Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

CompTIA Security+ Training Course

Professor Messer via YouTube

Overview

This is the official playlist of my SY0-601 Security+ Training Course. Every minute of every course video is available in this playlist.

Syllabus

How to Pass your SY0-601 Security+ Exam.
Phishing - SY0-601 CompTIA Security+ : 1.1.
Impersonation - CompTIA SY0-601 Security+ : 1.1.
Dumpster Diving - SY0-601 CompTIA Security+ : 1.1.
Shoulder Surfing - SY0-601 CompTIA Security+ : 1.1.
Hoaxes - SY0-601 CompTIA Security+ : 1.1.
Watering Hole Attacks - SY0-601 CompTIA Security+ : 1.1.
Spam - SY0-601 CompTIA Security+ : 1.1.
Influence Campaigns - SY0-601 CompTIA Security+ : 1.1.
Other Social Engineering Attacks - SY0-601 CompTIA Security+ : 1.1.
Principles of Social Engineering - SY0-601 CompTIA Security+ : 1.1.
An Overview of Malware - SY0-601 CompTIA Security+ : 1.2.
Viruses and Worms - SY0-601 CompTIA Security+ : 1.2.
Ransomware and Crypto-malware - SY0-601 CompTIA Security+ : 1.2.
Trojan and RATs - SY0-601 CompTIA Security+ : 1.2.
Rootkits - SY0-601 CompTIA Security+ : 1.2.
Spyware - SY0-601 CompTIA Security+ : 1.2.
Bots and Botnets - SY0-601 CompTIA Security+ : 1.2.
Logic Bombs - SY0-601 CompTIA Security+ : 1.2.
Password Attacks - SY0-601 CompTIA Security+ : 1.2.
Physical Attacks - SY0-601 CompTIA Security+ : 1.2.
Adversarial Artificial Intelligence - SY0-601 CompTIA Security+ : 1.2.
Supply Chain Attacks - SY0-601 CompTIA Security+ : 1.2.
Cloud-based vs. On-Premises Attacks - SY0-601 CompTIA Security+ : 1.2.
Cryptographic Attacks - SY0-601 CompTIA Security+ : 1.2.
Privilege Escalation - SY0-601 CompTIA Security+ : 1.3.
Cross-site Scripting - SY0-601 CompTIA Security+ : 1.3.
Injection Attacks - SY0-601 CompTIA Security+ : 1.3.
Buffer Overflows - SY0-601 CompTIA Security+ : 1.3.
Replay Attacks - SY0-601 CompTIA Security+ : 1.3.
Request Forgeries - SY0-601 CompTIA Security+ : 1.3.
Driver Manipulation - SY0-601 CompTIA Security+ : 1.3.
SSL Stripping - SY0-601 CompTIA Security+ : 1.3.
Race Conditions - SY0-601 CompTIA Security+ : 1.3.
Other Application Attacks - SY0-601 CompTIA Security+ : 1.3.
Rogue Access Points and Evil Twins - SY0-601 CompTIA Security+ : 1.4.
Bluejacking and Bluesnarfing - SY0-601 CompTIA Security+ : 1.4.
Wireless Disassociation Attacks - SY0-601 CompTIA Security+ : 1.4.
Wireless Jamming - SY0-601 CompTIA Security+ : 1.4.
RFID and NFC Attacks - SY0-601 CompTIA Security+ : 1.4.
Randomizing Cryptography - SY0-601 CompTIA Security+ : 1.4.
On-Path Attacks - SY0-601 CompTIA Security+ : 1.4.
MAC Flooding and Cloning - SY0-601 CompTIA Security+ : 1.4.
DNS Attacks - SY0-601 CompTIA Security+ : 1.4.
Denial of Service - SY0-601 CompTIA Security+ : 1.4.
Malicious Scripts - SY0-601 CompTIA Security+ : 1.4.
Threat Actors - SY0-601 CompTIA Security+ : 1.5.
Attack Vectors - SY0-601 CompTIA Security+ : 1.5.
Threat Intelligence - SY0-601 CompTIA Security+ : 1.5.
Threat Research - SY0-601 CompTIA Security+ : 1.5.
Vulnerability Types - SY0-601 CompTIA Security+ : 1.6.
Third-party Risks - SY0-601 CompTIA Security+ : 1.6.
Vulnerability Impacts - SY0-601 CompTIA Security+ : 1.6.
Threat Hunting - SY0-601 CompTIA Security+ : 1.7.
Vulnerability Scans - SY0-601 CompTIA Security+ : 1.7.
Security Information and Event Management - SY0-601 CompTIA Security+ : 1.7.
Penetration Testing - SY0-601 CompTIA Security+ : 1.8.
Reconnaissance - SY0-601 CompTIA Security+ : 1.8.
Security Teams - SY0-601 CompTIA Security+ : 1.8.
