Companies Home Search Profile

CompTIA Security+ (SY0-601) Complete Course & Exam

Focused View

Jason Dion • 1 Million+ Enrollments Worldwide,Dion Training Solutions • ATO for ITIL & PRINCE2,Dion Training Solutions • ATO for ITIL & PRINCE2

21:23:54

22 View
  • 1 - Quiz Overview of Security.html
  • 1 - Welcome.mp4
    11:56
  • 2 - CompTIA-Security-601-Study-Guide.pdf
  • 2 - CompTIA-Security-SY0-601-Exam-Objectives.pdf
  • 2 - Download the Study Guide.html
  • 3 - Overview of Security.mp4
    02:58
  • 4 - CIA Triad.mp4
    03:57
  • 5 - AAA of Security OBJ 24.mp4
    03:08
  • 6 - Security Threats OBJ 11 12.mp4
    02:59
  • 7 - Mitigating Threats OBJ 51.mp4
    02:49
  • 8 - Hackers OBJ 15.mp4
    04:56
  • 9 - Threat Actors 15.mp4
    03:15
  • 10 - Threat Intelligence and Sources OBJ 15.mp4
    08:55
  • 11 - Threat Hunting OBJ 17.mp4
    06:54
  • 12 - Attack Frameworks OBJ 42.mp4
    11:13
  • 2 - Quiz Malware.html
  • 13 - Malware OBJ 12.mp4
    00:42
  • 14 - Viruses OBJ 12.mp4
    06:24
  • 15 - Worms OBJ 12.mp4
    02:12
  • 16 - Trojans OBJ 12.mp4
    02:51
  • 17 - Demo Viruses and Trojans OBJ 12.mp4
    06:19
  • 18 - Ransomware OBJ 12.mp4
    02:33
  • 19 - Spyware OBJ 12.mp4
    02:42
  • 20 - Rootkits OBJ 12 13.mp4
    03:32
  • 21 - Spam OBJ 11.mp4
    02:59
  • 22 - Summary of Malware.mp4
    02:05
  • 3 - Quiz Malware Infection.html
  • 23 - Malware Infections.mp4
    04:15
  • 24 - Common Delivery Methods OBJ 11 15.mp4
    04:29
  • 25 - Demo Phishing OBJ 11 53.mp4
    05:22
  • 26 - Botnets and Zombies OBJ 12 14.mp4
    03:33
  • 27 - Active Interception and Privilege Escalation OBJ 13 14.mp4
    02:31
  • 28 - Demo Privilege Escalation OBJ 13 18.mp4
    05:44
  • 29 - Backdoors and Logic Bombs OBJ 12.mp4
    03:51
  • 30 - Symptoms of Infection OBJ 12.mp4
    04:13
  • 31 - Removing Malware OBJ 42.mp4
    05:04
  • 32 - Preventing Malware OBJ 16 32.mp4
    05:59
  • 33 - Malware Exploitation OBJ 12 14.mp4
    07:39
  • 4 - Quiz Security Applications and Devices.html
  • 34 - Security Applications and Devices.mp4
    00:35
  • 35 - Software Firewalls OBJ 32.mp4
    04:18
  • 36 - Demo Software Firewalls OBJ 32.mp4
    06:47
  • 37 - IDS OBJ 32 33.mp4
    05:05
  • 38 - Popup Blockers OBJ 11 33 44.mp4
    03:12
  • 39 - Data Loss Prevention DLP OBJ 21 32 44.mp4
    03:46
  • 40 - Securing the BIOS OBJ 32.mp4
    03:58
  • 41 - Securing Storage Devices OBJ 21 25 33.mp4
    03:29
  • 42 - Disk Encryption OBJ 21 28 32.mp4
    04:54
  • 43 - Endpoint Analysis OBJ 31 33.mp4
    05:47
  • 5 - Quiz Mobile Device Security.html
  • 44 - Mobile Device Security OBJ 15.mp4
    01:17
  • 45 - Securing Wireless Devices OBJ 34 35.mp4
    01:33
  • 46 - Mobile Malware OBJ 11 35.mp4
    06:21
  • 47 - SIM Cloning ID Theft OBJ 11 24 26.mp4
    04:03
  • 48 - Bluetooth Attacks OBJ 14 34.mp4
    02:11
  • 49 - Mobile Device Theft OBJ 35.mp4
    03:13
  • 50 - Security of Apps OBJ 31 35.mp4
    05:09
  • 51 - BYOD OBJ 35.mp4
    04:59
  • 52 - Hardening Mobile Devices OBJ 35.mp4
    03:54
  • 6 - Quiz Hardening.html
  • 53 - Hardening OBJ 32.mp4
    01:50
  • 54 - Unnecessary Applications OBJ 16.mp4
    03:14
  • 55 - Restricting Applications OBJ 32 44.mp4
    02:58
  • 56 - Demo Unnecessary Services OBJ 32 33.mp4
    05:38
  • 57 - Trusted Operating System OBJ 32.mp4
    01:59
  • 58 - Updates and Patches OBJ 16 32.mp4
    03:29
  • 59 - Patch Management OBJ 16 32.mp4
    03:52
  • 60 - Group Policies OBJ 21.mp4
    02:36
  • 61 - Demo Group Policies OBJ 32.mp4
    04:09
  • 62 - File Systems and Hard Drives OBJ 21 32.mp4
    03:21
  • 7 - Quiz Supply Chain Management.html
  • 63 - Supply Chain Assessment OBJ 12 15 16.mp4
    05:25
  • 64 - Root of Trust OBJ 32.mp4
    04:36
  • 65 - Trusted Firmware OBJ 32.mp4
    04:55
  • 66 - Secure Processing OBJ 32.mp4
    04:03
  • 8 - Quiz Virtualization.html
  • 67 - Virtualization OBJ 22.mp4
    02:10
  • 68 - Hypervisors OBJ 22.mp4
    02:40
  • 69 - Demo How to create a VM OBJ 22.mp4
    04:41
  • 70 - Threats to VMs OBJ 22.mp4
    03:46
  • 71 - Securing VMs OBJ 22.mp4
    03:50
  • 72 - Demo Securing VMs.mp4
    04:44
  • 9 - Quiz Application Security.html
  • 73 - Application Security.mp4
    01:46
  • 74 - Web Browser Security OBJ 32 33.mp4
    06:42
  • 75 - Web Browser Concerns OBJ 32 33.mp4
    03:22
  • 76 - Demo Web Browser Configuration OBJ 32 33.mp4
    05:22
  • 77 - Securing Applications OBJ 14 32.mp4
    04:41
  • 10 - Quiz Secure Software Development.html
  • 78 - Software Development OBJ 21 23.mp4
    08:36
  • 79 - SDLC Principles OBJ 16 23 32 53.mp4
    06:25
  • 80 - Testing Methods OBJ 23 32.mp4
    07:02
  • 81 - Software Vulnerabilities and Exploits OBJ 12 13 16.mp4
    03:47
  • 82 - Buffer Overflows OBJ 13.mp4
    06:18
  • 83 - Demo Buffer Overflow Attack OBJ 13.mp4
    06:28
  • 84 - XSS and XSRF OBJ 13.mp4
    03:10
  • 85 - SQL Injection OBJ 13.mp4
    06:28
  • 86 - Demo SQL Injection OBJ 12 13.mp4
    07:16
  • 87 - XML Vulnerabilities OBJ 13.mp4
    05:10
  • 88 - Race Conditions OBJ 13.mp4
    05:50
  • 89 - Design Vulnerabilities OBJ 13.mp4
    04:16
  • 11 - Quiz Network Design.html
  • 90 - Network Security.mp4
    00:47
  • 91 - The OSI Model OBJ 33 36.mp4
    06:03
  • 92 - Switches OBJ 14 27.mp4
    03:35
  • 93 - Routers OBJ 33.mp4
    02:30
  • 94 - Network Zones OBJ 33.mp4
    03:29
  • 95 - Jumpbox OBJ 35.mp4
    05:04
  • 96 - Network Access Control OBJ 33 44.mp4
    02:43
  • 97 - VLANs OBJ 33.mp4
    01:32
  • 98 - Subnetting OBJ 36.mp4
    01:54
  • 99 - Network Address Translation OBJ 33.mp4
    02:35
  • 100 - Telephony OBJ 31.mp4
    05:55
  • 12 - Quiz Perimeter Security.html
  • 101 - Perimeter Security.mp4
    00:49
  • 102 - Firewalls OBJ 33 44.mp4
    08:04
  • 103 - Demo SOHO Firewall OBJ 33 44.mp4
    04:07
  • 104 - Proxy Servers OBJ 33 44.mp4
    04:15
  • 105 - Honeypots and Honeynets OBJ 21.mp4
    01:25
  • 106 - Data Loss Prevention OBJ 21 32 44.mp4
    01:38
  • 107 - NIDS and NIPS OBJ 33.mp4
    04:13
  • 108 - Unified Threat Management OBJ 32 33.mp4
    01:55
  • 13 - Quiz Cloud Security.html
  • 109 - Cloud Computing OBJ 15 22 35 36.mp4
    03:32
  • 110 - Cloud Types OBJ 22 36.mp4
    02:54
  • 111 - As a Service OBJ 22.mp4
    07:07
  • 112 - Cloud Security OBJ 25 36.mp4
    02:28
  • 113 - Defending Servers OBJ 17 31 and 32.mp4
    04:35
  • 114 - Cloudbased Infrastructure OBJ 12 16 22 24 25 36.mp4
    07:22
  • 115 - CASB OBJ 21.mp4
    04:28
  • 116 - API OBJ 21.mp4
    06:09
  • 117 - FAAS and Serverless OBJ 22.mp4
    08:08
  • 118 - Cloud Threats OBJ 13 16 21 22.mp4
    08:11
  • 14 - Quiz Automation.html
  • 119 - Workflow Orchestration OBJ 23.mp4
    03:55
  • 120 - CICD OBJ 23.mp4
    07:05
  • 121 - DevSecOps OBJ 23.mp4
    04:51
  • 122 - IAC OBJ 22.mp4
    04:23
  • 123 - Machine Learning OBJ 12.mp4
    08:30
  • 15 - Quiz Network Attacks.html
  • 124 - Network Attacks OBJ 14.mp4
    00:40
  • 125 - Ports and Protocols OBJ 31.mp4
    04:27
  • 126 - Memorization of Ports OBJ 31.mp4
    11:18
  • 127 - Unnecessary Ports OBJ 16 32.mp4
    03:24
  • 128 - Denial of Service OBJ 13 14.mp4
    07:59
  • 129 - DDoS OBJ 12 13 14.mp4
    01:39
  • 130 - Stopping a DDoS OBJ 21 23.mp4
    02:29
  • 131 - Spoofing OBJ 14 33.mp4
    01:19
  • 132 - Hijacking OBJ 13 14.mp4
    03:47
  • 133 - Replay Attack OBJ 13.mp4
    01:29
  • 134 - Demo Null Sessions OBJ 16.mp4
    02:27
  • 135 - Transitive Attacks OBJ 24.mp4
    01:27
  • 136 - DNS Attacks OBJ 11 14 31.mp4
    04:36
  • 137 - ARP Poisoning OBJ 14.mp4
    01:33
  • 16 - Quiz Securing Networks.html
  • 138 - Securing Networks OBJ 33.mp4
    00:52
  • 139 - Securing Network Devices OBJ 12 16 33 37.mp4
    06:45
  • 140 - Securing Network Media OBJ 27.mp4
    08:51
  • 141 - Securing WiFi Devices OBJ 14 34.mp4
    04:25
  • 142 - Wireless Encryption OBJ 16 34.mp4
    05:33
  • 143 - Wireless Access Points OBJ 14 34.mp4
    06:14
  • 144 - Wireless Attacks OBJ 12 14 18.mp4
    04:18
  • 145 - Demo Wireless Attack OBJ 14.mp4
    07:42
  • 146 - WPA3 OBJ 34.mp4
    06:08
  • 147 - Other Wireless Technologies OBJ 14 35.mp4
    06:05
  • 17 - Quiz Physical Security.html
  • 148 - Physical Security OBJ 27.mp4
    01:33
  • 149 - Surveillance OBJ 27.mp4
    02:54
  • 150 - Door Locks OBJ 27.mp4
    03:50
  • 151 - Demo Lock Picking OBJ 27.mp4
    01:40
  • 152 - Biometric Readers OBJ 24.mp4
    04:18
  • 18 - Quiz Facilities Security.html
  • 153 - Facilities Security OBJ 27.mp4
    00:39
  • 154 - Fire Suppression OBJ 27.mp4
    06:24
  • 155 - HVAC OBJ 25 26 27.mp4
    02:26
  • 156 - Shielding OBJ 27.mp4
    02:37
  • 157 - Vehicular Vulnerabilities OBJ 26 27.mp4
    06:53
  • 158 - IoT Vulnerabilities OBJ 26.mp4
    03:29
  • 159 - Embedded System Vulnerabilities OBJ 26.mp4
    06:52
  • 160 - ICS and SCADA Vulnerabilities OBJ 26.mp4
    08:19
  • 161 - Mitigating Vulnerabilities OBJ 26.mp4
    03:30
  • 162 - Premise System Vulnerabilities OBJ 12 13 17 26.mp4
    06:14
  • 19 - Quiz Authentication.html
  • 163 - Authentication OBJ 24 35 38.mp4
    05:56
  • 164 - Authentication Models OBJ 24 35 38 39.mp4
    05:22
  • 165 - 8021x OBJ 34 38.mp4
    03:47
  • 166 - LDAP and Kerberos OBJ 31 38.mp4
    02:29
  • 167 - Remote Desktop Services OBJ 31.mp4
    01:54
  • 168 - Remote Access Service OBJ 31 38.mp4
    02:06
  • 169 - VPN OBJ 33.mp4
    03:05
  • 170 - RADIUS vs TACACS OBJ 38.mp4
    02:20
  • 171 - Authentication Summary OBJ 38.mp4
    02:06
  • 172 - Authentication Attacks OBJ 12.mp4
    07:12
  • 20 - Quiz Access Control.html
  • 173 - Access Control OBJ 38.mp4
    00:53
  • 174 - Access Control Models OBJ 38.mp4
    08:17
  • 175 - Best Practices OBJ 27 38 53.mp4
    05:46
  • 176 - Users and Groups OBJ 37 38.mp4
    09:15
  • 177 - Permissions OBJ 38.mp4
    03:44
  • 178 - Usernames and Passwords OBJ 16 37.mp4
    02:39
  • 179 - Demo Policies OBJ 37.mp4
    04:37
  • 180 - User Account Control OBJ 37 38.mp4
    01:56
  • 21 - Quiz Risk Assessments.html
  • 181 - Risk Assessments OBJ 54.mp4
    08:36
  • 182 - Qualitative Risk OBJ 54.mp4
    04:09
  • 183 - Quantitative Risk OBJ 54.mp4
    05:30
  • 184 - Methodologies OBJ 17 54.mp4
    02:52
  • 185 - Security Controls OBJ 51.mp4
    06:52
  • 186 - Types of Risk OBJ 16 54.mp4
    07:12
  • 22 - Quiz Vulnerability Management.html
  • 187 - Vulnerability Management OBJ 17 41 54.mp4
    07:53
  • 188 - Penetration Testing OBJ 18.mp4
    04:29
  • 189 - Training and Exercises OBJ 18 42.mp4
    04:49
  • 190 - OVAL OBJ 17.mp4
    01:37
  • 191 - Vulnerability Assessments OBJ 17 41.mp4
    06:55
  • 192 - Demo Nmap Scanning OBJ 41.mp4
    08:53
  • 193 - Demo Vulnerability Scanning OBJ 17 41 43.mp4
    09:36
  • 194 - Password Analysis OBJ 12.mp4
    05:57
  • 195 - Demo Password Cracking OBJ 41.mp4
    02:39
  • 23 - Quiz Monitoring and Auditing.html
  • 196 - Monitoring Types OBJ 33.mp4
    02:57
  • 197 - Performance Baselining OBJ 21.mp4
    04:38
  • 198 - Protocol Analyzers OBJ 33 41.mp4
    03:01
  • 199 - SNMP OBJ 31.mp4
    03:43
  • 200 - Demo Analytical Tools OBJ 41.mp4
    04:29
  • 201 - Auditing OBJ 17.mp4
    01:57
  • 202 - Demo Auditing Files OBJ 17.mp4
    03:56
  • 203 - Logging OBJ 17 43 45.mp4
    03:42
  • 204 - Log Files OBJ 43.mp4
    05:17
  • 205 - SIEM OBJ 17 43.mp4
    08:51
  • 206 - Syslog OBJ 17 43.mp4
    05:52
  • 207 - SOAR OBJ 17 44.mp4
    03:20
  • 24 - Quiz Cryptography.html
  • 208 - Cryptography OBJ 21 28.mp4
    04:58
  • 209 - Symmetric vs Asymmetric OBJ 28.mp4
    06:14
  • 210 - Symmetric Algorithms OBJ 28.mp4
    04:59
  • 211 - Public Key Cryptography OBJ 28.mp4
    03:12
  • 212 - Asymmetric Algorithms OBJ 28.mp4
    03:47
  • 213 - Pretty Good Privacy OBJ 28.mp4
    01:49
  • 214 - Key Management OBJ 28.mp4
    02:14
  • 215 - OneTime Pad OBJ 28.mp4
    04:21
  • 216 - Demo Steganography OBJ 28.mp4
    03:54
  • 217 - Cryptography Considerations OBJ 28.mp4
    12:26
  • 25 - Quiz Hashing.html
  • 218 - Hashing OBJ 12 28 32.mp4
    08:31
  • 219 - Demo Hashing OBJ 28.mp4
    03:07
  • 220 - Hashing Attacks OBJ 1213 28.mp4
    03:17
  • 221 - Increasing Hash Security OBJ 28 37.mp4
    01:29
  • 26 - Quiz Public Key Infrastructure.html
  • 222 - Public Key Infrastructure OBJ 31 33 39.mp4
    03:56
  • 223 - Digital Certificates OBJ 39.mp4
    06:45
  • 224 - Demo Certificates OBJ 28 39.mp4
    03:33
  • 225 - Certificate Authorities OBJ 32 39.mp4
    04:15
  • 226 - Web of Trust OBJ 39.mp4
    02:38
  • 27 - Quiz Security Protocols.html
  • 227 - Security Protocols OBJ 31.mp4
    00:24
  • 228 - SMIME OBJ 31.mp4
    01:32
  • 229 - SSL and TLS OBJ 12 21 31 33.mp4
    05:38
  • 230 - SSH OBJ 31 41.mp4
    02:31
  • 231 - VPN Protocols OBJ 31 33.mp4
    06:40
  • 232 - Demo Setting up a VPN OBJ 33.mp4
    01:37
  • 28 - Quiz Planning for the Worst.html
  • 233 - Planning for the Worst OBJ 25 54.mp4
    02:13
  • 234 - Redundant Power OBJ 25.mp4
    03:10
  • 235 - Backup Power OBJ 25.mp4
    03:09
  • 236 - Data Redundancy OBJ 25.mp4
    04:42
  • 237 - Demo RAIDs OBJ 25.mp4
    03:38
  • 238 - Network Redundancy OBJ 25.mp4
    02:07
  • 239 - Server Redundancy OBJ 25 33.mp4
    01:45
  • 240 - Redundant Sites OBJ 21.mp4
    02:23
  • 241 - Data Backup OBJ 25.mp4
    02:57
  • 242 - Tape Rotation OBJ 25.mp4
    03:55
  • 243 - Disaster Recovery Plan OBJ 21 25 42 54.mp4
    05:41
  • 244 - Business Impact Analysis OBJ 54.mp4
    15:47
  • 29 - Quiz Social Engineering.html
  • 245 - Social Engineering OBJ 11.mp4
    00:55
  • 246 - Demo Pretexting OBJ 11 53.mp4
    04:17
  • 247 - Insider Threat OBJ 15.mp4
    02:13
  • 248 - Phishing OBJ 11 53.mp4
    06:34
  • 249 - Motivation Factors OBJ 11.mp4
    07:14
  • 250 - More Social Engineering OBJ 11 12.mp4
    04:03
  • 251 - Fraud and Scams OBJ 11.mp4
    05:26
  • 252 - Influence Campaigns OBJ 11.mp4
    04:14
  • 253 - User Education OBJ 53.mp4
    04:47
  • 30 - Quiz Policies and Procedures.html
  • 254 - Policies and Procedures OBJ 52 53.mp4
    05:56
  • 255 - Data Classifications OBJ 53 55.mp4
    06:45
  • 256 - Data Ownership.mp4
    04:06
  • 257 - PII and PHI OBJ 52 55.mp4
    06:22
  • 258 - Legal Requirements OBJ 52 55.mp4
    05:45
  • 259 - Privacy Technologies OBJ 55.mp4
    06:29
  • 260 - Security Policies OBJ 53 55.mp4
    10:22
  • 261 - User Education OBJ 53.mp4
    04:05
  • 262 - Vendor Relationships OBJ 53.mp4
    07:55
  • 263 - Disposal Policies OBJ 27 41.mp4
    05:07
  • 264 - IT Security Frameworks OBJ 52.mp4
    03:21
  • 265 - Key Frameworks OBJ 52.mp4
    08:37
  • 31 - Quiz Incident Response and Forensics.html
  • 266 - Incident Response Procedures OBJ 42.mp4
    04:39
  • 267 - Incident Response Planning OBJ 42.mp4
    18:19
  • 268 - Investigative Data OBJ 43.mp4
    12:20
  • 269 - Forensic Procedures OBJ 45.mp4
    13:55
  • 270 - Data Collection Procedures OBJ 41 45.mp4
    07:59
  • 271 - Demo Disk Imaging OBJ 41.mp4
    06:59
  • 272 - Security Tools OBJ 41.mp4
    21:00
  • 273 - Conclusion.mp4
    09:23
  • 274 - BONUS Whats Next.mp4
    04:06
  • 274 - Connect with Jason at Dion Training.txt
  • 274 - Join our official Facebook group.txt
  • Description


