All in One Offer! | Access Unlimited Courses in any category starting at just $29. Offer Ends in:

Browse Library

  • Business Solutions
  • Become an Instructor
  • 0
    Shopping Cart

    Your Cart is empty. Keep shopping to find a course!

    Browse Courses
Get Unlimited Learning Access
$29
5 days left at this price!
30-Day Money-Back Guarantee

This plan includes

  • Instant access to 11,000+ online courses
  • Play & Pause Course Videos
  • HD Video Recorded Lectures
  • Learn on Mobile/PC/Tablet
  • Quizzes and Real Projects
  • Lifetime Course Certificate
  • Instructor Chat Support
  • Cancel Plan Anytime
Subscribe to Learnfly’s top courses
Get this course, plus 11,000+ of our top-rated courses for one year with Go Annually Plan.
$348 $244 a year Save 30%
5 days left at this price!
30-Day Money-Back Guarantee

This plan includes

  • Instant access to 11,000+ online courses
  • Play & Pause Course Videos
  • HD Video Recorded Lectures
  • Learn on Mobile/PC/Tablet
  • Quizzes and Real Projects
  • Lifetime Course Certificate
  • Instructor Chat Support
  • Cancel Plan Anytime
$29
$244
  • If students put in the hours required for this course, they should be able to pass the Security+ certification without a problem.
  • This course will teach the student the fundamental of Security+
  • This course will teach the important of security to those in the field, in a college or university program.
  • Once the student passes the CompTIA certification exam for Security+, they will also receive a letter from the US Department of Defense certifying that they have met the requirements for ISO 17024 standard and fulfill Directive 8570.01-M requirements.

 PLEASE NOTE:  Once the CompTIA Security+ course changes, I will update this course and upload new lectures reflecting the new certification.

This CompTIA Security+ course will show you to harden, protect and enhance your network to where it would lessen the possibility of a bridge in security and allow you to recover your network promptly.  

The course will also prepare the student to take and pass the Security+ certification.

For those already in the field, this Security+ course will enhance your knowledge of security within your network.

Those taking this course will become familiar with the terminology for this certification and will allow the student to implement security features.

Once the student passes the CompTIA Security+ certification exam, they will also receive a letter from the US Department of Defence (DoD) certifying that he/she meets and fulfills Directive 8570.01-M requirements. Having this certification is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Security+ is a foundational, vendor-neutral IT security knowledge and skills certification that is also government approved and is globally recognized.

  ~ "According to the Bureau of Labor Statistics, Security Specialists, Administrators and Managers"

Aquiring the Security+ certification will validate the holder's security expertise credentials and can provide substantial earnings that if combined with a CCNA certification, then the sky's the limit!

As you can imagine, the Security+ certification can open doors and new opportunities in the IT world and can only enhance your knowledge, career and financial status.

Please note:   In the coming weeks new lectures will continously be added to this course, so look out for announcements on these new lectures.


  • It is highly recommended that the student has a Security+ book to accompany this course.
  • The student should have a great desire to master the topics in this course as it relates to the Security+ certification.
  • The student should be aware that they must put in hours to practice for the Security+ certification.
  • Please Note: When the Security+ course changes this year, I will upload the new material to this course.
  • Anyone that wants to acquire the CompTIA Security+ certification.
  • Anyone that wants to supplement their knowledge of Security+ in the workplace.
  • Anyone in a management position that would like to enhance security in their workplace.
View More...
  • Section 1 : Introduction to the Security + Course 1 Lectures 00:01:29

    • Lecture 1 :
    • Introduction to the Security + Course Preview
    • In this lecture, I will be explaining the topics you will be learning in this course and the Importance of acquiring this certification.
  • Section 2 : Risk Assessment 7 Lectures 00:03:30

    • Lecture 1 :
    • Computing Risk Assessment
    • In this lecture, you will be learning how perform Risk calculations, understand the difference of Quantitative versus Qualitative, what areas you should be prioritizing when doing a Risk Assessment?
    • Lecture 2 :
    • Additional Risk Terminology
    • In this lecture, you will be learning more Risk Assessment terminology and learn how to create and understand an assessment scale.
    • Lecture 3 :
    • Acting on your Risk Assessment
    • In this lecture, you will learn the five possible actions you can take after you create your Risk Assessment.
    • Lecture 4 :
    • Risk Associated with Cloud Computing
    • In this lecture, you will learn three ways Cloud Computing is used and some of the Risk associated with using Cloud Computing.
    • Lecture 5 :
    • Risk Associated with Virtualization
    • In this lecture, I will briefly explain two main issues that can happen with Virtualization.
    • Lecture 6 :
    • Summary of Section
    • In this lecture, I will briefly brush over the topics discussed in the section.
    • Lecture 7 :
    • Learning Risk Assesment
  • Section 3 : Understanding the Guidelines and Standards of Networking 6 Lectures 00:27:48

