Free Course Image CompTIA Security course

Free online courseCompTIA Security course

Duration of the online course: 26 hours and 11 minutes

5

StarStarStarStarStar

(2)

Master cybersecurity essentials with the comprehensive CompTIA Security course by Certify Breakfast, covering topics from network security to digital forensics.

In this free course, learn about

  • Security Fundamentals and Core Concepts
  • Threats, Attacks, and Threat Intelligence
  • Vulnerability Management and Penetration Testing
  • Social Engineering and Malware
  • Applied Cryptography and PKI
  • Identity, Access, and Authorization Management
  • Network Security Architecture and Controls
  • Perimeter Defense and Network Monitoring
  • Secure Network and Remote Access Protocols
  • Endpoint, Embedded, and Mobile Security
  • Application and Web Security Practices
  • Cloud Security and Infrastructure as Code
  • Incident Response, SIEM, and Forensics
  • Risk and Physical Security Management

Course Description

Delve into the expansive world of cybersecurity with the comprehensive CompTIA Security course offered by Certify Breakfast. This online program transports learners into an array of crucial security topics vital for the modern IT landscape. Tread through an introduction to security and advance into specialized domains such as cyber roles and comprehensive security controls.

The course unravels layers of security through extensive modules covering attack categories, threat intelligence, and network reconnaissance. Learn valuable skills in vulnerability assessments, including scanning and pentesting, fundamental for active defense strategies. Grasp the nuances of social engineering and malware threats to bolster your defense mechanisms.

Explore intricate topics on cryptography, its practical applications, and delve into Public Key Infrastructure (PKI) for secure communications. Identity and access management are pivotal components, instructing learners on account management, authorization protocols, and creating robust security policies for personnel management.

Expand your capabilities in network security by mastering switching, routing, and securing wireless networks. Combat threats from DDoS attacks to establishing resilient firewall and proxy systems. Elevate your protective measures with security network monitoring, ensuring the integrity of protocols and safeguarding application security.

Gain expertise in endpoint security for both embedded systems and mobile devices. Navigate cloud environment security, ensuring data classification and securing infrastructure as code. Respond effectively to incidents through detailed digital forensics training and risk management strategies.

This robust course is meticulously designed to guide you through essential cybersecurity fundamentals and advanced protection strategies essential for your career in Information Technology.