    CompTIA Security+ (SY0-601) Bootcamp - Your preparation for the world's best cybersecurity certification!

    What You'll Learn?


    • Passing the CompTIA Security+ certification exam with confidence
    • Understand computer security, its functions, and its components
    • Performing basic security configurations
    • Become an effective security technician in a business environment

    Who is this for?


  • Students wanting to pass the CompTIA Security+ certification exam
  • Students wanting to learn the terminology and nomenclature of computer security
  • Students seeking a career in cyber security
  • What You Need to Know?


  • Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course)
  • (Helpful, but not required) Completion of the CompTIA A+ and Network+ certifications
  • More details


    Description

    ** Taught by a Best Selling IT Certification Instructor **


    Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.


    My name is Jason Dion, and I have personally helped over 500,000 students earn their IT certifications, and now I can help you, too!


    You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.


    CompTIA Security+ (SY0-601) is the world's most popular cybersecurity certification today!


    This course is designed to help prepare you for the CompTIA Security+ (SY0-601) certification exam and covers all the domains for the certification exam:

    1. Attacks, Threats, and Vulnerabilities

    2. Architecture and Design

    3. Implementation

    4. Operations and Incident Response

    5. Governance, Risk, and Compliance


    What You Will Receive In The Course:

    • Video lectures with the essential information needed to pass the Security+ (SY0-601) exam

    • A complete downloadable study guide in PDF format based on the lessons

    • Practice quizzes to ensure mastery of each section of the course

    • A full-length practice exam with multiple choice and mock simulations


    This course stays current and up-to-date with the SY0-601 version of the exam, and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!


    Upon completion of this course, you will earn 21 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

    Who this course is for:

    • Students wanting to pass the CompTIA Security+ certification exam
    • Students wanting to learn the terminology and nomenclature of computer security
    • Students seeking a career in cyber security

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jason Dion • 1 Million+ Enrollments Worldwide
    Jason Dion • 1 Million+ Enrollments Worldwide
    Instructor's Courses
    Jason Dion, CISSP No. 349867, is a former college professor and the lead instructor at Dion Training Solutions. He has multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. With networking experience dating back to 1992, Jason has been a network engineer, Director of a Network Operations and Security Center, and an Information Systems Officer for large organizations around the globe. He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance. He lives in Puerto Rico with his wife and two children.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 273
    • duration 21:23:54
    • English subtitles has
    • Release Date 2024/01/04

    Courses related to CompTIA Security+

    Courses related to Cyber Security

    Courses related to Network Security