Companies Home Search Profile

CompTIA Security+ (SY0-701) Complete Course & Exam

Focused View

Jason Dion • 1 Million+ Enrollments Worldwide,Dion Training Solutions • ATO for ITIL & PRINCE2,Dion Training Solutions • ATO for ITIL & PRINCE2

30:56:48

37 View
  • 001 CompTIA-Security-SY0-701-Study-Guide.pdf
  • 001 Download the Study Guide.html
  • 001 Security-701-Study-Plan.pdf
  • 001 comptia-security-sy0-701-exam-objectives-5-0.pdf
  • 002 Exam Tips.mp4
    07:20
  • 001 Fundamentals of Security.mp4
    09:09
  • 002 Threats and Vulnerabilities.mp4
    05:33
  • 003 Confidentiality (OBJ 1.2).mp4
    05:53
  • 004 Integrity (OBJ 1.2).mp4
    06:09
  • 005 Availability (OBJ 1.2).mp4
    06:27
  • 006 Non-repudiation (OBJ 1.2).mp4
    05:10
  • 007 Authentication (OBJ 1.2).mp4
    06:45
  • 008 Authorization (OBJ 1.2).mp4
    03:26
  • 009 Accounting (OBJ 1.2).mp4
    04:00
  • 010 Security Control Categories (OBJ 1.1).mp4
    04:49
  • 011 Security Control Types (OBJ 1.1).mp4
    05:21
  • 012 Gap Analysis (OBJ 1.1).mp4
    05:09
  • 013 Zero Trust (OBJ 1.2).mp4
    07:39
  • 001 Threat Actors (OBJ 1.2, 2.1, & 2.2).mp4
    04:11
  • 002 Threat Actor Motivations (OBJ 2.1).mp4
    07:48
  • 003 Threat Actor Attributes (OBJ 2.1).mp4
    04:34
  • 004 Unskilled Attackers (OBJ 2.1).mp4
    03:13
  • 005 Hacktivists (OBJ 2.1).mp4
    04:07
  • 006 Organized Crime (OBJ 2.1).mp4
    04:36
  • 007 Nation-state Actor (OBJ 2.1).mp4
    07:04
  • 008 Insider Threats (OBJ 2.1).mp4
    06:06
  • 009 Shadow IT (OBJ 2.1).mp4
    05:23
  • 010 Threat Vectors and Attack Surfaces (OBJ 2.2).mp4
    08:54
  • 011 Outsmarting Threat Actors (OBJ 1.2).mp4
    10:48
  • 001 Physical Security (OBJ 1.2 & 2.4).mp4
    03:43
  • 002 Fencing and Bollards (OBJ 1.2).mp4
    06:31
  • 003 Attacking with Brute Force (OBJ 2.4).mp4
    05:45
  • 004 Surveillance Systems (OBJ 1.2).mp4
    07:04
  • 005 Bypassing Surveillance Systems (OBJ 2.4).mp4
    04:28
  • 006 Access Control Vestibules (OBJ 1.2).mp4
    07:38
  • 007 Door Locks (OBJ 1.2).mp4
    13:16
  • 008 Access Badge Cloning (OBJ 2.4).mp4
    08:41
  • 001 Social Engineering (OBJ 2.2 & 5.6).mp4
    04:12
  • 002 Motivational Triggers (OBJ 5.6).mp4
    10:46
  • 003 Impersonation (OBJ 2.2).mp4
    08:17
  • 004 Pretexting (OBJ 2.2).mp4
    04:17
  • 005 Phishing Attacks (OBJ 2.2).mp4
    08:46
  • 006 Preventing Phishing Attacks (OBJ 5.6).mp4
    09:05
  • 007 Conducting an Anti-Phishing Campaign (OBJ 5.6).mp4
    05:21
  • 008 Frauds and Scams (OBJ 2.2).mp4
    06:29
  • 009 Influence Campaigns (OBJ 2.2).mp4
    05:47
  • 010 Other Social Engineering Attacks (OBJ 2.2).mp4
    09:31
  • 001 Malware (OBJ 2.4).mp4
    08:46
  • 002 Viruses (OBJ 2.4).mp4
    07:50
  • 003 Worms (OBJ 2.4).mp4
    03:22
  • 004 Trojans (OBJ 2.4).mp4
    03:50
  • 005 Viruses and Trojans (OBJ 2.4).mp4
    07:46
  • 006 Ransomware (OBJ 2.4).mp4
    07:51
  • 007 Zombies and Botnets (OBJ 2.4).mp4
    05:03
  • 008 Rootkits (OBJ 2.4).mp4
    05:23
  • 009 Backdoors and Logic Bombs (OBJ 2.4).mp4
    05:40
  • 010 Keylogger (OBJ 2.4).mp4
    05:06
  • 011 Spyware and Bloatware (OBJ 2.4).mp4
    04:58
  • 012 Malware Attack Techniques (OBJ 2.4).mp4
    05:01
  • 013 Indications of Malware Attacks (OBJ 2.4).mp4
    05:19
  • 001 Data Protection (OBJ 1.4, 3.3, 4.2, 4.4, & 5.1).mp4
    03:16
  • 002 Data Classifications (OBJ 3.3).mp4
    08:16
  • 003 Data Ownership (OBJ 4.2 & 5.1).mp4
    05:10
  • 004 Data States (OBJ 3.3).mp4
    05:12
  • 005 Data Types (OBJ 3.3 & 1.4).mp4
    04:30
  • 006 Data Sovereignty (OBJ 3.3).mp4
    02:57
  • 007 Securing Data (OBJ 3.3).mp4
    03:55
  • 008 Data Loss Prevention (DLP) (OBJ 4.4).mp4
    04:01
  • 009 Configuring a DLP (OBJ 4.5).mp4
    16:06
  • 001 Cryptographic Solutions (OBJ 1.4, 2.3, & 2.4).mp4
    12:00
  • 002 Symmetric vs Asymmetric (OBJ 1.4).mp4
    07:57
  • 003 Symmetric Algorithms (OBJ 1.4).mp4
    06:00
  • 004 Asymmetric Algorithms (OBJ 1.4).mp4
    07:22
  • 005 Hashing (OBJ 1.4).mp4
    10:35
  • 006 Increasing Hash Security (OBJ 1.4).mp4
    07:44
  • 007 Public Key Infrastructure (PKI) (OBJ 1.4).mp4
    06:04
  • 008 Digital Certificates (OBJ 1.4).mp4
    13:04
  • 009 Exploring Digital Certificates (OBJ 1.4).mp4
    03:33
  • 010 Blockchain (OBJ 1.4).mp4
    05:36
  • 011 Encryption Tools (OBJ 1.4).mp4
    05:54
  • 012 Obfuscation (OBJ 1.4).mp4
    08:58
  • 013 Cryptographic Attacks (OBJ 2.3 & 2.4).mp4
    15:13
  • 001 Risk Management (OBJ 5.2).mp4
    04:43
  • 002 Risk Assessment Frequency (OBJ 5.2).mp4
    03:25
  • 003 Risk Identification (OBJ 5.2).mp4
    06:00
  • 004 Risk Register (OBJ 5.2).mp4
    07:56
  • 005 Qualitative Risk Analysis (OBJ 5.2).mp4
    03:46
  • 006 Quantitative Risk Analysis (OBJ 5.2).mp4
    05:11
  • 007 Risk Management Strategies (OBJ 5.2).mp4
    05:32
  • 008 Risk Monitoring and Reporting (OBJ 5.2).mp4
    03:39
  • 001 Third-party Vendor Risks (OBJ 2.2, 2.3, & 5.3).mp4
    03:05
  • 002 Supply Chain Risks (OBJ 2.3 & 5.3).mp4
    04:10
  • 003 Supply Chain Attacks (OBJ 2.2 & 5.3).mp4
    06:18
  • 004 Vendor Assessment (OBJ 5.3).mp4
    05:01
  • 005 Vendor Selection and Monitoring (OBJ 5.3).mp4
    05:12
  • 006 Contracts and Agreements (OBJ 5.3).mp4
    05:15
  • 001 Governance and Compliance (OBJ 5.1 & 5.4).mp4
    04:54
  • 002 Governance (OBJ 5.1).mp4
    05:06
  • 003 Governance Structures (OBJ 5.1).mp4
    03:36
  • 004 Policies (OBJ 5.1).mp4
    05:16
  • 005 Standards (OBJ 5.1).mp4
    04:32
  • 006 Procedures (OBJ 5.1).mp4
    04:58
  • 007 Governance Considerations (OBJ 5.1).mp4
    07:03
  • 008 Compliance (OBJ 5.4).mp4
    05:47
  • 009 Non-compliance Consequences (OBJ 5.4).mp4
    03:56
  • 001 Asset and Change Management (OBJ 1.3, 4.1, & 4.2).mp4
    04:44
  • 002 Acquisition and Procurement (OBJ 4.2).mp4
    06:22
  • 003 Mobile Asset Deployments (OBJ 4.1).mp4
    06:18
  • 004 Asset Management (OBJ 4.2).mp4
    06:37
  • 005 Asset Disposal and Decommissioning (OBJ 4.2).mp4
