Duration of the online course: 26 hours and 11 minutes
5
(2)
Master cybersecurity essentials with the comprehensive CompTIA Security course by Certify Breakfast, covering topics from network security to digital forensics.
In this free course, learn about
Security Fundamentals and Core Concepts
Threats, Attacks, and Threat Intelligence
Vulnerability Management and Penetration Testing
Social Engineering and Malware
Applied Cryptography and PKI
Identity, Access, and Authorization Management
Network Security Architecture and Controls
Perimeter Defense and Network Monitoring
Secure Network and Remote Access Protocols
Endpoint, Embedded, and Mobile Security
Application and Web Security Practices
Cloud Security and Infrastructure as Code
Incident Response, SIEM, and Forensics
Risk and Physical Security Management
Course Description
Delve into the expansive world of cybersecurity with the comprehensive CompTIA Security course offered by Certify Breakfast. This online program transports learners into an array of crucial security topics vital for the modern IT landscape. Tread through an introduction to security and advance into specialized domains such as cyber roles and comprehensive security controls.
The course unravels layers of security through extensive modules covering attack categories, threat intelligence, and network reconnaissance. Learn valuable skills in vulnerability assessments, including scanning and pentesting, fundamental for active defense strategies. Grasp the nuances of social engineering and malware threats to bolster your defense mechanisms.
Explore intricate topics on cryptography, its practical applications, and delve into Public Key Infrastructure (PKI) for secure communications. Identity and access management are pivotal components, instructing learners on account management, authorization protocols, and creating robust security policies for personnel management.
Expand your capabilities in network security by mastering switching, routing, and securing wireless networks. Combat threats from DDoS attacks to establishing resilient firewall and proxy systems. Elevate your protective measures with security network monitoring, ensuring the integrity of protocols and safeguarding application security.
Gain expertise in endpoint security for both embedded systems and mobile devices. Navigate cloud environment security, ensuring data classification and securing infrastructure as code. Respond effectively to incidents through detailed digital forensics training and risk management strategies.
This robust course is meticulously designed to guide you through essential cybersecurity fundamentals and advanced protection strategies essential for your career in Information Technology.
Course content
Video class: CompTIA Security Full Course: Intro to Security20m
Exercise: What is a key feature of CompTIA Security+ training as mentioned in the video?
Video class: CompTIA Security Full Course: Cybersecurity Overview and Roles21m
Exercise: What is the primary objective of information security in IT?
Video class: CompTIA Security Full Course: Security Controls23m
Exercise: What are the three main categories of security control types?
Video class: CompTIA Security Full Course: Attack and Attacker Categories27m
Exercise: What is the difference between internal and external attackers in cybersecurity?
Video class: CompTIA Security Full Course: Threat Intelligence47m
Exercise: What is a crucial element of threat intelligence in cybersecurity?
Video class: CompTIA Security Full Course: Network Reconnaissance56m
Exercise: What is a basic approach to check network device configuration on Linux?
Video class: CompTIA Security Full Course: Security Assessments and Vulnerabilities20m
Exercise: What is a primary challenge when managing vulnerabilities in applications?
Video class: CompTIA Security Full Course: Vulnerability Scanning54m
Exercise: What is a key component for prioritizing vulnerabilities in network security?
Video class: CompTIA Security Full Course: Pentesting and Active Defense24m
Exercise: What's the primary goal of penetration testing?
Video class: CompTIA Security Full Course: Social Engineering22m
Exercise: What is a primary tactic used in social engineering attacks?
Video class: CompTIA Security Full Course: Malware Attacks34m
Exercise: What is the primary difference between viruses and worms?
Video class: CompTIA Security Full Course: Cryptography Explained36m
Exercise: In cryptography, what is plaintext?
Video class: CompTIA Security Full Course: Cryptography Use Cases1h16m
Exercise: What is a digital signature composed of?
Video class: CompTIA Security Full Course: Public Key Infrastructure (PKI)43m
Exercise: What is the role of PKI in digital certificates?
Video class: CompTIA Security Full Course: Identity, Access Management1h12m
Exercise: What is the main role of the Kerberos ticket granting ticket (TGT) in the authentication process?
Video class: CompTIA Security Full Course: Account Management34m
Exercise: What is the primary role of HR in account and identity management within a company?
Video class: CompTIA Security Full Course: Authorization and Personnel Policies32m
Exercise: What is Discretionary Access Control?
Video class: CompTIA Security Full Course: Securing Networks53m
Exercise: Which network design flaw involves relying predominantly on perimeter security?
Video class: CompTIA Security Full Course: Switching and Routing Security33m
Exercise: Which security method is used to prevent MAC address spoofing at a switch port level?
Video class: CompTIA Security Full Course: Securing Wireless52m
Exercise: What is a significant factor in wireless network security design?
Video class: CompTIA Security Full Course: DDoS Attacks and Connection Balancing51m
Exercise: What is the main role of a load balancer in a distributed server environment?
Video class: CompTIA Security Full Course: Firewalls and Proxies40m
Exercise: What is the primary purpose of a stateless firewall?
Video class: CompTIA Security Full Course: Security Network Monitoring52m
Exercise: What is a key limitation of an Intrusion Detection System (IDS)?
Video class: CompTIA Security Full Course: Network Protocol Security36m
Exercise: What is a common security vulnerability when using HTTP?
Video class: CompTIA Security Full Course: Application Protocol Security42m
Exercise: What is the default port for HTTPS?
Video class: CompTIA Security Full Course: Remote Access Security32m
Exercise: What does the term 'VPN' stand for?
Video class: CompTIA Security Full Course: Endpoint Security48m
Exercise: What is a primary security feature of TPM?
Video class: CompTIA Security Full Course: Protecting Embedded Systems, ICS35m
Exercise: What is a common security limitation of embedded systems?
Video class: CompTIA Security Full Course: Securing Mobile Devices30m
Exercise: What mobile device strategy involves employees using their own devices for work purposes?
Video class: CompTIA Security Full Course: Application Security56m
Exercise: What is a key vulnerability target in application security?
Video class: CompTIA Security Full Course: Web Application Security47m
Exercise: What is one reason web applications are considered high-value targets for attackers?
Video class: CompTIA Security Full Course: Writing Secure Application Code44m
Exercise: Which practice is crucial for ensuring application security?
Video class: CompTIA Security Full Course: Securing Cloud Environments40m
Exercise: What is a key responsibility when using public cloud services?
Video class: CompTIA Security Full Course: Infrastructure as Code33m
Exercise: What is one major benefit of using Infrastructure as Code (IaC)?
Video class: CompTIA Security Full Course: Classifying and Securing Data27m
Exercise: Which role is primarily responsible for data classification and labeling?
Video class: CompTIA Security Full Course: Incident Response33m
Exercise: What is the first step in the incident response process according to the NIST Special Publication 800-61?
Video class: CompTIA Security Full Course: SIEM and Log Analysis20m
Exercise: What is the primary purpose of a SIEM tool in a network?
Video class: CompTIA Security Full Course: Mitigating Security Incidents19m
Exercise: What is a key component of incident management to ensure security incidents don't happen again?
Video class: CompTIA Security Full Course: Digital Forensics34m
Exercise: What is a critical component in ensuring digital evidence is admissible in court?
Video class: CompTIA Security Full Course: Risk Management24m
Exercise: What is the formula for calculating risk in quantitative risk assessment?
Video class: CompTIA Security Full Course: Physical Security29m
Exercise: Which method enhances both data confidentiality and physical security?
Course comments: CompTIA Security course
Darlene
Thank you I have a daughter Name Candis Shereece Swinney
Malope David Sekhwela
Bravooo