CompTIA Security Training Series - 3 Courses » ITU Online IT Training
Ready to start learning? Individual Plans →Team Plans →
[ Course ]

CompTIA Security Training Series – 3 Courses

Build your cybersecurity expertise and advance your IT career with comprehensive training in cloud security, threat detection, and security protocols designed for aspiring security professionals.


46 Hrs 44 Min180 Videos446 QuestionsCertificate of CompletionClosed Captions

CompTIA Security Training Series – 3 Courses



In today’s digital environment, protecting sensitive information and securing network infrastructure is no longer optional; it’s essential. If you’re an IT professional or aspiring cybersecurity specialist, mastering the skills covered in our CompTIA cybersecurity training helps you stay ahead of cyber threats and demonstrates your ability to safeguard digital assets effectively. Whether you’re managing cloud environments, analyzing security threats, or implementing security protocols, this comprehensive training series prepares you to face real-world security challenges head-on.

This series includes three targeted courses: Certified Cloud Security Professional (CCSP), CompTIA CySA+ (Cybersecurity Analyst+), and CompTIA Security+ (SY0-601). These courses align with the latest CompTIA certification objectives, including SY0-601, Security+ SY0-501, and CySA+ (CS0-002). You’ll gain practical skills in cloud security, threat detection, vulnerability management, and incident response—skills that employers demand across industries. Our instructors bring extensive experience, ensuring you receive practical, actionable insights that go beyond theory.

What You Will Learn

After completing this series, you will have a solid grasp of core cybersecurity concepts and hands-on skills. You will learn to identify, analyze, and mitigate security threats in various environments. Here are some specific skills you will walk away with:

  • Develop strategies for securing cloud environments and managing cloud security risks effectively.
  • Use threat intelligence and vulnerability management techniques to detect, analyze, and respond to security incidents.
  • Implement security controls based on industry best practices to protect network infrastructure and endpoints.
  • Apply cryptographic techniques and manage digital certificates to ensure data confidentiality and integrity.
  • Identify social engineering tactics and develop user security awareness training programs.
  • Configure and troubleshoot network protocols to enhance security posture.
  • Perform risk assessments and develop incident response plans to minimize security breaches.
  • Interpret security logs and forensic data to investigate security incidents thoroughly.
  • Understand organizational security frameworks and compliance requirements necessary for secure operations.
  • Prepare for and pass key CompTIA cybersecurity certification exams to advance your career.

Who This Course Is For

This training series is designed for IT professionals at various experience levels seeking to deepen their cybersecurity expertise. Ideal candidates include network administrators, security analysts, systems engineers, and IT managers who want to validate their skills with recognized certifications. Whether you’re new to cybersecurity or looking to enhance your security credentials, this course offers practical, job-ready knowledge. Prior basic networking or security knowledge is helpful but not required, as the course covers foundational concepts and advanced topics.

Why These Skills Matter

Mastering the skills in this compTIA cybersecurity training series positions you as a valuable asset in today’s competitive job market. Certifications like Security+ and CySA+ are recognized globally and demonstrate your ability to implement security measures that protect organizational assets. Employers actively seek candidates with these credentials to fill roles such as Security Analyst, Security Engineer, and Network Security Administrator. Beyond certification, this training equips you to proactively defend against evolving cyber threats, reduce organizational risk, and contribute to a secure IT environment. Gaining these skills opens doors to higher salaries, greater responsibilities, and career advancement in a rapidly growing field.

Module 1: Information Security Roles Security Control and Framework Types
  • Introduction and Overview
  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
  • Module Summary
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
  • Module Summary
Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
  • Assess Organizational Security with Network Reconnaissance Tools
  • Packet Capture and Replay Demo
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts
  • Module Summary
Module 4: Social Engineering, Indicators of Malware Attacks
  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-based Attacks
  • Fork Bomb Malware Demo
  • Module Summary
Module 5: Cryptography
  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies
  • Module Summary
Module 6: Certificates and PKI
  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
  • Implementing a PKI Demo
  • Module Summary
Module 7: Authentication
  • Summarize Authentication Design Concepts
  • Implement Knowledge-based Authentication
  • Password Cracker Demo
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts
  • Module Summary
Module 8: Identity and Accounts, Authorization, Personnel Polices
  • Implement Identity and Account Types
  • Implement Account Policies
  • Account Types and Polices Demo
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies
  • Module Summary
Module 9: Network Design and Hardware (Part 1)
  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Various Types of Network Attacks Demo
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers
  • Module Summary
Module 10: Network Hardware (Part 2)
  • Implement Firewalls and Proxy Servers
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM
  • Module Summary
Module 11: Network Protocols
  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocols
  • Module Summary
Module 12: Endpoint Security
  • Implement Secure Firmware
  • Implement Endpoint Security
  • Endpoint Protection Demo
  • Explain Embedded System Security Implications
  • Module Summary
Module 13: Mobile Devices
  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections
  • Module Summary
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
  • Analyze Indicators of Application Attack
  • Analyze Indicators of Web Application Attacks
  • Summarize Secure Coding Practices
  • Implement Secure Script Environments
  • Summarize Deployment and Automation Concepts
  • Module Summary
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
  • Summarize Secure Cloud and Virtualization Services
  • Apply Cloud Security Solutions
  • Summarize Infrastructure as Code Concepts
  • Module Summary
Module 16: Privacy and Data Protection
  • Explain Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls
  • Module Summary
Module 17: Incident Response
  • Summarize Incident Response Procedures
  • Utilize Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls
  • Module Summary
Module 18: Forensics
  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition
  • Module Summary
Module 19: Risk Management and Business Impact Analysis
  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts
  • Module Summary
Module 20: Redundancy and Backup Strategies
  • Implement Redundancy Strategies
  • Implement Backup Strategies
  • Implement Cybersecurity Resiliency Strategies
  • Module Summary
Module 21: Physical Security
  • Explain the Importance of Physical Site Controls
  • Explain the Importance of Physical Host Security Controls
  • Module Summary
Module 22: Afterword
  • Conclusion and General Exam Tips
Module 1: Threat and Vulnerability Management
  • Instructor Intro
  • About the Exam
  • Test Taking Tips and Techniques
  • Explain the importance of threat data and intelligence
  • Given a scenario, utilize threat intelligence to support organizational security
  • Given a scenario, perform vulnerability management activities Pt 1
  • Given a scenario, perform vulnerability management activities Pt 2
  • Given a scenario, analyze the output from common vulnerability assessment tools
  • Explain the threats and vulnerabilities associated with specialized technology
  • Explain the threats and vulnerabilities associated with operating in the Cloud
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
  • Outline
  • Given a scenario, apply security solutions for infrastructure management Pt 1
  • Given a scenario, apply security solutions for infrastructure management Pt 2
  • Given a scenario, apply security solutions for infrastructure management Pt 3
  • Flashcards
  • Explain software assurance best practices
  • Scatter
  • Explain hardware assurance best practices
  • Learn
  • Speller
  • Workbook
Module 3: Security Operations and Monitoring
  • Given a scenario, analyze data as part of security monitoring activities Pt 1
  • Given a scenario, analyze data as part of security monitoring activities Pt 2
  • Given a scenario, analyze data as part of security monitoring activities Pt 3
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 1
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 2
  • Explain the importance of proactive threat hunting
  • Compare and contrast automation concepts and technologies
Module 4: Incident Response
  • Explain the importance of the incident response process
  • Given a scenario, apply the appropriate the incident response procedure
  • Given an incident, analyze potential indicators of compromise
  • Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
  • Understand the importance of data privacy and protection
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
  • Explain the importance of frameworks, policies, procedures, and controls Pt 1
  • Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
  • Recap
  • Review Questions
  • Before the Exam
Cloud Concepts, Architecture and Design
  • Course Intro
  • Cloud Concepts, Architecture and Design – Part 1
  • Cloud Concepts, Architecture and Design – Part 2
  • Cloud Concepts, Architecture and Design – Part 3
  • Cloud Concepts, Architecture and Design – Part 4
  • Cloud Concepts, Architecture and Design – Part 5
  • Cloud Concepts, Architecture and Design – Part 6
  • Cloud Concepts, Architecture and Design – Part 7
  • Cloud Concepts, Architecture and Design – Part 8
  • Cloud Concepts, Architecture and Design – Part 9
Legal, Risk and Compliance
  • Legal, Risk and Compliance Part 1
  • Legal, Risk and Compliance Part 2
  • Legal, Risk and Compliance Part 3
  • Legal, Risk and Compliance Part 4
  • Legal, Risk and Compliance Part 5
  • Legal, Risk and Compliance Part 6
  • Legal, Risk and Compliance Part 7
Cloud Data Security
  • Cloud Data Security – Part 1
  • Cloud Data Security – Part 2
  • Cloud Data Security – Part 3
  • Cloud Data Security – Part 4
  • Cloud Data Security – Part 5
  • Cloud Data Security – Part 6
  • Cloud Data Security – Part 7
Cloud Platform and Infrastructure Security
  • Cloud Platform and Infrastructure Security – Part 1
  • Cloud Platform and Infrastructure Security – Part 2
  • Cloud Platform and Infrastructure Security – Part 3
  • Cloud Platform and Infrastructure Security – Part 4
  • Cloud Platform and Infrastructure Security – Part 5
  • Cloud Platform and Infrastructure Security – Part 6
  • Cloud Platform and Infrastructure Security – Part 7
  • Cloud Platform and Infrastructure Security – Part 8
Cloud Application Security
  • Cloud Application Security – Part 1
  • Cloud Application Security – Part 2
  • Cloud Application Security – Part 3
  • Cloud Application Security – Part 4
  • Cloud Application Security – Part 5
  • Cloud Application Security – Part 6
  • Cloud Application Security – Part 7
  • Cloud Application Security – Part 8
  • Cloud Application Security – Part 9
Cloud Security Operations
  • Cloud Security Operations – Part 1
  • Cloud Security Operations – Part 2
  • Cloud Security Operations – Part 3
  • Cloud Security Operations – Part 4
  • Cloud Security Operations – Part 5
  • Cloud Security Operations – Part 6
  • Cloud Security Operations – Part 7
  • Cloud Security Operations – Part 8
  • Cloud Security Operations – Part 9
  • Cloud Security Operations – Part 10
  • Cloud Security Operations – Part 11
  • Course Outro

