- +1 855.488.5327
- customerservice@ituonline.com
- Mon - Fri: 9:00am - 5:00pm ET
CompTIA Security Training Series
Take 25% off all orders of $49.00 or more! No coupon needed; auto applies in cart.
$59.00
Sale Ends Soon
- 00Days
- 00Hours
- 00Minutes
- 00Seconds
Our CompTIA security training series includes 3 popular CompTIA security related courses. Certified Cloud Security Professional (CCSP), CompTIA CySA+ (Cybersecurity Analyst+) CS0-002, and CompTIA Security+ (SY0-601).
44 Training Hours
179 Videos
34 Topics
446 Practice Questions
Course Description
Focus on security in this CompTIA security training series
This 3-course CompTIA security training focuses on the three core Security certifications provided by CompTIA. They are CompTIA Security+, CompTIA CySA+, and CCSP.
CompTIA CCSP – Certified Cloud Security Professional
After finishing this CompTia training bundle course, you will be able to design and secure data, applications, and infrastructure in the cloud using advanced technical skills and knowledge. The instructor of this class will go over best practices, policies, and procedures established by cybersecurity experts so that you have a strong foundation to build from.
CompTIA Security+
Our CompTIA Security+ SY0-601 course will teach you a foundational understanding of computer and network security. Our online course will equip you with the knowledge necessary to craft a comprehensive threat analysis and more importantly secure your network from cybersecurity attacks. In addition, you’ll uncover how create secure network designs of devices, media outlets, penetration testing, and networks. Our online course covers all objectives needed to pass your CompTIA Security+ SY0-601 exam and acquire your certification.
CompTIA CySA+
In this course you will learn how to apply behavioral analytics to networks and devices with the intention to prevent, detect, and combat cybersecurity threats via continuous security monitoring. This course will cover the objectives needed in order to pass the CompTIA CySA+ (CS0-002) certification exam, which validates an IT professional’s ability to proactively defend and continuously improve the security of an organization.
By the end of this CompTIA Exam prep training course, you will have the demonstrable skills and
Analysis skills to pass the following
- SY0-601 exam
- Security+ SYO-501 exam
- CompTIA CySA+ (CS0-002) exam
View more information on each of these courses included in our CompTIA Security training by visiting the links below:
Your Training Instructors
Alan Grayson has been teaching bootcamps for 20 years and has a 905 average pass rate from those students he has taught. Alan has attended The USAF Academy, University of Southern California, and has certifications in CompTIA CTT+, CASP+, CySA+, PenTest+, Security+, Network+, A+ as well as Cloud+. Alan also holds the CISSP Certification and is an official ISC2 Instructor for CISSP, SSCP, CSSLP, and CCSP.
John is a Senior Technical Instructor at Ft. Gordon in Augusta, Georgia, instructing U.S. military and civilian employees on a number of cybersecurity subjects and certifications. He has been an IT professional for well over two decades, as prior to his current job he retired from the Army after a 20-year career as a soldier in the signal branch (IT and communications). John holds a bachelor’s degree in Computer Science from the University of Maryland Global Campus as well as the following IT certifications: Network+, Security+, Cybersecurity Analyst (CySA+), CompTIA Advanced Security Practitioner (CASP+), Certified Information Systems Security Professional (CISSP).
