CompTIA Security+ Certification (SY0-501): The Total Course

Everything you need to pass the CompTIA Security+ SY0-501 Exam, from Mike Meyers. CompTIA expert and bestselling author.

Instructed by Total Seminars

Want to learn more?
Go for Premium Subscription

Choose your plan:

  • Monthly
  • Annually
$ 29
Monthly Subscription
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
Need Help?

Call +1 855 999 1795

( Toll Free )
  • This is a complete and comprehensive CompTIA Security+ Certification (SY0-501) course. It is designed to prepare you to be able to take and pass the exam to become CompTIA Security+ Certified.
  • Once you complete the course, you will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech. This course is ideal as both a study tool and an on-the-job reference.
  • Your new skills and the CompTIA Security+ Certification will help you land a great IT security tech job. Or, if you are already a security tech, get that raise or advancement you are after.

Welcome to the CompTIA Security+ Certification; SY0-501. The Total Course from Mike Meyers and Total Seminars.

This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-501 Exam. The first goal of the course is to make you a good IT security tech and, in the process, make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.

 

WHAT OUR STUDENTS ARE SAYING:

"I used these courses to pass the A+, Security+, and Network+ in a span of 2.5 months. I had no IT experience 4 months ago. Now I am a network engineer at a managed service provider with a great salary and solid upward mobility." - Ryan D.

The course covers all the CompTIA Security+ SY0-501 objective domains: 1.0 Threats, Attacks, and Vulnerabilities                                  21% 2.0 Technologies and Tools                                                     22% 3.0 Architecture and Design                                                    15% 4.0 Identity and Access Management                                     16% 5.0 Risk Management                                                             14% 6.0 Cryptography and PKI                                                       12%

 

Topics include:

  •   Risk management

  •   Cryptography

  •   Authentication and authorization

  •   Host, LAN, and application security

  •   Wireless, cloud, and mobile security

  •   Environmental security and controls

 

See what our customers are saying:

"This is a great course! Mike is funny and explains each security topic very well. I feel this has really prepared me for the exam. And although this course is designed to prepare you for the Security+ exam, I think it is also great if you're just interested in learning more about cyber security." - Spencer G

 

This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.

  • Basic familiarity with PCs and networks.
  • This course is intended for anyone that is preparing for an IT Security position or looking to improve their security skills and become CompTIA Security+ Certified. However, it goes beyond that and will give you the skills you need to be a better security tech on the job.
  • There are no specific prerequisites, since the course covers all the topics in detail.
  • It is a good idea to have an understanding of CompTIA A+ and Network+, or to be certified in these topics. You can learn more about these certifications from our Mike Meyers – Total Seminars CompTIA A+ and Network+ Certification courses on Udemy.
View More...

Section 1 : Risk Management

  • Lecture 1 :
  • Introduction to the CompTIA Security+ Exam SY0-501 Preview
  • In this introduction to the CompTIA Security+ SY0-501 exam, Mike explains what the exam is all about, including an overview of IT security. Download the CompTIA Security+ objectives attached to this lecture.
  • Lecture 2 :
  • The CIA of Security
  • In this episode, Mike discusses the CIA goals of security: confidentiality, integrity, and availability.
  • Lecture 3 :
  • Threat Actors
  • Mike explains the types of man-made threats that can attack a system.
  • Lecture 4 :
  • What is Risk?
  • In this episode, Mike explains risk and related concepts.
  • Lecture 5 :
  • Managing Risk
  • In this episode, Mike explains the terms and processes to manage risk.
  • Lecture 6 :
  • Using Guides for Risk Assessment
  • Mike discusses how to use benchmarks and other measurements to implement hardware and software in an environment.
  • Lecture 7 :
  • Interesting Security Controls
  • In this episode, Mike discusses other related security controls.
  • Lecture 8 :
  • Defense in Depth
  • In this episode, Mike reviews the concepts of defense in depth, as well as combining or fortifying security controls.
  • Lecture 9 :
  • IT Security Governance
  • In this episode, Mike explains the concept of security governance: policies, standards, and procedures.
  • Lecture 10 :
  • Security Policies
  • In this episode, Mike addresses various examples of security policies.
  • Lecture 11 :
  • Frameworks
  • Mike shares the benefits of using frameworks and how to apply them to a security program.
  • Lecture 12 :
  • Quantitative Risk Calculations
  • In this episode, Mike looks at the impact of risk.
  • Lecture 13 :
  • Business Impact Analysis
  • In this episode, Mike identifies what methods can directly address issues for a company and how to categorize impact types to maintain business continuity.
  • Lecture 14 :
  • Organizing Data
  • In this episode, Mike discusses data handling and how data is protected within an organization.
  • Lecture 15 :
  • Security Training
  • In this episode, Mike goes through the controls and roles that make security training work.
  • Lecture 16 :
  • Third Party Agreements
  • In this episode, Mike discusses the different types of third-party agreements, why they’re important, and how they affect IT security.
  • Lecture 17 :
  • Risk Management Quiz
  • Risk Management Quiz

