Free CompTIA Security+ SY0-701 Certification Course : Master Cybersecurity Concepts
Learn essential cybersecurity concepts, recognize threats, and develop skills to protect systems effectively with this comprehensive free Security+ training course.
When a phishing email slips past the inbox filter and lands in front of a user who clicks too fast, the damage is rarely limited to one workstation. That is exactly the kind of problem the comptia security+ free course is built to help you understand and handle. This on-demand CompTIA® Security+™ training gives you a practical path through the SY0-701 objectives so you can recognize threats, harden systems, respond to incidents, and speak the language of security with confidence.
I built this course for people who need more than a high-level overview. You are not here to collect vague theory. You are here to understand what actually matters on the job: how attacks work, how defenders think, where controls fail, and how to make better decisions when the pressure is on. Because this is a comptia security+ free course, you can start immediately, study on your own schedule, and decide whether you want to keep going once you see the material for yourself. That matters. Security is one of those fields where the best way to learn is to get your hands on the concepts and start connecting them to real-world scenarios.
If you have been searching for a comptia security+ certification free option that still feels serious and structured, this course is designed to give you exactly that starting point. It is also a strong fit if you want a comptia security+ free course with certificate experience that helps you build momentum without paying upfront. You get a focused introduction to the security domains that employers actually expect you to know, and you get it in a format that is built for self-paced learning.
Why this comptia security+ free course matters for your career
Security+ is often the first certification people pursue when they want to move into cybersecurity or prove they understand the baseline disciplines that every security professional needs. That is not an accident. The SY0-701 exam measures practical knowledge across threat management, architecture, implementation, operations, governance, and risk. Those are not abstract categories. They are the day-to-day decisions that keep an organization from losing data, trust, or money.
This comptia security+ free course is especially useful if you are coming from help desk, desktop support, networking, systems administration, or audit. Those roles already expose you to security issues, but they often leave gaps in the “why” behind the controls. Here, you will see how the pieces fit together. You will learn why a password policy is not enough by itself, why segmentation matters, why incident response must be rehearsed, and why risk management is as important as technical tooling.
Employers often use Security+ as a hiring benchmark for roles such as:
- Cybersecurity analyst
- Security administrator
- Network administrator with security duties
- Systems administrator
- IT support specialist moving into security
- Junior SOC analyst
- IT auditor or compliance-focused technician
Salary varies widely by location and experience, but entry-level security roles often land somewhere in the rough range of $60,000 to $95,000 in the United States, with higher figures in major metro areas and for candidates who already bring networking or systems experience. Security+ will not magically hand you the job, but it can absolutely help you qualify for the interview and, more importantly, keep the conversation moving once you are there.
What the SY0-701 exam expects you to know
The comptia security+ sy0-701 free course is centered around the current exam objectives, and that is important. Security content ages quickly. A course tied to outdated assumptions can waste your time and leave you underprepared for the real exam or the real job. The SY0-701 version reflects modern security concerns such as cloud adoption, hybrid environments, stronger identity controls, supply chain risk, and the need to respond quickly to incidents with defensible procedures.
You will work through the major objective areas in a way that builds understanding rather than memorization. The point is not simply to identify a phishing email or define ransomware. The point is to understand why the attack succeeded, what control could have reduced the risk, how the organization should respond, and what evidence might matter afterward. That is the mindset employers want and certification exams tend to reward.
The course focuses on the core domains that define the exam:
- Attacks, threats, and vulnerabilities
- Architecture and design
- Implementation
- Operations and incident response
- Governance, risk, and compliance
That structure is intentional. When you study each domain separately, you can get lost in terminology. When you study them as parts of one security story, you begin to see how threat actors exploit weaknesses, how architects reduce exposure, how administrators implement controls, how responders contain damage, and how policy keeps the whole thing defensible.
Attacks, threats, and vulnerabilities: learning to think like a defender
This is where many students begin to understand why security work is so demanding. Threats are not just malware names and buzzwords. They are patterns of behavior. In this portion of the comptia security+ free training, you study common attack methods such as phishing, spear phishing, smishing, vishing, password attacks, malware variants, social engineering, denial-of-service attacks, and exploit-driven compromise. You also look at how attackers combine methods, because real incidents rarely involve a single tactic.
Just as important, you will learn how vulnerabilities appear in everyday environments. An unpatched application, a misconfigured cloud storage bucket, weak credentials, excessive permissions, or a poorly secured wireless network can become the weak point that makes a breach possible. Security professionals must be able to identify those weaknesses before someone else does.
Expect to build practical judgment around topics like:
- Threat actors and their motivations
- Indicators of compromise
- Vulnerability scanning and remediation priorities
- Threat intelligence and attacker tradecraft
- Application, network, and host-based weaknesses
I always tell students this: if you cannot explain how an attack starts, you will struggle to explain how to stop it. That is why this objective is so foundational. It gives you the vocabulary and the defensive mindset that everything else depends on.
Architecture and design: building security into the environment
Security is easier when the environment is designed well, and much harder when it is not. In this section, you learn how secure architecture reduces risk before controls even fire. That includes network segmentation, secure topology choices, zero trust concepts, cloud security design considerations, virtualization risks, and the use of security zones and boundaries to reduce blast radius.
This is the part of the course where students often start to connect security with engineering. A good architecture does not just react to attacks; it limits what attackers can reach. That may mean separating user networks from server networks, restricting administrative access, using strong authentication methods, or designing cloud workloads with the least privilege necessary. You will also look at how secure systems should be designed to support resilience, availability, and recoverability, not just confidentiality.
Topics in this area typically include:
- Secure network architecture and segmentation
- Cloud and hybrid environment security considerations
- Virtualization and container-related risks
- Resilience, redundancy, and secure design principles
- Physical security and environmental controls
Too many junior techs think security is something you bolt on later. It is not. Good security architecture is what makes later compromises harder, slower, and more visible. That is why this domain matters so much in a CompTIA® Security+™ path.
Implementation: putting controls in place the right way
Knowing what security should look like is one thing. Implementing it in a live environment is where the work becomes real. This part of the comptia security+ sy0-701 free course focuses on practical controls: secure configuration, authentication methods, encryption, wireless security, firewalls, VPNs, endpoint protection, and application security basics. These are the tools and settings you actually touch on the job.
You will learn how security controls are applied at different layers. For example, identity controls govern who can access what. Network controls limit traffic and enforce boundaries. Host controls protect the endpoint. Cryptographic controls protect data at rest and in transit. When those controls are coordinated well, the environment becomes much harder to abuse.
In this objective, pay close attention to:
- Identity and access management fundamentals
- Multi-factor authentication and authentication factors
- Encryption concepts and certificate-based trust
- Firewall rules, secure remote access, and VPN basics
- Wireless security settings and safe deployment practices
- Secure application and automation concepts
What I like about this section is that it stops security from being theoretical. You are learning how control choices affect actual systems. That is the kind of judgment administrators and analysts use every day, whether they are securing a branch office, a cloud workload, or a remote workforce.
Operations and incident response: what you do when something goes wrong
When an incident hits, people do not remember who had the nicest policy document. They remember who knew what to do. That is why operations and incident response is such a critical part of Security+. In this course, you will learn the sequence of incident handling, the value of preparation, and the role of evidence, communication, and recovery when a security event disrupts normal operations.
This domain covers incident response procedures, logging, monitoring, triage, containment, eradication, recovery, and post-incident activity. It also connects security operations to policies, business continuity, disaster recovery, legal considerations, and forensic preservation. A lot of beginners underestimate this area because it sounds procedural. It is not. It is where security becomes business survival.
You should expect to understand concepts such as:
- Alert triage and log analysis
- Incident response steps and containment strategy
- Forensic basics and evidence handling
- Disaster recovery and business continuity planning
- Security controls that support operational resilience
Good incident response is not improvisation. It is practiced, documented, and coordinated. If you are waiting until the breach to figure out roles, tools, and communication paths, you are already late.
