CompTIA Security+ (SY0-701) Complete Course & Exam
About Course
** Taught by a Best Selling IT Certification Instructor **
Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of computer security.
You will learn the fundamentals of cybersecurity and gain experience in the configuration, management, and troubleshooting of common wired and wireless networks with lessons, lectures, and video demonstrations to teach you everything you need to know to pass the CompTIA Security+ exam.
CompTIA Security+ (SY0-701) is the world’s most popular cybersecurity certification today!
This course is designed to help prepare you for the CompTIA Security (SY0-701) certification exam and covers all the domains the Security+ (SY0-701) certification exam:
CompTIA Security+ (SY0-701):
- General Security Concepts
- Threats, Vulnerabilities, and Mitigations
- Security Architecture
- Security Operations
- Security Program Management and Oversight
What You Will Receive In The Course:
- Video lectures with the essential information needed to pass the Security+ (SY0-701) exam
- A complete downloadable study guide in PDF format based on the lessons
- Practice quizzes to ensure mastery of each section of the course
- A full-length practice exam with multiple choice and mock simulations
This course stays current and up-to-date with the latest release of the CompTIA Security+ exam (SY0-701), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!
What Other Students Are Saying About My CompTIA Security+ Course:
- Solid information, acronym break downs throughout the course (allows for better note taking). Jason is easy to follow, listen to, and understand during your study period (I sit for hours listening and taking notes and replaying the section) (Mark Guillen, 5 stars)
- Just passed my security+ today! Dion’s course was excellent. It was all I needed, and I took his practice tests I also purchased. The only thing I think would help other testers is more sophisticated and harder performance-based questions as I experienced ones today that were pretty tough and required more hands-on experience. Overall, though completely worth the money. (Duran navarro, 5 stars)
- The course is very informative and good for people that has no knowledge about cybersecurity so far. It teaches us about the harm caused by attacks and how to prevent them. I would suggest everyone to take this course, even if they don’t wan the certificate from Comptia. (Mahmoud Choumar, 5 stars)
- Jason is a great pedagogue. He is thorough and amiable. The course has very minimal errors and you can tell he is very strict with the format of his lessons. I had very few questions during the lectures and only experience one issue throughout the whole experience. I will definitely buy more courses from him. I also bought the voucher from his website to get the retake for only 100 bucks! Good job Dion Training! Keep up the great job! (Victor Cabrales, 5 stars)
- Passed the exam in December of 2022 using this course – FIRST TRY!! This course gave the back bone of everything I needed to pass the Sec. + exam. When the time came to study up a day or two before the actual exam, I used all the practice quizzes/tests from the CompTIA Sec. + study book. Seems thoughtless or stupid to not use the book for actual studying, but I found I learn slightly better in a class environment and this course/videos allowed me that. Thank you for this course and I look forward to many more in the future! Honestly, I haven’t taken an ACTUAL exam in years – many years. If I can do it, you all can too! Good luck and God speed! (Nathaniel Shumaker, 5 stars)
Upon completion of this course, you will earn 21 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.
What Will You Learn?
- Fundamental Security Concepts
- Navigating Threats, Vulnerabilities, & Remedies
- Decoding Security Architecture
- Mastering Security Operations
- Guiding Security Program Management & Oversight
Course Content
01 Introduction
-
Download Resource Files
-
001 Welcome to the Course!_part1
03:40 -
001 Welcome to the Course!_part2
03:40 -
001 Welcome to the Course!_part3
03:40 -
001 Welcome to the Course!_part4
03:40 -
003 Exam Tips
07:21
02 Fundamentals of Security
-
Download Resource Files
-
001 Fundamentals of Security_part1
04:34 -
001 Fundamentals of Security_part2
04:34 -
002 Threats and Vulnerabilities
05:33 -
003 Confidentiality (OBJ 12)
05:53 -
004 Integrity (OBJ 12)
06:09 -
005 Availability (OBJ 12)
06:27 -
006 Non-repudiation (OBJ 12)
05:10 -
007 Authentication (OBJ 12)
06:45 -
008 Authorization (OBJ 12)
03:27 -
009 Accounting (OBJ 12)
04:01 -
010 Security Control Categories (OBJ 11)
04:49 -
011 Security Control Types (OBJ 11)
05:21 -
012 Gap Analysis (OBJ 12)
05:09 -
013 Zero Trust (OBJ 12)
07:39
03 Threat Actors
-
Download Resource Files
-
001 Threat Actors (OBJ 12, 21, 22)
04:11 -
002 Threat Actor Motivations (OBJ 21)
07:48 -
003 Threat Actor Attributes (OBJ 21)
04:34 -
004 Unskilled Attackers (OBJ 21)
03:13 -
005 Hacktivists (OBJ 21)
04:07 -
006 Organized Crime (OBJ 21)
04:36 -
007 Nation-state Actor (OBJ 21)_part1
03:32 -
007 Nation-state Actor (OBJ 21)_part2
03:32 -
008 Insider Threats (OBJ 21)_part1
03:03 -
008 Insider Threats (OBJ 21)_part2
03:03 -
009 Shadow IT (OBJ 21)
05:23 -
010 Threat Vectors and Attack Surfaces (OBJ 22)_part1
04:27 -
010 Threat Vectors and Attack Surfaces (OBJ 22)_part2
04:27 -
011 Outsmarting Threat Actors (OBJ 12)
10:48
04 Physical Security
-
Download Resource Files
-
001 Physical Security (OBJ 12 24)
03:43 -
002 Fencing and Bollards (OBJ 12)_part1
03:15 -
002 Fencing and Bollards (OBJ 12)_part2
03:15 -
003 Attacking with Brute Force (OBJ 24)
05:46 -
004 Surveillance Systems (OBJ 12)
07:04 -
005 Bypassing Surveillance Systems (OBJ 24)
04:28 -
006 Access Control Vestibules (OBJ 12)
07:38 -
007 Door Locks (OBJ 12)_part1_part1
03:19 -
007 Door Locks (OBJ 12)_part1_part2
03:19 -
007 Door Locks (OBJ 12)_part2
06:38 -
008 Access Badge Cloning (OBJ 24)_part1
04:20 -
008 Access Badge Cloning (OBJ 24)_part2
04:20
05 Social Engineering
-
Download Resource Files
-
001 Social Engineering (OBJ 22 56)
04:12 -
002 Motivational Triggers (OBJ 56)_part1
05:23 -
002 Motivational Triggers (OBJ 56)_part2
05:23 -
003 Impersonation (OBJ 22)
08:17 -
004 Pretexting (OBJ 22)
04:17 -
005 Phishing Attacks (OBJ 22)
08:46 -
006 Preventing Phishing Attacks (OBJ 56)
09:05 -
007 Conducting an Anti-Phishing Campaign (OBJ 56)
05:21 -
008 Frauds and Scams (OBJ 22)
06:29 -
009 Influence Campaigns (OBJ 22)
05:47 -
010 Other Social Engineering Attacks (OBJ 22)
09:31
06 Malware
-
Download Resource Files
-
001 Malware (OBJ 24)_part1
04:23 -
001 Malware (OBJ 24)_part2
04:23 -
002 Viruses (OBJ 24)
07:50 -
003 Worms (OBJ 24)
03:22 -
004 Trojans (OBJ 24)
03:50 -
005 Viruses and Trojans (OBJ 24)_part1
03:53 -
005 Viruses and Trojans (OBJ 24)_part2
03:53 -
006 Ransomware (OBJ 24)_part1
03:55 -
006 Ransomware (OBJ 24)_part2
03:55 -
007 Zombies and Botnets (OBJ 24)
05:03 -
008 Rootkits (OBJ 24)
05:23 -
009 Backdoors and Logic Bombs (OBJ 24)
05:40 -
010 Keylogger (OBJ 24)
05:06 -
011 Spyware and Bloatware (OBJ 24)
04:58 -
012 Malware Attack Techniques (OBJ 24)
05:01 -
013 Indications of Malware Attacks (OBJ 24)
05:19
07 Data Protection
-
Download Resource Files
-
001 Data Protection (OBJ 14, 33, 42, 44, 51)
03:16 -
002 Data Classifications (OBJ 33)
08:16 -
003 Data Ownership (OBJ 42 51)
05:10 -
004 Data States (OBJ 33)
05:12 -
005 Data Types (OBJ 33 14)
04:30 -
006 Data Sovereignty (OBJ 33)
02:57 -
007 Securing Data (OBJ 33)
03:55 -
008 Data Loss Prevention (DLP) (OBJ 44)
04:01 -
009 Configuring a DLP (OBJ 45)
16:06
08 Cryptographic Solutions
-
Download Resource Files
-
001 Cryptographic Solutions (OBJ 14, 23, 24)_part1
06:00 -
001 Cryptographic Solutions (OBJ 14, 23, 24)_part2
06:00 -
002 Symmetric vs Asymmetric (OBJ 14)_part1
03:58 -
002 Symmetric vs Asymmetric (OBJ 14)_part2
03:58 -
003 Symmetric Algorithms (OBJ 14)
06:00 -
004 Asymmetric Algorithms (OBJ 14)
07:23 -
005 Hashing (OBJ 14)_part1
05:17 -
005 Hashing (OBJ 14)_part2
05:17 -
006 Increasing Hash Security (OBJ 14)
07:44 -
007 Public Key Infrastructure (PKI) (OBJ 14)
06:05 -
008 Digital Certificates (OBJ 14)_part1
06:32 -
008 Digital Certificates (OBJ 14)_part2
06:32 -
009 Exploring Digital Certificates (OBJ 14)
03:33 -
010 Blockchain (OBJ 14)
05:36 -
011 Encryption Tools (OBJ 14)
05:54 -
012 Obfuscation (OBJ 14)
08:58 -
013 Cryptographic Attacks (OBJ 23 24)_part1
07:36 -
013 Cryptographic Attacks (OBJ 23 24)_part2
07:36
09 Risk Management
-
Download Resource Files
-
001 Risk Management (OBJ 52)
04:43 -
002 Risk Assessment Frequency (OBJ 52)
03:26 -
003 Risk Identification (OBJ 52)
06:00 -
004 Risk Register (OBJ 52)
07:56 -
005 Qualitative Risk Analysis (OBJ 52)
03:46 -
006 Quantitative Risk Analysis (OBJ 52)
05:11 -
007 Risk Management Strategies (OBJ 52)
05:32 -
008 Risk Monitoring and Reporting (OBJ 52)
03:39
10 Third-party Vendor Risks
-
Download Resource Files
-
001 Third-party Vendor Risks (OBJ 22, 23, 53)
03:05 -
002 Supply Chain Risks (OBJ 23 53)
04:10 -
003 Supply Chain Attacks (OBJ 22 53)_part1
03:09 -
003 Supply Chain Attacks (OBJ 22 53)_part2
03:09 -
004 Vendor Assessment (OBJ 53)
05:01 -
005 Vendor Selection and Monitoring (OBJ 53)
05:12 -
006 Contracts and Agreements (OBJ 53)
05:15
11 Governance and Compliance
-
Download Resource Files
-
001 Governance and Compliance (OBJ 51 54)
04:54 -
002 Governance (OBJ 51)
05:06 -
003 Governance Structures (OBJ 51)
03:36 -
004 Policies (OBJ 51)
05:16 -
005 Standards (OBJ 51)
04:32 -
006 Procedures (OBJ 51)
04:58 -
007 Governance Considerations (OBJ 51)
07:03 -
008 Compliance (OBJ 54)
05:47 -
009 Non-compliance Consequences (OBJ 54)
03:56
12 Asset and Change Management
-
Download Resource Files
-
001 Asset and Change Management (OBJ 13, 41, 42)
04:44 -
002 Acquisition and Procurement (OBJ 42)
06:22 -
003 Mobile Asset Deployments (OBJ 41)
06:18 -
004 Asset Management (OBJ 42)
06:37 -
005 Asset Disposal and Decommissioning (OBJ 42)
09:00 -
006 Change Management (OBJ 13)_part1
03:34 -
006 Change Management (OBJ 13)_part2
03:34 -
007 Change Management Processes (OBJ 13)
06:22 -
008 Technical Implications of Changes (OBJ 13)
04:59 -
009 Documenting Changes (OBJ 13)
04:29
13 Audits and Assessments
-
Download Resource Files
-
001 Audits and Assessments (OBJ 55)
04:51 -
002 Internal Audits and Assessments (OBJ 55)
07:44 -
003 Performing an Internal Assessment (OBJ 55)
04:26 -
004 External Audits and Assessments (OBJ 55)
07:10 -
005 Performing an External Assessment (OBJ 55)
04:40 -
006 Penetration Testing (OBJ 55)
06:02 -
007 Reconnaissance in Pentesting (OBJ 55)
06:34 -
008 Performing a Basic PenTest (OBJ 55)
19:43 -
009 Attestation of Findings (OBJ 55)_part1
03:15 -
009 Attestation of Findings (OBJ 55)_part2
03:15
14 Cyber Resilience and Redundancy
-
Download Resource Files
-
001 Cyber Resilience and Redundancy (OBJ 34)
03:16 -
002 High Availability (OBJ 34)
08:51 -
003 Data Redundancy (OBJ 34)
08:50 -
004 Configuring a RAID (OBJ 34)
03:37 -
005 Capacity Planning (OBJ 34)
08:04 -
006 Powering Data Centers (OBJ 34)_part1
05:22 -
006 Powering Data Centers (OBJ 34)_part2
05:21 -
007 Data Backups (OBJ 34)
10:42 -
008 Continuity of Operations Plan (OBJ 34)_part1
04:37 -
008 Continuity of Operations Plan (OBJ 34)_part2
04:37 -
009 Redundant Site Considerations (OBJ 34)_part1
06:09 -
009 Redundant Site Considerations (OBJ 34)_part2
06:09 -
010 Resilience and Recovery Testing (OBJ 34)
06:57
15 Security Architecture
-
Download Resource Files
-
001 Security Architecture (OBJ 31 41)
04:03 -
002 On-premise versus the Cloud (OBJ 31)_part1
05:11 -
002 On-premise versus the Cloud (OBJ 31)_part2
05:11 -
003 Cloud Security (OBJ 31 41)
06:20 -
004 Virtualization and Containerization (OBJ 23 31)_part1
05:13 -
004 Virtualization and Containerization (OBJ 23 31)_part2
05:13 -
005 Serverless (OBJ 31)
03:42 -
006 Microservices (OBJ 31)
04:12 -
007 Network Infrastructure (OBJ 31)
03:17 -
008 Software-Defined Network (SDN) (OBJ 31)
03:11 -
009 Infrastructure as Code (IaC) (OBJ 31)
04:24 -
010 Centralized vs Decentralized Architectures (OBJ 31)
04:20 -
011 Internet of Things (IoT) (OBJ 31 41)
05:05 -
012 ICS and SCADA (OBJ 31 41)
04:07 -
013 Embedded Systems (OBJ 31 41)
05:07
16 Security Infrastructure
-
Download Resource Files
-
001 Security Infrastructure (OBJ 32 45)
04:25 -
002 Ports and Protocols (OBJ 45)
15:23 -
003 Firewalls (OBJ 32)
12:13 -
004 Configuring Firewalls (OBJ 45)_part1
06:59 -
004 Configuring Firewalls (OBJ 45)_part2
06:59 -
005 IDS and IPS (OBJ 32)
06:28 -
006 Network Appliances (OBJ 32)_part1
04:58 -
006 Network Appliances (OBJ 32)_part2
04:58 -
007 Port Security (OBJ 32)_part1
05:25 -
007 Port Security (OBJ 32)_part2
05:24 -
008 Securing Network Communications (OBJ 32)_part1
06:51 -
008 Securing Network Communications (OBJ 32)_part2
06:51 -
008 Securing Network Communications (OBJ 32)_part3
06:51 -
009 SD-WAN and SASE (OBJ 32)_part1
03:50 -
009 SD-WAN and SASE (OBJ 32)_part2
03:50 -
010 Infrastructure Considerations (OBJ 32)_part1
05:27 -
010 Infrastructure Considerations (OBJ 32)_part2
05:27 -
011 Selecting Infrastructure Controls (OBJ 32)
08:17
17 Identity and Access Management (IAM) Solutions
-
Download Resource Files
-
001 Identity and Access Management (IAM) Solutions (OBJ 24 46)
04:30 -
002 Identity and Access Management (IAM) (OBJ 46)
04:58 -
003 Multifactor Authentication (OBJ 46)_part1
07:38 -
003 Multifactor Authentication (OBJ 46)_part2
07:38 -
004 Password Security (OBJ 46)_part1
08:16 -
004 Password Security (OBJ 46)_part2
08:16 -
005 Password Attacks (OBJ 24)
10:09 -
006 Single Sign-On (SSO) (OBJ 46)
09:51 -
007 Federation (OBJ 46)
05:09 -
008 Privileged Access Management (PAM) (OBJ 46)
03:20 -
009 Access Control Models (OBJ 46)
09:07 -
010 Assigning Permissions (OBJ 46)
07:01
18 Vulnerabilities and Attacks
-
Download Resource Files
-
001 Vulnerabilities and Attacks (OBJ 22, 23, 24, 25, 41)
06:37 -
002 Hardware Vulnerabilities (OBJ 22, 23, 25)
06:36 -
003 Bluetooth Vulnerabilities and Attacks (OBJ 23, 25, 41)
06:43 -
004 Mobile Vulnerabilities and Attacks (OBJ 23, 25, 41)
05:02 -
005 Zero-day Vulnerabilities (OBJ 23)
05:03 -
006 Operating System Vulnerabilities (OBJ 23 25)
04:55 -
007 SQL and XML Injections (OBJ 23 24)_part1
06:59 -
007 SQL and XML Injections (OBJ 23 24)_part2
06:59 -
008 Conducting an SQL Injection (OBJ 23 24)_part1
03:49 -
008 Conducting an SQL Injection (OBJ 23 24)_part2
03:49 -
009 XSS and XSRF (OBJ 23 24)_part1
08:04 -
009 XSS and XSRF (OBJ 23 24)_part2
08:04 -
010 Buffer Overflow (OBJ 23 24)
06:34 -
011 Race Conditions (OBJ 23)
06:04
19 Malicious Activity
-
Download Resource Files
-
001 Malicious Activity (OBJ 24)
03:25 -
002 Distributed Denial of Service (OBJ 24)_part1
04:02 -
002 Distributed Denial of Service (OBJ 24)_part2
04:02 -
003 Domain Name System (DNS) Attacks (OBJ 24)
05:23 -
004 Directory Traversal Attack (OBJ 24)
08:04 -
005 Execution and Escalation Attack (OBJ 24)
06:19 -
006 Replay Attacks (OBJ 24)
02:35 -
007 Session Hijacking (OBJ 24)
04:52 -
008 On-Path Attacks
04:01 -
009 Injection Attacks
04:20 -
010 Indicators of Compromise (IoC)
06:58
20 Hardening
-
Download Resource Files
-
001 Hardening (OBJ 25, 41, 45)
04:03 -
002 Changing Default Configurations (OBJ 25)
05:03 -
003 Restricting Applications (OBJ 25)
07:01 -
004 Unnecessary Services (OBJ 25)
05:36 -
005 Trusted Operating Systems (OBJ 25)
05:33 -
006 Updates and Patches (OBJ 25)
05:02 -
007 Patch Management (OBJ 25)_part1
04:24 -
007 Patch Management (OBJ 25)_part2
04:24 -
008 Group Policies (OBJ 25 45)
08:56 -
009 SELinux (OBJ 25 45)
06:47 -
010 Data Encryption Levels (25)
04:44 -
011 Secure Baselines (OBJ 25 and 41)
05:01
21 Security Techniques
-
Download Resource Files
-
001 Security Techniques (OBJ 41 45)
03:44 -
002 Wireless Infrastructure Security (OBJ 41)_part1
04:11 -
002 Wireless Infrastructure Security (OBJ 41)_part2
04:11 -
003 Wireless Security Settings (OBJ 41)_part1
07:26 -
003 Wireless Security Settings (OBJ 41)_part2
07:26 -
004 Application Security (OBJ 41)_part1
06:21 -
004 Application Security (OBJ 41)_part2
06:21 -
005 Network Access Control (NAC) (OBJ 45)
06:01 -
006 Web and DNS Filtering (OBJ 45)
07:05 -
007 Email Security (OBJ 45)
07:41 -
008 Endpoint Detection and Response (OBJ 45)
07:26 -
009 User Behavior Analytics (OBJ 45)
06:06 -
010 Selecting Secure Protocols (OBJ 45)_part1
07:22 -
010 Selecting Secure Protocols (OBJ 45)_part2
07:22
22 Vulnerability Management
-
Download Resource Files
-
001 Vulnerability Management (OBJ 43)
02:52 -
002 Identifying Vulnerabilities (OBJ 43)
05:46 -
003 Threat Intelligence Feeds (OBJ 43)
07:12 -
004 Responsible Disclosure Programs (OBJ 43)
06:07 -
005 Analyzing Vulnerabilities (OBJ 43)_part1
05:14 -
005 Analyzing Vulnerabilities (OBJ 43)_part2
05:13 -
006 Conducting Vulnerability Scans (OBJ 43)_part1
15:42 -
006 Conducting Vulnerability Scans (OBJ 43)_part2_part1
07:51 -
006 Conducting Vulnerability Scans (OBJ 43)_part2_part2
07:51 -
007 Assessing Vulnerability Scan Results (OBJ 43)_part1