Section 2 : Cryptography

  • Lecture 1 :
  • Cryptography Basics
  • In this episode, Mike goes over the goals and methods used in cryptography.
  • Lecture 2 :
  • Cryptographic Methods
  • Mike shares various methods used in cryptography, and the various methods used to protect the keys.
  • Lecture 3 :
  • Symmetric Cryptosystems
  • In this episode, Mike describes encrypting and decrypting data with the same key.
  • Lecture 4 :
  • Symmetric Block Modes
  • Mike talks about the usage and benefits of block modes when used in symmetric encryption.
  • Lecture 5 :
  • RSA Cryptosystems
  • In this episode, Mike describes encrypting and decrypting data with different keys.
  • Lecture 6 :
  • Diffie-Hellman
  • Learn the Diffie-Hellman key exchange agreement and methods as Mike conceptualizes this very complex algorithm.
  • Lecture 7 :
  • PGP/GPG
  • Mike works though the ups and downs of the PGP/GPG encryption methods.
  • Lecture 8 :
  • Hashing
  • In this episode, Mike shows how a hash provides integrity to data.
  • Lecture 9 :
  • HMAC
  • In this episode, Mike explains how hashing can improve message security.
  • Lecture 10 :
  • Steganography
  • In this episode, Mike illustrates that information can be hidden within other data. Note - if the video is garbled, change the resolution down one setting (or two if it persists) and that should solve the problem.  We're working on a permanent fix but this will make it function in the short term.
  • Lecture 11 :
  • Certificates and Trust
  • In this episode, Mike explains certificates and how they are used to establish trust.
  • Lecture 12 :
  • Public Key Infrastructure
  • In this episode, Mike discusses the public key infrastructure (PKI), used to enable commerce and other secure activities over the Internet.
  • Lecture 13 :
  • Cryptographic Attacks
  • In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.
  • Lecture 14 :
  • Cryptography Quiz
  • Cryptography Quiz

Section 3 : Identity and Access Management

  • Lecture 1 :
  • Identification
  • In this episode, Mike explains the issues of proving you are who you are.
  • Lecture 2 :
  • Authorization Concepts
  • Mike continues the discussion on the issues of proving you are who you are.
  • Lecture 3 :
  • Access Control List
  • In this episode, Mike discusses how to govern access to resources.
  • Lecture 4 :
  • Password Security
  • In this episode, Mike shows methods to keep passwords secure.
  • Lecture 5 :
  • Linux File Permissions
  • In this episode, Mike looks at how to control access to files in a Linux system.
  • Lecture 6 :
  • Windows File Permissions
  • In this episode, Mike looks at how to control access to files in a Windows system.
  • Lecture 7 :
  • User Account Management
  • In this episode, Mike discusses the security of user accounts.
  • Lecture 8 :
  • AAA
  • In this episode, Mike explores two common methods used for AAA, RADIUS, and TACACS+.
  • Lecture 9 :
  • Authentication Methods
  • In this episode, Mike discusses common protocols used to identify proper users, such as PAP, CHAP, Kerberos, LDAP, and more.
  • Lecture 10 :
  • Single Sign-On
  • In this episode, Mike describes how to log in to one computer and gain access to many.
  • Lecture 11 :
  • Identity and Access Management Quiz
  • Identity and Access Management Quiz