Course Outline
CompTIA Security+ (SY0-601) Course Outline
Module 1: Information Security Roles Security Control and Framework Types
- Introduction and Overview
- Compare and Contrast Information Security Roles
- Compare and Contrast Security Control and Framework Types
- Module Summary
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
- Explain Threat Actor Types and Attack Vectors
- Explain Threat Intelligence Sources
- Module Summary
Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
- Assess Organizational Security with Network Reconnaissance Tools
- Packet Capture and Replay Demo
- Explain Security Concerns with General Vulnerability Types
- Summarize Vulnerability Scanning Techniques
- Explain Penetration Testing Concepts
- Module Summary
Module 4: Social Engineering, Indicators of Malware Attacks
- Compare and Contrast Social Engineering Techniques
- Analyze Indicators of Malware-based Attacks
- Fork Bomb Malware Demo
- Module Summary
Module 5: Cryptography
- Compare and Contrast Cryptographic Ciphers
- Summarize Cryptographic Modes of Operation
- Summarize Cryptographic Use Cases and Weaknesses
- Summarize Other Cryptographic Technologies
- Module Summary
Module 6: Certificates and PKI
- Implement Certificates and Certificate Authorities
- Implement PKI Management
- Implementing a PKI Demo
- Module Summary
Module 7: Authentication
- Summarize Authentication Design Concepts
- Implement Knowledge-based Authentication
- Password Cracker Demo
- Implement Authentication Technologies
- Summarize Biometrics Authentication Concepts
- Module Summary
Module 8: Identity and Accounts, Authorization, Personnel Polices
- Implement Identity and Account Types
- Implement Account Policies
- Account Types and Polices Demo
- Implement Authorization Solutions
- Explain the Importance of Personnel Policies
- Module Summary
Module 9: Network Design and Hardware (Part 1)
- Implement Secure Network Designs
- Implement Secure Switching and Routing
- Various Types of Network Attacks Demo
- Implement Secure Wireless Infrastructure
- Implement Load Balancers
- Module Summary
Module 10: Network Hardware (Part 2)
- Implement Firewalls and Proxy Servers
- Implement Network Security Monitoring
- Summarize the Use of SIEM
- Module Summary
Module 11: Network Protocols
- Implement Secure Network Operations Protocols
- Implement Secure Application Protocols
- Implement Secure Remote Access Protocols
- Module Summary
Module 12: Endpoint Security
- Implement Secure Firmware
- Implement Endpoint Security
- Endpoint Protection Demo
- Explain Embedded System Security Implications
- Module Summary
Module 13: Mobile Devices
- Implement Mobile Device Management
- Implement Secure Mobile Device Connections
- Module Summary
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
- Analyze Indicators of Application Attack
- Analyze Indicators of Web Application Attacks
- Summarize Secure Coding Practices
- Implement Secure Script Environments
- Summarize Deployment and Automation Concepts
- Module Summary
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
- Summarize Secure Cloud and Virtualization Services
- Apply Cloud Security Solutions
- Summarize Infrastructure as Code Concepts
- Module Summary
Module 16: Privacy and Data Protection
- Explain Privacy and Data Sensitivity Concepts
- Explain Privacy and Data Protection Controls
- Module Summary
Module 17: Incident Response
- Summarize Incident Response Procedures
- Utilize Appropriate Data Sources for Incident Response
- Apply Mitigation Controls
- Module Summary
Module 18: Forensics
- Explain Key Aspects of Digital Forensics Documentation
- Explain Key Aspects of Digital Forensics Evidence Acquisition
- Module Summary
Module 19: Risk Management and Business Impact Analysis
- Explain Risk Management Processes and Concepts
- Explain Business Impact Analysis Concepts
- Module Summary
Module 20: Redundancy and Backup Strategies
- Implement Redundancy Strategies
- Implement Backup Strategies
- Implement Cybersecurity Resiliency Strategies
- Module Summary
Module 21: Physical Security
- Explain the Importance of Physical Site Controls
- Explain the Importance of Physical Host Security Controls
- Module Summary
Module 22: Afterword
- Conclusion and General Exam Tips
CompTIA CySA+ (Cybersecurity Analyst+) CS0-002 Course Outline
Module 1: Threat and Vulnerability Management
- Instructor Intro
- About the Exam
- Test Taking Tips and Techniques
- Explain the importance of threat data and intelligence
- Given a scenario, utilize threat intelligence to support organizational security
- Given a scenario, perform vulnerability management activities Pt 1
- Given a scenario, perform vulnerability management activities Pt 2
- Given a scenario, analyze the output from common vulnerability assessment tools
- Explain the threats and vulnerabilities associated with specialized technology
- Explain the threats and vulnerabilities associated with operating in the Cloud
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
- Given a scenario, apply security solutions for infrastructure management Pt 1
- Outline
- Given a scenario, apply security solutions for infrastructure management Pt 2
- Given a scenario, apply security solutions for infrastructure management Pt 3
- Flashcards
- Explain software assurance best practices
- Scatter
- Explain hardware assurance best practices
- Learn
- Speller
- Workbook
Module 3: Security Operations and Monitoring
- Given a scenario, analyze data as part of security monitoring activities Pt 1
