Get $1 credit for every $25 spent!

ITProTV: The Premium Core CompTIA Certification Prep Bundle

Ending In:
Add to Cart - $29.99
Add to Cart ($29.99)
$825
96% off
wishlist
Courses
3
Lessons
387

What's Included

Product Details

Access
Lifetime
Content
103 hours
Lessons
210

CompTIA A+ Core (220-1001/220-1002)

Gain Foundational Knowledge & Skills on the Most Common Hardware and Software

By ITPro.TV | in Online Courses

This comprehensive course is geared towards the individual who has a basic set of computer skills and who desires to obtain a job as an entry-level IT technician. It covers the objectives of the CompTIA A+ Core 1 and Core 2. You will learn to install, configure, optimize, troubleshoot, repair, upgrade, and perform preventative maintenance on PCs, digital devices, and operating systems. It will also tackle networking infrastructure concepts as well as how to configure and troubleshoot network connections. The course will also take a look at implementing client-side virtualization as well as operational procedures.

  • Access 210 lectures & 103 hours of content 24/7
  • Install, configure, optimize, troubleshoot, repair, upgrade, & perform preventative maintenance on PCs, digital devices, and operating systems
  • Maintain & troubleshoot Microsoft Windows operating systems
  • Explain networking infrastructure concepts
  • Configure & troubleshoot network connections
  • Implement client-side virtualization, physical security, & operational procedures

ITProTV

ITProTV is an IT skills development platform addressing the global IT skills gap by providing online training for IT professionals in every stage of their careers. With training that’s more like a talk show, IT pros watch more and learn more with an affordable, convenient, better-than-classroom experience.

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets. The partnership offers B2B and B2C clients a huge array of online, on-site, in-person, and on-demand learning opportunities that promise to be as entertaining as they are effective. The combined company offers lifetime learning for anyone wanting to start their career, master their profession, or develop their teams.