    • Lecture 1 :
    • Developing Policies, Standards and Guidelines
    • In this lecture, you will gain an understanding of the importance of creating policies, Standards and Guidelines to create a solid foundation to your network.
    • Lecture 2 :
    • Implementing Policies
    • In this lecture, we will discuss the key areas we need to address when implementing policies.
    • Lecture 3 :
    • Understanding Control Types and False Positive/Negatives
    • In this lecture, you will learn about the different Control types and the Controls associated with that Control type.
    • Lecture 4 :
    • Undertaking Business Impact Analysis
    • In this lecture, you will learn what a BIA is and how its used in a business environment for planning recovery plans.
    • Lecture 5 :
    • Disaster Recovery
    • In this lecture, you will learn what disaster recovery is and the different steps we can take to be able to recover in case something goes wrong.
    • Lecture 6 :
    • Summary of Section
    • In this lecture, I will briefly brush over the topics discussed in the section.
  • Section 4 : Actively Monitoring and Servicing your Network 5 Lectures 00:31:11

    • Lecture 1 :
    • Network Monitors
    • In this lecture, I will be discussing what Network Monitors are and why we need them. Also, how Network monitors have evolved in throughout the years.
    • Lecture 2 :
    • Monitoring System Logs
    • In this lecture, I will discuss about event logs and two important logs you should always be monitoring.
    • Lecture 3 :
    • Understanding Hardening
    • In this lecture, you will gain an understanding of what Hardening a PC really is.
    • Lecture 4 :
    • Working with Services
    • In this lecture, I will be explaining what are services and how some services can be helpful but at the same time, it can open a hole in your network. Also discuss about software,Patches, User Account Control and file systems.
    • Lecture 5 :
    • Summary of Section
    • In this lecture, I will be discussing what was covered In this section.
  • Section 5 : Tools an Services to Secure your Network 5 Lectures 00:43:55

    • Lecture 1 :
    • Securing the Network
    • In this lecture, I will discuss some essential concepts for the CompTIA Security+ Exam, such as MAC limiting and filtering, 802.1X, Disable Unused Ports and Rogue Machine Detection.
    • Lecture 2 :
    • Security Posture
    • In this lecture, we will learn what is meant by a Security Posture and learn certain steps you can take to create it, such as; Continuous Security monitoring, Security Audits, Setting a remediation Policy.
    • Lecture 3 :
    • Reporting Security Issues
    • In this lecture, we will be discussing Alarms, Alerts, and Trends to help us identify threats better secure our network.
    • Lecture 4 :
    • Detection Controls VS. Prevention Controls
    • In this lecture, we will be discussing the differences between detecting a problem and preventing a problem.
    • Lecture 5 :
    • Summary of Section
    • In this lecture, I will discuss briefly what was discussed in the section.
  • Section 6 : The TCP/IP Suite and it's Protocols 3 Lectures 00:12:49

    • Lecture 1 :
    • Mastering TCP/IP
    • In this lecture, you I will explain to you the importance of understanding the TCP/IP suite and the role that it plays in computing.
    • Lecture 2 :
    • Working with Protocols and Services
    • In this lecture, we will be discussing the different port numbers that correlate to specific applications and how that application is used. We will discuss the Three-way handshake and API’s.
    • Lecture 3 :
    • Summary of Section
    • In this lecture, we discussed the TCP/IP model and its layers and compared them to the OSI Model, and to the new 5 layer TCP/IP model and the protocols that work on those layers.
  • Section 7 : Networks 6 Lectures 00:32:17