    09:00
  • 006 Change Management (OBJ 1.3).mp4
    07:08
  • 007 Change Management Processes (OBJ 1.3).mp4
    06:22
  • 008 Technical Implications of Changes (OBJ 1.3).mp4
    04:59
  • 009 Documenting Changes (OBJ 1.3).mp4
    04:29
  • 001 Audits and Assessments (OBJ 5.5).mp4
    04:51
  • 002 Internal Audits and Assessments (OBJ 5.5).mp4
    07:44
  • 003 Performing an Internal Assessment (OBJ 5.5).mp4
    04:26
  • 004 External Audits and Assessments (OBJ 5.5).mp4
    07:10
  • 005 Performing an External Assessment (OBJ 5.5).mp4
    04:39
  • 006 Penetration Testing (OBJ 5.5).mp4
    06:02
  • 007 Reconnaissance in Pentesting (OBJ 5.5).mp4
    06:34
  • 008 Performing a Basic PenTest (OBJ 5.5).mp4
    19:43
  • 009 Attestation of Findings (OBJ 5.5).mp4
    06:30
  • 001 Cyber Resilience and Redundancy (OBJ 3.4).mp4
    03:15
  • 002 High Availability (OBJ 3.4).mp4
    08:51
  • 003 Data Redundancy (OBJ 3.4).mp4
    08:50
  • 004 Configuring a RAID (OBJ 3.4).mp4
    03:37
  • 005 Capacity Planning (OBJ 3.4).mp4
    08:04
  • 006 Powering Data Centers (OBJ 3.4).mp4
    10:43
  • 007 Data Backups (OBJ 3.4).mp4
    10:42
  • 008 Continuity of Operations Plan (OBJ 3.4).mp4
    09:15
  • 009 Redundant Site Considerations (OBJ 3.4).mp4
    12:18
  • 010 Resilience and Recovery Testing (OBJ 3.4).mp4
    06:57
  • 001 Security Architecture (OBJ 3.1 & 4.1).mp4
    04:03
  • 002 On-premise versus the Cloud (OBJ 3.1).mp4
    10:23
  • 003 Cloud Security (OBJ 3.1 & 4.1).mp4
    06:20
  • 004 Virtualization and Containerization (OBJ 2.3 & 3.1).mp4
    10:26
  • 005 Serverless (OBJ 3.1).mp4
    03:42
  • 006 Microservices (OBJ 3.1).mp4
    04:12
  • 007 Network Infrastructure (OBJ 3.1).mp4
    03:17
  • 008 Software-Defined Network (SDN) (OBJ 3.1).mp4
    03:11
  • 009 Infrastructure as Code (IaC) (OBJ 3.1).mp4
    04:23
  • 010 Centralized vs Decentralized Architectures (OBJ 3.1).mp4
    04:20
  • 011 Internet of Things (IoT) (OBJ 3.1 & 4.1).mp4
    05:05
  • 012 ICS and SCADA (OBJ 3.1 & 4.1).mp4
    04:07
  • 013 Embedded Systems (OBJ 3.1 & 4.1).mp4
    05:07
  • 001 Security Infrastructure (OBJ 3.2 & 4.5).mp4
    04:25
  • 002 Ports and Protocols (OBJ 4.5).mp4
    15:23
  • 003 Firewalls (OBJ 3.2).mp4
    12:13
  • 004 Configuring Firewalls (OBJ 4.5).mp4
    13:58
  • 005 IDS and IPS (OBJ 3.2).mp4
    06:28
  • 006 Network Appliances (OBJ 3.2).mp4
    09:57
  • 007 Port Security (OBJ 3.2).mp4
    10:49
  • 008 Securing Network Communications (OBJ 3.2).mp4
    20:34
  • 009 SD-WAN and SASE (OBJ 3.2).mp4
    07:42
  • 010 Infrastructure Considerations (OBJ 3.2).mp4
    10:55
  • 011 Selecting Infrastructure Controls (OBJ 3.2).mp4
    08:16
  • 001 Identity and Access Management (IAM) Solutions (OBJ 2.4 & 4.6).mp4
    04:30
  • 002 Identity and Access Management (IAM) (OBJ 4.6).mp4
    04:58
  • 003 Multifactor Authentication (OBJ 4.6).mp4
    15:16
  • 004 Password Security (OBJ 4.6).mp4
    16:32
  • 005 Password Attacks (OBJ 2.4).mp4
