- +1 855.488.5327
- customerservice@ituonline.com
- Mon - Fri: 9:00am - 5:00pm ET
CompTIA Security Training Series – 3 Courses
Our CompTIA security training series includes 3 popular CompTIA security related courses. Certified Cloud Security Professional (CCSP), CompTIA CySA+ (Cybersecurity Analyst+) CS0-002, and CompTIA Security+ (SY0-601).
Included In This Course
Included In This Course
44 Training Hours
179 On-demand Videos
Closed Captions
34 Topics
446 Prep Questions
Certificate of Completion
Course Description
Focus on security in this CompTIA security training series
This 3-course CompTIA security training focuses on the three core Security certifications provided by CompTIA. They are CompTIA Security+, CompTIA CySA+, and CCSP.
CompTIA CCSP – Certified Cloud Security Professional
After finishing this CompTia training bundle course, you will be able to design and secure data, applications, and infrastructure in the cloud using advanced technical skills and knowledge. The instructor of this class will go over best practices, policies, and procedures established by cybersecurity experts so that you have a strong foundation to build from.
CompTIA Security+
Our CompTIA Security+ SY0-601 course will teach you a foundational understanding of computer and network security. Our online course will equip you with the knowledge necessary to craft a comprehensive threat analysis and more importantly secure your network from cybersecurity attacks. In addition, you’ll uncover how create secure network designs of devices, media outlets, penetration testing, and networks. Our online course covers all objectives needed to pass your CompTIA Security+ SY0-601 exam and acquire your certification.
CompTIA CySA+
In this course you will learn how to apply behavioral analytics to networks and devices with the intention to prevent, detect, and combat cybersecurity threats via continuous security monitoring. This course will cover the objectives needed in order to pass the CompTIA CySA+ (CS0-002) certification exam, which validates an IT professional’s ability to proactively defend and continuously improve the security of an organization.
By the end of this CompTIA Exam prep training course, you will have the demonstrable skills and
Analysis skills to pass the following
- SY0-601 exam
- Security+ SYO-501 exam
- CompTIA CySA+ (CS0-002) exam
View more information on each of these courses included in our CompTIA Security training by visiting the links below:
- Certified Cloud Security Professional – CCSP
- CompTIA CySA+ (Cybersecurity Analyst+) CS0-002
- CompTIA Security+ (SY0-601)
Frequently Asked Questions About CompTIA Security Training Series
What exams does this course prepare me for?
This course prepares you for the SY0-601 exam, Security+ SY0-501 exam, and the CompTIA CySA+ (CS0-002) exam​.
Who are the instructors for this course?
The instructors for this course are Alan Grayson and John. Alan has a 90% average pass rate from those students he has taught and holds several CompTIA certifications. John is a Senior Technical Instructor at Ft. Gordon and has been an IT professional for over two decades.
What topics are covered in the CompTIA Security+ (SY0-601) course?
The course covers a variety of topics, including Information Security Roles Security Control, Threat Actor Types, Organizational Security, Network Reconnaissance, Social Engineering, Cryptography, Certificates and PKI, Authentication, Network Design and Hardware, Network Protocols, Endpoint Security, Mobile Devices, Secure Coding, Privacy and Data Protection, Incident Response, Forensics, Risk Management, and Physical Security among others.
What topics are covered in the CompTIA CySA+ (CS0-002) course?
The course includes modules on Threat and Vulnerability Management, with focus on understanding threat data and intelligence, vulnerability management activities, and implementation of controls to mitigate attacks and software vulnerabilities​.
How long is the CompTIA Security+ exam and how many questions does it include?
The CompTIA Security+ exam is 90 minutes long and includes a maximum of 90 questions.
What is the main focus of the CompTIA Security+ certification?
The Security+ certification exam focuses on assessing the baseline cybersecurity skills necessary for IT job roles. It covers the latest trends and techniques in risk management, risk mitigation, threat management, and intrusion detection.