This section is especially valuable if you are aiming for a SOC analyst, systems, or operations role. Those jobs live in the tension between uptime and risk, and you need to understand both sides of that equation.
Governance, risk, and compliance: the part many technicians overlook
Some people want to skip governance because it feels less exciting than malware or firewalls. That is a mistake. Governance, risk, and compliance are where organizations decide what security should look like, how they measure risk, and how they prove they are following the rules that govern their business. If you do not understand this domain, you will struggle to make security decisions that stand up to audits, leadership questions, or regulatory requirements.
In this portion of the course, you work through security policies, standards, procedures, and controls; legal and regulatory concepts; risk treatment options; and the basic language of compliance. You will also see how frameworks and documentation support accountability. The point is not to turn you into a lawyer. The point is to help you understand why security must be defensible, not just technically clever.
Key ideas include:
- Risk assessment and risk treatment
- Policy versus standard versus procedure
- Compliance expectations and data handling considerations
- Security awareness and governance responsibilities
- Documentation that supports audits and management review
This is one reason Security+ remains valuable. It does not train you to be a one-dimensional technician. It trains you to think like someone who can operate inside a real organization, with real constraints, where security has to serve business goals without ignoring risk.
Who should take this course and what you need before you start
This course is built for learners at a range of stages, but it is especially helpful if you already have some IT exposure and want to move into security. You do not need to be an expert before you begin. You do need curiosity, discipline, and enough comfort with basic networking or systems concepts to stay engaged. If terms like IP address, DNS, ports, permissions, and Windows or Linux administration are familiar, you will be in a good place.
The best-fit learners usually include:
- Help desk professionals preparing to specialize
- Network technicians who want security responsibility
- System administrators who need stronger defensive skills
- Students pursuing a first cybersecurity certification
- IT auditors and compliance-minded professionals
- Career changers with some technical foundation
If you are brand new to IT, you can still benefit from the content, but you may need to slow down on the networking, OS, and identity management concepts. That is normal. Security is built on a lot of moving parts. The good news is that this course is designed to help you make those connections in a structured way.
Many people use a comptia security+ free course like this one to test the waters before committing to a full certification attempt. That is a smart move. It lets you see whether the subject fits your career goals, and it gives you a solid foundation if you decide to continue toward exam preparation.
How to get the most value from a free Security+ path
A free course is only valuable if you use it with intent. Security concepts tend to pile up quickly, and passive watching is not enough. The students who get the most from this material are the ones who pause, compare examples, and ask, “What would I do in my environment?” That habit turns theory into skill.
Here is how I recommend approaching this comptia security+ free training:
- Start with the attack and threat domain so you understand the problem space.
- Move into architecture and implementation to see how defenses are built.
- Study incident response and governance together so you understand action and accountability.
- Take notes in your own words, not just copied definitions.
- Relate each concept to a real scenario you have seen or can imagine at work.
If you are preparing for the exam, this kind of study rhythm matters more than cramming. The SY0-701 exam rewards understanding, not just recognition. And if your goal is job readiness rather than the exam itself, the same approach helps you speak with more confidence in interviews and on the job.
This is also why a comptia security+ certification free option can be useful early in your journey. It lowers the barrier to entry while still giving you structured content that reflects a legitimate industry baseline.
What you walk away with
By the time you work through this course, you should be able to talk through the major security domains with much more confidence. You will understand how common attacks operate, how secure designs reduce exposure, how implementation choices affect risk, how incident response works, and how governance keeps security aligned with business and legal expectations.
That is the real payoff. You are not just memorizing terminology for a test. You are building the mental habits that security work demands. If your goal is to break into cybersecurity, strengthen your existing IT role, or prepare for CompTIA® Security+™ with a practical foundation, this course gives you a clear starting point.
And because it is a comptia security+ sy0-701 free course, you can begin without the usual friction. No credit card. Immediate access. A serious introduction to a serious subject. That is exactly how I think a good entry point into security should work.
CompTIA® and Security+™ are trademarks of CompTIA®. This content is for educational purposes.
Module 1 – SY0-701 General Security Concepts
- 1.0 Introduction to the Course
- 1.1 Fundamental Security Concepts
- 1.2 Zero Trust
- 1.3 Deception and Disruption
- 1.3.1 ACTIVITY – Testing a Honeypot
- 1.4 Security Controls
- 1.5 Change Management and Security
- 1.6 Cryptography Basics
- 1.6.1 ACTIVITY – Examining Symmetric Encryption
- 1.7 Asymmetric Encryption
- 1.7.1 ACTIVITY – Exploring Asymmetric Encryption
- 1.8 Hashing
- 1.8.1 ACTIVITY – Verifying Integrity with Hashing
- 1.9 Digital Certificates
- 1.10 Public Key Infrastructure
- 1.11 Data and Keys
- 1.12 Crypto Implementations
- 1.13 Blockchain
- 1.14 Non-Cryptographic Data Protection
Module 2 – SY0-701 Threats, Vulnerabilities, and Mitigations
- 2.1 Threat Actors and Motivations
- 2.2 Threat Vectors
- 2.2.1 ACTIVITY – O.MG Cable Baiting
- 2.2.2 O.MG-No Cable
- 2.3 Social Engineering
- 2.4 Operating System Vulnerabilities and Attacks
- 2.5 Application Vulnerabilities and Attacks
- 2.5.1 ACTIVITY – Performing a Buffer Overflow
- 2.6 Web-based Vulnerabilities and Attacks
- 2.6.1 ACTIVITY – Abusing Unsanitized Input
- 2.6.2 ACTIVITY – Grabbing Passwords with SQL Injection
- 2.6.3 ACTIVITY – Swiping a Token with XSS