4.8/5 stars on G2: ★ ★ ★ ★
4.8/5 stars on Trustpilot: ★ ★ ★ ★

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic computer skills

Course Outline

  • Your First Program
  • Supporting Operating Systems
    • Overview - 6:03
    • 1.11 - Common Operating Systems - 28:44
    • 1.12 - Common Operating Systems Part 2 - 33:38
    • 1.13 - Common Operating Systems Part 3 - 33:57
    • 1.14 - Common Operating Systems Part 4 - 35:04
    • 1.21 - Troubleshooting Methodology - 28:52
    • 1.31 - Windows Features and Tools - 35:05
    • 1.32 - Windows Features and Tools Part 2 - 32:32
    • 1.33 - Windows Features and Tools Part 3 - 32:23
    • 1.34 - Windows Features and Tools Part 4 - 24:10
    • 1.41 - Manage Files in Windows - 29:16
    • 1.42 - Manage Files in Windows Part 2 - 29:16
    • 1.43 - Manage Files in Windows Part 3 - 23:15
    • 1.44 - Manage Files in Windows Part 4 - 38:31
    • 1.51 - Manage Disks in Windows - 34:21
    • 1.52 - Manage Disks in Windows Part 2 - 34:12
    • 1.53 - Manage Disks in Windows Part 3 - 34:18
    • 1.54 - Manage Disks in Windows Part 4 - 33:12
    • 1.55 - Manage Disks in Windows Part 5 - 25:27
    • 1.61 - Manage Devices in Windows - 34:20
    • 1.62 - Manage Devices in Windows Part 2 - 30:24
    • 1.63 - Manage Devices in Windows Part 3 - 34:36
    • 1.64 - Manage Devices in Windows Part 4 - 26:17
    • 1.65 - Manage Devices in Windows Part 5 - 28:36
  • Installing and Configuring PC Components
    • 2.11 - Safety Procedures - 29:59
    • 2.12 - Safety Procedures Part 2 - 33:22
    • 2.21 - PC Components - 24:54
    • 2.22 - PC Components Part 2 - 34:11
    • 2.23 - PC Components Part 3 - 29:58
    • 2.24 - PC Components Part 4 - 32:08
    • 2.25 - PC Components Part 5 - 33:26
    • 2.26 - PC Components_ Motherboard Form Factors - 25:17
    • 2.27 - PC Components_ Expansion Slots - 29:29
    • 2.31 - Common Connection Interfaces - 31:51
    • 2.32 - Common Connection Interfaces Part 2 - 25:02
    • 2.33 - Common Connection Interfaces Part 3 - 34:22
    • 2.34 - Common Connection Interfaces Part 4 - 33:01
    • 2.41 - Peripheral Device Types - 31:07
    • 2.42 - Peripheral Device Types Part 2 - 21:53
  • Installing, Configuring, Troubleshooting Display and Multimedia Devices
    • 3.11 - Display Device_ Connections - 24:33
    • 3.12 - Display Device_ Connections Part 2 - 14:17
    • 3.13 - Display Devices_ Characteristics - 26:18
    • 3.14 - Display Devices_ Resolution - 16:28
    • 3.21 - Troubleshooting Display Devices - 33:54
    • 3.31 - Multimedia Devices - 24:09
  • Installing, Configuring, Troubleshooting Storage Devices
    • 4.11 - Install System Memory - 27:52
    • 4.12 - Install System Memory Part 2 - 24:36
    • 4.13 - Install System Memory Part 3 - 21:35
    • 4.21 - Mass Storage Devices_ Optical Drives - 29:20
    • 4.22 - Mass Storage Devices_ Optical Drives Part 2 - 12:06
    • 4.23 - Mass Storage Devices_ Flash Storage - 26:28
    • 4.24 - Mass Storage Devices_ HDDs and SSDs - 30:55
    • 4.25 - Mass Storage Devices_ HDDs and SSDs Part 2 - 24:05
    • 4.26 - Mass Storage Devices_ RAID - 30:21
