Duration of the online course: 26 hours and 11 minutes
Cybersecurity is no longer a niche specialty: it touches every role that designs, manages, or uses technology. This free online course helps you build a solid foundation in modern information security, from the language of security to the real-world problems teams face when protecting systems, data, and people. You will learn how security goals guide day-to-day decisions, how defenses are organized, and why attackers choose certain paths when trying to break in.
Instead of staying theoretical, the course connects core concepts to practical thinking you can apply immediately. You will explore how security controls work together across administrative, technical, and physical layers, and how to reason about threats using attacker categories and threat intelligence. You will also see how reconnaissance and assessment fit into the security lifecycle, improving your ability to spot weaknesses before they turn into incidents and to understand why vulnerability management can be challenging in fast-changing applications and networks.
As you progress, you will strengthen your understanding of offensive and defensive perspectives. You will learn the purpose of penetration testing, how active defense supports detection and response, and why social engineering remains one of the most effective tactics against organizations. The course also demystifies malware behaviors and helps you recognize how different malicious programs spread and persist.
Cryptography and identity are essential pillars of trust online, and the course makes them approachable. You will learn what data looks like before and after encryption, where cryptography is used in everyday security, and how digital signatures, PKI, and certificates support integrity and authentication at scale. On the access side, you will connect identity and access management concepts with real mechanisms such as Kerberos and with processes like account lifecycle management, including the organizational responsibilities that keep access accurate and controlled.
Finally, you will focus on protecting infrastructure: network security design, common architectural pitfalls, securing switching and routing, and the decisions that matter most in wireless environments. Throughout, short exercises and targeted questions reinforce comprehension so you can retain concepts, communicate them clearly, and prepare with confidence for entry-level security responsibilities or further certification study.
Video class: CompTIA Security Full Course: Intro to Security
20m
Exercise: What is a key feature of CompTIA Security+ training as mentioned in the video?
Video class: CompTIA Security Full Course: Cybersecurity Overview and Roles
21m
Exercise: What is the primary objective of information security in IT?
Video class: CompTIA Security Full Course: Security Controls
23m
Exercise: What are the three main categories of security control types?
Video class: CompTIA Security Full Course: Attack and Attacker Categories
27m
Exercise: What is the difference between internal and external attackers in cybersecurity?
Video class: CompTIA Security Full Course: Threat Intelligence
47m
Exercise: What is a crucial element of threat intelligence in cybersecurity?
Video class: CompTIA Security Full Course: Network Reconnaissance
56m
Exercise: What is a basic approach to check network device configuration on Linux?
Video class: CompTIA Security Full Course: Security Assessments and Vulnerabilities
20m
Exercise: What is a primary challenge when managing vulnerabilities in applications?
Video class: CompTIA Security Full Course: Vulnerability Scanning
54m
Exercise: What is a key component for prioritizing vulnerabilities in network security?
Video class: CompTIA Security Full Course: Pentesting and Active Defense
24m
Exercise: What's the primary goal of penetration testing?
Video class: CompTIA Security Full Course: Social Engineering
22m
Exercise: What is a primary tactic used in social engineering attacks?
Video class: CompTIA Security Full Course: Malware Attacks
34m
Exercise: What is the primary difference between viruses and worms?
Video class: CompTIA Security Full Course: Cryptography Explained
36m
Exercise: In cryptography, what is plaintext?
Video class: CompTIA Security Full Course: Cryptography Use Cases
1h16m
Exercise: What is a digital signature composed of?
Video class: CompTIA Security Full Course: Public Key Infrastructure (PKI)
43m
Exercise: What is the role of PKI in digital certificates?
Video class: CompTIA Security Full Course: Identity, Access Management
1h12m
Exercise: What is the main role of the Kerberos ticket granting ticket (TGT) in the authentication process?
Video class: CompTIA Security Full Course: Account Management
34m
Exercise: What is the primary role of HR in account and identity management within a company?
Video class: CompTIA Security Full Course: Authorization and Personnel Policies
32m
Exercise: What is Discretionary Access Control?
Video class: CompTIA Security Full Course: Securing Networks
53m
Exercise: Which network design flaw involves relying predominantly on perimeter security?
Video class: CompTIA Security Full Course: Switching and Routing Security
33m
Exercise: Which security method is used to prevent MAC address spoofing at a switch port level?
Video class: CompTIA Security Full Course: Securing Wireless
52m
Exercise: What is a significant factor in wireless network security design?
Explore the fundamentals of Cryptography with 3 free online courses. Learn encryption techniques, security protocols, and secure communication practices to enhance your cybersecurity skills.
Explore our free online course in Digital Forensics to gain essential skills in digital crime investigation, cybersecurity analysis, and evidence recovery techniques.
26 hours and 11 minutes of online video course
Digital certificate of course completion (Free)
Exercises to train your knowledge
100% free, from content to certificate
Ready to get started?Download the app and get started today.
Install the app now
to access the courseOver 5,000 free courses
Programming, English, Digital Marketing and much more! Learn whatever you want, for free.
Study plan with AI
Our app's Artificial Intelligence can create a study schedule for the course you choose.
From zero to professional success
Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.
You can also use the QR Code or the links below.

Free CourseInformation Security Management Fundamentals
2h55m
15 exercises

Free CourseAdvanced Topics in Cryptography
22h34m
9 exercises

Free CourseComputer systems security
29h44m
20 exercises

Free CourseIT Security
15h04m
18 exercises

Free CourseCyber security
2h07m
24 exercises

Free CourseInformation security lessons
7h15m
11 exercises

Free CourseIntroduction to Cybersecurity
7h43m
6 exercises

Free CourseCyber Security Masterclass
1h36m
6 exercises

Free CourseCyber security full course
11h06m

Free CourseCyber Security full course
11h03m
Thousands of online courses in video, ebooks and audiobooks.
To test your knowledge during online courses
Generated directly from your cell phone's photo gallery and sent to your email
Download our app via QR Code or the links below::.
+ 10 million
students
Free and Valid
Certificate
60 thousand free
exercises
4.8/5 rating in
app stores
Free courses in
video and ebooks
Course comments: CompTIA Security course
Charlie Barajas
this course is loaded with content. Thank you
Darlene
Thank you I have a daughter Name Candis Shereece Swinney
Malope David Sekhwela
Bravooo