Companies Home Search Profile

CompTIA Security+ (SY0-601) Course with Practice Exam

Focused View

Cybr Training,Christophe Limpalair

23:42:14

66 View
  • 1. About the course and certification.mp4
    04:42
  • 2. About the course author.html
  • 3. Pre-requisites.mp4
    01:31
  • 4. Tools and tips to help you study more efficiently.mp4
    08:12
  • 5. Study techniques that will help you pass.html
  • 6. What surprised me the most about the exam.mp4
    05:15
  • 7. Join our Discord community for support and interaction.html
  • 8. Acronym definitions and study template.html
  • 1. About threats, attacks, and vulnerabilities.mp4
    03:50
  • 1. What is social engineering.mp4
    02:38
  • 2. Principles.mp4
    03:17
  • 3. Spam.mp4
    02:09
  • 4. Blocking and Managing Spam.mp4
    02:28
  • 5. Phishing.mp4
    05:38
  • 6. Smishing.mp4
    02:38
  • 7. Vishing.mp4
    01:36
  • 8. Spear phishing.mp4
    00:52
  • 9. Whaling.mp4
    00:56
  • 10. Impersonation.mp4
    03:13
  • 11. Dumpster diving.mp4
    01:47
  • 12. Shoulder surfing.mp4
    02:14
  • 13. Pharming.mp4
    07:06
  • 14. Tailgating.mp4
    01:49
  • 15. Eliciting information.mp4
    01:50
  • 16. Prepending.mp4
    01:53
  • 17. Identity fraud.mp4
    03:09
  • 18. Invoice scams.mp4
    01:17
  • 19. Credentials harvesting.mp4
    02:12
  • 20. Reconnaissance.mp4
    02:13
  • 21. Hoax.mp4
    03:05
  • 22. Watering hole attack.mp4
    01:40
  • 23. Typo squatting and URL Hijacking.mp4
    01:47
  • 24. Influence campaigns.mp4
    02:53
  • 25. Hybrid warfare.mp4
    01:55
  • 26. Knowledge check.html
  • 1. What is malware.mp4
    06:58
  • 2. Malware classification.mp4
    05:51
  • 3. Virus.mp4
    03:49
  • 4. Worms.mp4
    03:37
  • 5. Backdoor.mp4
    04:05
  • 6. Trojans.mp4
    05:44
  • 7. Remote access Trojan (RAT).mp4
    03:26
  • 8. Ransomware and Crypto Malware.mp4
    04:50
  • 9. How does ransomware work.mp4
    04:48
  • 10. Potentially unwanted programs (PUPs).mp4
    01:57
  • 11. Spyware.mp4
    03:49
  • 12. Adware & Malvertising.mp4
    03:22
  • 13. Keyloggers.mp4
    01:05
  • 14. Fileless malware.mp4
    01:52
  • 15. Logic bombs.mp4
    03:07
  • 16. Rootkit.mp4
    01:59
  • 17. Bots and Botnets.mp4
    04:54
  • 18. Command and control.mp4
    03:16
  • 19. What are password attacks.mp4
    07:13
  • 20. Plaintext, encrypted, and hashed passwords.mp4
    05:51
  • 21. Brute force.mp4
    02:09
  • 22. Dictionary attacks.mp4
    02:17
  • 23. Spraying attacks.mp4
    01:42
  • 24. Rainbow and hash tables.mp4
    05:29
  • 25. Credential stuffing.mp4
    04:12
  • 26. What are physical attacks.mp4
    00:50
  • 27. Malicious universal serial bus (USB) cable.mp4
    01:44
  • 28. Malicious flash drive.mp4
    01:17
  • 29. Card cloning.mp4
    01:00
  • 30. Skimming.mp4
    04:58
  • 31. What is adversarial AI and tainted training for ML.mp4
    02:09
  • 32. Supply-chain attacks.mp4
    05:08
  • 33. Cloud-based vs. on-premises attacks.mp4
    04:06
  • 34. Cryptography concepts.mp4
    05:13
  • 35. Cryptographic attacks.mp4
    04:22
  • 36. Knowledge Check 1.2.1.html
  • 37. Knowledge Check 1.2.2.html
  • 38. Knowledge Check 1.2.3.html
  • 1. Privilege escalation.mp4
    02:23
  • 2. Improper input handling.mp4
    02:11
  • 3. Improper error handling.mp4
    02:41
  • 4. Cross-Site Scripting (XSS).mp4
    05:35
  • 5. Structured query language (SQL Injections).mp4
    05:24