    • Lecture 1 :
    • Designing a Secure Network
    • In this lecture, will discuss different method that we can you use to secure our network. Such as DMZ’s, Subnetting, VLANs, and most important securing remote access.
    • Lecture 2 :
    • Understanding the various network infrastructure devices
    • In this lecture, we will discuss Firewalls, Routers, Switches, Load Balancers, Proxies, VPNs and VPN Concentrators, IDS’s
    • Lecture 3 :
    • Intrusion Detection Systems
    • in this lecture, we will be learning the differences between IDS and IPS, also gain an understanding of how to work with a Network & Host base IDS
    • Lecture 4 :
    • Network Based IDS
    • In this lecture, you will understand the concept of Network Based IDS.
    • Lecture 5 :
    • Working with NIPS
    • In this lecture, we will be learning about different types of Network Intrusion Prevention System, which focus on prevention.
    • Lecture 6 :
    • Summary of Section
    • In this lecture, I will briefly go over topics discussed in the section.
  • Section 8 : Access Control, Authentication and Authorization 2 Lectures 00:13:54

    • Lecture 1 :
    • Understanding Access Control Basics
    • In this lecture, you will gain what access control is and the differences between access control and authentication.
    • Lecture 2 :
    • Working with Radius
  • Section 9 : Protecting Wireless Networks 2 Lectures 00:00:02

    • Lecture 1 :
    • Working with Wireless Systems
    • In this lecture, you will learn about the different types of Wireless Standards, Wireless Devices and how to protect those devices.
    • Lecture 2 :
    • Wireless vulnerabilities you should know
    • In this lecture, you will learn the different weaknesses that wireless by default brings into the network and type of attacks that are used.
  • Section 10 : Working with Cloud Computing and Virtualization 2 Lectures 00:31:51

    • Lecture 1 :
    • Working with Cloud Computing
    • In this lecture you will learn about different Clouds and how to Work with Cloud Computing.
    • Lecture 2 :
    • Working with Virtualization
    • In this lecture you will learn how to work with Virtualization.
  • Section 11 : Security 2 Lectures 00:08:59

    • Lecture 1 :
    • Application Security
    • In this lecture we will learn the number of issues to be aware of when it comes to application security. We will cover areas such as Key Management, Credential management, Authentication and more.
    • Lecture 2 :
    • Best practices for Security
    • In previous lectures we learned some of the basics of operating system application hardening. This however will cover other technologies and practices such as Data Loss Prevention and Hardware Based Encryption.
  • Section 12 : Malware vulnerabilities and Threats 1 Lectures 00:00:00

    • Lecture 1 :
    • Malware vulnerabilities and threats
  • Section 13 : Summary of the ENTIRE Course 1 Lectures 00:07:22

    • Lecture 1 :
    • Summary of Course
    • This lecture is about covering all we went learned thru the entire course.
  • How do i access the course after purchase?

    It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certificate for the courses?

    Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.
  • For how long can i access my course on the platform?

    You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.
  • Is there any free trial?

    Currently, we do not offer any free trial.
  • Can i cancel anytime?

    Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?