    • 4.27 - Mass Storage Devices_ RAID Part 2 - 24:52
    • 4.31 - Removable Storage Devices - 31:35
    • 4.51 - Troubleshooting Storage Devices - 29:41
  • Installing, Configuring, Troubleshooting Internal System Components
    • 5.21 - Configure and Upgrade BIOS UEFI - 22:26
    • 5.22 - Configure and Upgrade BIOS UEFI Part 2 - 21:42
    • 5.31 - Power Supplies - 36:19
    • 5.41 - Troubleshoot Internal System Components - 34:06
    • 5.51 - Custom PCs - 30:56
    • 5.52 - Custom PCs Part 2 - 24:51
  • Installing, Configuring, and Maintaining Operating Systems
    • 6.11 - Configure and Use Linux - 23:55
    • 6.12 - Configure and Use Linux Part 2 - 31:12
    • 6.21 - Configure and Use macOS - 30:15
    • 6.22 - Configure and Use macOS Part 2 - 32:00
    • 6.23 - Configure and Use macOS Part 3 - 28:53
    • 6.24 - Configure and Use macOS Part 4 - 30:23
    • 6.31 - Install and Upgrade Operating Systems - 26:06
    • 6.32 - Install and Upgrade Operating Systems Part 2 - 36:12
    • 6.33 - Install and Upgrade Operating Systems Part 3 - 28:32
    • 6.41 - Maintain Operating Systems - 27:37
    • 6.42 - Maintain Operating Systems Part 2 - 27:37
    • 6.43 - Maintain Operating Systems Part 3 - 28:30
  • Maintaining and Troubleshooting Microsoft Windows
    • 7.11 - Install and Manage Windows Applications - 27:47
    • 7.12 - Install and Manage Windows Applications Pt2 - 36:53
    • 7.13 - Install and Manage Windows Applications Pt3 - 32:47
    • 7.14 - Install and Manage Windows Applications Pt4 - 37:31
    • 7.21 - Manage Windows Performance - 39:26
    • 7.22 - Manage Windows Performance Part 2 - 30:36
    • 7.23 - Manage Windows Performance Part 3 - 41:53
    • 7.31 - Troubleshoot Windows - 30:52
    • 7.32 - Troubleshoot Windows Part 2 - 33:17
    • 7.33 - Troubleshoot Windows Part 3 - 30:52
    • 7.34 - Troubleshoot Windows Part 4 - 33:20
  • Network Infrastructure Concepts
    • 8.11 - Wired Networks - 30:00
    • 8.12 - Wired Networks Part 2 - 30:06
    • 8.13 - Wired Networks Part 3 - 20:46
    • 8.14 - Wired Networks Part 4 - 39:45
    • 8.15 - Wired Networks Part 5 - 25:56
    • 8.21 - Network Hardware Devices - 32:19
    • 8.22 - Network Hardware Devices Part 2 - 25:17
    • 8.23 - Network Hardware Devices Part 3 - 28:45
    • 8.31 - Wireless Networks - 28:51
    • 8.32 - Wireless Networks Part 2 - 27:15
    • 8.33 - Wireless Networks Part 3 - 32:00
    • 8.34 - Wireless Networks Part 4 - 13:44
    • 8.41 - Internet Connection Types - 25:34
    • 8.42 - Internet Connection Types Part 2 - 24:07
    • 8.43 - Internet Connection Types Part 3 - 22:23
    • 8.51 - Network Configuration_ OSI and TCP_IP - 31:13
    • 8.52 - Network Configuration_ OSI and TCP_IP Pt.2 - 23:54
    • 8.61 - Network Configuration_ Routers - 34:06
    • 8.71 - Network Configuration_ IPv4 Addressing - 30:53
    • 8.72 - Network Configuration_ IPv4 Addressing Pt.2 - 29:35
    • 8.81 - Network Configuration_ IPv6 - 32:20
    • 8.82 - Network Configuration_ Host Configuration - 24:58
    • 8.83 - Network Configuration_ Host Configuration Part 2 - 35:22
    • 8.91 - Network Configuration_ IP Address Format - 30:43
    • 8.92 - Network Configuration_ IP Address Format Pt.2 - 35:34
    • 8.93 - Network Configuration_ Network Services - 29:38
    • 8.94 - Network Configuration_ Network Services Part 2 - 26:58
    • 8.95 - Network Configuration_ Network Services Pt.3 - 31:16
    • 8.96 - Network Configuration_ Network Services Pt.4 - 28:08
  • Configuring and Troubleshooting Networks
    • 9.11 - Network Connection Settings - 27:05
    • 9.12 - Network Connection Settings Part 2 - 26:52
    • 9.21 - Install and Configure SOHO Networks - 38:11
    • 9.31 - Configure SOHO Network Security - 30:24
    • 9.32 - Configure SOHO Network Security Part 2 - 26:33
    • 9.41 - Configure Remote Access - 26:23
    • 9.42 - Configure Remote Access Part 2 - 31:20
    • 9.51 - Troubleshooting Network Connections - 30:16
    • 9.52 - Troubleshooting Network Connections Part 2 - 30:28
    • 9.53 - Troubleshooting Network Connections Part 3 - 28:07
    • 9.54 - Troubleshooting Network Conneciton Part 4 - 42:12
    • 9.61 - Install and Configure IoT Devices - 26:38
  • Managing Users, Workstations, and Shared Resources
    • 10.11 - Manage Users - 30:52
    • 10.12 - Manage Users Part 2 - 30:10
    • 10.13 - Manage Users Part 3 - 40:46
    • 10.21 - Shared Resources: Shares and Printer Sharing - 25:42
    • 10.22 - Shared Resources: Shares and Printer Sharing Pt2 - 34:40
    • 10.31 - Shared Resources_ Network and Sharing Center - 31:58
    • 10.41 - Shared Resources_ Workgroups and HomeGroups - 31:18
    • 10.51 - Shared Resources_ NTFS Permissions - 37:08
    • 10.52 - Shared Resources_ NTFS Permissions Part 2 - 22:21
    • 10.53 - Shared Resources_ NTFS Permissions Part 3 - 29:31
    • 10.54 - Shared Resources_ NTFS Permissions Part 4 - 34:55
    • 10.61 - Configure Active Directory Accounts and Policies - 33:02
    • 10.62 - Configure Active Directory Accounts, Policies Pt 2 - 40:59
    • 10.63 - Configure Active Directory Accounts, Policies Pt 3 - 29:36
    • 10.64 - Configure Active Directory Accounts, Policies Pt 4 - 42:15
  • Implementing Client Virtualization and Cloud Computing
    • 11.11 - Configure Client-side Virtualization - 26:47
    • 11.12 - Configure Client-side Virtualization Part 2 - 37:08
    • 11.13 - Configure Client-side Virtualization Part 3 - 19:30
    • 11.31 - Cloud Computing Concepts - 26:32
    • 11.32 - Cloud Computing Concepts Part 2 - 21:45
  • Security Concepts
    • 12.11 - Logical Security Concepts - 27:15
    • 12.12 - Logical Security Concepts Part 2 - 31:49
    • 12.13 - Logical Security Concepts Part 3 - 25:49
    • 12.14 - Logical Security Concepts Part 4 - 34:12
    • 12.31 - Physical Security - 31:01
    • 12.41 - Threats and Vulnerabilities - 25:46
    • 12.42 - Threats and Vulnerabilities Part 2 - 35:33
  • Securing Workstations and Data
    • 13.11 - Implement Security Best Practices - 27:14
    • 13.12 - Implement Security Best Practices Part 2 - 32:33
    • 13.21 - Implement Data Protection Policies - 28:51
    • 13.22 - Implement Data Protection Policies Part 2 - 45:57
    • 13.31 - Protect Data During Incident Response - 32:19
