We may earn an affiliate commission when you visit our partners.
Elizabeth Manar

This course prepares individuals to successfuly pass the CompTIA Security+ SY0-701 certification exam. It covers each of the five domains in the Security+ exam: General Security Concepts; Threats, Vulnerabilities, and Mitigations; Security Architecture; Security Operations; and Security Program Management and Oversight. Each course will explain the concepts and terminology covered on the exam and include helpful analogies, memory aids, and practical applications of the material to better remember important key points, with each video providing targeted details of important individual topics or similar, related concepts.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Security basics
In this module, we explain general concepts and vocabulary used in cybersecurity and explore categories and types of security controls used to protect assets. Physical controls are also considered as ways of protecting physical infrastructure.
Read more
Cryptography
In this course, we will discuss protecting sensitive data with cryptography, which is the practice of disguising information in a way that looks random. We will cover the history of cryptography, hashing, passwords, and keys.
Threats
There are a range of groups and individuals who might carry out an attack or impact an organization's operations. In this course, we review various types of threat actors who might seek to harm an organization along with their motivations. Also discussed are the various ways an attack might occur. Ways a social engineering attack might be carried out is also described.
Attacks
A number of cyberattacks are possible including physical, network, application, and cryptographic attacks. In this course, we review the general types of cyber attacks mentioned in the CompTIA Security+ exam. We also describe their general operation of specific examples of attacks both over the network and in applications.
Identity and access management
Identity and access management is all about verifying the right users have the right access to the tools and technologies needed to do their job. Learn about the most important security concepts related to identity and access management: identification, authentication, authorization, and accounting.
Organizational security
There are a number of ways an organization can create a secure operating environment. In this course, we review ways organizations protect their networks and software in order to prevent data loss.
Network security devices
A number of network devices can be used to help secure an organization's networks. In this course, we delve into different network devices used to safeguard networks from malicious activity, protect data confidentiality, and reduce potential harmful intrusions.
Security operations
As an organization implements new technologies and evolves its existing infrastructure, various secure operating requirements should be utilized. In this course, we review the concepts driving security management at an organization including practices, policies, and specific technologies such as a security information and event management system to better monitor a network for security incidents.
Virtualization
Virtualization has given rise to a host of new computing technologies and operations. Most major enterprise solutions utilize virtualization, automation, and cloud services. In this course, we review the terminology used in virtualization and how organizations leverage cloud computing services to meet their needs.
Mobile security
As mobile devices proliferate the modern workplace, various security controls must be implemented to safeguard the organization from data loss. In this course, we explore mobile device management solutions as well as the manner in which organization choose to implement mobile device usage for their employees.
Vulnerability and risk management
Determining if a system or network is impacted by vulnerabilities is the first step toward identifying and correcting security shortcomings. In this section, we outline the methods by which secure organizations identify vulnerabilities, analyze the findings, and determine which vulnerabilties require a response.
Incident response
This course explains the purpose and main components of an incident response plan and walks through the phases of incident response, contingency planning and creating backups. Explore how an incident response plan works and the basic concepts related to digital forensics.
Data protection
Organizations must be on guard to protect their data both from outside threats as well as inside threats. In this course, we disuss the ideas surrounding data protection through the use of secure data management practices, data management technologies, and regulatory requirements involving how an organization's data protection operation is structured.
Governance
Secure, mature organizations thoughtfully consider how individuals at the organization will operate and take proactive steps to safeguard the organization from data loss. In this course, we review legal and industry regulations that might shape how an organization operates and we describe the methods by which an organization creates and implements policies.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers each of the five domains in the Security+ exam, providing a structured approach to exam preparation and increasing the likelihood of certification success
Explores general concepts and vocabulary used in cybersecurity, which builds a strong foundation for individuals entering the field and helps them understand core principles
Delves into security operations, including practices, policies, and technologies like SIEM, which is essential for monitoring networks and responding to security incidents
Examines identity and access management, which is all about verifying the right users have the right access to the tools and technologies needed to do their job
Discusses legal and industry regulations that might shape how an organization operates, which helps security professionals stay compliant and avoid potential legal issues
Explores mobile device management solutions, which is crucial for safeguarding organizations from data loss in the modern workplace where mobile devices are prevalent

