Curriculum
Course:
CompTIA Security+ Certification Exam Boo...
Login
Curriculum
CompTIA Security+ Certification Exam Bootcamp
Introduction
0/4
Welcome
Video lesson
Preview
Exam Information
Video lesson
Exam Tips
Video lesson
Resources
4
Domain 1: General Security Concepts
0/25
Domain Introduction
Video lesson
1.1a - Control Categories
15 minutes
1.1b - Control Types
Video lesson
1.2a - Confidentiality, Integrity, and Availability
Video lesson
1.2b - Non-repudiation
Video lesson
1.2c - Authentication, Authorization, and Accounting
Video lesson
1.2d - Gap analysis
Video lesson
1.2e - Zero Trust
Video lesson
1.2f - Physical security
Video lesson
1.2g - Deception and disruption technology
23 minutes
Preview
1.3a - Business processes impacting security operation
Video lesson
1.3b - Technical implications
Video lesson
1.3c - Documentation and Version Control
Video lesson
1.4a - Public key infrastructure (PKI)
Video lesson
1.4b - Encryption
Video lesson
1.4c - Encryption Tools
Video lesson
1.4d - Obfuscation
Video lesson
1.4e - Hashing
Video lesson
1.4f - Salting
Video lesson
1.4g - Digital signatures
Video lesson
1.4h - Key stretching
Video lesson
1.4i - Blockchain
Video lesson
1.4j - Open public ledger
Video lesson
1.4k - Certificates
Video lesson
Domain 1 Assessment Quiz
Quiz
Domain 2: Threats, Vulnerabilities, and Mitigations
0/46
Domain Introduction
Video lesson
2.1a - Threat Actors
Video lesson
2.1b - Attributes of actors
Video lesson
2.1c - Motivations
Video lesson
2.2a - Message-based
Video lesson
2.2b - Image-based
Video lesson
2.2c - File-based
Video lesson
2.2d - Voice call
Video lesson
2.2e - Removable device
Video lesson
2.2f - Vulnerable software
Video lesson
2.2g - Unsupported systems and applications
Video lesson
2.2h - Unsecure networks
Video lesson
2.2i - Open service ports
Video lesson
2.2j - Default credentials
Video lesson
2.2k - Supply chain
Video lesson
2.2l - Human vectors/social engineering
Video lesson
2.3a - Application vulnerabilities
Video lesson
2.3b - Operating system (OS)-based vulnerabilities
Video lesson
2.3c - Web-based vulnerabilities
Video lesson
2.3d - Hardware vulnerabilities
Video lesson
2.3e - Virtualization vulnerabilities
Video lesson
2.3f - Cloud-specific vulnerabilities
Video lesson
2.3g - Supply chain vulnerabilities
Video lesson
2.3h - Cryptographic vulnerabilities
Video lesson
2.3i - Vulnerabilities caused by misconfiguration
Video lesson
2.3j - Mobile device vulnerabilities
Video lesson
2.3k - Zero-day vulnerabilities
Video lesson
2.4a - Malware attacks
Video lesson
2.4b - Physical attacks
Video lesson
2.4c - Network attacks
Video lesson
2.4d - Application attacks
Video lesson
2.4e - Cryptographic attacks
Video lesson
2.4f - Password attacks
Video lesson
2.4g - Indicators
Video lesson
2.5a - Segmentation
Video lesson
2.5b - Access control
Video lesson
2.5c - Application allow list
Video lesson
2.5d - Isolation
Video lesson
2.5e - Patching
Video lesson
2.5f - Encryption
Video lesson
2.5g - Monitoring
Video lesson
2.5h - Least privilege
Video lesson
2.5i - Configuration enforcement
Video lesson
2.5j - Decommissioning
Video lesson
2.5k - Hardening techniques
Video lesson
Domain 2 Assessment Quiz
Quiz
Domain 3: Security Architecture
0/20
Domain Introduction
Video lesson
3.1a - Architecture and infrastructure concepts
Video lesson
3.1b - Considerations
Video lesson
3.2a - Infrastructure considerations
Video lesson
3.2b - Secure communication/access
Video lesson
3.2c - Selection of effective controls
Video lesson
3.3a - Data types
Video lesson
3.3b - Data classifications
Video lesson
3.3c - General data considerations
Video lesson
3.3d - Methods to secure data
Video lesson
3.4a - High availability
Video lesson
3.4b - Site considerations
Video lesson
3.4c - Platform diversity
Video lesson
3.4d - Multi-cloud systems
Video lesson
3.4e - Continuity of operations
Video lesson
3.4f - Capacity planning
Video lesson
3.4g - Testing
Video lesson
3.4h - Backups
Video lesson
3.4i - Power
Video lesson
Domain 3 Assessment Quiz
Quiz
Domain 4: Security Operations
0/56
Domain Introduction
Video lesson
4.1a - Secure baselines
Video lesson