Proudly DisplayYour Achievement
Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.Course Outline
CompTIA Security+ (SY0-601) Course Content
Module 1: Information Security Roles Security Control and Framework Types
Introduction and Overview
Compare and Contrast Information Security Roles
Compare and Contrast Security Control and Framework Types
Module Summary
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
Explain Threat Actor Types and Attack Vectors
Explain Threat Intelligence Sources
Module Summary
Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
Assess Organizational Security with Network Reconnaissance Tools
Packet Capture and Replay Demo
Explain Security Concerns with General Vulnerability Types
Summarize Vulnerability Scanning Techniques
Explain Penetration Testing Concepts
Module Summary
Module 4: Social Engineering, Indicators of Malware Attacks
Compare and Contrast Social Engineering Techniques
Analyze Indicators of Malware-based Attacks
Fork Bomb Malware Demo
Module Summary
Module 5: Cryptography
Compare and Contrast Cryptographic Ciphers
Summarize Cryptographic Modes of Operation
Summarize Cryptographic Use Cases and Weaknesses
Summarize Other Cryptographic Technologies
Module Summary
Module 6: Certificates and PKI
Implement Certificates and Certificate Authorities
Implement PKI Management
Implementing a PKI Demo
Module Summary
Module 7: Authentication
Summarize Authentication Design Concepts
Implement Knowledge-based Authentication
Password Cracker Demo
Implement Authentication Technologies
Summarize Biometrics Authentication Concepts
Module Summary
Module 8: Identity and Accounts, Authorization, Personnel Polices
Implement Identity and Account Types
Implement Account Policies
Account Types and Polices Demo
Implement Authorization Solutions
Explain the Importance of Personnel Policies
Module Summary
Module 9: Network Design and Hardware (Part 1)
Implement Secure Network Designs
Implement Secure Switching and Routing
Various Types of Network Attacks Demo
Implement Secure Wireless Infrastructure
Implement Load Balancers
Module Summary
Module 10: Network Hardware (Part 2)
Implement Firewalls and Proxy Servers
Implement Network Security Monitoring
Summarize the Use of SIEM
Module Summary
Module 11: Network Protocols
Implement Secure Network Operations Protocols
Implement Secure Application Protocols
Implement Secure Remote Access Protocols
Module Summary
Module 12: Endpoint Security
Implement Secure Firmware
Implement Endpoint Security
Endpoint Protection Demo
Explain Embedded System Security Implications
Module Summary
Module 13: Mobile Devices
Implement Mobile Device Management
Implement Secure Mobile Device Connections
Module Summary
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
Analyze Indicators of Application Attack
Analyze Indicators of Web Application Attacks
Summarize Secure Coding Practices
Implement Secure Script Environments
Summarize Deployment and Automation Concepts
Module Summary
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
Summarize Secure Cloud and Virtualization Services
Apply Cloud Security Solutions
Summarize Infrastructure as Code Concepts
Module Summary
Module 16: Privacy and Data Protection
Explain Privacy and Data Sensitivity Concepts
Explain Privacy and Data Protection Controls
Module Summary
Module 17: Incident Response
Summarize Incident Response Procedures
Utilize Appropriate Data Sources for Incident Response
Apply Mitigation Controls
Module Summary
Module 18: Forensics
Explain Key Aspects of Digital Forensics Documentation
Explain Key Aspects of Digital Forensics Evidence Acquisition
Module Summary
Module 19: Risk Management and Business Impact Analysis
Explain Risk Management Processes and Concepts
Explain Business Impact Analysis Concepts
Module Summary
Module 20: Redundancy and Backup Strategies
Implement Redundancy Strategies
Implement Backup Strategies
Implement Cybersecurity Resiliency Strategies
Module Summary
Module 21: Physical Security
Explain the Importance of Physical Site Controls
Explain the Importance of Physical Host Security Controls
Module Summary
Module 22: Afterword
Conclusion and General Exam Tips
CompTIA CySA+ (Cybersecurity Analyst+) CS0-002 Course Content
Module 1: Threat and Vulnerability Management
Instructor Intro
About the Exam
Test Taking Tips and Techniques
Explain the importance of threat data and intelligence
Given a scenario, utilize threat intelligence to support organizational security
Given a scenario, perform vulnerability management activities Pt 1
Given a scenario, perform vulnerability management activities Pt 2
Given a scenario, analyze the output from common vulnerability assessment tools