  • 6. Dynamic Link Library (DLL Injections).mp4
    01:02
  • 7. Lightweight directory access protocol (LDAP Injections).mp4
    03:30
  • 8. Extensible Markup Language (XML) and XPATH Injections.mp4
    02:10
  • 9. XXE Injections.mp4
    01:51
  • 10. Directory traversal.mp4
    03:36
  • 11. Request forgeries.mp4
    03:40
  • 12. Application Programming Interface (API) attacks.mp4
    02:19
  • 13. Secure Sockets Layer (SSL) stripping.mp4
    04:15
  • 14. Replay attack (session replays).mp4
    03:10
  • 15. Pass the hash.mp4
    01:46
  • 16. Race conditions (time of check and time of use).mp4
    02:11
  • 17. Resource exhaustion.mp4
    02:50
  • 18. Memory leak.mp4
    02:13
  • 19. Pointerobject dereference.mp4
    01:43
  • 20. Integer overflow.mp4
    01:20
  • 21. Buffer overflows.mp4
    02:20
  • 22. Driver manipulation (shimming and refactoring).mp4
    02:50
  • 23. Knowledge Check 1.3.1.html
  • 24. Knowledge Check 1.3.2.html
  • 1. What are wireless attacks.mp4
    02:17
  • 2. Distributed Denial of Service (DDoS).mp4
    03:03
  • 3. Rogue access point and Evil Twin.mp4
    03:44
  • 4. Bluesnarfing and Bluejacking.mp4
    01:52
  • 5. Disassociation and Jamming.mp4
    02:55
  • 6. Radio Frequency Identifier (RFID) attacks.mp4
    03:12
  • 7. Near Field Communication (NFC) attacks.mp4
    01:55
  • 8. Initialization Vector (IV).mp4
    02:44
  • 9. Man in the middle.mp4
    03:07
  • 10. Man in the browser.mp4
    01:35
  • 11. What are layer 2 attacks.mp4
    00:31
  • 12. Address resolution protocol (ARP) poisoning.mp4
    02:35
  • 13. Media access control (MAC) flooding.mp4
    05:11
  • 14. MAC cloning & spoofing.mp4
    02:55
  • 15. What are Domain Name System (DNS) attacks and defenses.mp4
    02:12
  • 16. Domain hijacking.mp4
    01:08
  • 17. DNS poisoning.mp4
    03:12
  • 18. Universal resource locator (URL) redirection.mp4
    03:35
  • 19. Domain reputation.mp4
    01:42
  • 20. Knowledge Check.html
  • 1. What are actors and threats.mp4
    00:58
  • 2. Attributes of actors.mp4
    02:04
  • 3. Vectors.mp4
    01:46
  • 4. Insider threats.mp4
    03:13
  • 5. State actors.mp4
    03:09
  • 6. Hacktivists.mp4
    03:19
  • 7. Script kiddies.mp4
    01:28
  • 8. Hackers (white hat, black hat, gray hat).mp4
    05:04
  • 9. Criminal syndicates.mp4
    02:05
  • 10. Advanced persistent threat (APT).mp4
    06:22
  • 11. Shadow IT.mp4
    04:31
  • 12. Competitors.mp4
    02:05
  • 13. Threat intelligence sources (OSINT and others).mp4
    09:04
  • 14. Using threat intelligence.mp4
    07:06
  • 15. Research sources.mp4
    05:04
  • 16. Knowledge Check.html
  • 1. Cloud-based vs. on-premises vulnerabilities.mp4
    10:44
  • 2. Zero-day vulnerabilities.mp4
    08:40
  • 3. Weak configurations.mp4
    03:02
  • 4. Weak encryption, hashing, and digital signatures.mp4
    05:20
  • 5. Third-party risks.mp4
    10:59
  • 6. Improper or weak patch management.mp4
    04:00
  • 7. Legacy platforms.mp4
    04:20
  • 8. Impacts.mp4
    05:23
  • 9. Knowledge Check.html
  • 1. Threat hunting.mp4
    06:56
  • 2. Vulnerability scans.mp4
    08:37
  • 3. SyslogSecurity information and event management (SIEM).mp4
    08:26
  • 4. Security orchestration, automation, response (SOAR).mp4
    04:19
  • 5. Knowledge Check.html
  • 1. Important pentesting concepts.mp4
    09:03
  • 2. Bug bounties.mp4
    03:27
  • 3. Exercise types (red, blue, white, and purple teams).mp4
    10:29