- 2.7 Other Vulnerabilities
- 2.8 Common Malicious Activity Indicators
- 2.9 Insider Threat Indicators
- 2.10 Social Engineering Indicators
- 2.10.1 ACTIVITY – Capturing Credentials through Social Engineering
- 2.11 Malware Activity Indicators
- 2.12 Operating System Attack Indicators
- 2.13 Application Attack Indicators
- 2.13.1 ACTIVITY – Recognizing Directory Traversal
- 2.14 Physical Attack Indicators
- 2.14.1 ACTIVITY – Quickly Cloning an RFID Badge
- 2.15 Network Attack Indicators
- 2.15.1 ACTIVITY – Crashing a Target with DoS
- 2.16 Cryptographic Attack Indicators
- 2.17 Password Attack Indicators
- 2.17.1 ACTIVITY – Password Cracking
- 2.18 Network Segmentation
- 2.19 Access Control
- 2.20 Enterprise Device Hardening
Module 3 – SY0-701 Security Architecture
- 3.1 Network Segmentation
- 3.1.1 ACTIVITY – Segementing a Network
- 3.2 High Availability
- 3.3 Virtualization
- 3.3.1 ACTIVITY – Deploying Docker Containers
- 3.4 Cloud
- 3.5 Serverless Computing
- 3.6 IoT
- 3.7 ICS SCADA
- 3.7.1 ACTIVITY – Operating a SCADA System
- 3.8 RTOS and Embedded Systems
- 3.9 Reducing the Attack Surface
- 3.10 Firewalls
- 3.11 IDS IPS.mp4
- 3.12 Secure Communications – Access
- 3.13 Port Security
- 3.14 SD-WAN and SASE
- 3.15 Data Classifications
- 3.16 Protecting Data Types
- 3.17 Data Considerations
- 3.18 Redundancy
- 3.19 Alternate Sites
- 3.20 Multiple Platforms
- 3.21 Business Continuity
Module 4 – SY0-701 Security Operations
- 4.1 Secure Baselines
- 4.2 Attack Surface Reduction
- 4.3 Wireless Installation
- 4.4 Wireless Security Settings
- 4.5 Mobile Solutions
- 4.5.1 ACTIVITY – Pwning a Mobile Device
- 4.6 Application Security Management
- 4.7 Asset Management
- 4.8 Vulnerability Management
- 4.9 Monitoring Activities
- 4.10 Monitoring Tools
- 4.10.1 ACTIVITY – Scanning a Network for Vulnerabilities
- 4.11 Firewall Configuration
- 4.11.1 ACTIVITY – Configuring Firewall Rules
- 4.12 Intrusion Detection Configuration
- 4.13 Web Traffic Filtering
- 4.14 Operating System Policy
- 4.14.1 ACTIVITY – Examining Windows Group Policy
- 4.15 Network Service Security
- 4.16 Data Loss Protection
- 4.16.1 ACTIVITY – Checking File Integrity
- 4.17 Network Access Control
- 4.17.1 ACTIVITY – Require Multifactor Authentication
- 4.18 Identity Management
- 4.19 Access Management
- 4.19.1 ACTIVITY – Implementing Access Control
- 4.20 Security Automation
- 4.21 Incident Response
- 4.22 Digital Forensics
Module 5 – SY0-701 Security Program Management and Oversight
- 5.1 Elements of Effective Security Governance
- 5.2 Elements of the Risk Management Process
- 5.3 Third Party Risk Assessment and Management
- 5.3.1 ACTIVITY – Analyzing the Solar Winds Supply Chain Failure
- 5.4 Effective Security Compliance
- 5.5 Audits and Assessments
- 5.5.1 ACTIVITY – Conducting OSINT
- 5.5.2 ACTIVITY – Performing Active Reconnaissance
- 5.6 Security Awareness Practices
- 5.7 Course Outro
Module 1 – CompTIA CySA+ CS0-003 Basics
- 1.1 Course Introduction
- 1.2 Instructor Introduction
- 1.3 What is CySA
- 1.4 Exam Objectives
- 1.5 Cybersecurity Pathway
- 1.6 DoD Baseline Certfication
Module 2 – CompTIA CySA+ CS0-003 Domain 1 – Security Operations
- 2.1 Domain 1 – Security Operations Overview
- 2.2 System and Network Architecture Concepts in Security Operations
- 2.3 Log Files
- 2.4 Operating Systems
- 2.5 Infrastructure Concepts
- 2.6 Network Architecture
- 2.7 Software Defined Networking
- 2.8 Whiteboard Discussion – Network Architectures
- 2.9 Identity and Access Management IAM Basics
- 2.10 Demonstration – IAM
- 2.11 Encryption
- 2.12 Sensitive Data
- 2.13 1.2 Analyze Indicators of Potentially Malicious Activity
- 2.14 Network Attack
- 2.15 Host Attacks
- 2.16 Application Related Attacks
- 2.17 Social Attacks
- 2.18 Tools or Techniques to Determine Malicious Activity Overview
- 2.19 Tools and Toolsets For Identifying Malicious Activity
- 2.20 Common Techniques
- 2.21 Programming Concerns
- 2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
- 2.23 Threat Actors
- 2.24 Tactics, Techniques and Procedures
- 2.25 Confidence Levels IOC
- 2.26 Collection Sources
- 2.27 Threat Intelligence
- 2.28 Cyber Response Teams
- 2.29 Security Operations
- 2.30 Standardized Processes and Operations
- 2.31 Security Operations Tools and Toolsets
- 2.32 Module 2 Review
Module 3 – CompTIA CySA+ CS0-003 Domain 2 – Vulnerability Management
- 3.1 Domain 2 – Vulnerability Management Overview
- 3.2 Vulnerability Discovery and Scanning
- 3.3 Asset Discovery and Scanning
- 3.4 Industry Frameworks
- 3.5 Mitigating Attacks
- 3.6 CVSS and CVE
- 3.7 Common Vulnerability Scoring System (CVSS) interpretation
- 3.8 CVE Databases
- 3.9 Cross Site Scripting (XSS)
- 3.10 Vulnerability Response, Handling, and Management
- 3.11 Control Types (Defense in Depth, Zero Trust)
- 3.12 Patching and Configurations
- 3.13 Attack Surface Management
- 3.14 Risk Management Principles
- 3.15 Threat Modeling
- 3.16 Threat Models
- 3.17 Secure Coding and Development (SDLC)
- 3.18 Module 3 Review
Module 4 – CompTIA CySA+ CS0-003 Domain 3 – Incident Response and Management
- 4.1 Domain 3 – Incident Response and Management Overview
- 4.2 Attack Methodology Frameworks
- 4.3 Cyber Kill Chain
- 4.4 Frameworks to Know
- 4.5 Incident Response and Post Reponse
- 4.6 Detection and Analysis
- 4.7 Post Incident Activities
- 4.8 Containment, Eradication and Recovery
- 4.9 Module 4 Review
Module 5 – CompTIA CySA+ CS0-003 Domain 4 – Reporting and Communication
- 5.1 Domain 4 – Reporting and Communication Overview
- 5.2 Reporting Vulnerabilities Overview
- 5.2.1 Vulnerability Reporting
- 5.3 Compliance Reports
- 5.4 Inhibitors to Remediation
- 5.5 Metrics and KPI's
- 5.6 Incident Response Reporting and Communications Overview
- 5.7 Incident Declaration
- 5.8 Communication with Stakeholders
- 5.9 Root Cause Analysis
- 5.10 Lessons Learned and Incident Closure
- 5.11 Module 5 Review
Module 6 – CompTIA CySA+ CS0-003 – Course Closeout
- 6.1 Course Closeout Overview
- 6.2 Practice Questions
- 6.3 Exam Process
- 6.4 Continuing Education
- 6.5 Course Closeout
Module 1 – CompTIA Cloud+ CV0-003 Course Overview
- 1.0 Course Trailer
- 1.1 Course Overview
- 1.2 What is the Cloud + Exam
- 1.3 Cloud + Domain Obectives Overview
- 1.4 CompTIA Certification Pathways
- 1.5 DoD and ISO Requirements
Module 2 – General Cloud Knowledge
- 2.1 Domain Overview
- 2.2 Compare and Contrast Cloud Models
- 2.3 Cloud Computing Defined
- 2.4 Deployment Models
- 2.5 Service Models
- 2.6 Cloud Characteristics
- 2.7 Cloud Roles
- 2.8 Evaluate Cloud Providers and Services
- 2.9 Regions and Zones
- 2.10 Shared Responsibility Model
- 2.11 Demonstration – AWS Shared Security Model
- 2.12 Comparing Cloud to Virtualization
- 2.13 Comparing Cloud to On Premises
- 2.14 What is a Virtual Machine