    10:09
  • 006 Single Sign-On (SSO) (OBJ 4.6).mp4
    09:50
  • 007 Federation (OBJ 4.6).mp4
    05:09
  • 008 Privileged Access Management (PAM) (OBJ 4.6).mp4
    03:20
  • 009 Access Control Models (OBJ 4.6).mp4
    09:07
  • 010 Assigning Permissions (OBJ 4.6).mp4
    07:01
  • 001 Vulnerabilities and Attacks (OBJ 2.2, 2.3, 2.4, 2.5, & 4.1).mp4
    06:37
  • 002 Hardware Vulnerabilities (OBJ 2.2, 2.3, & 2.5).mp4
    06:36
  • 003 Bluetooth Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
    06:43
  • 004 Mobile Vulnerabilities and Attacks (OBJ 2.3, 2.5, & 4.1).mp4
    05:02
  • 005 Zero-day Vulnerabilities (OBJ 2.3).mp4
    05:03
  • 006 Operating System Vulnerabilities (OBJ 2.3 & 2.5).mp4
    04:55
  • 007 SQL and XML Injections (OBJ 2.3 & 2.4).mp4
    13:58
  • 008 Conducting an SQL Injection (OBJ 2.3 & 2.4).mp4
    07:39
  • 009 XSS and XSRF (OBJ 2.3 & 2.4).mp4
    16:08
  • 010 Buffer Overflow (OBJ 2.3 & 2.4).mp4
    06:33
  • 011 Race Conditions (OBJ 2.3).mp4
    06:04
  • 001 Malicious Activity (OBJ 2.4).mp4
    03:25
  • 002 Distributed Denial of Service (OBJ 2.4).mp4
    08:05
  • 003 Domain Name System (DNS) Attacks (OBJ 2.4).mp4
    05:23
  • 004 Directory Traversal Attack (OBJ 2.4).mp4
    08:04
  • 005 Execution and Escalation Attack (OBJ 2.4).mp4
    06:19
  • 006 Replay Attacks (OBJ 2.4).mp4
    02:35
  • 007 Session Hijacking (OBJ 2.4).mp4
    04:52
  • 008 On-Path Attacks.mp4
    04:01
  • 009 Injection Attacks.mp4
    04:20
  • 010 Indicators of Compromise (IoC).mp4
    06:58
  • 001 Hardening (OBJ 2.5, 4.1, & 4.5).mp4
    04:03
  • 002 Changing Default Configurations (OBJ 2.5).mp4
    05:03
  • 003 Restricting Applications (OBJ 2.5).mp4
    07:01
  • 004 Unnecessary Services (OBJ 2.5).mp4
    05:36
  • 005 Trusted Operating Systems (OBJ 2.5).mp4
    05:33
  • 006 Updates and Patches (OBJ 2.5).mp4
    05:02
  • 007 Patch Management (OBJ 2.5).mp4
    08:49
  • 008 Group Policies (OBJ 2.5 & 4.5).mp4
    08:56
  • 009 SELinux (OBJ 2.5 & 4.5).mp4
    06:47
  • 010 Data Encryption Levels (2.5).mp4
    04:44
  • 011 Secure Baselines (OBJ 2.5 and 4.1).mp4
    05:01
  • 001 Security Techniques (OBJ 4.1 & 4.5).mp4
    03:44
  • 002 Wireless Infrastructure Security (OBJ 4.1).mp4
    08:23
  • 003 Wireless Security Settings (OBJ 4.1).mp4
    14:52
  • 004 Application Security (OBJ 4.1).mp4
    12:43
  • 005 Network Access Control (NAC) (OBJ 4.5).mp4
    06:01
  • 006 Web and DNS Filtering (OBJ 4.5).mp4
    07:04
  • 007 Email Security (OBJ 4.5).mp4
    07:41
  • 008 Endpoint Detection and Response (OBJ 4.5).mp4
    07:26
  • 009 User Behavior Analytics (OBJ 4.5).mp4
    06:06
  • 010 Selecting Secure Protocols (OBJ 4.5).mp4
    14:43
  • 001 Vulnerability Management (OBJ 4.3).mp4
    02:52
  • 002 Identifying Vulnerabilities (OBJ 4.3).mp4
    05:46
  • 003 Threat Intelligence Feeds (OBJ 4.3).mp4
    07:12
  • 004 Responsible Disclosure Programs (OBJ 4.3).mp4
    06:07
  • 005 Analyzing Vulnerabilities (OBJ 4.3).mp4