  • 4. Passive and active reconnaissance.mp4
    07:09
  • 5. Knowledge Check.html
  • 1. About architecture and design.html
  • 1. Configuration management.mp4
    04:37
  • 2. Data sovereignty.mp4
    04:48
  • 3. Data protection.mp4
    10:03
  • 4. Hardware security module (HSM) and Trusted Platform Module (TPM).mp4
    03:30
  • 5. Geographical considerations.mp4
    04:22
  • 6. Cloud access security broker (CASB).mp4
    03:35
  • 7. Response and recovery controls.mp4
    01:54
  • 8. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) inspection.mp4
    08:30
  • 9. Hashing.mp4
    04:25
  • 10. API considerations.mp4
    04:40
  • 11. Site resiliency.mp4
    04:53
  • 12. Deception and disruption.mp4
    05:26
  • 13. Knowledge Check 2.1.html
  • 1. Comparing cloud models.mp4
    06:19
  • 2. Cloud service providers.mp4
    05:31
  • 3. Virtualization.mp4
    06:21
  • 4. Containers.mp4
    06:49
  • 5. Microservices and APIs.mp4
    05:32
  • 6. Serverless architecture.mp4
    05:00
  • 7. MSPs and MSSPs.mp4
    03:35
  • 8. On-premises vs. off-premises.html
  • 9. Edge computing.mp4
    03:04
  • 10. Fog computing.mp4
    02:16
  • 11. Thin client.mp4
    02:25
  • 12. Infrastructure as Code (IaC).mp4
    04:25
  • 13. Services integration.mp4
    01:39
  • 14. Resource policies.mp4
    01:46
  • 15. Transit gateway.mp4
    02:31
  • 16. Knowledge Check 2.2.html
  • 1. Understanding development environments.mp4
    06:01
  • 2. Automation and scripting.mp4
    03:56
  • 3. Version control.mp4
    02:13
  • 4. Secure coding techniques.mp4
    09:09
  • 5. Open Web Application Security Project (OWASP).mp4
    01:48
  • 6. Integrity measurement.mp4
    01:16
  • 7. Software diversity.mp4
    03:13
  • 8. Provisioning and deprovisioning.mp4
    01:56
  • 9. Elasticity.mp4
    03:49
  • 10. Scalability.mp4
    01:48
  • 11. Knowledge Check 2.3.html
  • 1. Important authentication and authorization concepts.mp4
    06:51
  • 2. Multifactor authentication (MFA) factors and attributes.mp4
    09:24
  • 3. MFA factors and attributes.html
  • 4. Authentication technologies.mp4
    09:42
  • 5. Biometrics techniques and concepts.mp4
    05:21
  • 6. Authentication, authorization, and accounting (AAA).mp4
    01:51
  • 7. Cloud vs. on-premises requirements.mp4
    03:27
  • 8. Knowledge Check 2.4.html
  • 1. What is redundancy.mp4
    01:47
  • 2. Disk redundancy (RAID levels).mp4
    10:47
  • 3. Network redundancy.mp4
    03:32
  • 4. Power redundancy.mp4
    04:21
  • 5. Replication.mp4
    04:21
  • 6. Backup types (full, incremental, differential, and snapshot).mp4
    07:41
  • 7. Backup types practice scenarios.html
  • 8. Backup devices and strategies.mp4
    07:24
  • 9. Backup types, devices, and strategies.html
  • 10. Non-persistence.mp4
    03:27
  • 11. Restoration order.mp4
    01:57
  • 12. Diversity.mp4
    03:55
  • 13. Knowledge Check 2.5.html
  • 1. What are embedded systems.mp4
    03:28
  • 2. System on a Chip (SoC).mp4
    02:25
  • 3. SCADA and ICS.mp4
    02:20
  • 4. Internet of Things (IoT).mp4
    02:12
  • 5. Specialized systems.mp4
    03:33
  • 6. VoIP, HVAC, DronesAVs, MFP, RTOS, Surveillance systems.mp4
    05:16
  • 7. Communication considerations.mp4
    04:16
  • 8. Important constraints.mp4
    04:51
  • 1. Bollardsbarricades, Mantraps, Badges, Alarms, Signage.mp4
    03:07
  • 2. Lighting and fencing.mp4
    02:07
  • 3. Cameras and Closed-circuit television (CCTV).mp4