Section 4 : Tools of the Trade

  • Lecture 1 :
  • OS Utilities, Part 1
  • In this episode, Mike goes through the command-line utilities to view network traffic and traffic patterns.
  • Lecture 2 :
  • OS Utilities, Part 2
  • In this episode, Mike demonstrates how to find out the IP and MAC addresses of a host, as well as the DNS server.
  • Lecture 3 :
  • Network Scanners
  • In this episode, Mike explores with the tools used to scan network machines.
  • Lecture 4 :
  • Protocol Analyzers
  • In this episode, Mike discusses how traffic is analyzed via a host computer.
  • Lecture 5 :
  • SNMP
  • In this episode, Mike describes how the Simple Network Management Protocol (SNMP) can make the lives of network administrators very, very easy.
  • Lecture 6 :
  • Logs
  • In this episode, Mike explores the purposes and secrets of log files.
  • Lecture 7 :
  • Tools of the Trade Quiz
  • Tools of the Trade Quiz

Section 5 : Securing Individual Systems

  • Lecture 1 :
  • Denial of Service
  • In this episode, Mike discusses attacks that prevent servers from providing their essential services.
  • Lecture 2 :
  • Host Threats
  • In this episode, Mike looks at some of the things that threaten computers and users.
  • Lecture 3 :
  • Man-in-the-Middle
  • In this episode, Mike shows attacks where bad actors function between encrypting hosts.
  • Lecture 4 :
  • System Resiliency
  • In this episode, Mike shares how resiliency is integrated into security plans, and how to deal with scaling, elasticity, and other system design  considerations to ensure availability of systems.
  • Lecture 5 :
  • RAID
  • In this episode, Mike explores using multiple disks to improve reliability and performance.
  • Lecture 6 :
  • NAS and SAN
  • In this episode, Mike discusses secure methods to save and access data on a network device.
  • Lecture 7 :
  • Physical Hardening
  • Mike explores how to protect a system and the components used with various controls and policies.
  • Lecture 8 :
  • RFI, EMI and ESD
  • In this episode, Mike discusses the interference that can affect the functionality of equipment.
  • Lecture 9 :
  • Host Hardening
  • In this episode, Mike talks about techniques to protect a host computer from threats.
  • Lecture 10 :
  • Data and System Security
  • In this episode, Mike explains how to ensure that stored data is safe from physical loss.
  • Lecture 11 :
  • Disk Encryption
  • In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.
  • Lecture 12 :
  • Hardware/Firmware Security
  • Mike discusses methods that can be used to protect hardware-based authentication, disks, and firmware.
  • Lecture 13 :
  • Secure OS Types
  • In this episode, Mike discusses the OS types, characteristics, and usages.
  • Lecture 14 :
  • Securing Peripherals
  • Mike discusses how to work with different types of connections for peripheral and security considerations.
  • Lecture 15 :
  • Malware
  • In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.
  • Lecture 16 :
  • Analyzing Output
  • In this episode, Mike explores how to review utility outputs to discern the validity and make an action plan.
  • Lecture 17 :
  • IDS and IPS
  • In this episode, Mike addresses the difference between detecting network intruders and preventing intrusions.
  • Lecture 18 :
  • Automation Strategies
  • Mike examines some of the automation strategies used and their best practices.
  • Lecture 19 :
  • Data Destruction
  • In this episode, Mike discusses data destruction and media sanitization, and what these methods do to the media.
  • Lecture 20 :
  • Securing Individual Systems Quiz
  • Securing Individual Systems Quiz

Section 6 : The Basic LAN

  • Lecture 1 :
  • LAN Review
  • In this episode, Mike reviews elements of local area networks.
  • Lecture 2 :
  • Network Topologies Review
  • In this episode, Mike reviews the data flow concept of the basic network topologies.
  • Lecture 3 :
  • Network Zone Review
  • In this episode, Mike works through the concepts of zones and typical configurations.
  • Lecture 4 :
  • Network Access Controls
  • In this episode, Mike talks about how to access and control access to networks.
  • Lecture 5 :
  • The Network Firewall
  • Learn as Mike discusses firewall concepts and explores the configurations for stateless and stateful configurations.
  • Lecture 6 :
  • Proxy Servers
  • In this episode, Mike discusses the different types of proxy servers and their purpose.
  • Lecture 7 :
  • Honeypots
  • Mike discusses the concept of honeypots and how they are used in a security program.
  • Lecture 8 :
  • Virtual Private Networks
  • In this episode, Mike discusses the purposes and protocols behind virtual private networks (VPNs).
  • Lecture 9 :
  • IPSec
  • In this episode, Mike addresses IPsec, the first standardized Internet encryption.
  • Lecture 10 :
  • NIDS/NIPS
  • Learn the difference between NIDS and NIPS and the characteristics of each.
  • Lecture 11 :
  • SIEM
  • In this episode, Mike reveals the purpose of security information and event management (SIEM) tools.
  • Lecture 12 :
  • The Basic LAN Quiz
  • The Basic LAN Quiz

