CompTIA Security + (SY0-401)

The Security+ certification from CompTIA is highly sought and it qualifies

Instructed by Lazaro (Laz) Diaz

  • If students put in the hours required for this course, they should be able to pass the Security+ certification without a problem.
  • This course will teach the student the fundamental of Security+
  • This course will teach the important of security to those in the field, in a college or university program.
  • Once the student passes the CompTIA certification exam for Security+, they will also receive a letter from the US Department of Defense certifying that they have met the requirements for ISO 17024 standard and fulfill Directive 8570.01-M requirements.

 PLEASE NOTE:  Once the CompTIA Security+ course changes, I will update this course and upload new lectures reflecting the new certification.

This CompTIA Security+ course will show you to harden, protect and enhance your network to where it would lessen the possibility of a bridge in security and allow you to recover your network promptly.  

The course will also prepare the student to take and pass the Security+ certification.

For those already in the field, this Security+ course will enhance your knowledge of security within your network.

Those taking this course will become familiar with the terminology for this certification and will allow the student to implement security features.

Once the student passes the CompTIA Security+ certification exam, they will also receive a letter from the US Department of Defence (DoD) certifying that he/she meets and fulfills Directive 8570.01-M requirements. Having this certification is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Security+ is a foundational, vendor-neutral IT security knowledge and skills certification that is also government approved and is globally recognized.

  ~ "According to the Bureau of Labor Statistics, Security Specialists, Administrators and Managers"

Aquiring the Security+ certification will validate the holder's security expertise credentials and can provide substantial earnings that if combined with a CCNA certification, then the sky's the limit!

As you can imagine, the Security+ certification can open doors and new opportunities in the IT world and can only enhance your knowledge, career and financial status.

Please note:   In the coming weeks new lectures will continously be added to this course, so look out for announcements on these new lectures.


  • It is highly recommended that the student has a Security+ book to accompany this course.
  • The student should have a great desire to master the topics in this course as it relates to the Security+ certification.
  • The student should be aware that they must put in hours to practice for the Security+ certification.
  • Please Note: When the Security+ course changes this year, I will upload the new material to this course.
  • Anyone that wants to acquire the CompTIA Security+ certification.
  • Anyone that wants to supplement their knowledge of Security+ in the workplace.
  • Anyone in a management position that would like to enhance security in their workplace.
View More...

Section 1 : Introduction to the Security + Course

  • Lecture 1 :
  • Introduction to the Security + Course Preview
  • In this lecture, I will be explaining the topics you will be learning in this course and the Importance of acquiring this certification.

Section 2 : Risk Assessment

  • Lecture 1 :
  • Learning Risk Assessment
  • In this lecture, you will be learning what a Risk Assessment is and I will be breaking down the Key components associated with a Risk Assessment.
  • Lecture 2 :
  • Computing Risk Assessment
  • In this lecture, you will be learning how perform Risk calculations, understand the difference of Quantitative versus Qualitative, what areas you should be prioritizing when doing a Risk Assessment?
  • Lecture 3 :
  • Additional Risk Terminology
  • In this lecture, you will be learning more Risk Assessment terminology and learn how to create and understand an assessment scale.
  • Lecture 4 :
  • Acting on your Risk Assessment
  • In this lecture, you will learn the five possible actions you can take after you create your Risk Assessment.
  • Lecture 5 :
  • Risk Associated with Cloud Computing
  • In this lecture, you will learn three ways Cloud Computing is used and some of the Risk associated with using Cloud Computing.
  • Lecture 6 :
  • Risk Associated with Virtualization
  • In this lecture, I will briefly explain two main issues that can happen with Virtualization.
  • Lecture 7 :
  • Summary of Section
  • In this lecture, I will briefly brush over the topics discussed in the section.

Section 3 : Understanding the Guidelines and Standards of Networking

  • Lecture 1 :
  • Developing Policies, Standards and Guidelines
  • In this lecture, you will gain an understanding of the importance of creating policies, Standards and Guidelines to create a solid foundation to your network.
  • Lecture 2 :
  • Implementing Policies
  • In this lecture, we will discuss the key areas we need to address when implementing policies.
  • Lecture 3 :
  • Understanding Control Types and False Positive/Negatives
  • In this lecture, you will learn about the different Control types and the Controls associated with that Control type.
  • Lecture 4 :
  • Undertaking Business Impact Analysis
  • In this lecture, you will learn what a BIA is and how its used in a business environment for planning recovery plans.
  • Lecture 5 :
  • Disaster Recovery
  • In this lecture, you will learn what disaster recovery is and the different steps we can take to be able to recover in case something goes wrong.
  • Lecture 6 :
  • Summary of Section
  • In this lecture, I will briefly brush over the topics discussed in the section.

Section 4 : Actively Monitoring and Servicing your Network

  • Lecture 1 :
  • Network Monitors
  • In this lecture, I will be discussing what Network Monitors are and why we need them. Also, how Network monitors have evolved in throughout the years.
  • Lecture 2 :
  • Monitoring System Logs
  • In this lecture, I will discuss about event logs and two important logs you should always be monitoring.
  • Lecture 3 :
  • Understanding Hardening
  • In this lecture, you will gain an understanding of what Hardening a PC really is.
  • Lecture 4 :
  • Working with Services
  • In this lecture, I will be explaining what are services and how some services can be helpful but at the same time, it can open a hole in your network. Also discuss about software,Patches, User Account Control and file systems.
  • Lecture 5 :
  • Summary of Section
  • In this lecture, I will be discussing what was covered In this section.

Section 5 : Tools an Services to Secure your Network

  • Lecture 1 :
  • Securing the Network
  • In this lecture, I will discuss some essential concepts for the CompTIA Security+ Exam, such as MAC limiting and filtering, 802.1X, Disable Unused Ports and Rogue Machine Detection.
  • Lecture 2 :
  • Security Posture
  • In this lecture, we will learn what is meant by a Security Posture and learn certain steps you can take to create it, such as; Continuous Security monitoring, Security Audits, Setting a remediation Policy.
  • Lecture 3 :
  • Reporting Security Issues
  • In this lecture, we will be discussing Alarms, Alerts, and Trends to help us identify threats better secure our network.
  • Lecture 4 :
  • Detection Controls VS. Prevention Controls
  • In this lecture, we will be discussing the differences between detecting a problem and preventing a problem.
  • Lecture 5 :
  • Summary of Section
  • In this lecture, I will discuss briefly what was discussed in the section.

Section 6 : The TCP/IP Suite and it's Protocols

  • Lecture 1 :
  • Mastering TCP/IP
  • In this lecture, you I will explain to you the importance of understanding the TCP/IP suite and the role that it plays in computing.
  • Lecture 2 :
  • Working with Protocols and Services
  • In this lecture, we will be discussing the different port numbers that correlate to specific applications and how that application is used. We will discuss the Three-way handshake and API’s.
  • Lecture 3 :
  • Summary of Section
  • In this lecture, we discussed the TCP/IP model and its layers and compared them to the OSI Model, and to the new 5 layer TCP/IP model and the protocols that work on those layers.

Section 7 : Networks

  • Lecture 1 :
  • Designing a Secure Network
  • In this lecture, will discuss different method that we can you use to secure our network. Such as DMZ’s, Subnetting, VLANs, and most important securing remote access.
  • Lecture 2 :
  • Understanding the various network infrastructure devices
  • In this lecture, we will discuss Firewalls, Routers, Switches, Load Balancers, Proxies, VPNs and VPN Concentrators, IDS’s
  • Lecture 3 :
  • Intrusion Detection Systems
  • in this lecture, we will be learning the differences between IDS and IPS, also gain an understanding of how to work with a Network & Host base IDS
  • Lecture 4 :
  • Network Based IDS
  • In this lecture, you will understand the concept of Network Based IDS.
  • Lecture 5 :
  • Working with NIPS
  • In this lecture, we will be learning about different types of Network Intrusion Prevention System, which focus on prevention.
  • Lecture 6 :
  • Summary of Section
  • In this lecture, I will briefly go over topics discussed in the section.

Section 8 : Access Control, Authentication and Authorization

  • Lecture 1 :
  • Understanding Access Control Basics
  • In this lecture, you will gain what access control is and the differences between access control and authentication.
  • Lecture 2 :
  • Working with Radius

Section 9 : Protecting Wireless Networks

  • Lecture 1 :
  • Working with Wireless Systems
  • In this lecture, you will learn about the different types of Wireless Standards, Wireless Devices and how to protect those devices.
  • Lecture 2 :
  • Wireless vulnerabilities you should know
  • In this lecture, you will learn the different weaknesses that wireless by default brings into the network and type of attacks that are used.

Section 10 : Working with Cloud Computing and Virtualization

  • Lecture 1 :
  • Working with Cloud Computing
  • In this lecture you will learn about different Clouds and how to Work with Cloud Computing.
  • Lecture 2 :
  • Working with Virtualization
  • In this lecture you will learn how to work with Virtualization.