This course is included in all of our team and individual training plans. Choose the option that works best for you.

[ Team Training ]

Enroll My Team.

Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.

Get Team Pricing

[ Individual Plans ]

Choose a Plan.

Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.

View Individual Plans

[ FAQ ]

Frequently Asked Questions.

What topics are covered in the CompTIA Security+ (SY0-601) course, and how does it prepare me for the certification exam?

The CompTIA Security+ (SY0-601) course comprehensively covers essential cybersecurity topics aligned with the latest exam objectives. It includes core areas such as network security, threat management, cryptography, identity and access management, and security architecture. The curriculum emphasizes practical skills like implementing security protocols, configuring firewalls, and managing vulnerabilities to prepare you for real-world scenarios.

This training is designed not only to help you understand fundamental security principles but also to develop the hands-on skills necessary for the SY0-601 exam. The course includes simulated labs, scenario-based exercises, and assessments that reinforce learning. By completing this series, you will be well-equipped to analyze security threats, apply security controls, and demonstrate your knowledge of industry best practices, all of which are critical for passing the Security+ exam and advancing your cybersecurity career.

How does the CompTIA CySA+ (CS0-002) course help me in threat detection and incident response?

The CompTIA CySA+ (CS0-002) course focuses on cybersecurity analytics, threat detection, and incident response techniques. It covers key topics such as analyzing security data, using threat intelligence tools, and applying vulnerability management practices to identify potential security issues proactively. The course emphasizes the importance of continuous monitoring and behavioral analysis for effective threat detection.

What are the benefits of obtaining the Certified Cloud Security Professional (CCSP) certification through this training?

The CCSP certification validates your expertise in cloud security, a rapidly growing domain within cybersecurity. This training covers critical areas such as cloud architecture, data security, compliance, and risk management, aligning with the (ISC)² CCSP exam objectives. It prepares you to design, manage, and secure cloud environments effectively, ensuring data confidentiality and integrity across multi-cloud or hybrid setups.

By earning the CCSP credential, you demonstrate your ability to implement industry best practices for cloud security, making you a valuable asset to organizations adopting cloud solutions. The certification also enhances your career prospects by opening roles such as cloud security architect, cloud security analyst, or cloud security consultant. The training provides the practical knowledge needed to navigate complex cloud security challenges and aligns with current industry standards and compliance requirements.

Is prior experience in networking or security necessary before taking this cybersecurity training series?

No prior experience in networking or security is strictly required to enroll in this training series. The courses are designed to accommodate learners at various levels, from beginners to those with some foundational knowledge. The curriculum starts with core concepts and gradually progresses to more advanced topics, ensuring a comprehensive understanding of cybersecurity principles.

However, having basic familiarity with networking concepts such as IP addressing, TCP/IP protocols, and general security practices can be beneficial for grasping certain topics more quickly. The instructors make an effort to clarify fundamental ideas before moving into complex scenarios, allowing learners to build their skills at a comfortable pace. This approach ensures that both newcomers and experienced IT professionals can gain valuable, job-ready knowledge from the series.

How can I best prepare for the CompTIA Security+ (SY0-601) exam using this training series?

To maximize your chances of passing the SY0-601 exam, it is essential to follow a structured study plan alongside completing this training series. Start by thoroughly engaging with all course materials, including videos, labs, and assessments. Revisit challenging topics and ensure you understand key concepts such as risk management, cryptography, and security controls.

Supplement your learning with practice exams, which help familiarize you with the exam format and identify areas that need further review. Creating study notes, participating in discussion forums, and practicing hands-on labs will reinforce your understanding. Additionally, staying updated on current security threats and industry trends can provide practical context for your studies. Combining this comprehensive training with disciplined review and practice will prepare you to confidently pass the exam and achieve your cybersecurity certification goals.

Ready to start learning? Individual Plans →Team Plans →