4.1b - Hardening targets
Video lesson
4.1c - Wireless devices
Video lesson
4.1d - Mobile solutions
Video lesson
4.1e - Wireless security settings
Video lesson
4.1f - Application security
Video lesson
4.1g - Sandboxing
Video lesson
4.1h - Monitoring
Video lesson
4.2a - Acquisition/procurement process
Video lesson
4.2b - Assignment/accounting
Video lesson
4.2c - Monitoring/asset tracking
Video lesson
4.2d - Disposal/decommissioning
Video lesson
4.3a - Identification methods
Video lesson
4.3b - Analysis
Video lesson
4.3c - Vulnerability response and remediation
Video lesson
4.3d - Validation of remediation
Video lesson
4.3e - Reporting
Video lesson
4.4a - Monitoring computing resources
Video lesson
4.4b - Activities
Video lesson
4.4c - Tools
Video lesson
4.5a - Firewall
Video lesson
4.5b - IDS/IPS
Video lesson
4.5c - Web filter
Video lesson
4.5d - Operating system security
Video lesson
4.5e - Implementation of secure protocols
Video lesson
4.5f - DNS filtering
Video lesson
4.5g - Email security
Video lesson
4.5h - File integrity monitoring
Video lesson
4.5i - DLP
Video lesson
4.5j - Network access control (NAC)
Video lesson
4.5k - Endpoint detection and response (EDR)/extended detection and response (XDR)
Video lesson
4.5l - User behavior analytics
Video lesson
4.6a - Provisioning/de-provisioning user accounts
Video lesson
4.6b - Permission assignments and implications
Video lesson
4.6c - Identity proofing
Video lesson
4.6d - Federation
Video lesson
4.6e - Single sign-on (SSO)
Video lesson
4.6f - Interoperability
Video lesson
4.6g - Attestation
Video lesson
4.6h - Access controls
Video lesson
4.6i - Multifactor authentication
Video lesson
4.6j - Password concepts
Video lesson
4.6k - Privileged access management tools
Video lesson
4.7a - Use cases of automation and scripting
Video lesson
4.7b - Benefits
Video lesson
4.7c - Other considerations
Video lesson
4.8a - Process
Video lesson
4.8b - Training
Video lesson
4.8c - Testing
Video lesson
4.8d - Root cause analysis
Video lesson
4.8e - Threat hunting
Video lesson
4.8f - Digital forensics
Video lesson
4.9a - Log data
Video lesson
4.9b - Data sources
Video lesson
Domain 4 Assessment Quiz
Quiz
Domain 5: Security Program Management and Oversight
0/39
Domain Introduction
Video lesson
5.1 a - Guidelines
Video lesson
5.1b - Policies
Video lesson
5.1c - Standards
Video lesson
5.1d - Procedures
Video lesson
5.1e - External considerations
Video lesson
5.1f - Monitoring and revision
Video lesson
5.1g - Types of governance structures
Video lesson
5.1h - Roles and responsibilities for systems and data
Video lesson
5.2a - Risk identification
Video lesson
5.2b - Risk assessment
Video lesson
5.2c - Risk analysis
Video lesson
5.2d - Risk register
Video lesson
5.2e - Risk tolerance
Video lesson
5.2f - Risk appetite
Video lesson
5.2g - Risk management strategies
Video lesson
5.2h - Risk reporting
Video lesson
5.2i - Business impact analysis
Video lesson
5.3a - Vendor assessment
Video lesson
5.3b - Vendor selection
Video lesson
5.3c - Agreement types
Video lesson
5.3d - Vendor monitoring
Video lesson
5.3e - Questionnaires
Video lesson
5.3f - Rules of engagement
Video lesson
5.4a - Compliance reporting
Video lesson
5.4b - Consequences of non-compliance
Video lesson
5.4c - Compliance monitoring
Video lesson
5.4d - Privacy
Video lesson
5.5a - Attestation
Video lesson
5.5b - Internal
Video lesson
5.5c - External
Video lesson
5.5d - Penetration testing
Video lesson
5.6a - Phishing
Video lesson
5.6b - Anomalous behavior recognition
Video lesson
5.6c - User guidance and training
Video lesson
5.6d - Reporting and monitoring
Video lesson
5.6e - Development
Video lesson
5.6f - Execution
Video lesson
Domain 5 Assessment Quiz
Quiz
Conclusion
0/4
Conclusion
Video lesson
Mock Exam 1
Quiz
Mock Exam 2
Quiz
Mock Exam 3
Quiz
Video lesson
1.2g – Deception and disruption technology
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
I want to sign up as instructor
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
Your application is sent
We'll send you an email as soon as your application is approved.
Go to Profile
No account?
Sign Up
Sign In
Lost Password?