CompTIA Security+ SY0-701

Video description

27+ Hours of Video Instruction

Get the edge you need to successfully study for the CompTIA Security+ exam!

Overview

CompTIA Security+ (SY0-701) is designed to prepare you for the SY0-701 version of the Security+ exam. It is an engaging self-paced video training solution that provides learners with more than 27.5 hours of personal training from security expert Sari Greene.

With topic-focused instructional videos, you will gain an in-depth understanding of each exam objective in the CompTIA Security+ (SY0-701) exam, as well as a deeper understanding of security foundations and principles to ensure exam success. This self-paced video course maps to the CompTIA Security+ Certification Exam Objectives for the SY0-701 exam, which has been updated to reflect current and emerging cybersecurity trends and techniques. At the end of every sub lesson you’ll find a three-second challenge, a Security-in-Action case study, and a word cloud that displays key concepts and terminology.

  • At the end of every lesson, you’ll find a Deep Dive quiz to help you assess your knowledge and progress.
  • At the end of every module, you’ll find practical application Closer Look labs.

Related Learning

Sign up for live training on CompTIA Security+ SY0-601 with Sari Greene:

CompTIA Security+ SY0-601 Crash Course

The exam objectives are organized into five domains:

  1. General Security Concepts
  2. Threats, Vulnerabilities, and Mitigations
  3. Security Architecture
  4. Security Operations
  5. Security Program Management and Oversight

About the Instructor

Sari Greene (CISSP-ISSMP, CRISC, CISM, CISA, SEC+, NSA/IAM) is an information security practitioner, author, educator, entrepreneur, and sailor. In 2003, Sari founded one of the first dedicated cybersecurity consultancies. She is a recognized leader in the field of cybersecurity and has amassed thousands of hours in the field working with a spectrum of technical, operational, compliance, and management personnel as well as boards of directors, regulators, service providers, and law enforcement agencies.

Sari is the author and presenter of multiple best-selling certification videos including CISSP Complete Video Course 1st, 2nd, and 3rd editions, the Pearson Complete Course for CISM and the CompTIA SY0-501 and SY0-601 Security+ Complete Video Courses. Sari has published a number of articles related to cybersecurity, has been quoted in the New York Times, Wall Street Journal, on CNN and on CNBC, and speaks regularly at cybersecurity, legal, financial, and healthcare conferences and workshops around the country. Sari serves on the Bangor Savings Bank Board of Directors and chairs the Enterprise Risk Management Committee. In 2018, Sari was named Cybersecurity Educator of the Year and presented with the Cybersecurity Excellence award. The Cybersecurity Excellence Awards is an annual competition honoring individuals and companies that demonstrate excellence, innovation, and leadership in information security.

Skill Level

Intermediary to Advanced

Learn How To

  • Confidently understand every objective on the CompTIA Security+ exam—this course covers every objective and topic in depth.
  • Prepare for exam success—Sari shares her best practices for studying for and taking the Security+ exam.
  • Enhance your real-world cybersecurity skills and knowledge.

Course Requirement

CompTIA recommends but does not require at least two years of experience in IT administration with a focus on security prior to taking the certification exam.

Who Should Take This Course

  • Anyone preparing for the CompTIA Security+ examination. Secondary audience: IT professionals
  • Anyone interested in learning security fundamentals

About Pearson Video Training

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Table of contents

  1. Introduction
    1. CompTIA Security+ SY0-701: Introduction
  2. Module 1: General Security Concepts
    1. Module introduction
  3. Lesson 1: Compare and Contrast Various Types of Security Controls
    1. Learning objectives
    2. 1.1 Control Objectives
    3. 1.2 Control Categories and Classifications
    4. 1.3 Deep Dive Quiz
  4. Lesson 2: Summarize Fundamental Security Concepts
    1. Learning objectives
    2. 2.1 Security and Privacy Principles
    3. 2.2 Zero Trust
    4. 2.3 Physical Security
    5. 2.4 Environmental Impact
    6. 2.5 Deception and Disruption
    7. 2.6 Deep Dive Quiz
  5. Lesson 3: Explain the Importance of Change Management Processes and the Impact to Security
    1. Learning objectives
    2. 3.1 Configuration Management
    3. 3.2 Change Management
    4. 3.3 Deep Dive Quiz
  6. Lesson 4: Explain the Importance of Using Appropriate Cryptographic Solutions
    1. Learning objectives
    2. 4.1 Cryptography Primer
    3. 4.2 Encryption
    4. 4.3 Hashing and Digital Signatures
    5. 4.4 Digital Certificates
    6. 4.5 Emerging Cryptography
    7. 4.6 Steganography
    8. 4.7 Deep Dive Quiz
  7. Module 1 Closer Look Labs
    1. Honeypots
    2. Hashing and HMACS
    3. Digital Certificates
  8. Module 2: Threats, Vulnerabilities and Mitigations
    1. Module introduction
  9. Lesson 5: Compare and Contrast Common Threat Actors and Motivations
    1. Learning objectives
    2. 5.1 Threat Actors and Attributes
    3. 5.2 Threat Modeling and Intelligence
    4. 5.3 Deep Dive Quiz
  10. Lesson 6: Explain Common Threat Vectors and Attack Surfaces
    1. Learning objectives
    2. 6.1 Operational Threat Vectors
    3. 6.2 Third-Party and Supply Chain Threat Vectors
    4. 6.3 Social Engineering
    5. 6.4 Deep Dive Quiz
  11. Lesson 7: Explain Various Types of Vulnerabilities
    1. Learning objectives
    2. 7.1 Vulnerability Primer
    3. 7.2 Network, OS, and Cloud Vulnerabilities
    4. 7.3 Deep Dive Quiz
  12. Lesson 8: Given a Scenario, Anaylze Indicators of Malicious Activity
    1. Learning objectives
    2. 8.1 Indicators of Malicious Activity
    3. 8.2 Malware Attacks
    4. 8.3 Brute Force Attacks
    5. 8.4 Digital Infrastructure Attacks
    6. 8.5 Application Attacks
    7. 8.6 Wireless Attacks
    8. 8.7 Cryptographic Attacks
    9. 8.8 Deep Dive Quiz
  13. Lesson 9: Explain the Purpose of Mitigation Techniques Used to Secure the Enterprise
    1. Learning objectives
    2. 9.1 Secure Design Principles
    3. 9.2 Segmentation
    4. 9.3 Deep Dive Quiz
  14. Module 2 Closer Look Labs
    1. Phone and Text Spoofing
    2. Malware Analysis
    3. Constructing Error Messages
    4. Threat Intelligence Workflow
    5. Zero-day Vulnerabilities
  15. Module 3: Security Architecture
    1. Module introduction
  16. Lesson 10: Compare and Contrast Security Implications of Different Architecture Models
    1. Learning objectives
    2. 10.1 Computing Architecture Models
    3. 10.2 Cloud Services
    4. 10.3 Cloud Infrastructure
    5. 10.4 Data Center Solution Elements
    6. 10.5 Virtualization
    7. 10.6 Embedded Systems
    8. 10.7 Internet of Things (IoT)
    9. 10.8 Deep Dive Quiz
  17. Lesson 11: Given a Scenario, Apply Security Principles to Secure the Enterprise
    1. Learning objectives
    2. 11.1 Network Devices
    3. 11.2 Network Access Control
    4. 11.3 Firewalls
    5. 11.4 Secure Communications
    6. 11.5 Deep Dive Quiz
  18. Lesson 12: Compare and Contrast Concepts and Strategies to Protect Data
    1. Learning objectives
    2. 12.1 Data Types
    3. 12.2 Data Classification
    4. 12.3 Data Protection
    5. 12.4 Deep Dive Quiz
  19. Lesson 13: Explain the Importance of Resilience and Recovery in Security Architecture
    1. Learning objectives
    2. 13.1 Backup and Recovery
    3. 13.2 Resiliency Concepts
    4. 13.3 Continuity of Operations
    5. 13.4 Deep Dive Quiz
  20. Module 3 Closer Look Labs
    1. RAID
    2. SSL and TLS Packet Capture
    3. Cloud Controls
  21. Module 4: Security Operations
    1. Module introduction
  22. Lesson 14: Given a Scenario, Apply Common Security Techniques to Computing Resources
    1. Learning objectives
    2. 14.1 Secure Baselines and Hardening Targets
    3. 14.2 Wireless Configuration
