CompTIA Security+ SY0-401

by Keith Barker

Total Videos : 36 Course Duration: 16:51:32
1. Welcome and Overview (00:07:00)
2. Network Security Devices (00:34:53)
3. Security Admin Principles (00:29:11)
4. Network Design Security (00:36:21)
5. Protocols and Ports (00:36:51)
6. Wireless Security (00:28:48)
7. Control Types (00:25:28)
8. Risk Calculations (00:30:58)
9. 3rd Party Integration Risk (00:11:23)
10. Strategies to Reduce Risk (00:28:17)
11. Forensics (00:20:09)
12. Incident Response (00:11:58)
13. Security Awareness (00:31:08)
14. Physical and Environmental Security (00:25:04)
15. Risk Management (00:36:29)
16. The Correct Controls for CIA (00:39:23)
17. Malware (00:31:48)
18. Attack Types (00:51:24)
19. Social Engineering (00:25:31)
20. Wireless Attacks (00:17:17)
21. Application Attacks (00:31:39)
22. Mitigation and Deterrent Techniques (00:30:23)
23. Discovery Tools (00:37:20)
24. Penetration Testing (00:14:54)
25. App. Security Controls and Techniques (00:27:07)
26. Security for Mobile (00:20:00)
27. Host Security (00:26:02)
28. Data Security (00:25:52)
29. Static Environment Security (00:15:19)
30. Authentication Services & Protocols (00:34:48)
31. Authentication Methods (00:33:45)
32. Authorization Models (00:18:54)
33. Account Management (00:21:23)
34. Crypto Concepts (00:43:44)
35. Crypto Protocols (00:41:26)
36. PKI (00:29:35)
The CompTIA Security+ certification is an internationally recognized validation of foundation-level security skills and knowledge. The exam will certify that the successful candidate can identify risk, participate in risk mitigation activities, and provide infrastructure, application information and operational security. This course will prepare you for this certification including the knowledge of security controls to maintain confidentiality, integrity and availability.

Recommended skills:
  • Experience in IT administration with a focus on security
  • Broad knowledge of security concerns and implementation

Recommended equipment:
  • None

Related certifications:
  • CompTIA Security+ SY0-401

Related job functions:
  • Security architect
  • Security engineer
  • Security consultant/specialist
  • Information assurance technician
  • Security administrator
  • Systems administrator
  • Network administrator
  • Penetration Tester

If you're looking for a solid foundation in network security, this Security+ video training is for you!

It's also for you if you're an IT manager or CIO and want to extend your security knowledge, if you're preparing for a high-level certification such as CISSP, you're making a career change, or you're working in industries governed by HIPAA, SOX, or the office of Homeland Security.

Corporations often have trouble finding qualified applicants to fill their security positions. This training, which maps to CompTIA's Security+ exam, separates you from the crowd and increases your value to any employer.

Convincing your IT manager that the network is secure (and then following up with the skills to ensure that security) translates into job security.

This course prepares the candidate for the requirements of the current SYO-401 certification exam.

Welcome and Overview

00:00:00 - Hello, my name is Keith Barker.
00:00:02 - And on behalf of the entire CBT Nuggets family,
00:00:05 - welcome to Security+.
00:00:07 - Let's jump in.
00:00:08 - I wanted to chat with you, personally,
00:00:10 - just for a moment on how you and I can get the absolute most out
00:00:13 - of this course.
00:00:14 - The first secret is to schedule time
00:00:17 - so you can watch the videos.
00:00:18 - The videos are about 30 minutes each,
00:00:20 - so it doesn't take a lot of time.
00:00:22 - The key is making some time, and then
00:00:24 - actually watching the videos.
00:00:26 - And as we go to the videos together there a lot of fun.
00:00:29 - So not only will you be learning from the videos
00:00:31 - and improving your knowledge about security,
00:00:33 - you'll also be having fun as we go through these videos
00:00:35 - together.
00:00:36 - You and I.
00:00:37 - Let me share with you an insight regarding myself.
00:00:40 - Now I do not consider myself exceptionally bright, or super
00:00:43 - smart, or anything like that, but I'll
00:00:44 - tell you what I am-- is that I am persistent.
00:00:47 - For example, this week and there's
00:00:49 - this extension cord I was unraveling
00:00:50 - and I thought to myself, oh my goodness,
00:00:52 - how am I ever going to figure all this out?
00:00:54 - And the answer is, you just start.
00:00:56 - And you start working at it, and working at it,
00:00:58 - and eventually you're done.
00:01:01 - And I still remember back in the early '90s
00:01:03 - when I first learned about a CCIE
00:01:05 - and I read an article about it.
00:01:07 - I thought to myself, wow, Cisco's, at the time, highest
00:01:10 - certification level.
00:01:11 - And in the early '90s I didn't know anything about Cisco.
00:01:14 - So what I did was, I got some material together,
00:01:16 - I started studying, and then step by step by step,
00:01:19 - now I've got a couple of CCIEs.
00:01:21 - And I've done the same thing with Check Point, and Juniper,
00:01:23 - and Hewlett Packard, and other vendors
00:01:25 - in the learning their technologies is just starting
00:01:28 - off and keep on moving, just being persistent.
00:01:30 - So together you and I can master this content.
00:01:34 - Another technique that I found very, very helpful
00:01:36 - is committing.
00:01:37 - And what I would like you to do is commit to an exam date--
00:01:39 - the month and year when you're going to take the CompTS
00:01:43 - Security+ certification exam to become CompTS Security+
00:01:46 - certified.
00:01:47 - Now making a real commitment involves
00:01:49 - letting others know about it.
00:01:50 - And what I'd like you to do is let
00:01:52 - me know about it on my Facebook page.
00:01:54 - And the best way to reach me on Facebook
00:01:56 - is on my page at Keith Barker networking.
00:01:59 - And all you have to do is go to that page and say,
00:02:01 - I commit to Security+ exam, and then the month and year.
00:02:05 - So maybe it's January, 20xx-- whatever
00:02:09 - the year's going to be.
00:02:10 - Or July of that year.
00:02:12 - And there's some power in that.
00:02:14 - When you commit publicly, and you
00:02:15 - let me know when you're taking your certification exam,
00:02:18 - it's going to add additional motivations for you
00:02:20 - to regularly make sure you watch those videos.
00:02:22 - Now because it's a vendor neutral exam,
00:02:25 - there's got to be any specific configuration
00:02:27 - questions regarding Cisco, or Juniper, HP, or Check Point.
00:02:31 - It's getting more about applying the concepts of security
00:02:34 - to a network, or to a system.
00:02:36 - Not the literal commands to do it,
00:02:37 - but the concepts of how it would be applied or when would
00:02:40 - you use a certain technology.
00:02:41 - For example, in this network, if we have Bob at this user PC,
00:02:45 - and Bob is connecting out to a bank web server,
00:02:48 - and Bob is using his browser.
00:02:49 - What technology might we implement
00:02:51 - that would use both asymmetrical and symmetrical keys?
00:02:56 - And which technology could leverage
00:02:58 - that type of cryptography between Bob, the end
00:03:00 - user, and the bank?
00:03:01 - And then based on what we cover together in these videos,
00:03:03 - we can answer-- Well, we can use https.
00:03:06 - Which behind the scenes could either be SSL--
00:03:08 - secure sockets layer,-- or it could be TLS--
00:03:11 - transport layer security.
00:03:12 - Those are all talking about the basic concept
00:03:14 - of using asymmetrical encryption to negotiate a session key,
00:03:18 - and then kicking over to a symmetrical encryption
00:03:20 - algorithm using the session key that they established.
00:03:23 - And that by the way, is what https, and the protocols that
00:03:26 - support it, bring to the table.
00:03:28 - So going back to the commitment part,
00:03:29 - please take a moment right now and I think to yourself-- OK,
00:03:32 - what's a reasonable time that I can have these videos done
00:03:35 - and take the certification exam?
00:03:37 - And come up to Keith Barker Networking on Facebook,
00:03:39 - and please post a comment to commit
00:03:41 - of when you're going to take that exam.
00:03:43 - And my friend you will benefit by making that commitment.
00:03:47 - Another huge tip that we can leverage
00:03:49 - as we go through this course together, is to take notes.
00:03:52 - Now that could be electronically,
00:03:53 - or it can be on paper.
00:03:55 - And the key is, the more senses that we
00:03:57 - used to learn the information-- we're
00:03:59 - going to use our eyes and our ears, obviously.
00:04:01 - But if we also write out our notes,
00:04:03 - that additional method is going to help us learn even better.
00:04:06 - Sometimes I'll make a lot of notes
00:04:08 - and I'll never even go back to those notes,
00:04:10 - but I do know this-- writing out those notes
00:04:12 - has assisted me in internalizing that information
00:04:15 - and learning it that much better.
00:04:16 - And the benefit of learning the information
00:04:18 - and really knowing it has two benefits.
00:04:20 - One primarily in a production environment,
00:04:23 - we can implement it and use those technologies
00:04:26 - to make a more secure network, a more secure system.
00:04:29 - And secondly, for those who are pursuing certification,
00:04:32 - by taking those notes and having a better
00:04:34 - recollection of the details, it's
00:04:36 - going to help in that certification environment,
00:04:38 - as well.
00:04:39 - Another great technique that you and I can use
00:04:41 - is the concept of teaching others.
00:04:43 - Now why does this work?
00:04:44 - Well, let's say that you and I are
00:04:45 - going through a video, for example,
00:04:47 - on threats and vulnerabilities.
00:04:49 - And let's say for example, we're looking at a syn-flood attack.
00:04:52 - And looking at the details of how that works,
00:04:54 - and why it works.
00:04:55 - And what techniques we might use to mitigate, or reduce
00:04:58 - the risk of, a syn-flood attack.
00:05:00 - Well if you and I are going through this together,
00:05:02 - and you know that you're going to turn around
00:05:04 - at dinner, or at the next break, and you're
00:05:06 - going to actually teach that to somebody
00:05:08 - else-- like a spouse, or sister, or brother, or friend,
00:05:11 - or coworker-- chances are you're going
00:05:13 - to pay more attention as we study it,
00:05:16 - because you know you 're going to have to teach it.
00:05:18 - The second thing this is going to do for us,
00:05:20 - as you do share this with other friends and individuals,
00:05:23 - is that as you discuss the topics that we're
00:05:25 - learning together-- such as a syn-flood attack or any
00:05:28 - of the other hundreds of topics that we're
00:05:30 - going to be covering in this course
00:05:31 - together-- as you explain the concept to somebody else that
00:05:34 - may help identify for yourself some of the areas
00:05:37 - where you need to go back and maybe revisit that topic.
00:05:40 - So it's a win-win situation when you teach somebody else.
00:05:46 - Because they'll get to learn about it,
00:05:48 - you'll reinforce those concepts in your mind,
00:05:50 - as well as help identifying where
00:05:52 - you need to go back and do a little bit more research
00:05:54 - or study to make sure that you can clearly explain
00:05:57 - that concept or topic to another person.
00:05:59 - And the reason this all matters is because we really
00:06:02 - do, in the 21st century, we need to build a fortress of security
00:06:06 - for our systems and networks.
00:06:08 - Because it's critical for governments and businesses
00:06:11 - to have secure networks that have clearly
00:06:13 - identified the risks, and then taken the steps
00:06:16 - to mitigate those risks by putting in countermeasures.
00:06:19 - Which is another way of saying putting in controls that
00:06:22 - help reduce the risk, or reduce the effectiveness
00:06:25 - of the threats against our networks and our systems.
00:06:28 - I had a lot of fun in putting this course together
00:06:30 - in every single Nugget.
00:06:31 - In fact I finished the last one this morning.
00:06:33 - So it's all wrapped up and ready to go.
00:06:35 - And every video, while I was creating it,
00:06:37 - I was doing it as if I'm talking to you personally,
00:06:40 - with you in mind.
00:06:42 - So I am asking you for the opportunity for allowing me
00:06:45 - to be your tour guide and coach through this journey through
00:06:48 - the world of Security+.
00:06:49 - And I've kept this intro fairly short,
00:06:51 - so we can get right to the content, which
00:06:53 - starts in the very next video.
00:06:55 - And until then, I hope this has been informative for you.
00:06:58 - And I'd like to thank you for viewing.