- Given a scenario, analyze data as part of security monitoring activities Pt 2
- Given a scenario, analyze data as part of security monitoring activities Pt 3
- Given a scenario, implement configuration changes to existing controls to improve security Pt 1
- Given a scenario, implement configuration changes to existing controls to improve security Pt 2
- Explain the importance of proactive threat hunting
- Compare and contrast automation concepts and technologies
Module 4: Incident Response
- Explain the importance of the incident response process
- Given a scenario, apply the appropriate the incident response procedure
- Given an incident, analyze potential indicators of compromise
- Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
- Understand the importance of data privacy and protection
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
- Explain the importance of frameworks, policies, procedures, and controls Pt 1
- Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
- Recap
- Review Questions
- Before the Exam
Certified Cloud Security Professional - CCSP Course Outline
Cloud Concepts, Architecture and Design
- Course Intro
- Cloud Concepts, Architecture and Design - Part 1
- Cloud Concepts, Architecture and Design - Part 2
- Cloud Concepts, Architecture and Design - Part 3
- Cloud Concepts, Architecture and Design - Part 4
- Cloud Concepts, Architecture and Design - Part 5
- Cloud Concepts, Architecture and Design - Part 6
- Cloud Concepts, Architecture and Design - Part 7
- Cloud Concepts, Architecture and Design - Part 8
- Cloud Concepts, Architecture and Design - Part 9
Legal, Risk and Compliance
- Legal, Risk and Compliance Part 1
- Legal, Risk and Compliance Part 2
- Legal, Risk and Compliance Part 3
- Legal, Risk and Compliance Part 4
- Legal, Risk and Compliance Part 5
- Legal, Risk and Compliance Part 6
- Legal, Risk and Compliance Part 7
Cloud Data Security
- Cloud Data Security - Part 1
- Cloud Data Security - Part 2
- Cloud Data Security - Part 3
- Cloud Data Security - Part 4
- Cloud Data Security - Part 5
- Cloud Data Security - Part 6
- Cloud Data Security - Part 7
Cloud Platform and Infrastructure Security
- Cloud Platform and Infrastructure Security - Part 1
- Cloud Platform and Infrastructure Security - Part 2
- Cloud Platform and Infrastructure Security - Part 3
- Cloud Platform and Infrastructure Security - Part 4
- Cloud Platform and Infrastructure Security - Part 5
- Cloud Platform and Infrastructure Security - Part 6
- Cloud Platform and Infrastructure Security - Part 7
- Cloud Platform and Infrastructure Security - Part 8
Cloud Application Security
- Cloud Application Security - Part 1
- Cloud Application Security - Part 2
- Cloud Application Security - Part 3
- Cloud Application Security - Part 4
- Cloud Application Security - Part 5
- Cloud Application Security - Part 6
- Cloud Application Security - Part 7
- Cloud Application Security - Part 8
- Cloud Application Security - Part 9
Cloud Security Operations
- Cloud Security Operations - Part 1
- Cloud Security Operations - Part 2
- Cloud Security Operations - Part 3
- Cloud Security Operations - Part 4
- Cloud Security Operations - Part 5
- Cloud Security Operations - Part 6
- Cloud Security Operations - Part 7
- Cloud Security Operations - Part 8
- Cloud Security Operations - Part 9
- Cloud Security Operations - Part 10
- Cloud Security Operations - Part 11
- Course Outro
CompTIA Security Training Series
$59.00
Our CompTIA security training series includes 3 popular CompTIA security related courses. Certified Cloud Security Professional (CCSP), CompTIA CySA+ (Cybersecurity Analyst+) CS0-002, and CompTIA Security+ (SY0-601).
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.
Monthly All-Access Subscription
$39.00 / month
A great option at an affordable monthly price.
Annual All-Access Subscription
$229 / year
A discounted price when paying for your All Access library on an annual basis.
Lifetime All-Access Library
$379 One time payment
Exceptional Value. Pay once, never have to buy IT training again.
Related Courses
$79.00
Our CompTIA certification training courses are comprehensive, providing IT professionals with 12 courses that feature the Core Series for A+ certification as well as introducing our innovative IT Fundamentals (ITF+) course! Furthermore, we have PenTest+, Security+, Cloud+ and Network+. For those seeking to become an expert in IT certifications – this is the training product for you!
$59.00
In this IT course you will learn a thorough understanding of the information security risks and mitigation strategies critical to data security in the Cloud. This CompTIA IT course will teach you strategies for protecting data at rest and data in motion as well as strategies for safe-guarding data, classifying data, ensuring privacy, assuring compliance with regulatory agencies, and working with authorities during legal investigations.
$59.00
The CompTIA CSIS is a progressive certification in the IT field that was crafted by CompTIA. It is ideal for those with 0-2 years of experience who are looking to upskill. At ITU, we offer an extensive Certification Path which comes bundled with educative materials and preparing you to pass the three exams;CompTIA A+, Comptia Network+ and Comptia Security+.
$59.00
CompTIA CSSS is the ideal certification for IT professionals with zero to two years of experience. Through this stackable credential, you can achieve specialized knowledge and proficiency by completing the CompTIA A+ and CompTIA Linux+ exams that are part of its Certification Path.Â