    03:32
  • 4. Industrial camouflage.mp4
    01:45
  • 5. Personnel, robots, dronesUAVs.mp4
    03:51
  • 6. Locks.mp4
    03:51
  • 7. Different sensors.mp4
    03:13
  • 8. Fire suppression.mp4
    01:21
  • 9. Protected cable distribution (PCD).mp4
    02:13
  • 10. Secure areas (air gap, faraday cages, DMZ, etc).mp4
    01:20
  • 11. Hot and cold aisles.mp4
    01:20
  • 12. Secure data destruction.mp4
    07:05
  • 13. USB data blocker.mp4
    01:14
  • 14. Knowledge Check 2.7.html
  • 1. Common use cases.mp4
    05:24
  • 2. Key length.mp4
    02:29
  • 3. Key stretching.mp4
    04:01
  • 4. Salting, hashing, digital signatures.html
  • 5. Perfect forward secrecy.mp4
    04:08
  • 6. Elliptic curve cryptography.mp4
    00:49
  • 7. Ephemeral.mp4
    03:48
  • 8. Symmetric vs. asymmetric encryption.mp4
    01:19
  • 9. Key exchange.mp4
    02:09
  • 10. Cipher suites.mp4
    06:21
  • 11. Modes of operation.mp4
    02:23
  • 12. Lightweight cryptography and Homomorphic encryption.mp4
    00:53
  • 13. Steganography.mp4
    02:33
  • 14. Blockchain.mp4
    03:16
  • 15. Quantum and post-quantum.mp4
    02:33
  • 16. Limitations.mp4
    04:20
  • 17. Knowledge Check 2.8.1.html
  • 1. About implementation.html
  • 1. Important protocols to know and use cases.mp4
    00:51
  • 2. Important email secure protocols.mp4
    07:11
  • 3. IPsec and VPN.mp4
    02:47
  • 4. FTPS, SFTP, SCP.mp4
    01:18
  • 5. DNSSEC.mp4
    01:56
  • 7. DHCP.mp4
    01:11
  • 8. SNMP and SNMPv3.mp4
    01:16
  • 1. Endpoint protection.mp4
    11:25
  • 2. Self-encrypting drive (SED), full disk encryption (FDE), and file-level encrypti.mp4
    05:34
  • 3. Boot integrity.mp4
    08:21
  • 4. Database and data security.html
  • 5. Application security.mp4
    07:00
  • 6. Hardening hosts.mp4
    06:11
  • 7. Sandboxing.mp4
    03:25
  • 1. DNS.html
  • 2. Load balancing.mp4
    09:13
  • 3. Network segmentation.mp4
    09:46
  • 4. East-West and North-South.mp4
    01:18
  • 5. Jump servers (bastion hosts).mp4
    03:16
  • 6. NAT Gateways.mp4
    01:34
  • 7. Proxy servers.mp4
    04:48
  • 8. Out-of-band management.mp4
    01:33
  • 9. Virtual Private Networks (VPNs) and IPsec.mp4
    09:33
  • 10. Network Access Control (NAC).mp4
    04:20
  • 11. Port security.mp4
    08:05
  • 12. Network-based intrusion detection and prevention system (NIDS and NIPS).mp4
    03:51
  • 13. Firewalls.mp4
    09:29
  • 14. Next-Generation Firewalls.mp4
    03:47
  • 15. Access Control List (ACL) and Security Groups (SGs).mp4
    05:33
  • 16. Quality of Service (QoS).mp4
    01:43
  • 17. Implications of IPv6.mp4
    03:04
  • 18. Port scanning and port mirroring.mp4
    03:51
  • 19. File integrity monitors.mp4
    02:13
  • 1. Cryptographic protocols.mp4
    07:08
  • 2. Methods.mp4
    07:23
  • 3. Authentication protocols.mp4
    09:27
  • 4. Installation considerations.mp4
    02:13
  • 1. Connection methods and receivers.mp4
    06:52
  • 2. Mobile deployment models.mp4
    05:43
  • 3. Mobile device management (MDM).mp4
    08:14
  • 4. Mobile devices.mp4
    05:39
  • 5. Enforcement and monitoring.mp4
    08:04
  • 1. Cloud security controls.mp4
    04:22
  • 2. Secure cloud storage.mp4
    05:32
  • 3. Secure cloud networking.mp4
    06:31
  • 4. Secure cloud compute resources.mp4
    03:46
  • 5. Secure cloud solutions.mp4
    06:02
  • 1. Understanding identity.mp4
    05:21