Section 11 : Security

  • Lecture 1 :
  • Application Security
  • In this lecture we will learn the number of issues to be aware of when it comes to application security. We will cover areas such as Key Management, Credential management, Authentication and more.
  • Lecture 2 :
  • Best practices for Security
  • In previous lectures we learned some of the basics of operating system application hardening. This however will cover other technologies and practices such as Data Loss Prevention and Hardware Based Encryption.

Section 12 : Malware vulnerabilities and Threats

  • Lecture 1 :
  • Malware vulnerabilities and threats

Section 13 : Summary of the ENTIRE Course

  • Lecture 1 :
  • Summary of Course
  • This lecture is about covering all we went learned thru the entire course.

Lazaro (Laz) Diaz,

If you are tired of the same old methods of learning and want someone that is pretty much unconventional, but at the same time will provide you with an enjoyable learning experience in layman's terms...then please preview my courses and you will discover that I am your guy. I am a Network Engineer with many years in the field and in the teaching industry. I hold the following certifications: CCNA, CCNA Security, CCNA Voice, CCNP, Security+, Network+, A+, MCP, MCTS & MOS. My teaching experience stems from teaching at various institutions in the US. Now, I bring the classroom to you! I've taught over 100K students worldwide...courtesy of the internet. Thank goodness for technology! ;-) Having been in all sides of the spectrum; as a student, a teacher/trainer, and in the field, I believe this uniquely qualifies me to understand you, the student. I know first hand what you have been exposed to as opposed to what you really want to accomplish. These two are sometimes extremely conflicting and frustrating. That is why I teach in the manner I do and can relate to your rejection of the Status Quo. I have taught corporate employees at MetroPCS (now T-Mobile) and have also taught IT professionals of companies like The Florida Marlins, Ulysse Nardin, Alberta Water Department (Canada), The Assurant Group, Hospital personnel & Attorney's firms, among others. to guide them in acquiring their IT certifications or general knowledge. However, my expertice also extends to being able to teach applications as well. YES!...I am also an applications instructor and qualified to teach Word, Excel, PowerPoint and Access.This, of course, includes the MOS (Microsoft Office Specialist) certification. As you can see, I am a multifaceted person and consider myself to be an eternal student as well. I teach in an unconventional way that allows for students to understand the subject matter and can therefore, not only prepare them for a Cisco, Microsoft or CompTIA certification exam, but apply my methods in the real world. I strive to give the student a greater opportunity to compete in the current job markets. Do I go above and beyond what is needed for a certification?...YES, I do!...because it's not only about getting a certification, it's also about making sure that you, the student, is prepared for a job interview and/or maintaining your current job by enhancing your skills. This is where I step in and make sure that you are prepared for whatever you need and make you an asset to your employer. Everyone has different requirements and I make sure, or at least I try, to provide information for most scenarios. My classes and/or courses are very simple and that's how I like to teach. I truly believe in "KISS",,,NO, I don't want to kiss you, what this means "keep it simple stupid" - If things are kept simple, easily explained in a way that the student can grasp quickly and retain the information...then I have achieved my goal! For those that do not know me yet, you may not be used to my style of teaching, but you will soon get accustomed to it :)... I'm very laid back, I try to make learning fun and I teach in layman's terms...no physics jargon or mumbo jumbo in my teachings. My courses are very interactive and extremely dynamic!...you will not find my lectures monotone or boring, because falling asleep, for lack of excitement, is just NOT an option. Just take a look for yourself at my video previews, which I always provide on ALL my courses, so you can determine if I'm the right guy to help you get your industry specific certifications. ;) I certainly hope that after a careful review of my credentials & testimonials (you can Google it you know!), I'm the Cisco, Microsoft or CompTIA Instructor you're looking for! Laz Network Engineer, Cisco, Microsoft, CompTIA Instructor & Motivational Evangelist - and - Author of: "The Only IP Book You Will Ever Need!" now available on AMAZON
View More...

Ethical Hacking and Penetration Tes...

By : Darshil Modi

Lecture 21

$21

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

$20

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

$14

Google TensorFlow Hands on with Pyt...

By : UNP United Network of Professionals

Lecture 51

$21

CISSP- Certification Introduction

By : MUKESH SINGH

Lecture 18

$14

Complete Ethical Hacking & Penetrat...

By : Abhilash Nelson

Lecture 29

$14

Need any help with the platform? Contact us at: support@learnfly.com