Course content

  • Video class: CompTIA Security Full Course: Intro to Security 20m
  • Exercise: What is a key feature of CompTIA Security+ training as mentioned in the video?
  • Video class: CompTIA Security Full Course: Cybersecurity Overview and Roles 21m
  • Exercise: What is the primary objective of information security in IT?
  • Video class: CompTIA Security Full Course: Security Controls 23m
  • Exercise: What are the three main categories of security control types?
  • Video class: CompTIA Security Full Course: Attack and Attacker Categories 27m
  • Exercise: What is the difference between internal and external attackers in cybersecurity?
  • Video class: CompTIA Security Full Course: Threat Intelligence 47m
  • Exercise: What is a crucial element of threat intelligence in cybersecurity?
  • Video class: CompTIA Security Full Course: Network Reconnaissance 56m
  • Exercise: What is a basic approach to check network device configuration on Linux?
  • Video class: CompTIA Security Full Course: Security Assessments and Vulnerabilities 20m
  • Exercise: What is a primary challenge when managing vulnerabilities in applications?
  • Video class: CompTIA Security Full Course: Vulnerability Scanning 54m
  • Exercise: What is a key component for prioritizing vulnerabilities in network security?
  • Video class: CompTIA Security Full Course: Pentesting and Active Defense 24m
  • Exercise: What's the primary goal of penetration testing?
  • Video class: CompTIA Security Full Course: Social Engineering 22m
  • Exercise: What is a primary tactic used in social engineering attacks?
  • Video class: CompTIA Security Full Course: Malware Attacks 34m
  • Exercise: What is the primary difference between viruses and worms?
  • Video class: CompTIA Security Full Course: Cryptography Explained 36m
  • Exercise: In cryptography, what is plaintext?
  • Video class: CompTIA Security Full Course: Cryptography Use Cases 1h16m
  • Exercise: What is a digital signature composed of?
  • Video class: CompTIA Security Full Course: Public Key Infrastructure (PKI) 43m
  • Exercise: What is the role of PKI in digital certificates?
  • Video class: CompTIA Security Full Course: Identity, Access Management 1h12m
  • Exercise: What is the main role of the Kerberos ticket granting ticket (TGT) in the authentication process?
  • Video class: CompTIA Security Full Course: Account Management 34m
  • Exercise: What is the primary role of HR in account and identity management within a company?
  • Video class: CompTIA Security Full Course: Authorization and Personnel Policies 32m
  • Exercise: What is Discretionary Access Control?
  • Video class: CompTIA Security Full Course: Securing Networks 53m
  • Exercise: Which network design flaw involves relying predominantly on perimeter security?
  • Video class: CompTIA Security Full Course: Switching and Routing Security 33m
  • Exercise: Which security method is used to prevent MAC address spoofing at a switch port level?
  • Video class: CompTIA Security Full Course: Securing Wireless 52m
  • Exercise: What is a significant factor in wireless network security design?
  • Video class: CompTIA Security Full Course: DDoS Attacks and Connection Balancing 51m
  • Exercise: What is the main role of a load balancer in a distributed server environment?
  • Video class: CompTIA Security Full Course: Firewalls and Proxies 40m
  • Exercise: What is the primary purpose of a stateless firewall?
  • Video class: CompTIA Security Full Course: Security Network Monitoring 52m
  • Exercise: What is a key limitation of an Intrusion Detection System (IDS)?
  • Video class: CompTIA Security Full Course: Network Protocol Security 36m
  • Exercise: What is a common security vulnerability when using HTTP?
  • Video class: CompTIA Security Full Course: Application Protocol Security 42m
  • Exercise: What is the default port for HTTPS?
  • Video class: CompTIA Security Full Course: Remote Access Security 32m
  • Exercise: What does the term 'VPN' stand for?
  • Video class: CompTIA Security Full Course: Endpoint Security 48m
  • Exercise: What is a primary security feature of TPM?
  • Video class: CompTIA Security Full Course: Protecting Embedded Systems, ICS 35m
  • Exercise: What is a common security limitation of embedded systems?
  • Video class: CompTIA Security Full Course: Securing Mobile Devices 30m
  • Exercise: What mobile device strategy involves employees using their own devices for work purposes?
  • Video class: CompTIA Security Full Course: Application Security 56m
  • Exercise: What is a key vulnerability target in application security?
  • Video class: CompTIA Security Full Course: Web Application Security 47m
  • Exercise: What is one reason web applications are considered high-value targets for attackers?
  • Video class: CompTIA Security Full Course: Writing Secure Application Code 44m
  • Exercise: Which practice is crucial for ensuring application security?
  • Video class: CompTIA Security Full Course: Securing Cloud Environments 40m
  • Exercise: What is a key responsibility when using public cloud services?
  • Video class: CompTIA Security Full Course: Infrastructure as Code 33m
  • Exercise: What is one major benefit of using Infrastructure as Code (IaC)?
  • Video class: CompTIA Security Full Course: Classifying and Securing Data 27m
  • Exercise: Which role is primarily responsible for data classification and labeling?
  • Video class: CompTIA Security Full Course: Incident Response 33m
  • Exercise: What is the first step in the incident response process according to the NIST Special Publication 800-61?
  • Video class: CompTIA Security Full Course: SIEM and Log Analysis 20m
  • Exercise: What is the primary purpose of a SIEM tool in a network?
  • Video class: CompTIA Security Full Course: Mitigating Security Incidents 19m
  • Exercise: What is a key component of incident management to ensure security incidents don't happen again?
  • Video class: CompTIA Security Full Course: Digital Forensics 34m
  • Exercise: What is a critical component in ensuring digital evidence is admissible in court?
  • Video class: CompTIA Security Full Course: Risk Management 24m
  • Exercise: What is the formula for calculating risk in quantitative risk assessment?
  • Video class: CompTIA Security Full Course: Physical Security 29m
  • Exercise: Which method enhances both data confidentiality and physical security?

This free course includes:

26 hours and 11 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

Course comments: CompTIA Security course

Darlene

Thank you I have a daughter Name Candis Shereece Swinney

Malope David Sekhwela

Bravooo

More free courses at Cyber Security

Download the App now to have access to + 3300 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 48 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate

+ 9 million
students

Free and Valid
Certificate

60 thousand free
exercises

4.8/5 rating in
app stores

Free courses in
video and ebooks