Section 7 : Beyond the Basic LAN

  • Lecture 1 :
  • Wireless Review
  • In this episode, Mike reviews basic wireless terms and protocols.
  • Lecture 2 :
  • Living in Open Networks
  • In this episode, Mike describes how to remain secure in a non-secure, open-network world.
  • Lecture 3 :
  • Vulnerabilities with Wireless Access Points
  • In this episode, Mike discusses rogue access points and their nefarious cousins, the evil twins.
  • Lecture 4 :
  • Cracking 802.11 – WEP
  • In this episode, Mike talks about WEP wireless security attacks and methods for cracking WEP passwords.
  • Lecture 5 :
  • Cracking 802.11 – WPA
  • In this episode, Mike talks about WPA wireless security attacks.
  • Lecture 6 :
  • Cracking 802.11 – WPS
  • Lecture 7 :
  • Wireless Hardening
  • In this episode, Mike explores the processes behind securing wireless networks.
  • Lecture 8 :
  • Wireless Access Points
  • In this episode, Mike explains the different wireless devices and how the antenna signal effects the placement and usage.
  • Lecture 9 :
  • Virtualization Basics
  • In this episode, Mike explores virtualization technologies.
  • Lecture 10 :
  • Virtual Security
  • In this episode, Mike talks about some of the security aspects of virtualization.
  • Lecture 11 :
  • Containers
  • Mike discusses containers, their attributes, and the benefits that can be obtained from using containers.
  • Lecture 12 :
  • IaaS
  • In this episode, Mike talks about some of the security aspects of virtualization.
  • Lecture 13 :
  • PaaS
  • In this episode, Mike describes the purpose of devices used to set up PaaS.
  • Lecture 14 :
  • SaaS
  • In this episode, Mike discusses the programmers and applications that enable companies to deploy Software as a Service (SaaS).
  • Lecture 15 :
  • Deployment Models
  • Mike discusses the ways to distribute software programs, Web services, and electronic data using various cloud models.
  • Lecture 16 :
  • Static Hosts
  • In this episode, Mike looks at network-aware devices, appliances, and industrial systems.
  • Lecture 17 :
  • Mobile Connectivity
  • In this episode, Mike explores the various methods used to interconnect mobile devices.
  • Lecture 18 :
  • Deploying Mobile Devices
  • In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.
  • Lecture 19 :
  • Mobile Enforcement
  • In this episode, Mike works through some of the security issues that need to be considered when putting together security policies on mobile devices.
  • Lecture 20 :
  • Mobile Device Management
  • In this episode, Mike goes through the various device- and application-level management that can take place on mobile devices.
  • Lecture 21 :
  • Physical Controls
  • In this episode, Mike explores preventative controls, such as guards and fences.
  • Lecture 22 :
  • HVAC
  • In this episode, Mike gives a quick overview of the importance and basic function of HVAC systems and how they keep servers and other important equipment happy.
  • Lecture 23 :
  • Fire Suppression
  • In this episode, Mike talks fire, the right ways to fight it and the best systems to have in place to save your equipment.
  • Lecture 24 :
  • Beyond the Basic LAN Quiz
  • Beyond the Basic LAN Quiz

