repudiation 02:54
- 688: Providing Confidentiality with Encryption 08:14
- 689: Block Versus Stream Ciphers 04:10
- 690: Symmetric Encryption 01:55
- 691: Symmetric Encryption Methods 06:15
- 692: Asymmetric Encryption 01:57
- 693: Certificates 03:57
- 694: Steganography And Obfuscation 02:41
- 695: Using Cryptographic Protocols 01:47
- 696: Cipher Suites 03:34
- 697: Exploring PKI Components 08:03
- 698: Comparing Certificate Types 04:37
- 699: Quiz 02:00
-
Secure Web Page 07:14
- 700: 223 - HTTPS Transport Encryption.mp4 adli dosyanin kopyasi 05:14
- 701: Quiz 02:00
-
Risk Mitigation Methods 49:22
- 702: Exploring Security Policies 01:12
- 703: Personnel Management Policies 10:41
- 704: Background Check 02:50
- 705: NDA 04:40
- 706: Policy Violations and Adverse Actions 01:37
- 707: Agreement Types 03:00
- 708: PII and PHI 05:13
- 709: Responding to Incidents 02:32
- 710: Providing Training 05:32
- 711: Troubleshooting Personnel Issues 02:26
- 712: Incident Response-Education 06:39
- 713: Quiz 03:00
Description
Hello there,
Welcome to the “Security+ | CompTIA Security Plus SY0-701 Certification Prep” course.
CompTIA Security Plus | Embrace the latest Cybersecurity trends, pass CompTIA security+ exam & get a cyber security job
Every internet-connected person is affected by issues pertaining to cybersecurity. As a result, cybersecurity professionals are increasingly in-demand. That’s why OAK Academy offers top-rated CompTIA Security+exam prep courses to help you prepare for the job market.
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
Comptia Security+ validates certified professionals have the skills required to recommend and implement security solutions.
Join thousands of learners in preparing for the CompTIA Security+ certification with real-world cybersecurity at OAK Academy. You’ll get step-by-step video tutorials along with hands-on exercises and practice tests that mirror real-world problems you’ll encounter in a typical IT security job.
This course walks you through all the things you need to pass the CompTIA Security + (SY0-601) exam, step by step.
You can pass the CompTIA Security + exam by studying the topics covered throughout the course.
By the way, you don't need to know anything about CompTIA security +.
We will tell you all the things you need to pass the comtia security plus (SY0-701) exam.
Our course consists of 11 basic parts.
However, in order to better understand the topics, these basic topics are divided into parts and explained in 39 small chapters in CompTIA Security+ (SY0-701).
Each of the sections is important on its own. It also relates to other departments.
As you follow the course, you will hear the same terms in different lessons. This is because many terms in the field of Security can be used in relation to each other in different subjects. cybersecurity, comptia security plus, security+, comptia, cyber security, comptia security, security plus, security +, comptia security+
For example, the subject of encryption is mentioned in many places.
Although the basic meaning is the same, usage types can gain different meanings on different platforms.
The narration of the topics is brief and for the exam.
If you wish, you can improve yourself by using the topics covered in the lessons.
Because at the end of the course, you will see all the topics used in the field of Security.
All you have to do is search the subject on the internet and continue learning in comptia security.
During the course, sample questions were given at the end of each section in comptia.
These questions are generally similar to questions that were previously found in the CompTIA Security + exam.
There is no such thing as the same question will always appear in the exam in CompTIA.
However, the questions to be asked on a certain subject are also close to each other in comtia.
This course is for Comptia Security + (SY0-701).
CompTIA updates its exams every 3 years.
Comptia Security+ SY0-601 exam has been updated to CompTIA Security+ (SY0-701) in November 2023
The new CompTIA Security+ (SY0-701) addresses the latest cybersecurity trends and techniques – covering the most core technical skills in risk assessment and management, incident response, forensics, enterprise networks, hybrid/cloud operations and security controls, ensuring high performance on the job. These skills include:
Assessing the security posture of an enterprise environment and recommend and implement appropriate security solutions.