Explain the threats and vulnerabilities associated with specialized technology
Explain the threats and vulnerabilities associated with operating in the Cloud
Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
Outline
Given a scenario, apply security solutions for infrastructure management Pt 1
Given a scenario, apply security solutions for infrastructure management Pt 2
Flashcards
Given a scenario, apply security solutions for infrastructure management Pt 3
Explain software assurance best practices
Scatter
Explain hardware assurance best practices
Learn
Speller
Workbook
Module 3: Security Operations and Monitoring
Given a scenario, analyze data as part of security monitoring activities Pt 1
Given a scenario, analyze data as part of security monitoring activities Pt 2
Given a scenario, analyze data as part of security monitoring activities Pt 3
Given a scenario, implement configuration changes to existing controls to improve security Pt 1
Given a scenario, implement configuration changes to existing controls to improve security Pt 2
Explain the importance of proactive threat hunting
Compare and contrast automation concepts and technologies
Module 4: Incident Response
Explain the importance of the incident response process
Given a scenario, apply the appropriate the incident response procedure
Given an incident, analyze potential indicators of compromise
Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
Understand the importance of data privacy and protection
Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
Explain the importance of frameworks, policies, procedures, and controls Pt 1
Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
Recap
Review Questions
Before the Exam
Certified Cloud Security Professional - CCSP Course Content
Cloud Concepts, Architecture and Design
Course Intro
Cloud Concepts, Architecture and Design - Part 1
Cloud Concepts, Architecture and Design - Part 2
Cloud Concepts, Architecture and Design - Part 3
Cloud Concepts, Architecture and Design - Part 4
Cloud Concepts, Architecture and Design - Part 5
Cloud Concepts, Architecture and Design - Part 6
Cloud Concepts, Architecture and Design - Part 7
Cloud Concepts, Architecture and Design - Part 8
Cloud Concepts, Architecture and Design - Part 9
Legal, Risk and Compliance
Legal, Risk and Compliance Part 1
Legal, Risk and Compliance Part 2
Legal, Risk and Compliance Part 3
Legal, Risk and Compliance Part 4
Legal, Risk and Compliance Part 5
Legal, Risk and Compliance Part 6
Legal, Risk and Compliance Part 7
Cloud Data Security
Cloud Data Security - Part 1
Cloud Data Security - Part 2
Cloud Data Security - Part 3
Cloud Data Security - Part 4
Cloud Data Security - Part 5
Cloud Data Security - Part 6
Cloud Data Security - Part 7
Cloud Platform and Infrastructure Security
Cloud Platform and Infrastructure Security - Part 1
Cloud Platform and Infrastructure Security - Part 2
Cloud Platform and Infrastructure Security - Part 3
Cloud Platform and Infrastructure Security - Part 4
Cloud Platform and Infrastructure Security - Part 5
Cloud Platform and Infrastructure Security - Part 6
Cloud Platform and Infrastructure Security - Part 7
Cloud Platform and Infrastructure Security - Part 8
Cloud Application Security
Cloud Application Security - Part 1
Cloud Application Security - Part 2
Cloud Application Security - Part 3
Cloud Application Security - Part 4
Cloud Application Security - Part 5
Cloud Application Security - Part 6
Cloud Application Security - Part 7
Cloud Application Security - Part 8
Cloud Application Security - Part 9
Cloud Security Operations
Cloud Security Operations - Part 1
Cloud Security Operations - Part 2
Cloud Security Operations - Part 3
Cloud Security Operations - Part 4
Cloud Security Operations - Part 5
Cloud Security Operations - Part 6
Cloud Security Operations - Part 7
Cloud Security Operations - Part 8
Cloud Security Operations - Part 9
Cloud Security Operations - Part 10
Cloud Security Operations - Part 11
Course Outro
Add a review
Rating*
0/5
* Rating is required
Your review
* Review is required
Name
* Name is required
Email
* Email is required
1-5 of 49 reviews
Sorry, no reviews match your current selections
Your Training Instructors
Alan Grayson has been teaching bootcamps for 20 years and has a 905 average pass rate from those students he has taught. Alan has attended The USAF Academy, University of Southern California, and has certifications in CompTIA CTT+, CASP+, CySA+, PenTest+, Security+, Network+, A+ as well as Cloud+. Alan also holds the CISSP Certification and is an official ISC2 Instructor for CISSP, SSCP, CSSLP, and CCSP.