- 2.15 Demonstration – Deploy a Cloud VM (AWS EC2)
- 2.16 What is an API
- 2.17 Capacity Planning Factors
- 2.18 Licensing, Factors, Requirements and Planning
- 2.19 Capacity Planning
- 2.20 Demonstration – AWS Trusted Advisor
- 2.21 HA and Scaling
- 2.22 High Availability and Disaster Recovery
- 2.23 Virtual, System and Communication Protection
- 2.24 Hypervisor Affinity
- 2.25 Analyze the solution design
- 2.26 Business Requirements
- 2.27 Business Enablers
- 2.28 Demonstration -AWS Well Architected Tool
- 2.29 Testing Techniques
- 2.30 Testing Success Factors
- 2.31 Module Review Questions
- 2.32 Module Summary Review
Module 3 – Cloud Security
- 3.1 Domain Overview
- 3.2 Configure Identity and Access Management
- 3.3 Identification and Authorization Management (IAM)
- 3.4 SDLC
- 3.5 Directory Services
- 3.6 Security and Access Controls
- 3.7 Federation
- 3.8 SSO and MFA
- 3.9 Certificates and Key Management
- 3.10 Secure a Network in a Cloud Environment
- 3.11 Networking Devices and Segmentation
- 3.12 Firewalls and Proxies
- 3.13 NAT and PAT
- 3.14 Secure Network Configurations (Tunnelling and Encryption)
- 3.15 Demo Hardening and Configuration Changes
- 3.16 OS Application Controls and Security Credentials
- 3.17 Policies and Permissions
- 3.18 Host and Network Protections (HIDSIPS)
- 3.19 Virtualization Security
- 3.20 Monitoring
- 3.21 Data Security and Compliance Controls in Cloud Environments
- 3.22 Structured, Unstructured and Semi Structured Data
- 3.23 Data Classification and Labeling
- 3.24 Data Loss Prevention
- 3.25 Demonstration – Google Cloud DLP
- 3.26 Chain of Custody and Non-Repudiation
- 3.27 Discussion – CASB
- 3.28 Module Summary Review
- 3.29 Module Review Questions
Module 4 – Cloud Deployment
- 4.1 Domain Overview
- 4.2 Integrate Components into Cloud Solutions
- 4.3 Subscription Services
- 4.4 Demonstration – Provision VM
- 4.5 Cloud Infrastructure Components
- 4.6 Whiteboard – Design a Resilent AWS Cloud Architecture
- 4.7 Containers
- 4.8 Microservices
- 4.9 Demonstration – Deploy Containers
- 4.10 Scaling
- 4.11 Provision Storage
- 4.12 Cloud Storage Protocols
- 4.13 Storage Features
- 4.14 Storage Cost Considerations
- 4.15 Storage Performance
- 4.16 RAID and Tiering
- 4.17 Demonstration – AWS S3
- 4.18 Deploy Cloud Networking Solutions
- 4.19 Connecting to The Cloud
- 4.20 Network Protocols
- 4.21 VPNS, VPC and Connectivity
- 4.22 Whiteboard – AWS VPC Connectivity
- 4.23 Demonstration – AWS VPC
- 4.24 Software Defined Networking (SDN)
- 4.25 Compute Sizing
- 4.26 Virtualization Considerations
- 4.27 Resource Rightsizing (CPU, Memory, etc)
- 4.28 Module Summary Review
- 4.29 Module Review Questions
Module 5 – Operations and Support
- 5.1 Domain Overview
- 5.2 Logging Monitoring and Alerting
- 5.3 Logging, Storage and Analysis of Data Events
- 5.4 Monitoring Cloud Resources
- 5.5 Service Level Agreements
- 5.6 Demonstration – SLAs in AWS
- 5.7 Maintain Efficient Operations of a Cloud Environment
- 5.8 Lifecycle Management
- 5.9 Change and Asset Management
- 5.10 SOP, Patching and Upgrades
- 5.11 Orchestration and Automation
- 5.12 Orchestration or Automation
- 5.13 DevOps, IaC and CICD Pipelines
- 5.14 Playbooks and Templates
- 5.15 Backup and Restore Operations
- 5.16 Backup Types, Objects, Targets
- 5.17 Restore and Recovery
- 5.18 Module Summary Review
- 5.19 Module Review Questions
Module 6 – Troubleshooting
- 6.1 Domain Overview
- 6.2 Troubleshooting Methodology Intro
- 6.3 Troubleshooting Methodology
- 6.4 Troubleshoot Security Issues
- 6.5 Cloud Attacks
- 6.6 Security Groups and NACLS
- 6.7 Troubleshoot Deployment Issues
- 6.8 Discussion Site Connectivity Issues
- 6.9 Discussion – Capacity Issues
- 6.10 Connectivity Issues
- 6.11 Connectivity Troubleshooting Tools
- 6.12 Demonstration – GCP AWS Azure Latency Test
- 6.13 Module Summary Review
- 6.14 Module Review Questions
Module 7 – Course Closeout
- 7.1 Exam Preparation
- 7.2 Course Closeout
Module 1 – Devices, Setups, and Installs
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Appropriate Safety Procedures
- 1.3 PC Components
- 1.4 Guidlines for PC Disassembly
- 1.5 Motherboards
- 1.6 CPU Sockets
- 1.7 PCI Bus
- 1.8 Storage Bus (SATA and IDE)
- 1.9 Discussing PC Components
- 1.10 Common Connection Interfaces
- 1.11 Wired and Wireless Connection Standards
- 1.12 Install Peripheral Devices
- 1.13 Guidlines and Discussion for Installing Peripheral Devices
Module 2 – Displays and Multimedia Devices
- 2.1 Displays and Multimedia
- 2.2 Display Device Connections and Cables
- 2.3 Discussing Display Device Installation and Configuration
- 2.4 Troubleshoot Display Devices
- 2.5 Guidelines for Troubleshooting Display Devices
- 2.6 Discussing Display Device Troubleshooting
- 2.7 Install and Configure Multimedia Devices
- 2.8 Discussing Multimedia Device Installation and Configuration
Module 3 – Supporting Multiple Drive Types
- 3.1 Supporting Multiple Drive Types and Memory
- 3.2 Memory Types
- 3.3 RAM Types
- 3.4 Memory Modules
- 3.5 DIMM and SO-DIMM Technologies
- 3.6 Parity and ECC RAM
- 3.7 Memory Compatibility Issues
- 3.8 Discussing System Memory Installation
- 3.9 Install and Configure Mass Storage Devices
- 3.10 Storage Adapters and Cables
- 3.11 Solid State Drives
- 3.12 Guidlines for Installing Mass Storage Devices
- 3.13 Discussing Mass Storage Device Installation and Configuration
- 3.14 Install and Configure Removable Storage
- 3.15 Discussing Removable Storage Device Istallation and Configuration
- 3.16 Configure RAID
- 3.17 RAID Configuration Options
- 3.18 Discussing RAID Configuration
- 3.19 Troubleshoot Storage Devices
- 3.20 Boot Failures
- 3.21 Discussing Storage Device Troubleshooting
Module 4 – Accounting for CPUs and Internal Components
- 4.1 Install Upgrade CPUs
- 4.2 Multiprocessing and Multicore Processors
- 4.3 Discussing CPU Upgrades
- 4.4 Configure and Update BIOS UEFI
- 4.5 Discussing BOIS-UEFI Configuration and Updates
- 4.6 Install Power Supplies
- 4.7 Discussing Power Supply Installation
- 4.8 Troubleshoot Internal System Components
- 4.9 POST and Boot Problems
- 4.10 Boot Troubleshooting and Log Entries
- 4.11 Motherboard Component Problems
- 4.12 Discussing System Component Troubleshooting
Module 5 – All About Network Theories
- 5.1 Wired Networks
- 5.2 Common Ethernet Network Implementations
- 5.3 Taps and Mirrors
- 5.4 Discussing Wired Networks
- 5.5 Network Hardware Devices
- 5.6 Switches
- 5.7 Power Over Ethernet
- 5.8 Discussing Network Hardware Devices
- 5.9 Wireless Networks
- 5.10 Access Points and Wireless Network Modes
- 5.11 Discussing Wireless Networks
- 5.12 Internet Connection Types
- 5.13 Wireless Internet Service Providers WISP
- 5.14 Discussing Internet Connection Types
- 5.15 Network Configuration Concepts