Network Security Devices

Security Admin Principles

Network Design Security

Protocols and Ports

Wireless Security

Control Types

Risk Calculations

3rd Party Integration Risk

Strategies to Reduce Risk


Incident Response

Security Awareness

Physical and Environmental Security

Risk Management

The Correct Controls for CIA


Attack Types

Social Engineering

Wireless Attacks

Application Attacks

Mitigation and Deterrent Techniques

Discovery Tools

Penetration Testing

App. Security Controls and Techniques

Security for Mobile

Host Security

Data Security

Static Environment Security

Authentication Services & Protocols

Authentication Methods

Authorization Models

Account Management

Crypto Concepts

Crypto Protocols


Please help us improve by sharing your feedback on training courses and videos. For customer service questions, please contact our support team. The views expressed in comments reflect those of the author and not of CBT Nuggets. We reserve the right to remove comments that do not adhere to our community standards.

comments powered by Disqus
Keith Barker

Keith Barker

CBT Nuggets Trainer

Cisco CCIE Routing and Switching, Cisco CCIE Security, Cisco CCDP, HP-MASE, Brocade BCNP, (ISC)2 CISSSP, CompTIA’s Network+ and Security+, VMware VCP5-DCV, Palo Alto CNSE, Check Point CCSA

Area Of Expertise:
Cisco, security, networking, bitcoin. Author or coauthor of: CCNA Security 640-554 Official Cert Guide; CCNP Security IPS 642-627 Official Cert Guide; CCNA Security 640-554 Official Cert Guide, and many more.

Course Features

Speed Control

Play videos at a faster or slower pace.


Pick up where you left off watching a video.


Jot down information to refer back to at a later time.

Closed Captions

Follow what the trainers are saying with ease.


Files/materials that supplement the video training

Premium Features

Transcender® Practice Exams

These practice tests help you review your knowledge and prepare you for exams.

Offline Training

Our mobile apps offer the ability to download videos and train anytime, anywhere offline.

Accountability Coaching

Develop and maintain a study plan with assistance from coaches.


Stay Connected

Get the latest updates on the subjects you choose.

  © 2015 CBT Nuggets. All rights reserved. Licensing Agreement | Billing Agreement | Privacy Policy | RSS