    10:27
  • 006 Conducting Vulnerability Scans (OBJ 4.3).mp4
    31:25
  • 007 Assessing Vulnerability Scan Results (OBJ 4.3).mp4
    13:19
  • 008 Vulnerability Response and Remediation (OBJ 4.3).mp4
    06:05
  • 009 Validating Vulnerability Remediation (OBJ 4.3).mp4
    05:45
  • 010 Vulnerability Reporting (OBJ 4.3).mp4
    09:23
  • 001 Alerting and Monitoring (OBJ 4.4).mp4
    05:37
  • 002 Monitoring Resources (OBJ 4.4).mp4
    04:37
  • 003 Alerting and Monitoring Activities (OBJ 4.4).mp4
    12:06
  • 004 Simple Network Management Protocol (SNMP) (OBJ 4.4).mp4
    06:59
  • 005 Security Information and Event Management (SIEM) (OBJ 4.4).mp4
    11:00
  • 006 Data from Security Tools (OBJ 4.4).mp4
    05:04
  • 007 Security Content Automation and Protocol (SCAP) (OBJ 4.4).mp4
    09:57
  • 008 NetFlow and Flow Analysis.mp4
    07:07
  • 009 Single Pane of Glass (OBJ 4.4).mp4
    05:59
  • 001 Incident Response (OBJ 4.8).mp4
    03:05
  • 002 Incident Response Process (OBJ 4.8).mp4
    11:06
  • 003 Threat Hunting (OBJ 4.8).mp4
    06:47
  • 004 Root Cause Analysis (OBJ 4.8).mp4
    07:59
  • 005 Incident Response Training and Testing (OBJ 4.8).mp4
    08:42
  • 006 Digital Forensic Procedures (OBJ 4.8).mp4
    13:13
  • 007 Data Collection Procedures (OBJ 4.8).mp4
    08:48
  • 008 Disk Imaging and Analysis (OBJ 4.8).mp4
    09:03
  • 001 Investigating an Incident (OBJ 4.9).mp4
    03:21
  • 002 Investigating with Data (OBJ 4.9).mp4
    12:17
  • 003 Dashboards (OBJ 4.9).mp4
    04:02
  • 004 Automated Reports (OBJ 4.9).mp4
    06:32
  • 005 Vulnerability Scans (OBJ 4.9).mp4
    11:04
  • 006 Packet Captures (OBJ 4.9).mp4
    08:38
  • 007 Firewall Logs (OBJ 4.9).mp4
    06:12
  • 008 Application Logs (OBJ 4.9).mp4
    04:02
  • 009 Endpoint Logs (OBJ 4.9).mp4
    03:49
  • 010 OS-specific Security Logs (OBJ 4.9).mp4
    04:00
  • 011 IPSIDS Logs (OBJ 4.9).mp4
    05:42
  • 012 Network Logs (OBJ 4.9).mp4
    05:34
  • 013 Metadata (OBJ 4.9).mp4
    04:29
  • 001 Automation and Orchestration (OBJ 4.7).mp4
    06:37
  • 002 When to Automate and Orchestrate (OBJ 4.7).mp4
    10:15
  • 003 Benefits of Automation and Orchestratation (OBJ 4.7).mp4
    08:02
  • 004 Automating Support Tickets (OBJ 4.7).mp4
    06:46
  • 005 Automating Onboarding (OBJ 4.7).mp4
    06:56
  • 006 Automating Security (OBJ 4.7).mp4
    04:56
  • 007 Automating Application Development (OBJ 4.7).mp4
    09:31
  • 008 Integrations and APIs (OBJ 4.7).mp4
    13:01
  • 001 Security Awareness (OBJ 5.6).mp4
    03:48
  • 002 Recognizing Insider Threats (OBJ 5.6).mp4
    07:29
  • 003 Password Management (OBJ 5.6).mp4
    10:31
  • 004 Avoiding Social Engineering (OBJ 5.6).mp4
    08:20
  • 005 Policy and Handbooks (OBJ 5.6).mp4
    07:35
  • 006 Remote and Hybrid Work Environments (OBJ 5.6).mp4
    07:21
  • 007 Creating a Culture of Security (OBJ 5.6).mp4
    05:02
  • 001 Conclusion.mp4
    12:53
  • 002 BONUS Where do I go from here.mp4
    03:47
  • Description