  • 2. Account types to consider.mp4
    05:29
  • 3. Account policies to consider.mp4
    08:22
  • 1. Authentication management.mp4
    05:28
  • 2. Authentication protocols and considerations.mp4
    04:13
  • 3. Extensible Authentication Protocol (EAP).html
  • 4. RADIUS and TACACS+.mp4
    05:33
  • 5. Kerberos, LDAP, and NTLM.mp4
    08:34
  • 6. Federated Identities.mp4
    06:53
  • 7. Access control schemes.mp4
    09:01
  • 1. What is public key infrastructure.mp4
    11:46
  • 2. Types of certificates.mp4
    06:37
  • 3. Certificate formats.mp4
    04:20
  • 4. Important concepts.mp4
    04:59
  • 1. About operations and incident response.html
  • 1. Network reconnaissance and discovery part 1.mp4
    10:20
  • 2. Network reconnaissance and discovery part 2.mp4
    06:45
  • 3. File manipulation.mp4
    05:03
  • 4. Shell and script environments.mp4
    03:16
  • 5. Packet capture and replay.mp4
    03:34
  • 6. Forensics tools.mp4
    03:54
  • 7. Exploitation frameworks.mp4
    03:37
  • 8. Password crackers.mp4
    02:24
  • 9. Data sanitization.mp4
    02:36
  • 1. Incident response plans.mp4
    02:12
  • 2. Incident response process.mp4
    09:41
  • 3. Important exercises.mp4
    04:08
  • 4. Important attack frameworks.mp4
    04:39
  • 5. BCP, COOP, and DRP.mp4
    03:45
  • 6. Incident response team and stakeholder management.mp4
    02:40
  • 7. Retention policies.mp4
    01:32
  • 1. Vulnerability scan outputs.mp4
    03:07
  • 2. SIEM dashboards.mp4
    04:41
  • 3. Log files.mp4
    05:28
  • 4. Syslog, rsyslog, syslog-ng.mp4
    04:11
  • 5. Journald and journalctl.mp4
    01:52
  • 6. NXLog.mp4
    00:49
  • 7. Bandwidth and network monitors.mp4
    06:46
  • 8. Important and useful metadata.mp4
    02:52
  • 1. Reconfiguring endpoint security solutions.mp4
    05:11
  • 2. Configuration changes.mp4
    03:38
  • 3. Isolation, containment, and segmentation.mp4
    04:44
  • 4. Secure Orchestration, Automation, and Response (SOAR).mp4
    04:07
  • 1. Documentation and evidence.mp4
    07:27
  • 2. E-discovery, data recovery, and non-repudiation.mp4
    05:31
  • 3. Integrity and preservation of information.mp4
    04:09
  • 4. Acquisition.mp4
    11:46
  • 5. On-premises vs. cloud.mp4
    04:26
  • 6. Strategic intelligence and counterintelligence.mp4
    01:56
  • 1. About governance, risk and compliance.mp4
    02:43
  • 1. Categories.mp4
    03:28
  • 2. Control types.mp4
    03:55
  • 1. Regulations, standards, and legislation.mp4
    04:18
  • 2. Key frameworks to know about.mp4
    11:30
  • 3. Benchmarks and secure configuration guides.mp4
    02:14
  • 1. Personnel.mp4
    07:50
  • 2. User training.mp4
    04:03
  • 3. Third-party risk management.mp4
    06:55
  • 4. Data.mp4
    02:59
  • 5. Credential policies.mp4
    07:00
  • 6. Organizational policies.mp4
    05:30
  • 1. Types of risks.mp4
    04:21
  • 2. Risk management strategies.mp4
    05:07
  • 3. Risk analysis.mp4
    06:01
  • 4. Disasters.mp4
    02:48
  • 5. Business impact analysis.mp4
    04:29
  • 1. Organizational consequences of privacy breaches.mp4
    04:10
  • 2. Notifications of breaches.mp4
    02:29
  • 3. Data types.mp4
    07:43
  • 4. Privacy enhancing technologies.mp4
    05:40
  • 5. Roles and responsibilities.mp4
    03:09
  • 1. What should you do next.html
  • 2. Bonus FREE Performance-Based Questions (PBQs).html
  • 3. Realistic Security+ Practice Exam.html
  • Description