- 5.16 The TCIP-IP Protocol Suite
- 5.17 Internet Protocol and IP Addressing
- 5.18 Public and Private IP Addresses
- 5.19 IPv6
- 5.20 Discussing Network Configuration Concepts
- 5.21 Network Services
- 5.22 DNS
- 5.23 Dynamic and Static IP Configurations
- 5.24 DNS Records MX and A
- 5.25 Web Servers and HTTP-HTTPS
- 5.26 Discussing Network Services
Module 6 – Network Operations and Diagnostics
- 6.1 Configuring and Troubleshooting Networks
- 6.2 Network Connections in Windows
- 6.3 Install and Configure SOHO Networks
- 6.4 Configure SOHO Network Security
- 6.5 Firewalls
- 6.6 Port Fowarding and Port Triggering
- 6.7 Windows Firewall
- 6.8 Network Security and Embedded Appliances
- 6.9 Configure Remote Access
- 6.10 Discussing Remote Access Configuration
- 6.11 Troubleshoot Network Connections
- 6.12 IP Configuration Issues
- 6.13 Routing Issues
- 6.14 Discussing Network Connection Troubleshooting
Module 7 – Cloud and Virtualization Computing
- 7.1 Configure Client-Side Virtulaization
- 7.2 Hypervisors
- 7.3 Processor Support and Resource Requirements
- 7.4 Virtual Networks
- 7.5 Client-Side Virtualization
- 7.6 Cloud Computing Concepts
- 7.7 Internal and External Shared Resources
- 7.8 Cloud Service Options
- 7.9 Virtual Desktops
- 7.10 Software-Defined Networking (SDN)
- 7.11 Discussing Cloud Computing Concepts
Module 8 – Laptop Features and Troubleshooting
- 8.1 Use Laptop Features
- 8.2 Expansion Options
- 8.3 Discussing Laptop Features
- 8.4 Install and Configure Laptop Hardware
- 8.5 Discussing Laptop Hardware Installation and Configuration
- 8.6 Troubleshoot Common Laptop Issues
- 8.7 Discussing Troubleshooting Common laptop Issues
Module 9 – Syncing and Setup of Mobile Devices
- 9.1 Syncing and Setup of Mobile Devices
- 9.2 Connect and Configure Mobile Devices
- 9.3 Configure Mobile Device Network Connectivity
- 9.4 Mobile VPN Configuration
- 9.5 Email Configuration Options
- 9.6 Discussing Mobile Device Network Connectivity Configuration
- 9.7 Support Mobile Apps
- 9.8 Discussing Mobile App Support
Module 10 – All Things Printing
- 10.1 All Things Printing
- 10.2 Discussing Laser Printer Maintenance
- 10.3 Maintain Inkjet Printers
- 10.4 Discussing Inkjet Printer Maintenance
- 10.5 Maintain Impact, Thermal, and 3D Printers
- 10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
- 10.7 Install and Configure Printers
- 10.8 Discussing Printer Installation and Configuration
- 10.9 Troubleshoot Print Device Issues
- 10.10 Install and Configure Imaging Devices
- 10.11 Discussing Device Installation and Configuration
Module 11 – Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
Module 1 – Operating System Management
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Identify Common Operating Systems
- 1.3 Microsoft Windows
- 1.4 Work and Education Features
- 1.5 Windows System Limits
- 1.6 Apple Operating Systems
- 1.7 Linux Disk and File Management
- 1.8 Discussing OS Types
- 1.9 Use Windows Features and Tools
- 1.10 Administrative Tools
- 1.11 Manage Files in Windows
- 1.12 System Hierarchies
- 1.13 File Attributes
- 1.14 Discussing Windows Features and Tools
- 1.15 Manage Disks in Windows
- 1.16 Discussing File Management in Windows
- 1.17 The Windows Disk Management Console
- 1.18 Discussing Windows Disk Management
- 1.19 Manage Devices in Windows
- 1.20 Device Manager
- 1.21 Discussing Windows Device Manager
Module 2 – Configuring and installing the OS
- 2.1 Configuring and Installing the OS
- 2.2 Installation Boot Methods
- 2.3 Disk Formatting and Partitioning
- 2.4 Networking Considerations
- 2.5 Post Installation Tasks
- 2.6 OS Installation Types
- 2.7 Unattended Installations
- 2.8 Maintain OSs
- 2.9 OS Updates
- 2.10 Anti-Malware Updates
- 2.11 Scheduled Backups
- 2.12 Task Schedulers part 1
- 2.13 Task Schedulers part 2
- 2.14 Install Windows 10 Demonstration
- 2.15 Discussing OS Maintenance
Module 3 – Tools to Troubleshoot and Maintain the OS
- 3.1 Install and Manage Windows Applications
- 3.2 Windows OS Tools
- 3.3 Application and Print Services
- 3.4 Task Manager
- 3.5 Manage Windows Performance
- 3.6 Windows Performance Management Tools
- 3.7 Troubleshoot Windows
- 3.8 Event Viewer
- 3.9 The System Configuration Utility
- 3.10 Troubleshooting Tips Boot Process
- 3.11 Troubleshooting Tips for Windows System Issues
- 3.12 Blue Screens and Spontaneous Shutdowns
- 3.13 Troubleshooting Tips for File and Memory Corruption
- 3.14 Safe Boot
- 3.15 System Repair Disc
- 3.16 System Restore
- 3.17 Guidelines for Troubleshooting Windows Issues
Module 4 – Network Management Tools
- 4.1 Network Management Tools
- 4.2 Network Connectivity
- 4.3 IP Addressing and Connection Types
- 4.4 Proxy Settings
- 4.5 Windows Client Configuration
- 4.6 Location Services
- 4.7 Firewalls
- 4.8 Network Troubleshooting
- 4.9 Remote Desktop Tools
- 4.10 Desktop Management and Remote Monitoring Tools
- 4.11 Disscussion Topics
Module 5 – Sharing Resources and Wrights Management
- 5.1 Sharing Resources and Wrights Management
- 5.2 User Group Accounts
- 5.3 Local Secutity Policy
- 5.4 SSO and Credential Manager
- 5.5 Workgroups and Homegroups
- 5.6 Network and Sharing Center
- 5.7 Network Share Configuration
- 5.8 NTSF File and Folder Permissions
- 5.9 Configure Active Directory Accounts and Policies
- 5.10 Domain Membership and Group Policy Objects
- 5.11 Basic AD Functions
- 5.12 Account Locks and Password Resets
Module 6 – Threats and Security Measures
- 6.1 Threats and Security Measures
- 6.2 Logical Security Concepts
- 6.3 Encryption
- 6.4 PKI and Certificates
- 6.5 Execution Control
- 6.6 NAC
- 6.7 Discussing Logical Decurity Concepts
- 6.8 Threats and Vulnerablilities
- 6.9 Types of Password Attacks
- 6.10 Discussing Threats and Vulnerabilities
- 6.11 Physical Security Controls
- 6.12 Discussing Physical Security Measures
Module 7 – Policies to Protect Data
- 7.1 Policies to Protect Data
- 7.2 Implement Security Best Practices
- 7.3 Guidlines for Implementing Security Best Practices
- 7.4 Discussing Security Best Practices Implementation
- 7.5 Implement Data Protection Policies
- 7.6 ACLs and Directory Permissions
- 7.7 Full Disk Encryption
- 7.8 Guildlines for Implementing Data Protection Policies
- 7.9 Discussing Data Protection Policies
- 7.10 Protect Data During Incident Response
- 7.11 Discussing Data Protection During Incident Response
Module 8 – Prevent Malware and Security Threats
- 8.1 Prevent Malware and Security Threats
- 8.2 Detect, Remove, and Prevent Malware
- 8.3 Trojan Horses and Spyware
- 8.4 Sources of Malware Infection
- 8.5 Best Practices for Malware Removal
- 8.6 Discussing Detecting, Removing, and Preventing Malware Infections
- 8.7 Troubleshoot Common Workstation Security Issues
- 8.8 Discussing Troubleshoot Common Workstation Security Issues