    CompTIA Security+ (SY0-701) Bootcamp - Your preparation for the world's best cybersecurity certification!

    What You'll Learn?


    • Fundamental Security Concepts
    • Navigating Threats, Vulnerabilities, & Remedies
    • Decoding Security Architecture
    • Mastering Security Operations
    • Guiding Security Program Management & Oversight

    Who is this for?


  • IT Professionals
  • Entry-Level Security Personnel
  • Military Personnel
  • Government Employees
  • Security Consultants
  • Students and Recent Graduates
  • What You Need to Know?


  • Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course)
  • (Helpful, but not required) Completion of the CompTIA A+ and Network+ certifications
  • This course aligns directly to the CompTIA Security+ (SY0-701) Certification Study Guide
  • More details


    Description

    ** Taught by a Best Selling IT Certification Instructor **


    Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.


    You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.


    CompTIA Security+ (SY0-701) is the world's most popular cybersecurity certification today!


    This course is designed to help prepare you for the CompTIA Security (SY0-701) certification exam and covers all the domains the Security+ (SY0-701) certification exam:

    CompTIA Security+ (SY0-701):

    1. General Security Concepts

    2. Threats, Vulnerabilities, and Mitigations

    3. Security Architecture

    4. Security Operations

    5. Security Program Management and Oversight


    What You Will Receive In The Course:

    • Video lectures with the essential information needed to pass the Security+ (SY0-701) exam

    • A complete downloadable study guide in PDF format based on the lessons

    • Practice quizzes to ensure mastery of each section of the course

    • A full-length practice exam with multiple choice and mock simulations


    This course stays current and up-to-date with the latest release of the CompTIA Security+ exam (SY0-701), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!


    What Other Students Are Saying About My CompTIA Security+ Course:

    • Solid information, acronym break downs throughout the course (allows for better note taking). Jason is easy to follow, listen to, and understand during your study period (I sit for hours listening and taking notes and replaying the section) (Mark Guillen, 5 stars)


    • Just passed my security+ today! Dion's course was excellent. It was all I needed, and I took his practice tests I also purchased. The only thing I think would help other testers is more sophisticated and harder performance-based questions as I experienced ones today that were pretty tough and required more hands-on experience. Overall, though completely worth the money. (Duran navarro, 5 stars)


    • The course is very informative and good for people that has no knowledge about cybersecurity so far. It teaches us about the harm caused by attacks and how to prevent them. I would suggest everyone to take this course, even if they don't wan the certificate from Comptia.  (Mahmoud Choumar, 5 stars)


    • Jason is a great pedagogue. He is thorough and amiable. The course has very minimal errors and you can tell he is very strict with the format of his lessons. I had very few questions during the lectures and only experience one issue throughout the whole experience. I will definitely buy more courses from him. I also bought the voucher from his website to get the retake for only 100 bucks! Good job Dion Training! Keep up the great job! (Victor Cabrales, 5 stars)


    • Passed the exam in December of 2022 using this course - FIRST TRY!! This course gave the back bone of everything I needed to pass the Sec. + exam. When the time came to study up a day or two before the actual exam, I used all the practice quizzes/tests from the CompTIA Sec. + study book. Seems thoughtless or stupid to not use the book for actual studying, but I found I learn slightly better in a class environment and this course/videos allowed me that. Thank you for this course and I look forward to many more in the future! Honestly, I haven't taken an ACTUAL exam in years - many years. If I can do it, you all can too! Good luck and God speed! (Nathaniel Shumaker, 5 stars)


    Upon completion of this course, you will earn 21 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

    Who this course is for:

    • IT Professionals
    • Entry-Level Security Personnel
    • Military Personnel
    • Government Employees
    • Security Consultants
    • Students and Recent Graduates

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jason Dion • 1 Million+ Enrollments Worldwide
    Jason Dion • 1 Million+ Enrollments Worldwide
    Instructor's Courses
    Jason Dion, CISSP No. 349867, is a former college professor and the lead instructor at Dion Training Solutions. He has multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. With networking experience dating back to 1992, Jason has been a network engineer, Director of a Network Operations and Security Center, and an Information Systems Officer for large organizations around the globe. He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance. He lives in Puerto Rico with his wife and two children.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 262
    • duration 30:56:48
    • English subtitles has
    • Release Date 2023/12/16