  • Troubleshooting Workstation Security Issues
    • 14.11 - Detect, Remove and Prevent Malware - 29:15
    • 14.12 - Detect, Remove and Prevent Malware Part 2 - 27:02
    • 14.13 - Detect, Remove and Prevent Malware Part 3 - 32:58
    • 14.21 - Workstation Security Issues - 31:06
    • 14.22 - Workstation Security Issues Part 2 - 26:43
    • 14.23 - Workstation Security Issues Part 3 - 22:46
  • Supporting and Troubleshooting Laptops
    • 15.11 - Use Laptop Features - 39:26
    • 15.21 - Install and Configure Laptop Hardware - 32:46
    • 15.22 - Install and Configure Laptop Hardware Pt.2 - 33:51
    • 15.31 - Troubleshoot Common Laptop Issues - 37:38
  • Supporting and Troubleshooting Mobile Devices
    • 16.11 - Mobile Device Types - 32:11
    • 16.12 - Mobile Device Types Part 2 - 28:36
    • 16.13 - Mobile Device Types Part 3 - 30:51
    • 16.21 - Mobile Device Accessories - 22:13
    • 16.22 - Mobile Device Accessories Part 2 - 37:19
    • 16.31 - Configure Mobile Device Network Connectivity - 24:32
    • 16.32 - Configure Mobile Device Network Connectivity Pt2 - 28:51
    • 16.41 - Supporting Mobile Apps - 34:04
    • 16.51 - Securing Mobile Devices - 34:44
    • 16.61 - Mobile Device Issues_ Applications - 32:33
    • 16.62 - Mobile Device Issues_ OS and App Security - 35:03
    • 16.63 - Mobile Device Issues_ Operating Systems - 27:40
  • Installing, Configuring, and Troubleshooting Print Devices
    • 17.11 - Printers - 35:38
    • 17.12 - Printers Part 2 - 12:52
    • 17.21 - Maintain Laser Printers - 33:24
    • 17.22 - Maintain Laser Printers Part 2 - 31:10
    • 17.31 - Maintain Inkjet Printers - 31:38
    • 17.41 - Maintain Impact, Thermal and 3D Printers - 28:44
    • 17.42 - Maintain Impact, Thermal and 3D Printers Pt.2 - 14:40
    • 17.51 - Install and Configure Printers - 22:54
    • 17.52 - Install and Configure Printers Part 2 - 27:30
    • 17.53 - Install and Configure Printers Part 3 - 28:37
    • 17.54 - Install and Configure Printers Part 4 - 24:44
    • 17.61 - Troubleshoot Print Device Issues - 24:34
    • 17.62 - Troubleshoot Print Device Issues Part 2 - 29:32
    • 17.63 - Troubleshoot Print Device Issues Part 3 - 18:59
    • 17.71 - Install and Configure Imaging Devices - 16:59
  • Implementing Operational Procedures
    • 18.11 - Environmental Impacts and Controls - 31:10
    • 18.12 - Environmental Impacts and Controls Part 2 - 30:03
    • 18.13 - Environmental Impacts and Controls Part 3 - 32:10
    • 18.14 - Environmental Impacts and Controls Part 4 - 17:10
    • 18.21 - Create and Maintain Documentation - 33:40
    • 18.31 - Basic Configuration and Change Management - 24:36
    • 18.32 - Basic Configuration and Change Management Pt2 - 21:15
    • 18.41 - Disaster Prevention and Recovery Methods - 25:18
    • 18.42 - Disaster Prevention and Recovery Methods Pt2 - 32:54
    • 18.43 - Disaster Prevention and Recovery Methods Pt3 - 34:07
    • 18.51 - Basic Scripting Concepts - 28:42
    • 18.52 - Basic Scripting Concepts Part 2 - 23:20
    • 18.61 - Professionalism and Communication - 30:51
    • 18.62 - Professionalism and Communication Part 2 - 27:41