Module 9 – Supporting and Troubleshooting Mobile Devices
- 9.1 Supporting and Troubleshooting Mobile Devices
- 9.2 Secure Mobile Devices
- 9.3 IOT Internet of Things
- 9.4 Discussing Mobile Device Security
- 9.5 Troubleshoot Mobile Device Issues
- 9.6 Mobile Device Security Troubleshooting
- 9.7 Discussing Troubleshooting Mobile Devices
Module 10 – Implementing Operational Procedures
- 10.1 Implementing Operational Procedures
- 10.2 Environmental Impacts and Controls
- 10.3 Discussing Environmental Impact and Controls
- 10.4 Create and Maintain Documentation
- 10.5 Discussing Documentation Creation and Maintenance
- 10.6 Use Basic Change Management Best Practices
- 10.7 Discussing Change Management Best Practices
- 10.8 Implement Disaster Prevention and Recovery Methods
- 10.9 Discussing Implement Disaster Prevention and Recovery Methods
- 10.10 Basic Scripting Concepts
- 10.11 Discussing Scripting
- 10.12 Professionalism and Communication
- 10.13 Discussing Professionalism and Communication Skills
Module 11 – Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
Module 0 – Course introduction
- 0.1 Instructor Intro
- 0.2 Course Overview
Module 1 – Networking Fundamentals
- 1.1 Intro to Networking
- 1.1.1 Activity: Creating a Network
- 1.2 Common Terminology
- 1.2.1 Activity: Examining Ports and Sockets
- 1.3 OSI Model
- 1.4 DoD Model
- 1.4.1 Activity: Examining Network Layers
- 1.5 TCP, UDP, IP
- 1.5.1 Activity: Examining TCP
- 1.5.2 Activity: Examining UDP
- 1.5.3 Activity: Examining IP
- 1.6 ICMP, IGMP, ARP
- 1.6.1 Activity: Examining ICMP
- 1.6.2 Activity: Examining ARP
- 1.6.3 Activity: Examining IGMP
- 1.7 Network Topologies
- 1.8 Network Types
- 1.9 Part 1: Network Characteristics
- 1.9 Part 2: Network Characteristics
- 1.10 Module 1 outro
Module 2 – Cables and Connectors
- 2.1 Ethernet Standards
- 2.2 Copper Cable Types
- 2.3 Fiber Optic Cable Types
- 2.4 Connector Types
- 2.4.1 Activity: Selecting the Right Cable
- 2.5 Media Converters and Transceivers
- 2.6 Cable Management
- 2.7 Module 2 Outro
Module 3 – Internet Protocol (IP)
- 3.1 IPv4 Basics
- 3.2 IP Packet and Interface Types
- 3.2.1 Activity: Configuring Client IP Settings
- 3.3 Binary Numbering System
- 3.4 Classful and Classless Addressing
- 3.5 Understanding CIDR Notation
- 3.6 IPv4 Subnetting Method
- 3.7 Verifying with Binary
- 3.8 Finding Subnet IDs
- 3.8.1 Activity: Subnetting a Class C Network
- 3.9 The Delta in Action
- 3.9.1 Activity: Subnetting With the Delta
- 3.10 Subnetting Based on Hosts
- 3.11 Subnetting in Other Octets
- 3.12 Supernetting
- 3.12.1 Activity: Supernetting
- 3.13 IPv6
- 3.14 IPv4 – IPv6 Transition Mechanisms
- 3.15 Module 3 Outro
Module 4 – Layer 7 Protocols
- 4.1 Remote Control Protocols
- 4.2 File Sharing Protocols
- 4.3 Web Protcols
- 4.4 Email Protocols
- 4.5 Database Protocols
- 4.6 Voice Protocols
- 4.7 Security Protocols
- 4.8 Management Protocols
- 4.9 Module 4 Outro
Module 5 – Network Services
- 5.1 DHCP
- 5.1.1 Activity: Configuring DHCP
- 5.1.2 Activity: Configuring a DHCP Relay Agent
- 5.2 DNS
- 5.2.1 Activity: Configuring DNS – Part 1
- 5.2.2 Activity: Configuring DNS – Part 2
- 5.3 NTP
- 5.4 Corporate and Datacenter Network Architecture
- 5.5 Cloud Concepts and Connectivity Options
- 5.6 Module 5 Outro
Module 6 – Networking Devices
- 6.1 Introductory Concepts
- 6.2 Repeaters and Hubs
- 6.2.1 Activity: Connecting Devices with a Hub
- 6.3 Bridges and Switches
- 6.3.1 Activity: Connecting Devices with a Switch
- 6.4 Routers and Multilayer Switches
- 6.5 Security Devices
- 6.6 Modems
- 6.7 Module 6 Outro
Module 7 – Networked Devices
- 7.1 IP Devices
- 7.2 IoT
- 7.2.1 Activity – Programming IoT Devices
- 7.3 ICS/SCADA
- 7.4 Module 7 Outro
Module 8 – Routing and Bandwidth Management
- 8.1 Routing Basics
- 8.1.1 Activity: Configuring Static Routes
- 8.2 Packet Delivery on the Same Network
- 8.3 IP Routing Across a Single Router
- 8.4 IP Routing Across Multiple Hops
- 8.4.1 Activity: Static Routes – CHALLENGE
- 8.5 Route Selection
- 8.6 RIP
- 8.6.1 Activity: Configuring RIP – CHALLENGE
- 8.7 OSPF
- 8.8 EIGRP
- 8.9 BGP
- 8.10 NAT/PAT
- 8.11 Bandwidth Management (with Module 8 Outro)
Module 9 – Ethernet Switching
- 9.1 Ethernet Basics
- 9.2 Switching Overview
- 9.2.1 Activity: Examining a MAC Table
- 9.3 VLANs
- 9.3.1 Activity: Creating VLANs
- 9.4 VLAN Trunking
- 9.4.1 Activity: Configuring VLAN Trunking
- 9.5 VLAN Routing
- 9.5.1 Activity: Configuring VLAN Routing
- 9.6 Contention Management
- 9.7 Switchport Configuration (with Module 9 Outro)
Module 10 – Wireless Technologies
- 10.1 Wireless Overview
- 10.2 Radio Basics
- 10.3 Modulation
- 10.4 Wi-Fi Standards
- 10.5 Antennas
- 10.6 Wi-Fi Service Sets
- 10.7 Wi-Fi Security
- 10.8 Cellular
Module 11 Network Performance
- 11.1 Monitoring Performance
- 11.2 Common Metrics
- 11.2.1 Activity: Examining Interface Statistics
- 11.3 SNMP
- 11.4 Netflow
- 11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
- 12.1 HA and DR Concepts
- 12.2 High Availability Mechanisms
- 12.3 Disaster Recovery Mechanisms
- 12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
- 13.1 Plans and Procedures
- 13.2 Security Policies
- 13.3 Loss Prevention
- 13.4 Common Agreements
- 13.5 Common Documentation
- 13.6 Structured Cabling – MDF and IDF
- 13.7 Horizontal and Vertical Cabling
- 13.7.1 Activity – Implementing Cable Management
- 13.8 Labeling
- 13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
- 14.1 Common Security Concepts
- 14.2 Common Attack Types
- 14.3 Spoofing-based Attacks
- 14.4 Hijacking and MITM
- 14.5 Social Engineering
- 14.6 Network Segmentation
- 14.7 Private VLANs
- 14.8 Single Organization Authentication
- 14.9 Extending Authentication
- 14.10 Authorization
- 14.11 Network Device Hardening
- 14.12 Wireless Security
- 14.13 Remote Access Security
- 14.14 IoT Security
- 14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
- 15.1 Troubleshooting Methodology
- 15.2 Physical Connectivity Issues
- 15.3 Hardware Testing Tools
- 15.3.1 Activity – Testing an Ethernet Cable
- 15.3.2 Activity – Crimping on an RJ-45 Connector
- 15.3.3 Activity – Punching Down Twisted Pair
- 15.3.4 Activity – Using a Telephone Toner
- 15.4 Understanding Electricity
- 15.4.1 Activity – Checking Cable Continuity
- 15.4.2 Activity – Testing DC Voltage
- 15.4.3 Activity – Testing AC Voltage
- 15.5 Twisted Pair Pinout Problems
- 15.6 Twisted Pair Termination Problems
- 15.7 Repairing Damaged Twisted Pair Cable
- 15.8 Fiber Optic Connectivity Issues
- 15.8.1 Activity – Testing a Fiber Optic Cable
- 15.9 Common Port Problems
- 15.9.1 Working with Ports and Their Devices
- 15.10 Common Software Testing Tools
- 15.10.1 Activity – Scanning for Open Ports
- 15.11 Common Command Line Utilities