    4. 14.3 Wireless Design
    5. 14.4 Mobile Connectivity
    6. 14.5 Mobile Device Management
    7. 14.6 Application Security
    8. 14.7 Secure Coding
    9. 14.8 Deep Dive Quiz
  23. Lesson 15: Explain the Security Implications of Proper Hardware, Software, and Data Asset Management
    1. Learning objectives
    2. 15.1 Asset Management
    3. 15.2 Deletion, Disposal, and Destruction
    4. 15.3 Deep Dive Quiz
  24. Lesson 16: Explain Various Activities Associated with Vulnerability Management
    1. Learning objectives
    2. 16.1 Vulnerability Identification
    3. 16.2 Vulnerability Response and Remediation
    4. 16.3 Deep Dive Quiz
  25. Lesson 17: Explain Security Alerting and Monitoring Concepts and Tools
    1. Learning objectives
    2. 17.1 Logging and Analysis
    3. 17.2 SNMP, NetFlow, and SCAP
    4. 17.3 Deep Dive Quiz
  26. Lesson 18: Given a Scenario, Modify Enterprise Capabilities to Enhance Security
    1. Learning objectives
    2. 18.1 Enhancing Security with Network Devices
    3. 18.2 TCP/IP and Secure Protocols
    4. 18.3 Email Security
    5. 18.4 Group Policy and SELinux
    6. 18.5 Deep Dive Quiz
  27. Lesson 19: Given a Scenario, Implement and Maintain Identity and Access Management
    1. Learning objectives
    2. 19.1 Identity and Access Management (IAM)
    3. 19.2 Federated Identity
    4. 19.3 Authentication
    5. 19.4 Biometrics
    6. 19.5 Access Control and Authorization
    7. 19.6 Privileged Access Management
    8. 19.7 Deep Dive Quiz
  28. Lesson 20: Explain the Importance of Automation and Orchestration Related to Secure Operations
    1. Learning objectives
    2. 20.1 Scripting, Automation, and Orchestration
    3. 20.2 Deep Dive Quiz
  29. Lesson 21: Explain Appropriate Incident Response Activities
    1. Learning objectives
    2. 21.1 Incident Management
    3. 21.2 Incident Response
    4. 21.3 Evidence Handling
    5. 21.4 Forensic Examination
    6. 21.5 Disclosure and Notification
    7. 21.6 Deep Dive Quiz
  30. Lesson 22: Given a Scenario, Use Data Sources to Support an Investigation
    1. Learning objectives
    2. 22.1 Data Sources
    3. 22.2 Deep Dive Quiz
  31. Module 4 Closer Look Labs
    1. PowerShell
    2. Pwned Passwords
    3. IPv6 Addressing
    4. Wireless Heat Maps
    5. ZenMap
    6. Log files
    7. Ram Capture
  32. Module 5: Security Program Management and Oversight
    1. Module introduction
  33. Lesson 23: Summarize Effective Security Governance
    1. Learning objectives
    2. 23.1 Governance Structure
    3. 23.2 Governance Documents
    4. 23.3 Deep Dive Quiz
  34. Lesson 24: Explain Elements of the Risk Management Process
    1. Learning objectives
    2. 24.1 Risk Concepts
    3. 24.2 Risk Assessment and Analysis
    4. 24.3 Risk Response and Treatment
    5. 24.4 Business Impact Analysis
    6. 24.5 Deep Dive Quiz
  35. Lesson 25: Explain the Processes Associated with Third-Party Risk Assessment and Management
    1. Learning objectives
    2. 25.1 Third-party Risk Management
    3. 25.2 Deep Dive Quiz
  36. Lesson 26: Summarize Elements of Effective Security Compliance
    1. Learning objectives
    2. 26.1 Compliance Monitoring
    3. 26.2 Privacy Principles
    4. 26.3 Deep Dive Quiz
  37. Lesson 27: Explain Types and Purposes of Audits and Assessment
    1. Learning objectives
    2. 27.1 Audit and Assurance
    3. 27.2 Penetration Testing Concepts
    4. 27.3 Penetration Testing Tools and Techiques
    5. 27.4 Deep Dive Quiz
  38. Lesson 28: Given a Scenario, Implement Security Awareness Practices
    1. Learning objectives
    2. 28.1 Education, Training, and Awareness
    3. 28.2 Deep Dive Quiz
  39. Module 5 Closer Look Labs
    1. Passive Reconnaissance
    2. Policies and standards
    3. Quantitative Risk Analysis
    4. Privacy Walkthrough
  40. Module 6: Preparing for the Exam
    1. Module introduction
  41. Lesson 29: Attaining Your SY0-701 Security+ Certification
    1. Learning objectives
    2. 29.1 Understanding the SY0-701 Security+ Exam Structure
    3. 29.2 SY0-701 Exam Testing Options
    4. 29.3 SY0-701 Exam Testing Strategies
    5. 29.4 Congratulations! What's Next?
  42. Summary
    1. CompTIA Security+ SY0-701: Summary

Product information

  • Title: CompTIA Security+ SY0-701
  • Author(s): Sari Greene
  • Release date: September 2023
  • Publisher(s): Pearson
  • ISBN: 0138251061