View Full Curriculum


Access
Lifetime
Content
37 hours
Lessons
85

Complete CompTIA Network+ N10-007

All You Need to Know About Managing Devices on a Network

By ITPro.TV | in Online Courses

CompTIA Network+ is a benchmark for entry-level network technicians. It's also accredited as a 17024 certification by your International Organization of Standardization. It's also FISMA compliant as well and it is a worldwide accreditation. In this course, you'll learn a basic understanding of enterprise-level technologies and that conclude anything from small networks, large networks to cloud and virtualization technologies likewise. It also covers the basis for network security and access control. You're gonna learn about the common communication protocols and the network connection models and standardizations and necessary specifications when setting up and understanding networks.

  • Access 85 lectures & 37 hours of content 24/7
  • Set up & maintain network communications
  • Establish, maintain & troubleshoot your network connections
  • Learn the basis for network security & access control
  • Understand common communication protocols & network connection models and standardizations
  • Know the necessary specifications when setting up & understanding networks

ITProTV

ITProTV is an IT skills development platform addressing the global IT skills gap by providing online training for IT professionals in every stage of their careers. With training that’s more like a talk show, IT pros watch more and learn more with an affordable, convenient, better-than-classroom experience.

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets. The partnership offers B2B and B2C clients a huge array of online, on-site, in-person, and on-demand learning opportunities that promise to be as entertaining as they are effective. The combined company offers lifetime learning for anyone wanting to start their career, master their profession, or develop their teams.