Section 8 : Secure Protocols

  • Lecture 1 :
  • Secure Applications and Protocols
  • In this episode, Mike looks at Internet processes that have built-in encryption.
  • Lecture 2 :
  • Network Models
  • In this episode, Mike looks at the conceptual structure of networks.
  • Lecture 3 :
  • Know Your Protocols - TCP/IP
  • In this episode, Mike discusses the elements of TCP/IP networking.
  • Lecture 4 :
  • Know Your Protocols - Applications
  • In this episode, Mike reviews common applications, protocols, and port numbers.
  • Lecture 5 :
  • Transport Layer Security (TLS)
  • In this episode, Mike presents the elements of Transport Layer Security.
  • Lecture 6 :
  • Internet Service Hardening
  • In this episode, Mike explores secure protocols used for hardening Internet services.
  • Lecture 7 :
  • Protecting Your Servers
  • In this episode, Mike discusses how to protect and defend servers.
  • Lecture 8 :
  • Secure Code Development
  • Mike explores the methods used to develop code, reviewing some of the models, goals, and processes to maintain during the code lifecycle.
  • Lecture 9 :
  • Secure Deployment Concepts
  • In this episode, Mike explores the various considerations used to deploy code.
  • Lecture 10 :
  • Code Quality and Testing
  • Mike walks through the different code testing considerations prior to deployment.
  • Lecture 11 :
  • Secure Protocols Quiz
  • Secure Protocols Quiz

Section 9 : Testing Your Infrastructure

  • Lecture 1 :
  • Vulnerability Scanning Tools
  • In this episode, Mike delves into the world of vulnerability tools and how they work.
  • Lecture 2 :
  • Vulnerability Scanning Assessment
  • In this episode, Mike discusses the importance of and what takes place during vulnerability assessments.
  • Lecture 3 :
  • Social Engineering Principles
  • In this episode, Mike explores many aspects of attacks designed to use people to exploit resources.
  • Lecture 4 :
  • Social Engineering Attacks
  • In this episode, Mike describes specific attack vectors and potentials that manipulate people and circumstances to access or destroy information.
  • Lecture 5 :
  • Attacking Web Sites
  • In this episode, Mike builds on the attacks described in "Attacking Applications" and concentrates on attacks unique to Web applications.
  • Lecture 6 :
  • Attacking Applications
  • In this episode, Mike discusses how applications are attacked.
  • Lecture 7 :
  • Exploiting a Target
  • In this episode, Mike explores how systems are exploited as well as methods used to test a system for these exploits.
  • Lecture 8 :
  • Vulnerability Impact
  • In this episode, Mike looks at the impact of specific security issues on performance and access to services, and their burden on resources.
  • Lecture 9 :
  • Testing Your Infrastructure Quiz
  • Testing Your Infrastructure Quiz

Section 10 : Dealing with Incidents

  • Lecture 1 :
  • Incident Response
  • In this episode, Mike discusses the steps involved in incident response.
  • Lecture 2 :
  • Digital Forensics
  • In this episode, Mike demonstrates how to properly collect and preserve data when incidents happen, or legal inquiries are made.
  • Lecture 3 :
  • Contingency Planning
  • In this episode, Mike explains the thought processes necessary to create an effective contingency plan.
  • Lecture 4 :
  • Backups
  • In this episode, Mike describes the when, why, and how of backups.
  • Lecture 5 :
  • Dealing with Incidents Quiz
  • Dealing with Incidents Quiz

Total Seminars,

Total Seminars provides certification training services and training materials to thousands of schools, corporations, and government agencies including the United Nations, the FBI and all branches of the Department of Defense. Total Seminars produces the #1 selling CompTIA A+ and Network+ Certification books with over 1 million books in print. Total Seminars has created a number of best-selling video courses by Mike Meyers and the Total Seminars Team of Instructors. They also develop supplemental materials such as the TotalTester certification practice tests and TotalSims lab simulations to support your certification preparation. These are available on the Total Seminars' web site.
View More...
cisco-ccna-r-s-200-125-the-complete-course

Cisco CCNA R/S (200-125): The Compl...

By : Lazaro (Laz) Diaz

Lecture 153

ccnp-switch-300-115-the-complete-course

CCNP Switch (300-115): The Complete...

By : Lazaro (Laz) Diaz

Lecture 93

ccna-wireless-200-355-the-complete-course

CCNA Wireless (200-355): The Comple...

By : Lazaro (Laz) Diaz

Lecture 41

odoo-the-complete-master-class-beginner-to-professional

Odoo: The complete Master Class: B...

By : Abhilash Nelson

Lecture 32

convert-hex-to-decimal-in-under-30-seconds

Convert Hex to Decimal in under 30 ...

By : Lazaro (Laz) Diaz

Lecture 20

cisco-eigrp-comprehensive-labs-course

Cisco EIGRP Comprehensive Labs Cour...

By : Lazaro (Laz) Diaz

Lecture 10

Buy

$15

Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now