    Full Practice Exam | Simulated PBQs | Video Lessons | Everything you need to pass the CompTIA Security+ SY0-601 exam

    What You'll Learn?


    • Get access to this complete and high-quality course for the CompTIA Security+ SY0-601 certification exam
    • Pass the CompTIA Security+ with confidence and learn practical skills you can directly apply on-the-job
    • Common threats, attacks, and vulnerabilities (social engineering, malware, network-based, cloud-based, supply-chain, etc...) and how to defend against them
    • Proper security architecture and design for: enterprise environments, cloud computing, app development, authentication & authorization, and more
    • How to properly implement secure protocols, host & app security solutions, secure network designs, mobile solutions, cloud solutions, PKI, and more
    • Incident response approaches: selecting the right tools, policies, processes, and procedures, key aspects of digital forensics, and mitigation techniques
    • Governance, Risk, and Compliance concepts: controls, frameworks, regulations & standards, policies, risk management, and privacy for the enterprise
    • Full practice exam (multiple choice Q&A) and Performance-Based Questions (PBQs) with explanations included!

    Who is this for?


  • Learners who want to pass the CompTIA Security+ certification
  • Learners who want to build a solid foundation for cybersecurity by learning best practices
  • Learners who are seeking a career in cybersecurity
  • Learners who wish to learn more about common threats facing IT systems, networks, applications, and the cloud
  • More details


    Description

    Welcome! I'm here to help you prepare for and PASS the CompTIA Security+ SY0-601 exam!

    Whether you are new to IT or you already have experience, my course is designed to help you learn all of the topics you need.

    -----------------------

    Are you trying to get started in cybersecurity? Or are you looking to get a higher-paying job?

    The CompTIA Security+ certification is one of the most well-known cybersecurity certifications. It can not only provide you with more job opportunities, but it also provides you with a learning path of important cybersecurity topics you need to understand in order to have a successful career in this space. In fact, certain jobs require that you have at least one IT certification, and the Security+ can often qualify as one of those certifications.

    By the way, my name is Christophe Limpalair and I’m the founder of Cybr, a cybersecurity training platform, and the author of this all-in-one Security+ course. I have over 7 years of training experience, and I’ve been in IT for about 20 years. I’ve taught tens of thousands of students in cybersecurity, cloud computing, and web development, and I look forward to helping you get certified.

    I've personally taken and passed this exam, so I know exactly what you need to learn and how, and I've sprinkled in tips and tricks throughout the course that will help you get ready for the real exam.

    I specifically designed this course syllabus to match the official CompTIA Exam Objectives so that you can keep track of what you’ve learned and what you still need to learn.

    This exam has 5 different domains:

    • Domain 1 is about Attacks, Threats, and Vulnerabilities – which is 24% of the exam

    • Domain 2 is about Architecture and Design – which is 21% of the exam

    • Domain 3 is about Implementation – which is 25% of the exam

    • Domain 4 is about Operations and Incident Response – which is 16% of the exam

    • Domain 5 is about Governance, Risk, and Compliance – which is 14% of the exam

    Within these domains, you will learn about malware, web/cloud/network attacks, cryptography, network configurations, authentication, and much, much more.

    If any of those topics sound overwhelming to you — don’t worry! I walk you through it all lesson by lesson.

    In fact, this course has over 300 video lessons which is over 23 hours of high-quality video content as well as additional learning materials including a study template you can customize, a full list of Security+ acronyms and their definitions, and knowledge check quizzes.