4.8/5 stars on G2: ★ ★ ★ ★
4.8/5 stars on Trustpilot: ★ ★ ★ ★

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with networks

Course Outline

  • Networking Concepts
    • Overview - 5:17
    • 1.11 - Ports and Protocols - 27:47
    • 1.12 - Ports and Protocols Part 2 - 32:58
    • 1.21 - OSI Model - 20:24
    • 1.22 - OSI Model Part 2 - 16:38
    • 1.31 - Network Traffic Properties - 26:33
    • 1.32 - Network Traffic Properties Part 2 - 30:24
    • 1.41 - Switching Technologies - 39:33
    • 1.51 - Routing Technologies - 26:16
    • 1.52 - Routing Technologies Part 2 - 29:59
    • 1.61 - Network Performance Concepts - 25:20
    • 1.71 - IP Addressing - 29:54
    • 1.72 - IP Addressing Part 2 - 25:39
    • 1.73 - IP Addressing Part 3 - 26:52
    • 1.74 - IP Addressing Part 4 - 30:11
    • 1.81 - Classless IPv4 Addressing - 28:59
    • 1.82 - Classless IPv4 Addressing Part 2 - 38:10
    • 1.83 - Classless IPv4 Addressing Part 3 - 35:58
    • 1.84 - Classless IPv4 Addressing Part 4 - 40:29
    • 1.91 - IP Address Assignments - 35:58
    • 1.99 - IPv6 Addressing - 28:42
    • 1.991 - IPv6 Addressing Part 2 - 24:28
    • 1.992 - Network Topologies - 26:26
    • 1.993 - Network Topologies Part 2 - 33:04
    • 1.994 - Wireless Technologies - 30:28
    • 1.995 - Cloud Concepts - 23:20
    • 1.996 - Network Service Functions - 27:33
    • 1.997 - Network Service Functions Part 2 - 32:27
    • 1.9971 - Network Service Functions Part 3 - 40:32
    • 1.998 - TCP_IP Model - 27:27
    • 1.999 - TCP_IP Model Part 2 - 17:05
  • Infrastructure
    • 2.11 - Cabling Solutions-Copper - 28:54
    • 2.12 - Cabling Solutions-Copper Part 2 - 29:39
    • 2.13 - Cabling Solutions-Copper Part 3 - 34:14
    • 2.21 - Cabling Solutions-Fiber - 25:38
    • 2.22 - Cabling Solutions-Fiber Part 2 - 31:47
    • 2.31 - Network Devices - 31:49
    • 2.41 - Advanced Networking Devices - 28:30
    • 2.42 - Advanced Networking Devices Part 2 - 30:39
    • 2.51 - Virtualization and Network Storage - 30:04
    • 2.52 - Virtualization and Network Storage Part 2 - 28:47
    • 2.61 - WAN Technologies - 25:37
    • 2.62 - WAN Technologies Part 2 - 30:15
    • 2.63 - WAN Technologies Part 3 - 24:19
  • Network Operations
    • 3.11 - Network Diagrams and Documentation - 28:04
    • 3.21 - Business Continuity and Disaster Recovery - 29:32
    • 3.22 - Business Continuity and Disaster Recovery Part 2 - 37:54
    • 3.31 - Scanning, Monitoring and Patching - 42:36
    • 3.41 - Remote Access Methods - 26:56
    • 3.42 - Remote Access Methods Part 2 - 26:24
    • 3.43 - Remote Access Methods Part 3 - 29:44
    • 3.51 - Policies and Best Practices - 26:57
    • 3.52 - Policies and Best Practices Part 2 - 24:14
  • Network Security
    • 4.11 - Physical Security Devices - 32:09
    • 4.21 - Authentication and Access Control - 25:33
    • 4.22 - Authentication and Access Control Part 2 - 33:09
    • 4.31 - Basic Wireless Network Security - 32:28
    • 4.41 - Common Networking Attacks - 24:54
    • 4.42 - Common Networking Attacks Part 2 - 34:06
    • 4.51 - Network Device Hardening - 28:43
    • 4.52 - Network Device Hardening Part 2 - 25:26
    • 4.61 - Common Mitigation Techniques - 29:17
    • 4.62 - Common Mitigation Techniques Part 2 - 32:01
    • 4.63 - Common Mitigation Techniques Part 3 - 28:33
  • Network Troubleshooting and Tools
    • 5.11 - Network Troubleshooting Method - 25:41
    • 5.21 - Network Troubleshooting Tools - 27:55
    • 5.22 - Network Troubleshooting Tools Part 2 - 23:24
    • 5.23 - Network Troubleshooting Tools Part 3 - 34:25
    • 5.24 - Network Troubleshooting Tools Part 4 - 27:17
    • 5.25 - Network Troubleshooting Tools Part 5 - 33:11
    • 5.31 - Common Wired Network Issues - 32:29
    • 5.41 - Common Wireless Network Issues - 28:39
    • 5.51 - Common Network Service Issues - 21:09
    • 5.52 - Common Network Service Issues Part 2 - 26:41
    • 5.53 - Common Network Service Issues Part 3 - 31:06
  • Subnetting
    • 6.11 - Subnetting Step-by-Step - 18:21
    • 6.21 - Subnetting Step-by-Step Part 2 - 6:29
    • 6.31 - Subnetting Step-by-Step Part 3 - 16:50
    • 6.41 - Subnetting Step-by-Step Part 4 - 7:13
    • 6.51 - Subnetting Step-by-Step Part 5 - 7:43
    • 6.61 - Subnetting Step-by-Step Part 6 - 5:21
    • 6.71 - Subnetting Step-by-Step Part 7 - 4:09
    • 6.81 - Subnetting Step-by-Step Part 8 - 4:58
    • 6.91 - Subnetting Step-by-Step Part 9 - 4:53
    • 6.99 - Subnetting Step-by-Step Part 10 - 4:19