John is a Senior Technical Instructor at Ft. Gordon in Augusta, Georgia, instructing U.S. military and civilian employees on a number of cybersecurity subjects and certifications. He has been an IT professional for well over two decades, as prior to his current job he retired from the Army after a 20-year career as a soldier in the signal branch (IT and communications). John holds a bachelor’s degree in Computer Science from the University of Maryland Global Campus as well as the following IT certifications: Network+, Security+, Cybersecurity Analyst (CySA+), CompTIA Advanced Security Practitioner (CASP+), Certified Information Systems Security Professional (CISSP).
$59.00
OR
Subscribe To All-Access
Gain access to this training and all our other courses, offering over 2,500 hours of content, with our cost-effective monthly subscription. No obligations. Cancel anytime.
$49.00 $14.99 Monthly
CompTIA Security Training Series – 3 Courses
CompTIA Security Training Series – 3 Courses
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.
Monthly All-Access Subscription
7 Days Free - $39.00 / month
A great option at an affordable monthly price.
Annual All-Access Subscription
$229 / year
A discounted price when paying for your All Access library on an annual basis.
Lifetime All-Access Library
$379 One time payment
Exceptional Value. Pay once, never have to buy IT training again.
Related Courses
$49.00
Want to become a Linux expert? Learn everything you need to know with our comprehensive CompTIA Linux+ XK0-004 course.
This exam prep IT course will provide you with the knowledge and skills required to configure, manage, operate, and troubleshoot a Linux environment by using security best practices, scripting, and automation computing models. This online course will teach you critical skills needed and objectives covered in the CompTIA Linux+ certification exam.
$49.00
Become a cloud computing expert with our CompTIA training for Cloud+ CVO-002 online certification course. Enroll now to enhance your cloud computing skills and the knowledge needed to advance your career.
In this course you will learn to manage the cost, deploy, adhere to compliance, and secure a Cloud-based network. This course is ideal for IT personnel who focus on infrastructure, those who are interested in becoming Cloud practitioners, IT project managers who manage migrations, and IT managers who need a further understanding of Cloud technologies.
$49.00
Kickstart your IT career with CompTIA IT Fundamentals FC0-U61 (ITF+) training. Gain the foundational knowledge needed to excel in the IT industry.
In this ITF+ course you will learn the fundamental IT skills in subjects areas including hardware, software, programming, security, and infrastructure that is needed to pass the CompTIA FC0-U61 IT Fundamentals (ITF+) exam.
I was looking for an online course for Six Sigma as my new boss is a true believer and I wanted to have a better handle of what is Six Sigma. I started looking around and found ITU, and bought the course, and could not be happier. I have no intention of getting certified, but at least now I can speak the jargon and understand what my boss is talking about.
The educators at ituonline.com are highly skilled but could improve their methods of instruction. In the CCNA 200-301 course, there’s a heavy emphasis on oral lectures, and it would be beneficial to include more in-depth visual aids. Annotating labs and graphics could also make the educational journey more effective. On the other hand, the N10-008 course instructor consistently offers top-notch material.
The CompTIA PenTest was an excellent course and the instructor, Chrys, explained the material in a clear and easy way for me to understand and comprehend essential techniques. Highly recommend!
This course is super detailed but not boring, and they give you cool projects to actually practice what you’re learning.