- 15.12 Troubleshooting Basic IP Networking Issues
- 15.13 Common Switching Issues
- 15.14 Switching Test Tools and Techniques
- 15.15 Common IP Routing Issues
- 15.16 Wi-Fi Access Point Issues
- 15.17 Wirelss Interference
- 15.17.1 Activity – Using a Spectrum Analyzer
- 15.18 Wireless Antenna Issues
- 15.18.1 Activity – Configuring a Wi-Fi Router
- 15.19 WAP Placement Strategies
- 15.20 Infrastructure Service Issues (DHCP)
- 15.21 Infrastructure Service Issues (DNS)
- 15.22 Infrastructure Service Issues (NTP)
- 15.23 Fireall / ACL Issues
- 15.24 VPN Issues
- 15.25 Additional Network Security Troubleshooting and Tips
- 15.26 Advanced Networking Issues
- 15.27 Troubleshooting Server Services (with Module 15 Outro)
- CompTIA Network+ N10-008 Course Outro
Module 1: Intro & Performing Basic Linux Tasks
- Instructor Introduction
- Course Introduction
- Identify The Linux Design Philosophy
- Enter Shell Commands
- Shell Commands Activity
- Get Help with Linux
Module 2: Managing Users and Groups
- Assume Superuser and Groups
- Create, Modify, and Delete Users
- Create, Modify, and Delete Groups
- Query Users and Groups
- Configure Account Profiles
Module 3: Managing Permissions and Ownership
- Modify File and Directory Permissions
- Modify File and Directory Ownership
- Configure Special Permissions and Attributes
- Troubleshoot Permissions Issues
Module 4: Managing Storage
- Create Partitions
- Manage Logical Volumes
- Mount File Systems
- Manage File Systems
- Navigate the Linux Directory Structure
- Troubleshoot Storage Issues
Module 5: Managing Files and Directories
- Create and Edit Text Files
- Search for Files
- Perform Operations on Files and Directories
- Process Text Files
- Manipulate File Output
Module 6: Managing Kernel Modules
- Explore the Linux Kernel
- Install and Configure Kernel Modules
- Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
- Configure Linux Boot Components
- Configure GRUB
Module 8: Managing System Components
- Configure Localization Options
- Configure GUIs
- Manage Services
- Troubleshoot Process Issues
- Troubleshoot CPU and Memory Issues
Module 9: Managing Devices
- Identify the Types of Linux
- Configure Devices
- Monitor Devices
- Troubleshoot Hardware Issues
Module 10: Managing Networking
- Identify TCP/IP Fundamentals
- Identify Linux Server Roles
- Connect to a Network
- Configure DHCP and DNS Client Services
- Configure Cloud and Virtualization Technologies
- Troubleshoot Networking Issues
Module 11: Managing Packages and Software
- Identify Package Managers
- Manage RPM Packages with YUM
- Manage Debian Packages with APT
- Configure Repositories
- Acquire Software
- Build Software from Source Code
- Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
- Implement Cybersecurity Best Practices
- Implement Identity and Access Management Methods
- Configure SELinux or AppArmor
- Configure Firewalls
- Implement Logging Services
- Back Up, Restore, and Verify Data
Module 13: Working with Bash Scripts
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
- Schedule Jobs
- Implement Version Control Using Git
- Identify Orchestration Concepts
Module 15: Installing Linux
- Prepare for Linux Installation
- Perform the Installation
Module 1 – The Pen Test Engagement
- Module 1 Notes
- 1.0 PenTest Plus Introduction
- 1.1 PenTest Plus Topics
- 1.2 PenTest Engagement
- 1.3 Threat Modeling
- 1.4 Technical Constraints
- 1.5 PenTest Engagement Review
- 1.6 Examining PenTest Engagement Documents Act
Module 2 – Passive Reconnaissance
- Module 2 Notes
- 2.1 Passive Reconnaissance part1
- 2.2 WHOIS Act
- 2.3 Passive Reconnaissance part2
- 2.4 Google Hacking Act
- 2.5 Passive Reconnaissance part3
- 2.6 DNS Querying Act
- 2.7 Passive Reconnaissance part4
- 2.8 Email Server Querying Act
- 2.9 SSL-TLS Cerfificates
- 2.10 Shodan Act
- 2.11 The Havester
- 2.12 TheHarvester Act
- 2.13 Recon-ng
- 2.14 Recon-g Act
- 2.14 Recon-ng-Part-2-API-key Act
- 2.15 Maltego
- 2.16 Have I been Pwned
- 2.17 Punked and Owned Pwned Act
- 2.18 Fingerprinting Organization with Collected Archives
- 2.19 FOCA Act
- 2.20 Findings Analysis Weaponization
- 2.21 Chp 2 Review
Module 3 – Active Reconnaissance
- Module 3 Notes
- 3.1 Active Reconnaissannce
- 3.2 Discovery Scans Act
- 3.3 Nmap
- 3.4 Nmap Scans Types Act
- 3.5 Nmap Options
- 3.6 Nmap Options Act
- 3.7 Stealth Scans
- 3.8 Nmap Stealth Scans Act
- 3.9 Full Scans
- 3.10 Full Scans Act
- 3.11 Packet Crafting
- 3.12 Packet Crafting Act
- 3.13 Network Mapping
- 3.14 Metasploit
- 3.15 Scanning with Metasploit Act
- 3.16 Enumeration
- 3.17 Banner Grabbing Act
- 3.18 Windows Host Enumeration
- 3.19 Winddows Host Enumeration Act
- 3.20 Linux Host Enumeration
- 3.21 Linux Host Enumeration Act
- 3.22 Service Enumeration
- 3.23 Service Enumeration Act
- 3.24 Network Shares
- 3.25 SMB Share Enumeration Act
- 3.26 NFS Network Share Enumeration
- 3.27 NFS Share Enumeration Act
- 3.28 Null Sessions
- 3.29 Null Sessions Act
- 3.30 Website Enumeration
- 3.31 Website Enumeration Act
- 3.32 Vulnerability Scans
- 3.33 Compliance Scans Act
- 3.34 Credentialed Non-credentialed Scans
- 3.35 Using Credentials in Scans Act
- 3.36 Server Service Vulnerability Scan
- 3.37 Vulnerability Scanning Act
- 3.38 Web Server Database Vulnerability Scan
- 3.39 SQL Vulnerability Scanning Act
- 3.40 Vulnerability Scan Part 2 OpenVAS Act
- 3.41 Web App Vulnerability Scan
- 3.42 Web App Vulnerability Scanning Act
- 3.43 Network Device Vulnerability Scan
- 3.44 Network Device Vuln Scanning Act
- 3.45 Nmap Scripts
- 3.46 Using Nmap Scripts for Vuln Scanning Act
- 3.47 Packet Crafting for Vulnerbility Scans
- 3.48 Firewall Vulnerability Scans
- 3.49 Wireless Access Point Vunerability
- 3.50 Wireless AP Scans Act
- 3.51 WAP Vulnerability Scans
- 3.52 Container Security issues
- 3.53 How to Update Metasploit Pro Expired Trial License
Module 4 – Physical Security
- Module 4 Notes
- 4.1 Physical Security
- 4.2 Badge Cloning Act
- 4.3 Physical Security Review
Module 5 – Social Engineering
- Module 5 Notes
- 5.1 Social Engineering
- 5.2 Using Baited USB Stick Act
- 5.3 Using Social Enginnering to Assist Attacks
- 5.4 Phishing Act
- 5.5 Social Engineering Review
Module 6 – Vulnerability Scan Analysis
- Module 6 Notes
- 6.1 Vulnerbility Scan Analysis
- 6.2 Validating Vulnerability Scan Results Act
- 6.3 Vulnerbility Scan Analysis Review
Module 7 – Password Cracking
- Module 7 Notes
- 7.1 Password Cracking
- 7.2 Brute Force Attack Against Network Service Act
- 7.3 Network Authentication Interception Attack
- 7.4 Intercepting Network Authentication Act
- 7.5 Pass the Hash Attacks
- 7.6 Pass the Hash Act
- 7.7 Password Cracking Review
Module 8 – Penetrating Wired Networks
- Module 8 Notes
- 8.1 Penetrating Wired Network
- 8.2 Sniffing Act
- 8.3 Eavesdropping
- 8.4 Eavesdropping Act