View Full Curriculum


Access
Lifetime
Content
28 hours
Lessons
92

Complete CompTIA Security+ SY0-601

By ITPro.TV | in Online Courses

This course will help you get prepared for the CompTIA Security+ SY0-601 certification exam. Security+ is a vendor-neutral certification that is recognized worldwide as a benchmark for information system security best practices. The main goal will introduce you to foundational organizational security concepts. It will cover attacks, threats, vulnerabilities architecture, design, implementation, and more. You'll also learn about risk management, governance, and compliance. The series is intended for aspiring IT security professionals entering into security.

  • Access 92 lectures & 28 hours of content 24/7
  • Be familiar with foundational organizational security concepts
  • Learn about attacks, threats, vulnerabilities architecture, design, & implementation
  • Dig into risk management, governance, & compliance
  • Be ready to pass the CompTIA Security+ exam & get certified

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels
  • Have questions on how digital purchases work? Learn more here

Requirements

  • Basic familiarity with PCs and networks

Course Outline

  • Threats, Attacks, and Vulnerabilities
    • Overview - 5:34
    • 1 - Social Engineering Techniques - 20:21
    • 2 - Malware - 20:00
    • 3 - Password Attacks - Types - 12:33
    • 4 - Password Attacks - Tools - 14:39
    • 5 - Application Attacks - Injections - 18:47
    • 6 - Application Attacks - System Resources - 20:37
    • 7 - Application Attacks - XSS and XSRF - 11:56
    • 8 - Application Attacks - Replay Attacks - 12:12
    • 9 - Network Attacks - DNS Attacks - 20:25
    • 10 - Network Attacks - Layer 2 Attacks - 19:49
    • 11 - Network Attacks - DoS and DDoS - 13:13
    • 13 - Network Attacks - MiTM and MiTB - 11:45
    • 14 - Network Attacks - Wireless - 20:31
    • 15 - Vulnerabilities - 19:54
    • 16 - Threat Intelligence - OSINT - 12:30
    • 17 - Threat Intelligence - Threat Maps and Feeds - 13:06
    • 18 - Threat Intelligence Vulnerability Databases Feed - 18:20
    • 19 - Threat Actors and Vectors - 20:30
  • Cryptography
    • 20 - Cryptography Concepts - 21:43
    • 21 - Encryption and Steganography - 13:28
    • 22 - Hashing - 18:38
    • 23 - Symmetric vs. Asymmetric Encryption - 23:34
    • 24 - Secure Protocols - 24:40
    • 25 - Keys - 22:34
    • 26 - PKI Concepts - 23:26
    • 27 - Certificates - 18:49
    • 28 - IPSec - 23:17
  • Identity and Access Management
    • 29 - Authentication and Authorization - 23:48
    • 30 - Authentication Methods - 21:25
    • 31 - Additional Authentication Methods - 11:44
    • 32 - Biometrics - 16:59
    • 33 - Authentication Protocols - PAP and CHAP - 12:48
    • 34 - Authentication Protocols - EAP and 802.1X - 15:30
    • 35 - Authentication Protocols - RADIUS and TACACS - 14:31
    • 36 - Authentication Protocols - Kerberos - 11:25
    • 37 - Access Control Schemes - 23:34
    • 38 - Account Management - Account Types - 21:04
    • 39 - Account Management - Password Policies - 14:33
    • 40 - Account Management - Account Policies - 13:56
  • Implementing Security
    • 41 - Application Security - 18:51
    • 42 - Physical Security - 25:00
    • 43 - Wireless Security - 27:29
    • 44 - Secure Data Destruction - 17:13
    • 45 - Host Security - Endpoint Protection - 24:09
    • 46 - Host Security - Hardening - 24:12
    • 47 - Mobile Device Deployment - 20:48
    • 48 - Mobile Device Management and Enforcement - 21:48
    • 49 - Mobile Device Connections - 15:15
    • 50 - Specialized Systems - 19:24
    • 51 - Network Security - Segmentation - 22:00
    • 52 - Network Security - VPNs - 19:48
    • 53 - Network Security - Proxies and Load Balancing - 17:06
    • 54 - Network Security - Port Security - 16:58
    • 55 - Network Security - Firewalls - 15:18
    • 56 - Network Security - NIDS and NIPS - 7:33
  • Cloud and Virtualization
    • 57 - Virtualization - 23:01
    • 58 - Cloud Concepts - 22:59
    • 59 - Cloud Services - 18:15
    • 60 - Cloud Models - 10:03
    • 61 - Computing Types - 16:50
    • 62 - Cloud Security Controls - 18:20
  • Operational Resiliency
    • 63 - Hardware Redundancy - 26:53
    • 64 - Site Redundancy - 14:18
    • 65 - Non-persistence Concepts - 21:59
    • 66 - Backup and Recovery - 23:16
  • Operational Security and Incident Response
    • 67 - Network Reconnaissance and Discovery - 17:14
    • 68 - Packet Capture and Replay - 25:11
    • 69 - Vulnerability Scans - 15:51
    • 70 - SIEM and SOAR Systems - 13:22
    • 71 - Pentesting Techniques - 21:00
    • 72 - Pentesting Exercise Types - 15:21
    • 73 - Digital Forensics Concepts - 21:48
    • 74 - Investigational Data Sources - 23:54
    • 75 - Incident Response Process - 13:03
    • 76 - Incident Response Plans - 13:21
    • 77 - Attack Frameworks - 14:27
  • Governance, Risk and Compliance
    • 78 - Security Controls - 19:42
    • 79 - Regulations, Standards and Frameworks - 27:12
    • 80 - Spotlight on General Data Protection Regulation - 25:46
    • 80.5 - Organizational Security Policies - Personnel - 25:12
    • 81 - Organizational Security Policies - 3rd Party Risk - 24:24
    • 82 - Organizational Security Policies - Data - 18:40
    • 83 - Organizational Security Policies - Other Areas - 15:32
    • 84 - Risk Management Concepts - Vocabulary - 17:29
    • 85 - Risk Management Concepts - Types & Strategies - 25:46
    • 86 - Risk Management Concepts - Risk Analysis - 22:49
    • 87 - Risk Management Concepts Business Impact Analysis - 28:24
    • 88 - Privacy and Data Sensitivity Breaches & Data Types - 20:09
    • 89 - Privacy, Data Sensitivity - Privacy Enhancing Tech - 20:01
    • 90 - Privacy, Data Sensitivity, Roles, Responsibilities - 15:50
    • 91 - Privacy and Data Sensitivity - Other Areas - 16:27

View Full Curriculum



Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.