Configuration Management - SY0-601 CompTIA Security+ : 2.1.
Protecting Data - SY0-601 CompTIA Security+ : 2.1.
Data Loss Prevention - SY0-601 CompTIA Security+ : 2.1.
Managing Security - SY0-601 CompTIA Security+ : 2.1.
Site Resiliency - SY0-601 CompTIA Security+ : 2.1.
Honeypots and Deception - SY0-601 CompTIA Security+ : 2.1.
Cloud Models - SY0-601 CompTIA Security+ : 2.2.
Edge and Fog Computing - SY0-601 CompTIA Security+ : 2.2.
Designing the Cloud - SY0-601 CompTIA Security+ : 2.2.
Infrastructure as Code - SY0-601 CompTIA Security+ : 2.2.
Virtualization Security - SY0-601 CompTIA Security+ : 2.2.
Secure Deployments - SY0-601 CompTIA Security+ : 2.3.
Provisioning and Deprovisioning - SY0-601 CompTIA Security+ : 2.3.
Secure Coding Techniques - SY0-601 CompTIA Security+ : 2.3.
Software Diversity - SY0-601 CompTIA Security+ : 2.3.
Automation and Scripting - SY0-601 CompTIA Security+ : 2.3.
Authentication Methods - SY0-601 CompTIA Security+ : 2.4.
Biometrics - SY0-601 CompTIA Security+ : 2.4.
Multi-factor Authentication - SY0-601 CompTIA Security+ : 2.4.
Disk Redundancy - SY0-601 CompTIA Security+ : 2.5.
Network Redundancy - SY0-601 CompTIA Security+ : 2.5.
Power Redundancy - SY0-601 CompTIA Security+ : 2.5.
Replication - SY0-601 CompTIA Security+ : 2.5.
Backup Types - SY0-601 CompTIA Security+ : 2.5.
Resiliency - SY0-601 CompTIA Security+ : 2.5.
Embedded Systems - SY0-601 CompTIA Security+ : 2.6.
Embedded Systems Communication - SY0-601 CompTIA Security+ : 2.6.
Embedded Systems Constraints - SY0-601 CompTIA Security+ : 2.6.
Physical Security Controls - SY0-601 CompTIA Security+ : 2.7.
Secure Areas - SY0-601 CompTIA Security+ : 2.7.
Secure Data Destruction - SY0-601 CompTIA Security+ : 2.7.
Cryptography Concepts - SY0-601 CompTIA Security+ : 2.8.
Symmetric and Asymmetric Cryptography - SY0-601 CompTIA Security+ : 2.8.
Hashing and Digital Signatures - SY0-601 CompTIA Security+ : 2.8.
Cryptographic Keys - SY0-601 CompTIA Security+ : 2.8.
Steganography - SY0-601 CompTIA Security+ : 2.8.
Quantum Computing - SY0-601 CompTIA Security+ : 2.8.
Stream and Block Ciphers - SY0-601 CompTIA Security+ : 2.8.
Blockchain Technology - SY0-601 CompTIA Security+ : 2.8.
Cryptography Use Cases - SY0-601 CompTIA Security+ : 2.8.
Cryptography Limitations - SY0-601 CompTIA Security+ : 2.8.
Secure Protocols - SY0-601 CompTIA Security+ : 3.1.
Endpoint Protection - SY0-601 CompTIA Security+ : 3.2.
Boot Integrity - SY0-601 CompTIA Security+ : 3.2.
Database Security - SY0-601 CompTIA Security+ : 3.2.
Application Security - SY0-601 CompTIA Security+ : 3.2.
Application Hardening - SY0-601 CompTIA Security+ : 3.2.
Load Balancing - SY0-601 CompTIA Security+ : 3.3.
Network Segmentation - SY0-601 CompTIA Security+ : 3.3.
Virtual Private Networks - SY0-601 CompTIA Security+ : 3.3.
Port Security - SY0-601 CompTIA Security+ : 3.3.
Secure Networking - SY0-601 CompTIA Security+ : 3.3.
Firewalls - SY0-601 CompTIA Security+ : 3.3.
Network Access Control - SY0-601 CompTIA Security+ : 3.3.
Proxy Servers - SY0-601 CompTIA Security+ : 3.3.
Intrusion Prevention - SY0-601 CompTIA Security+ : 3.3.
Other Network Appliances - SY0-601 CompTIA Security+ : 3.3.
Wireless Cryptography - SY0-601 CompTIA Security+ : 3.4.
Wireless Authentication Methods - SY0-601 CompTIA Security+ : 3.4.
Wireless Authentication Protocols - SY0-601 CompTIA Security+ : 3.4.
Installing Wireless Networks - SY0-601 CompTIA Security+ : 3.4.
Mobile Networks - SY0-601 CompTIA Security+ : 3.5.
Mobile Device Management - SY0-601 CompTIA Security+ : 3.5.
Mobile Device Security - SY0-601 CompTIA Security+ : 3.5.
Mobile Device Enforcement - SY0-601 CompTIA Security+ : 3.5.
Mobile Deployment Models - SY0-601 CompTIA Security+ : 3.5.
Cloud Security Controls - SY0-601 CompTIA Security+ : 3.6.
Securing Cloud Storage - SY0-601 CompTIA Security+ : 3.6.
Securing Cloud Networks - SY0-601 CompTIA Security+ : 3.6.
Securing Compute Clouds - SY0-601 CompTIA Security+ : 3.6.
Cloud Security Solutions - SY0-601 CompTIA Security+ : 3.6.
Identity Controls - SY0-601 CompTIA Security+ : 3.7.
Account Types - SY0-601 CompTIA Security+ : 3.7.
Account Policies - SY0-601 CompTIA Security+ : 3.7.
Authentication Management - SY0-601 CompTIA Security+ : 3.8.
PAP and CHAP - SY0-601 CompTIA Security+ : 3.8.
Identity and Access Services - SY0-601 CompTIA Security+ : 3.8.
Federated Identities - SY0-601 CompTIA Security+ : 3.8.
Access Control - SY0-601 CompTIA Security+ : 3.8.
Public Key Infrastructure - SY0-601 CompTIA Security+ : 3.9.
Certificates - SY0-601 CompTIA Security+ : 3.9.
Certificate Formats - SY0-601 CompTIA Security+ : 3.9.
Certificate Concepts - SY0-601 CompTIA Security+ : 3.9.
Reconnaissance Tools - Part 1 - SY0-601 CompTIA Security+ : 4.1.
Reconnaissance Tools - Part 2 - SY0-601 CompTIA Security+ : 4.1.
File Manipulation Tools - SY0-601 CompTIA Security+ : 4.1.
Shell and Script Environments - SY0-601 CompTIA Security+ : 4.1.
Packet Tools - SY0-601 CompTIA Security+ : 4.1.
Forensic Tools - SY0-601 CompTIA Security+ : 4.1.
Incident Response Process - SY0-601 CompTIA Security+ : 4.2.
Incident Response Planning - SY0-601 CompTIA Security+ : 4.2.
Attack Frameworks - SY0-601 CompTIA Security+ : 4.2.
Vulnerability Scan Output - SY0-601 CompTIA Security+ : 4.3.
SIEM Dashboards - SY0-601 CompTIA Security+ : 4.3.
Log Files - SY0-601 CompTIA Security+ : 4.3.
Log Management - SY0-601 CompTIA Security+ : 4.3.
Endpoint Security Configuration - SY0-601 CompTIA Security+ : 4.4.
Security Configurations - SY0-601 CompTIA Security+ : 4.4.
Digital Forensics - SY0-601 CompTIA Security+ : 4.5.
Forensics Data Acquisition - SY0-601 CompTIA Security+ : 4.5.
On-Premises vs. Cloud Forensics - SY0-601 CompTIA Security+ : 4.5.
Managing Evidence - SY0-601 CompTIA Security+ : 4.5.
Security Controls - SY0-601 CompTIA Security+ : 5.1.
Security Regulations and Standards - SY0-601 CompTIA Security+ : 5.2.
Security Frameworks - SY0-601 CompTIA Security+ : 5.2.
Security Configurations - SY0-601 CompTIA Security+ : 5.2.
Personnel Security - SY0-601 CompTIA Security+ : 5.3.
Third-party Risk Management - SY0-601 CompTIA Security+ : 5.3.
Managing Data - SY0-601 CompTIA Security+ : 5.3.
Credential Policies - SY0-601 CompTIA Security+ : 5.3.
Organizational Policies - SY0-601 CompTIA Security+ : 5.3.
Risk Management Types - SY0-601 CompTIA Security+ : 5.4.
Risk Analysis - SY0-601 CompTIA Security+ : 5.4.
Business Impact Analysis - SY0-601 CompTIA Security+ : 5.4.
Privacy and Data Breaches - SY0-601 CompTIA Security+ : 5.5.
Data Classifications - SY0-601 CompTIA Security+ : 5.5.
Enhancing Privacy - SY0-601 CompTIA Security+ : 5.5.
Data Roles and Responsibilities - SY0-601 CompTIA Security+ : 5.5.

Taught by

Professor Messer

Reviews

5.0 rating, based on 1 Class Central review

Start your review of CompTIA Security+ Training Course

  • Profile image for Josep
    Josep
    This course will take a considerable amount of time but will give you a good foundation in cybersecurity.

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.