- 8.5 ARP Poisoning
- 8.6 ARP Poisoning Act
- 8.7 Man In The Middle
- 8.8 MITM Act
- 8.9 TCP Session HiJacking
- 8.10 Server Message Blocks SMB Exploits
- 8.11 SMB Attack Act
- 8.12 Web Server Attacks
- 8.13 FTP Attacks
- 8.14 Telnet Server Attacks
- 8.15 SSH Server Attacks
- 8.16 Simple Network Mgmt Protocol SNMP
- 8.17 Simple Mail Transfer Protocol SMTP
- 8.18 Domain Name System DNS Cache Poisoning
- 8.19 Denail of Service Attack DoS-DDoS
- 8.20 DoS Attack Act
- 8.21 VLAN Hopping Review
Module 9 – Penetrating Wireless Networks
- Module 9 Notes
- 9.1 Penetrating Wireless Networks
- 9.2 Jamming Act
- 9.3 Wireless Sniffing
- 9.4 Replay Attacks
- 9.5 WEP Cracking Act
- 9.6 WPA-WPA2 Cracking
- 9.7 WAP Cracking Act
- 9.8 Evil Twin Attacks
- 9.9 Evil Twin Attack Act
- 9.10 WiFi Protected Setup
- 9.11 Bluetooth Attacks
- 9.12 Penetrating Wireless Networks
Module 10 – Windows Exploits
- Module 10 Notes
- 10.1 Windows Exploits
- 10.2 Dumping Stored Passwords Act
- 10.3 Dictionary Attacks
- 10.4 Dictionary Attack Against Windows Act
- 10.5 Rainbow Table Attacks
- 10.6 Credential Brute Force Attacks
- 10.7 Keylogging Attack Act
- 10.8 Windows Kernel
- 10.9 Kernel Attack Act
- 10.10 Windows Components
- 10.11 Memory Vulnerabilities
- 10.12 Buffer Overflow Attack Act
- 10.13 Privilegde Escalation in Windows
- 10.14 Windows Accounts
- 10.15 Net and WMIC Commands
- 10.16 Sandboxes
Module 11 – Linux Exploits
- Module 11 Notes
- 11.1 Linux Exploits
- 11.2 Exploiting Common Linux Features Act
- 11.3 Password Cracking in Linux
- 11.4 Cracking Linux Passwords Act
- 11.5 Vulnerability Linux
- 11.6 Priviledge Escalation Linux
- 11.7 Linux Accounts
- 11.8 Linux Exploits Review
Module 12 – Mobile Devices
- Module 12 Notes
- 12.1 Mobile Devices
- 12.2 Hacking Android Act
- 12.3 Apple Exploits
- 12.4 Moblie Devices Review
Module 13 – Specialized Systems
- Module 13 Notes
- 13.1 Specialized Systems
- 13.2 Specialized Systems Review
Module 14 – Scripts
- Module 14 Notes
- 14.1 Scripts
- 14.2 Powershell
- 14.3 Python
- 14.4 Ruby
- 14.5 Common Scripting Elements
- 14.6 Scripts Review
- 14.7 Better Ping Sweep
- 14.8 Simple Port Scanner2
- 14.9 Multitarget Port Scanner
- 14.10 Port Scanner with Nmap
- 14.11 Scripts Review
Module 15 – Application Testing
- Module 15 Notes
- 15.1 Application Testing
- 15.2 Reverse Engineering
Module 16 – Web App Exploits
- Module 16 Notes
- 16.1 Webb App Exploits
- 16.2 Injection Attacks
- 16.3 HTML Injection
- 16.4 SQL Hacking – SQLmap Act
- 16.5 Cross-Site Attacks
- 16.6 Cross-Site Request Forgery
- 16.7 Other Web-based Attacks
- 16.8 File Inclusion Attacks
- 16.9 Web Shells
- 16.10 Web Shells Review
Module 17 – Lateral Movement
- Module 17 Notes
- 17.1 Lateral Movement
- 17.2 Lateral Movement with Remote Mgmt Services
- 17.3 Process Migration Act
- 17.4 Passing Control Act
- 17.5 Pivoting
- 17.6 Tools the Enable Pivoting
- 17.7 Lateral Movement Review
Module 18 – Persistence
- Module 18 Notes
- 18.1 Persistence
- 18.2 Breeding RATS Act
- 18.3 Bind and Reverse Shells
- 18.4 Bind Shells Act
- 18.5 Reverse Shells
- 18.6 Reverse Shells Act
- 18.7 Netcat
- 18.8 Netcat Act
- 18.9 Scheduled Tasks
- 18.10 Scheduled Tasks Act
- 18.11 Services and Domains
- 18.12 Persistence Review
Module 19 – Cover Your Tracks
- Module 19 Notes
- 19.1 Cover Your Tracks
- 19.2 Cover Your Tracks – Timestomp Files Act
- 19.3 Cover Your Tracks – Frame the Administrator Act
- 19.4 Cover Your Tracks – Clear the Event Log Act
- 19.5 Cover Your Tracks Review
Module 20 – The Report
- Module 20 Notes
- 20.1 The Report
- 20.2 The Report Review
Module 21 – Post Engagement Cleanup
- Module 21 Notes
- 21.1 Post Engagement Cleanup_1
- 21.3 Post Engagement Cleanup Review
- 21.4 PenTest Plus Conclusion.mp4
Frequently Asked Questions.
What key topics does the CompTIA Security+ SY0-701 course cover?
The CompTIA Security+ SY0-701 course covers a broad range of cybersecurity fundamentals essential for IT professionals. It includes topics such as threat identification, risk management, network security, cryptography, and incident response.
The course is designed to provide practical knowledge on how to recognize vulnerabilities, implement security best practices, and respond effectively to security incidents. It prepares students to understand the current threat landscape and develop strategies to mitigate risks in real-world scenarios.
Is this Security+ SY0-701 course suitable for beginners in cybersecurity?
Yes, the Free CompTIA Security+ SY0-701 course is suitable for beginners who are new to cybersecurity. It starts with foundational concepts and gradually builds up to more advanced topics, making it accessible to those with limited prior experience.
The course emphasizes practical skills and real-world applications, which helps beginners understand essential cybersecurity principles. It is an excellent starting point for anyone interested in pursuing a career in cybersecurity or preparing for the Security+ certification exam.
How does the Security+ SY0-701 course prepare students for the certification exam?
This free course aligns with the SY0-701 exam objectives, providing focused training on the topics and skills tested in the certification. It includes hands-on exercises, practical examples, and assessments to reinforce learning.
The course also covers exam-taking strategies and key concepts that help students identify questions’ intent and choose correct answers confidently. Completing this training equips students with both theoretical knowledge and practical skills to succeed in the Security+ exam.
What are the common misconceptions about the CompTIA Security+ certification?
One common misconception is that Security+ is only for network administrators or security specialists. In reality, it is designed for a wide range of IT professionals, including those involved in system administration, compliance, and technical support.
Another myth is that Security+ is overly technical and difficult. While it covers technical topics, the course emphasizes practical understanding and real-world application, making it accessible to those willing to learn foundational cybersecurity concepts.
Does the Security+ SY0-701 course include hands-on labs and practical exercises?
Yes, the course includes practical exercises aimed at reinforcing cybersecurity concepts through simulated scenarios and real-world tasks. These hands-on activities help learners develop skills in threat detection, system hardening, and incident response.
Engaging in practical exercises is crucial for understanding how to apply security principles effectively in a professional environment. These activities prepare students not only for the exam but also for real cybersecurity challenges they may face in the workplace.