    I’ve even included a multiple-choice practice exam at the end of the course to validate your knowledge and understanding, and I provide free access to multiple Performance-Based Questions (PBQs) that you can take and that mimic PBQs you can expect to see on the exam.

    On top of the training you receive, you get access to Cybr’s free Discord community where you can meet others who are actively studying for the Security+ or who have passed it and can provide you with tips and tricks.

    If you still have doubts, by the way, I provide a 30-day money-back policy pursuant to Udemy's refund policies.

    With an increasing demand for cybersecurity jobs, getting started with this course is a no-brainer. Let’s get started, and let’s take your career to the next level!

    I’ll see you in the course!


    -----------------------

    About the Instructor

    Hi, my name is Christophe Limpalair, and I will be your instructor for this course. I got my start in IT at the age of 11 building websites for organizations. This is where I first learned the importance of writing secure code because some of my websites got hacked and I had to figure out how. Back then, there weren't very many affordable learning resources for this topic, so figuring this out was very painful at times. That's when I first started to realize that more training was needed in IT.

    Fast-forward a few years, and this thing called "AWS" was becoming more and more popular. I started learning how it worked by migrating a few of my projects to it, and I fell in love. Cloud computing was the real deal and I knew it was going to become more and more important over time, so I learned as much of it as I could. Around the same time, I founded a training platform for developers which got acquired by Linux Academy in 2016. There, I authored multiple AWS courses including: AWS Lambda Deep Dive, AWS Certified Developer Associate (certification course), AWS Certified DevOps Engineer Professional (certification course), AWS Backup Strategies, and more. I also helped build and secure our Hands-On Labs platform which was constantly under attack because malicious actors wanted to abuse our lab platform to mine cryptocurrency or to launch external attacks from our infrastructure. At the same time, many of our business customers were also sharing that they had issues and concerns with making sure their cloud environments and resources were secure, especially as they were migrating from on-prem.

    Once Linux Academy was acquired and merged with ACloudGuru in 2019, I decided to launch my own training platform called Cybr to provide affordable cybersecurity training, including this course and AWS cloud security courses, as well as ethical hacking courses.

    Long story short, I've been in IT for about 20 years and I've gotten exposure to web development, cloud computing, and cybersecurity. These are all topics I'm passionate about and that are needed to understand for the Security+ exam, and I love giving back because so many people have helped me along my journey. That's why I've been creating both free and affordable training material for over 7 years, and that's why I created a free community that all are welcome to join. I hope to see you in my community and in my course!


    -----------------------

    This course also comes with:

    • Lifetime access to the content

    • Udemy Certificate of Completion

    • Free access to a cybersecurity community

    • Notion study template you can fully customize

    • Full list of Security+ acronyms and their definitions

    • Full practice exam (multiple choice Q&A) with explanations

    • Performance-Based Questions (PBQs) with explanations

    Let's get you CompTIA Security+ certified!

    Who this course is for:

    • Learners who want to pass the CompTIA Security+ certification
    • Learners who want to build a solid foundation for cybersecurity by learning best practices
    • Learners who are seeking a career in cybersecurity
    • Learners who wish to learn more about common threats facing IT systems, networks, applications, and the cloud

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Cybr Training
    Cybr Training
    Instructor's Courses
    We are an online community and training platform, and we're here to help you build your cybersecurity career.Cybr was founded in 2020 by veterans of the IT and training industries who have helped individuals learn new skills and get certified, and businesses deploy training initiatives across their organization.We believe that the world can be a safer place through training and community, and we intend to carry out that mission one person at a time! Join us on this mission and build your cybersecurity career regardless of your current skill level.
    Christophe Limpalair
    Christophe Limpalair
    Instructor's Courses
    After writing his first lines of code at the age of 11, Christophe developed a passion for technology. Frustrated with the state & cost of education, he spent the last few years training individuals and organizations (SMB & F500) on how to use the cloud by pioneering hands-on training technologies. After his journey of building two successful IT businesses to acquisition in the last six years, he realized that most struggle with building secure software, so he co-founded Cybr to help make the world a more secure place through community and training.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 339
    • duration 23:42:14
    • Release Date 2023/06/08