320211 Course Views

14 Courses

If you are tired of the same old methods of learning and want someone that is pretty much unconventional, but at the same time will provide you with an enjoyable learning experience in layman's terms...then please preview my courses and you will discover that I am your guy. I am a Network Engineer with many years in the field and in the teaching industry. I hold the following certifications: CCNA, CCNA Security, CCNA Voice, CCNP, Security+, Network+, A+, MCP, MCTS & MOS. My teaching experience stems from teaching at various institutions in the US. Now, I bring the classroom to you! I've taught over 100K students worldwide...courtesy of the internet. Thank goodness for technology! ;-) Having been in all sides of the spectrum; as a student, a teacher/trainer, and in the field, I believe this uniquely qualifies me to understand you, the student. I know first hand what you have been exposed to as opposed to what you really want to accomplish. These two are sometimes extremely conflicting and frustrating. That is why I teach in the manner I do and can relate to your rejection of the Status Quo. I have taught corporate employees at MetroPCS (now T-Mobile) and have also taught IT professionals of companies like The Florida Marlins, Ulysse Nardin, Alberta Water Department (Canada), The Assurant Group, Hospital personnel & Attorney's firms, among others. to guide them in acquiring their IT certifications or general knowledge. However, my expertice also extends to being able to teach applications as well. YES!...I am also an applications instructor and qualified to teach Word, Excel, PowerPoint and Access.This, of course, includes the MOS (Microsoft Office Specialist) certification. As you can see, I am a multifaceted person and consider myself to be an eternal student as well. I teach in an unconventional way that allows for students to understand the subject matter and can therefore, not only prepare them for a Cisco, Microsoft or CompTIA certification exam, but apply my methods in the real world. I strive to give the student a greater opportunity to compete in the current job markets. Do I go above and beyond what is needed for a certification?...YES, I do!...because it's not only about getting a certification, it's also about making sure that you, the student, is prepared for a job interview and/or maintaining your current job by enhancing your skills. This is where I step in and make sure that you are prepared for whatever you need and make you an asset to your employer. Everyone has different requirements and I make sure, or at least I try, to provide information for most scenarios. My classes and/or courses are very simple and that's how I like to teach. I truly believe in "KISS",,,NO, I don't want to kiss you, what this means "keep it simple stupid" - If things are kept simple, easily explained in a way that the student can grasp quickly and retain the information...then I have achieved my goal! For those that do not know me yet, you may not be used to my style of teaching, but you will soon get accustomed to it :)... I'm very laid back, I try to make learning fun and I teach in layman's terms...no physics jargon or mumbo jumbo in my teachings. My courses are very interactive and extremely dynamic!...you will not find my lectures monotone or boring, because falling asleep, for lack of excitement, is just NOT an option. Just take a look for yourself at my video previews, which I always provide on ALL my courses, so you can determine if I'm the right guy to help you get your industry specific certifications. ;) I certainly hope that after a careful review of my credentials & testimonials (you can Google it you know!), I'm the Cisco, Microsoft or CompTIA Instructor you're looking for! Laz Network Engineer, Cisco, Microsoft, CompTIA Instructor & Motivational Evangelist - and - Author of: "The Only IP Book You Will Ever Need!" now available on AMAZON
View More...
  • Unmatched Variety and Value!
    Learnfly's monthly subscription offers unlimited access to a vast range of courses. Affordable pricing, compared to competitors, makes it the ultimate choice for continuous learning.
    Jessica M.

    4.7

    JM
  • Top-Notch Quality, Affordable Rates!
    High-quality courses with certified instructors make Learnfly stand out. The affordable pricing is a game-changer for those seeking premium education.
    Alex P.

    4.5

    AP
  • Certified Excellence Every Time!
    Learnfly's courses, taught by certified instructors, ensure top-notch learning experiences. The course completion certificates add significant value to one's skill set.
    Sarah R.

    4.3

    SR
  • Round-the-Clock Support!
    Learnfly goes the extra mile with 24/7 course support. Their dedication to helping students succeed is commendable.
    Ryan K.

    4.1

    RK
  • Learn Anywhere, Anytime!
    Whether on mobile, PC, or tablet, Learnfly's platform offers flexibility. Learning on the go has never been easier.
    Emily S.

    4.7

    ES
  • Job-Ready Skills!
    Learnfly's job-oriented courses equip learners with practical skills for the workplace. An investment in career growth!
    Jake M.

    4.2

    JM
  • Budget-Friendly Brilliance!
    Learnfly's pricing is a steal for the quality and variety of courses offered. Quality education without breaking the bank.
    Olivia T.

    4.5

    OT
  • Instructor Excellence Unleashed!
    Learn from the best with Learnfly's certified instructors. The platform ensures that knowledge is imparted by industry experts.
    Daniel L.

    4.0

    DL
  • Achievement Unlocked!
    Learnfly not only offers courses but also recognizes your efforts with course completion certificates. A sense of accomplishment with every course finished.
    Maya H.

    4.6

    MH
  • Learning Revolution!
    Learnfly's platform is a revolution in education. Access to unlimited courses at affordable rates is a game-changer.
    Ethan W.

    4.7

    EW
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lectures 80 Beginner 8:29:27
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lectures 17 Beginner 1:52:18
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lectures 6 Beginner 0:10:40
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lectures 40 Beginner 4:56:0
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lectures 30 Beginner 3:28:56
  • the-complete-xmpp-course-chat-server-setup-android-ios-apps

    The Complete XMPP Course: Chat Serv...

    By : Abhilash Nelson

    Lectures 10 Beginner 0:47:3

Students learning on Learnfly works with Fortune 500 companies around the globe.

Sign Up & Start Learning
By signing up, you agree to our Terms of Use and Privacy Policy
Reset Password
Enter your email address and we'll send you a link to reset your password.