06:39 -
007 Assessing Vulnerability Scan Results (OBJ 43)_part2
06:39 -
008 Vulnerability Response and Remediation (OBJ 43)
06:05 -
009 Validating Vulnerability Remediation (OBJ 43)
05:45 -
010 Vulnerability Reporting (OBJ 43)_part1
04:41 -
010 Vulnerability Reporting (OBJ 43)_part2
04:41
23 Alerting and Monitoring
-
Download Resource Files
-
001 Alerting and Monitoring (OBJ 44)
05:37 -
002 Monitoring Resources (OBJ 44)
04:37 -
003 Alerting and Monitoring Activities (OBJ 44)_part1
06:03 -
003 Alerting and Monitoring Activities (OBJ 44)_part2
06:03 -
004 Simple Network Management Protocol (SNMP) (OBJ 44)
06:56 -
005 Security Information and Event Management (SIEM) (OBJ 44)
11:00 -
006 Data from Security Tools (OBJ 44)
05:04 -
007 Security Content Automation and Protocol (SCAP) (OBJ 44)
09:57 -
008 NetFlow and Flow Analysis
07:07 -
009 Single Pane of Glass (OBJ 44)
05:59
24 Incident Response
-
Download Resource Files
-
001 Incident Response (OBJ 48)
03:05 -
002 Incident Response Process (OBJ 48)_part1
05:33 -
002 Incident Response Process (OBJ 48)_part2
05:33 -
003 Threat Hunting (OBJ 48)
06:47 -
004 Root Cause Analysis (OBJ 48)
08:00 -
005 Incident Response Training and Testing (OBJ 48)
08:42 -
006 Digital Forensic Procedures (OBJ 48)_part1
06:36 -
006 Digital Forensic Procedures (OBJ 48)_part2
06:36 -
007 Data Collection Procedures (OBJ 48)
08:48 -
008 Disk Imaging and Analysis (OBJ 48)_part1
04:31 -
008 Disk Imaging and Analysis (OBJ 48)_part2
04:31
25 Investigating an Incident
-
Download Resource Files
-
001 Investigating an Incident (OBJ 49)_part1
01:40 -
001 Investigating an Incident (OBJ 49)_part2
01:40 -
002 Investigating with Data (OBJ 49)_part1
06:09 -
002 Investigating with Data (OBJ 49)_part2
06:08 -
003 Dashboards (OBJ 49)
04:03 -
004 Automated Reports (OBJ 49)
06:32 -
005 Vulnerability Scans (OBJ 49)
11:04 -
006 Packet Captures (OBJ 49)
08:38 -
007 Firewall Logs (OBJ 49)
06:12 -
008 Application Logs (OBJ 49)
04:02 -
009 Endpoint Logs (OBJ 49)
03:49 -
010 OS-specific Security Logs (OBJ 49)
04:00 -
011 IPSIDS Logs (OBJ 49)
05:43 -
012 Network Logs (OBJ 49)
05:34 -
013 Metadata (OBJ 49)
04:29
26 Automation and Orchestration
-
Download Resource Files
-
001 Automation and Orchestration (OBJ 47)_part1
03:18 -
001 Automation and Orchestration (OBJ 47)_part2
03:18 -
002 When to Automate and Orchestrate (OBJ 47)_part1
05:07 -
002 When to Automate and Orchestrate (OBJ 47)_part2
05:07 -
003 Benefits of Automation and Orchestratation (OBJ 47)
08:02 -
004 Automating Support Tickets (OBJ 47)
06:46 -
005 Automating Onboarding (OBJ 47)
06:57 -
006 Automating Security (OBJ 47)
04:56 -
007 Automating Application Development (OBJ 47)
09:31 -
008 Integrations and APIs (OBJ 47)_part1
06:30 -
008 Integrations and APIs (OBJ 47)_part2
06:30
27 Security Awareness
-
Download Resource Files
-
001 Security Awareness (OBJ 56)
03:48 -
002 Recognizing Insider Threats (OBJ 56)
07:29 -
003 Password Management (OBJ 56)
10:31 -
004 Avoiding Social Engineering (OBJ 56)
08:20 -
005 Policy and Handbooks (OBJ 56)
07:36 -
006 Remote and Hybrid Work Environments (OBJ 56)
07:21 -
007 Creating a Culture of Security (OBJ 56)
05:02
28 Conclusion
-
Download Resource Files
-
001 Conclusion_part1
06:26 -
001 Conclusion_part2
06:26 -
002 BONUS Where do I go from here_part1
01:53 -
002 BONUS Where do I go from here_part2
01:53
29 Practice Exam
-
Download Resource Files