Monitoring and securing hybrid environments, including cloud, mobile, Internet of Things (IoT) and operational technology (OT).
Operating with an awareness of applicable regulations and policies, including principles of governance, risk and compliance.
Identifying, analyzing and responding to security events and incidents.
And 20% of exam objectives were updated to include:
Current trends: The latest trends in threats, attacks, vulnerabilities, automation, zero trust, risk, IoT, OT and cloud environments are emphasized, as well as communication, reporting and teamwork.
Hybrid environments: The latest techniques for cybersecurity professionals working in hybrid environments that are located in the cloud and on premises; cybersecurity professionals should be familiar with both worlds.
Basically in CompTIA Security + (SY0-701) exam;
1. General Security Concepts (12%)
2. Threats, Vulnerabilities and Mitigations (22%)
3. Security Architecture (18%)
4. Security Operations (28%)
5. Security Program Management and Oversight (20%)
Questions are asked from the fields. Throughout the course, topics related to these areas are explained.
In this course you will learn;
Passing the CompTIA Security+ certification exam with confidence
Understand computer security, its functions, and its components
Performing basic security configurations
Become an effective security technician in a business environment
Network topologies
Threat analysis
Jobs You Can Land With CompTIA Security+ :
Security Architect
Web App Penetration
Network Security Analyst
Penetration Tester
Network Security Operations
Cloud Penetration Tester
No prior knowledge is needed!
Open the Door to Your Cybersecurity Career with CompTIA Security+
Whats is Comptia Security+?
CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career. CompTIA Security+ is the first security certification IT professionals should earn.
Is CompTIA Security+ Worth It?
Security+ is an ideal certification if your goal is to break into cyber security. The knowledge and skills in Security+ apply across most elements of the cyber security industry, including offensive/defensive/management, so it's important to consider your career goals when deciding whether to get Security+ certified.
Why would you want to take this course?
Our answer is simple: The quality of teaching.
When you enroll, you will feel the OAK Academy's seasoned instructors' expertise.
OAK Academy based in London is an online education company. OAK Academy gives education in the field of IT, Software, Design, development in English, Portuguese, Spanish, Turkish and a lot of different language on Reed platform where it has over 1000 hours of video education lessons. OAK Academy both increase its education series number by publishing new courses, and it makes students aware of all the innovations of already published courses by upgrading.
When you enroll, you will feel the OAK Academy`s seasoned developers expertise. Questions sent by students to our instructors are answered by our instructors within 48 hours at the latest.
Fresh Content
It’s no secret how technology is advancing at a rapid rate and it’s crucial to stay on top of the latest knowledge. With this course, you will always have a chance to follow the latest data science trends.
Video and Audio Production Quality
All our videos are created/produced as high-quality video and audio to provide you the best learning experience.
Dive in now into the “Security+ | CompTIA Security Plus SY0-701 Certification Prep” course.
CompTIA Security Plus | Embrace the latest Cybersecurity trends, pass CompTIA security+ exam & get a cyber security job
We offer full support, answering any questions.
See you in the course!
Who is this course for?
Those who want to get CompTIA Security + certificate
Anyone interested in cyber security
Those who have a career goal in the field of cyber security
Those who have a basic knowledge of security and want to take it to higher levels
Those who want to step into the world of cybersecurity
Junior Security elements
Requirements
Desire to get CompTIA Security + certification
Watching the lecture videos completely, to the end and in order.
Internet Connection
Any device you can watch the course, such as a mobile phone, computer or tablet
Determination and patience to learn
Questions and answers
Currently there are no Q&As for this course. Be the first to ask a question.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
![](https://resources.reed.co.uk/courses/coursemedia/464310/7ea30839-cd0f-4c90-9fe7-69f5a017d775_cover_thumb.webp)
Add to basket or enquire
Course provided by
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.