Save this course

Save CompTIA Security+ 701 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in CompTIA Security+ 701 with these activities:
Review Networking Fundamentals
Reinforce your understanding of networking concepts, which are foundational to many security topics covered in the course.
Browse courses on Networking Fundamentals
Show steps
  • Review the OSI model and TCP/IP suite.
  • Practice subnetting and CIDR notation.
  • Familiarize yourself with common network protocols.
Read 'Security Engineering' by Ross Anderson
Gain a broader understanding of security engineering principles to complement the Security+ exam-focused content.
Show steps
  • Obtain a copy of 'Security Engineering'.
  • Read selected chapters relevant to course topics.
  • Take notes on key concepts and examples.
Practice Identifying Attack Types
Reinforce your ability to recognize and differentiate between various cyberattack types covered in the course.
Show steps
  • Create flashcards with attack names and descriptions.
  • Use online quizzes to test your knowledge.
  • Review real-world attack scenarios and identify the attack type.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Read 'Practical Packet Analysis' by Chris Sanders
Improve your network security skills by learning how to analyze network traffic using Wireshark.
Show steps
  • Obtain a copy of 'Practical Packet Analysis'.
  • Follow the examples and exercises in the book.
  • Analyze real-world network traffic captures.
Create a Presentation on Incident Response
Solidify your understanding of incident response processes by creating a presentation that explains the key steps and considerations.
Show steps
  • Research the incident response lifecycle.
  • Develop a presentation outline.
  • Create slides with clear and concise information.
  • Practice delivering the presentation.
Set up a Virtualized Security Lab
Gain hands-on experience with security tools and techniques by building a virtualized lab environment.
Show steps
  • Choose a virtualization platform (e.g., VirtualBox, VMware).
  • Install and configure virtual machines.
  • Install security tools (e.g., Nmap, Wireshark).
  • Experiment with different security scenarios.
Contribute to a Security-Related Open Source Project
Deepen your understanding of security concepts by contributing to a real-world open source project.
Show steps
  • Find a security-related open source project on GitHub.
  • Review the project's documentation and code.
  • Identify a bug or feature to work on.
  • Submit a pull request with your changes.

