Welcome to the CompTIA Security+ Certification; SY0-401. The Total Course from Mike Meyers and Total Seminars.
This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-401 Exam. The first goal of the course is to make you a good IT security tech and in the process make sure you are ready to pass the CompTIA Security+ exam. This course is over 10 hours in length containing over 80 video lectures.
The course covers all the CompTIA Security+ SY0-401 Objective Domains:
- Network Security: 20%
- Compliance and Operational Security: 18%
- Threats and Vulnerabilities: 20%
- Application, Data and Host Security: 15%
- Access Control and Identity Management: 15%
- Cryptography: 12%
Topics include:
- Risk management
- Cryptography
- Authentication and authorization
- Host, LAN, and application security
- Wireless, cloud and mobile security
- Environmental and personnel security and controls
This is a Total Security+ Course, it covers everything a good tech needs to know and prepares you to pass the CompTIA Security+ Certification exam.
Who is the target audience?
- This course is intended for anyone that is preparing for an IT Security position or looking to improve their security skills and become CompTIA Security+ Certified. However, it goes beyond that and will give you the skills you need to be a better security tech on the job
- Basic familiarity with PCs and networks
- There are no specific prerequisites as the course covers all the topics in detail
- It is a good idea to have an understanding of CompTIA A+ and Network+ or to be certified in these topics. You can learn more about these certifications from our Mike Meyers – Total Seminars CompTIA A+ and Network+ Certification courses on Simpliv
- This is a complete and comprehensive CompTIA Security+ Certification; SY0-401 course. It is designed to prepare the student to be able to take and pass the exam to become CompTIA Security+ Certified
- Once you complete the course you will have the knowledge and confidence to pass the CompTIA exam AND the skills to be a great IT security tech. This course is ideal as both a study tool and an on-the-job reference
- Your new skills and the CompTIA Security+ Certification will help you land a great It security tech job or if you are already a security tech, get that raise or advancement you are after
In this introduction to the CompTIA Security+ exam, Mike explains what the exam is all about and the focus of IT security.
Download the CompTIA Security+ objectives attached to this lecture.
In this episode, Mike describes the CompTIA Security+ exam objectives and explains in broad terms what is covered in each of them.
In this episode, Mike outlines a study strategy for success on the CompTIA Security+ exam.
In this episode, Mike discusses the CIA goals of security: confidentiality, integrity, and availability.
In this episode, Mike explains the concept of security governance: policies, standards, and procedures.
In this episode, Mike explains how hashing can improve message security.
In this episode, Mike describes encrypting and decrypting data with the same key.
In this episode, Mike shows that encrypting and decrypting can be done with different keys.
In this episode, Mike looks at Internet processes that have built-in encryption.
In this episode Mike explains certificates and how they are used to establish trust.
In this episode, Mike discusses the public key infrastructure (PKI), used to enable commerce and other secure activities over the Internet.
In this episode, Mike explains the issues of proving that you are who you are.
In this episode, Mike explores methods used for authorization, enabling clients to do stuff with resources properly.
In this episode, Mike discusses common protocols used to identify proper users, such as PAP, CHAP, Kerberos, LDAP, and more.
In this episode, Mike looks at how to control access to files in a Linux system.
In this episode, Mike describes how to log in to one computer and gain access to many.
In this episode, Mike explains how encrypted information is at risk and explores ways to protect it.
In this episode, Mike shows attacks where bad actors function between encrypting hosts.
In this episode, Mike discusses attacks that prevents servers from providing their essential services.
In this episode, Mike talks about techniques to protect a host computer from threats.
In this episode, Mike reviews common applications, protocols, and port numbers.
In this episode, Mike presents the elements of Transport Layer Security.
In this episode, Mike discusses secure methods to save and access data on a network device.
In this episode, Mike explores using multiple disks to improve reliability and performance.
In this episode, Mike explains how to ensure that stored data is safe from physical loss.
In this episode, Mike looks at the impact, benefits, and downsides of encrypting stored data.
In this episode, Mike looks at network-aware devices, appliances, and industrial systems.
In this episode, Mike addresses the difference between detecting network intruders and preventing intrusions.
In this episode Mike talks about WEP wireless security attacks and methods for cracking WEP passwords.
In this episode Mike talks about WPA and WPA2 wireless security attachs and methods for cracking WPA passwords.
In this episode Mike talks about WPS wireless security attacks and methods for cracking WPS passwords.
In this episode, Mike discusses types and the importance third-party agreements and how they affect IT security
In this episode, Mike explores devices and purposes involved in IaaS.
In this episode, Mike describes the purpose of devices used to set up PaaS infrastructures.
In this episode, Mike delves into the opposing forces of corporate and personal use of mobile devices.
In this episode, Mike goes through the various device and application level management that can take place on mobile devices
In this episode, Mike explores many aspects of attacks designed to use people to exploit resources.
In this episode, Mike describes specific attack vectors and potentials that manipulate people and circumstances to access or destroy information.
In this episode, Mike goes through the controls and roles that make security training work.
In this episode, Mike delves into the world of vulnerability tools and how they work.
In this episode, Mike discusses the importance of and what takes place during vulnerability assessments.
In this episode, Mike clues us in on how to properly collect and preserve data when incidents happen or legal inquiries are made.
In this episode, Mike explains the thought processes necessary to create an effective contingency plan.

Best online course at Simpliv i have found! The course was excellent, I have gained a lot of knowledge and the instructor was excellent. I loved this course and everything is very applicable to my every day work. I would recommend this course to anyone IT team!!!