Subscribe to The Knowledge Academy’s top courses
Get this course, plus 11,000+ of our top-rated courses, with Personal Plan
CompTIA Security+ Certification Course
IT Infrastructure & NetworkingGain comprehensive cybersecurity expertise through the CompTIA Security+ course, covering threat management, cryptography, network security, and incident response.
See Related CourseWhat you'll learn
-
The roles and responsibilities of information security professionals and various security controls and frameworks.
-
Types of threat actors, attack vectors, and sources of threat intelligence.
-
Techniques for conducting security assessments, vulnerability scans, and penetration tests.
-
Methods to identify and counter social engineering tactics and malware attacks.
-
Fundamental cryptographic concepts, including various ciphers and their applications.
-
How to implement and manage Public Key Infrastructure (PKI) and certificates.
-
Authentication controls, including design concepts and knowledge-based authentication mechanisms.
-
Best practices in identity and account management, including authorisation solutions.
This course includes
tv32h On-demand Video
21 sections
42 Activities
21
21
Unlock full course by purchasing this course today! Dive deeper into the content and elevate your learning experience.
Comparing Security Roles and Security Controls
42m 1s
"Security Roles & Controls Explorer"
0m 0s
Explaining Threat Actors and Threat Intelligence
55m 28s
"Threat Explorer: Image Hotspots Unveiled"
0m 0s
Performing Security Assessments
1h 53m 1s
"Security Assessments Mastery Quiz"
0m 0s
Identifying Social Engineering and Malware
43m 9s
"Security Mastery Flashcards: Social Engineering & Malware"
0m 0s
Summarising Basic Cryptographic Concepts
1h 9m 2s
"CryptoMinds Challenge: Mastering Basic Cryptographic Concepts"
0m 0s
Implementing Public Key Infrastructure
35m 16s
"PKI Lifecycle Challenge: Match and Master"
0m 0s
Implementing Authentication Controls
26m 55s
"Authentication Mastery: Visual Connections"
0m 0s
Implementing Identity and Account Management Controls
55m 57s
"Identity Mastery: Crossword Challenge on Account Management Controls"
0m 0s
Implementing Authentication Controls
1h 8m 10s
Fill in the blanks
0m 0s
Implementing Network Security Appliances
20m 4s
"Securing the Network: Appliance Implementation Journey"
0m 0s
Implementing Secure Network Protocols
36m 52s
"Protocols Unveiled: A Comparative Analysis of Secure Networks"
0m 0s
Implementing Host Security Solutions
33m 48s
"Securing the Core: A Visual Journey through Firmware, Endpoint, and Embedded System Security"
0m 0s
Implementing Secure Mobile Solutions
19m 22s
Single choice set
0m 0s
Summarising Secure Application Concepts
44m 28s
True & False
0m 0s
Implementing Secure Cloud Solutions
33m 17s
Information wall
0m 0s
Explaining Data Privacy and Protection Concepts
14m 16s
Multiple choice questions
0m 0s
Performing Incident Response
16m 52s
Find the Words
0m 0s
Explaining Digital Forensics
16m 25s
Interactive Book - Explaining Digital Forensics
0m 0s
Summarising Risk Management Concepts
9m 5s
Memory game
0m 0s
Implementing Cybersecurity Resilience
20m 5s
presentation
0m 0s
Explaining Physical Security
16m 20s
Mark the words
0m 0s
Unlock badges by purchasing this course today! Dive deeper into the content and elevate your learning experience.
Unlock certificates by purchasing this course today! Dive deeper into the content and elevate your learning experience.
FAQs
Review Summary