Career center

Learners who complete CompTIA Security+ 701 will develop knowledge and skills that may be useful to these careers:
Security Analyst
A security analyst monitors and protects an organization's systems and networks. This role requires a deep understanding of threats, vulnerabilities, and security operations, all of which are covered in this course. This course can help aspiring security analysts understand attack methods, incident response, and how to secure an organization's infrastructure. It is an ideal course for someone who wants to build a foundation in security analysis. The course's focus on practical applications and memory aids will be especially beneficial to learners new to the field.
Information Security Specialist
An information security specialist focuses on protecting sensitive information and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course provides a broad overview of security operations, data protection, and governance that is vital for this role. An information security specialist must also think about threats, and this course will help them understand how to defend against them. This course is a good starting point for aspiring information security specialists.
Incident Responder
Incident responders detect, analyze, and respond to security incidents. This course provides a detailed explanation of the incident response process, including identifying, containing, eradicating, recovering from and documenting security incidents. Also covered in the course is digital forensics, a key component of incident response. It is beneficial for this role to also know about threats, vulnerabilities, and security operations, all of which are discussed in this course.
Security Engineer
Security engineers are responsible for designing, implementing, and managing security systems. This course covers important topics for a security engineer, such as security architecture, network security devices, and virtualization. A security engineer should understand organizational security and how to protect data which is covered in this course. Those who wish to work as security engineers may find this course particularly helpful.
Network Administrator
Network administrators are responsible for maintaining and securing an organization's network infrastructure. This course helps a network administrator understand network security devices, virtualization, and how to protect against cyberattacks. A network administrator should have an idea of how to implement security measures, as well as how to react to events, and this course covers both. The course material on security operations and network security devices may be particularly relevant.
Systems Administrator
Systems administrators manage an organization's computer systems, ensuring they run smoothly and securely. This course can assist a systems administrator by providing fundamental knowledge of identity and access management, vulnerabilities and risk management, and data protection. The course explains a host of security topics that overlap with the responsibilities of a systems administrator, and it also covers how to respond to security incidents. This course is a good fit for learners pursuing a career as a systems administrator.
Data Security Analyst
A data security analyst is responsible for protecting an organization's data and ensuring its integrity. The course's sections on data protection, secure data management practices, and data management technologies may be particularly useful for this role. A data security analyst should also be familiar with organizational security and governance, both of which are covered in this course. Those wishing to work as data security analysts may benefit from what this course has to offer.
Cybersecurity Consultant
A cybersecurity consultant advises organizations on how to improve their security posture. This course covers many areas that a cybersecurity consultant would need to know, like risk management, security architecture, and incident response. A cybersecurity consultant should be familiar with security concepts and technologies, and this course will help a learner gain the foundational knowledge they need. The course’s depth and breadth of topics make it a valuable resource for a cybersecurity consultant.
Cloud Security Specialist
A cloud security specialist focuses on securing cloud-based systems and data. This course can assist a cloud security specialist by introducing virtualization, cloud computing services, and mobile device management. A cloud security specialist must be familiar with identity and access management, as well as data protection, topics which are also discussed in this course. The course's treatment of many topics relevant to the cloud makes this a valuable resource.
IT Risk Manager
An IT risk manager identifies and manages information technology risks. This course addresses organizational security, vulnerabilities and risk management, and data protection which are all vital for an IT risk manager to understand. An IT risk manager should understand how to interpret and apply policy, as well as legal and industry regulations. This course’s discussion of governance is useful for those in this role.
IT Auditor
An IT auditor evaluates an organization's information technology and security controls. This course helps an IT auditor understand security concepts, threats, and vulnerabilities, as well as how organizations protect their data. An IT auditor should be aware of data protection, governance, and the way an organization structures its processes, all of which are covered in this course. The course's review of legal and industry regulations also makes it a good fit for this role.
Security Awareness Trainer
A security awareness trainer educates employees about security best practices. This course provides the foundational concepts and terminology used in cybersecurity. A security awareness trainer benefits from knowing about common attacks, social engineering, and data protection. This course can help a security awareness trainer better understand the topics they will be teaching. The course's style of instruction, with analogies and memory aids, may also be of benefit.
Digital Forensics Analyst
A digital forensics analyst recovers and analyzes digital evidence related to security incidents. This course does not teach the specific tools used by a digital forensics analyst but it does provide a basis in incident response and digital forensics. The course also helps a digital forensics analysts understand threats, attacks, and security operations, which will benefit their analysis of incidents. This course may be useful for aspiring digital forensics analysts.
Compliance Analyst
A compliance analyst ensures that an organization adheres to relevant laws, regulations, and internal policies. This course will help a compliance analyst understand legal and industry regulations, as well as how organizations create and implement policies. It also covers organizational security, data protection, and governance which will help a compliance analyst understand how to establish proper safeguards for IT infrastructure. This course may be useful for those who wish to become compliance analysts.
Penetration Tester
A penetration tester simulates cyberattacks to identify vulnerabilities in an organization's security. While this course does not teach specific penetration testing skills, it provides a foundation in threats, attacks, and risk management. The course can help a penetration tester better understand the mindset of an attacker, as well as the vulnerabilities that they might target. As a result, this course may be useful for those who wish to become penetration testers.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in CompTIA Security+ 701.
Provides a practical guide to packet analysis using Wireshark. It covers the fundamentals of network protocols and how to analyze network traffic for security threats. It is particularly useful for understanding network security devices and security operations. This book is commonly used by industry professionals.
Provides a broad overview of security principles and practices, covering topics from cryptography to physical security. It offers a deeper understanding of the underlying concepts behind many security technologies. While not directly aligned with the Security+ exam objectives, it provides valuable context and a more comprehensive perspective on security engineering. This book is more valuable as additional reading than as a current reference.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser