CompTIA Security+ Certification Video Course

Video Courses > CompTIA Security+ Certification Video Course

CompTIA Security+ Certification Video Course

  • 400 Video Lectures
  • Includes Hands-On Labs
  • Quizzes and Video Answers
  • Taught by Security Experts
  • 12-Month Access

BUY NOW $495

The CompTIA Security+ Certification Video Course from Interface Technical Training will give you the information you need to prepare for the Security+ certification exam. This complete course is made up of more than 400 videos. It is a blend of Video Lectures, Online 24/7 Hands-on Labs, and Module Quizzes with Video Answers. The content in this on-demand course has been perfected over time through hundreds of live classes at Interface. The course teaches you to protect the technology used by your company every day from online threats. You will learn the approach of the enemy, so you can protect and lock down your most important assets. Achieving your CompTIA Security+ certification will prove your capability and help build a strong foundation for more advanced Security certifications, so start this course today!

Module 1: CompTIA Security + Certification Requirements
8 Videos | 29:36
Module 2: Risk components and Terms
12 Videos | 57:22
Solve ALE
5:37
Module 3: Maximum Tolerable Downtime (MTD) Model
7 Videos | 22:44
Module 4: Basic Security Terms and Categories
43 Videos | 3:55:42
Attacks
8:51
Module 5: Defense in Depth Model
5 Videos | 13:01
Module 6: Basic Data States
4 Videos | 3:36
Module 7: Authentication Models
14 Videos | 58:39
Module 8: Security Authorization Techniques
8 Videos | 24:51
Module 9: Common Account Management Controls
16 Videos | 1:06:58
Module 10: Federation Examples
3 Videos | 6:25
Module 11: Cryptographic Standards
32 Videos | 3:06:02
Module 12: Cryptographic Attacks
8 Videos | 33:01
Module 13: Certification Hierarchy Elements and Interactions
16 Videos | 1:15:30
Module 14: Kerberos Authentication Process
3 Videos | 14:58
Module 15: Windows OS Components and Processes
18 Videos | 1:08:33
Module 16: System and Software Attacks
16 Videos | 1:22:54
Module 17: System Controls
28 Videos | 2:04:03
TCB
2:35
Baselining
5:26
Hardening
7:44
Logging
3:03
Module 18: New Software Development Models
6 Videos | 19:32
Module 19: Secure Coding Techniques
6 Videos | 23:48
Module 20: Embedded Systems and Special Considerations
9 Videos | 18:19
SCADA
2:15
IOT
1:52
Module 21: Virtualization
7 Videos | 23:02
Module 22: Basic Network Terminology
24 Videos | 1:31:21
Layer 4
4:14
Module 23: Network Attack Surfaces
8 Videos | 33:27
Module 24: Ports Most Susceptible to Attack
14 Videos | 51:42
Exam Ports
3:36
DNS Ports
2:50
DHCP
2:26
HTTP/HTTPS
3:38
SSH
5:44
SNMP
3:09
RTP/RTPS
3:54
Module 25: VPN and Remote Access Methods
9 Videos | 36:39
VPN
4:16
IPSEC
4:19
Module 26: Common Password Elements
6 Videos | 22:32
NTLM
3:26
PAP/CHAP
5:32
Module 27: Network Attacks
27 Videos | 1:47:14
Hijacking
6:13
Module 28: Wireless Attack Surfaces
14 Videos | 1:12:31
Module 29: Wireless Attacks
12 Videos | 55:25
Module 30: Basic Network Controls
24 Videos | 1:28:41
DMZ
3:42
Honeypots
2:51
Module 31: Site Survey and Recommend Facility Device Placement
8 Videos | 44:12
Module 32: Mobile Device Security Controls
8 Videos | 32:26
Module 33: Unique Mobile Device Issues
9 Videos | 40:16
Geotagging
2:09
Module 34: Cloud Environments and Controls
3 Videos | 12:09
Module 35: Identify and Use Basic Security Tools
12 Videos | 1:15:08
Kali Linux
4:44
Module 36: Operational Security Frameworks
10 Videos | 38:09
Compliance
3:34
Module 37: Physical Security Elements
11 Videos | 1:00:45
Module 38: Specialized Physical Controls
8 Videos | 43:03
Man Traps
5:12
Module 39: Human Factor Issues
8 Videos | 39:56
Humanity
5:17
Module 40: Forensic Practices
11 Videos | 40:40
Volatility
3:10
Module 41: Organizational Recovery Programs
16 Videos | 56:45
VIEW ENTIRE COURSE