Free Course Image CompTIA Security course

Free online courseCompTIA Security course

Duration of the online course: 26 hours and 11 minutes

5

StarStarStarStarStar

(1)

Build in-demand cybersecurity skills in a free online course: security controls, threats, IAM, crypto, and network defense—plus practice questions to boost confidence.

In this free course, learn about

  • Security+ fundamentals: goals, principles, and core security terminology
  • Cybersecurity roles and the CIA triad as the primary objective of information security
  • Security controls: administrative, technical, and physical control categories
  • Attacker types and motives; differences between internal vs external attackers
  • Threat intelligence essentials: indicators, sources, and using intel to reduce risk
  • Network reconnaissance basics and checking Linux network configuration (e.g., ip/ifconfig)
  • Vulnerability management: app challenges, scanning, and risk-based prioritization (CVSS/context)
  • Pen testing purpose and active defense concepts for validating security posture
  • Social engineering tactics (phishing, pretexting, etc.) and human-focused attack methods
  • Malware types and spread mechanisms; key differences between viruses and worms
  • Cryptography basics: plaintext, encryption concepts, and common security use cases
  • Digital signatures and PKI: certificate trust, identity binding, and verification
  • Identity & access management: Kerberos TGT role, account lifecycle, and HR responsibilities
  • Network & wireless hardening: perimeter flaw, switch port security, and wireless design factors

Course Description

Cybersecurity is no longer a niche specialty: it touches every role that designs, manages, or uses technology. This free online course helps you build a solid foundation in modern information security, from the language of security to the real-world problems teams face when protecting systems, data, and people. You will learn how security goals guide day-to-day decisions, how defenses are organized, and why attackers choose certain paths when trying to break in.

Instead of staying theoretical, the course connects core concepts to practical thinking you can apply immediately. You will explore how security controls work together across administrative, technical, and physical layers, and how to reason about threats using attacker categories and threat intelligence. You will also see how reconnaissance and assessment fit into the security lifecycle, improving your ability to spot weaknesses before they turn into incidents and to understand why vulnerability management can be challenging in fast-changing applications and networks.

As you progress, you will strengthen your understanding of offensive and defensive perspectives. You will learn the purpose of penetration testing, how active defense supports detection and response, and why social engineering remains one of the most effective tactics against organizations. The course also demystifies malware behaviors and helps you recognize how different malicious programs spread and persist.

Cryptography and identity are essential pillars of trust online, and the course makes them approachable. You will learn what data looks like before and after encryption, where cryptography is used in everyday security, and how digital signatures, PKI, and certificates support integrity and authentication at scale. On the access side, you will connect identity and access management concepts with real mechanisms such as Kerberos and with processes like account lifecycle management, including the organizational responsibilities that keep access accurate and controlled.

Finally, you will focus on protecting infrastructure: network security design, common architectural pitfalls, securing switching and routing, and the decisions that matter most in wireless environments. Throughout, short exercises and targeted questions reinforce comprehension so you can retain concepts, communicate them clearly, and prepare with confidence for entry-level security responsibilities or further certification study.

Course content

  • Video class: CompTIA Security Full Course: Intro to Security

    20m

  • Exercise: What is a key feature of CompTIA Security+ training as mentioned in the video?

  • Video class: CompTIA Security Full Course: Cybersecurity Overview and Roles

    21m

  • Exercise: What is the primary objective of information security in IT?

  • Video class: CompTIA Security Full Course: Security Controls

    23m

  • Exercise: What are the three main categories of security control types?

  • Video class: CompTIA Security Full Course: Attack and Attacker Categories

    27m

  • Exercise: What is the difference between internal and external attackers in cybersecurity?

  • Video class: CompTIA Security Full Course: Threat Intelligence

    47m

  • Exercise: What is a crucial element of threat intelligence in cybersecurity?

  • Video class: CompTIA Security Full Course: Network Reconnaissance

    56m

  • Exercise: What is a basic approach to check network device configuration on Linux?

  • Video class: CompTIA Security Full Course: Security Assessments and Vulnerabilities

    20m

  • Exercise: What is a primary challenge when managing vulnerabilities in applications?

  • Video class: CompTIA Security Full Course: Vulnerability Scanning

    54m

  • Exercise: What is a key component for prioritizing vulnerabilities in network security?

  • Video class: CompTIA Security Full Course: Pentesting and Active Defense

    24m

  • Exercise: What's the primary goal of penetration testing?

  • Video class: CompTIA Security Full Course: Social Engineering

    22m

  • Exercise: What is a primary tactic used in social engineering attacks?

  • Video class: CompTIA Security Full Course: Malware Attacks

    34m

  • Exercise: What is the primary difference between viruses and worms?

  • Video class: CompTIA Security Full Course: Cryptography Explained

    36m

  • Exercise: In cryptography, what is plaintext?

  • Video class: CompTIA Security Full Course: Cryptography Use Cases

    1h16m

  • Exercise: What is a digital signature composed of?

  • Video class: CompTIA Security Full Course: Public Key Infrastructure (PKI)

    43m

  • Exercise: What is the role of PKI in digital certificates?

  • Video class: CompTIA Security Full Course: Identity, Access Management

    1h12m

  • Exercise: What is the main role of the Kerberos ticket granting ticket (TGT) in the authentication process?

  • Video class: CompTIA Security Full Course: Account Management

    34m

  • Exercise: What is the primary role of HR in account and identity management within a company?

  • Video class: CompTIA Security Full Course: Authorization and Personnel Policies

    32m

  • Exercise: What is Discretionary Access Control?

  • Video class: CompTIA Security Full Course: Securing Networks

    53m

  • Exercise: Which network design flaw involves relying predominantly on perimeter security?

  • Video class: CompTIA Security Full Course: Switching and Routing Security

    33m

  • Exercise: Which security method is used to prevent MAC address spoofing at a switch port level?

  • Video class: CompTIA Security Full Course: Securing Wireless

    52m

  • Exercise: What is a significant factor in wireless network security design?

This free course includes:

26 hours and 11 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

Course comments: CompTIA Security course

CB

Charlie Barajas

StarStarStarStarStar

this course is loaded with content. Thank you

D

Darlene

StarStarStarStarStar

Thank you I have a daughter Name Candis Shereece Swinney

MD

Malope David Sekhwela

StarStarStarStarStar

Bravooo

More free courses at Cyber Security

Free Ebook + Audiobooks! Learn by listening or reading!

Download the App now to have access to + 5000 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 60 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate