Start with 7 free days of training.

Gain instant access to our entire IT training library, free for your first week.
Train anytime on your desktop, tablet, or mobile devices.

The CompTIA Security+ certification is an internationally recognized validation of foundation-level security skills and knowledge. The exam will certify that the successful candidate can identify risk, participate in risk mitigation activities, and provide infrastructure, application information, and operational security. This course will prepare you for the CompTIA Security+ SY0-401 exam, including the knowledge of security controls to maintain confidentiality, integrity, and availability....
The CompTIA Security+ certification is an internationally recognized validation of foundation-level security skills and knowledge. The exam will certify that the successful candidate can identify risk, participate in risk mitigation activities, and provide infrastructure, application information, and operational security. This course will prepare you for the CompTIA Security+ SY0-401 exam, including the knowledge of security controls to maintain confidentiality, integrity, and availability.

This class is a good fit for you if you're an IT manager or CIO and want to extend your security knowledge, if you're preparing for a high-level certification such as CISSP, you're making a career change, or you're working in industries governed by HIPAA, SOX, or the office of Homeland Security.

Recommended Experience
  • Experience in IT administration with a focus on security
  • Broad knowledge of security concerns and implementation
Recommended Equipment
  • None
Related Certifications
  • CompTIA Security+ SY0-401
Related Job Functions
  • Security architect
  • Security engineer
  • Security consultant/specialist
  • Information assurance technician
  • Security administrator
  • Systems administrator
  • Network administrator
  • Penetration Tester
This exam also meets the requirements for DoD baseline certifications for IAT Level II, and IAM Level I.

Keith Barker has been a CBT Nuggets trainer since 2012 and holds a variety of certifications, including Cisco CCIE Routing and Switching, Cisco CCIE Security, Cisco CCDP, HP-MASE, Brocade BCNP, (ISC)2 CISSP, CompTIA’s Network+ and Security+, VMware VCP5-DCV, Palo Alto CNSE, Check Point CCSA.
 show less
1. Welcome and Overview (7 min)
2. Network Security Devices (34 min)
3. Security Admin Principles (29 min)
4. Network Design Security (36 min)
5. Protocols and Ports (37 min)
6. Wireless Security (28 min)
7. Control Types (25 min)
8. Risk Calculations (30 min)
9. 3rd Party Integration Risk (11 min)
10. Strategies to Reduce Risk (28 min)
11. Forensics (20 min)
12. Incident Response (11 min)
13. Security Awareness (31 min)
14. Physical and Environmental Security (25 min)
15. Risk Management (36 min)
16. The Correct Controls for CIA (39 min)
17. Malware (31 min)
18. Attack Types (51 min)
19. Social Engineering (25 min)
20. Wireless Attacks (17 min)
21. Application Attacks (31 min)
22. Mitigation and Deterrent Techniques (30 min)
23. Discovery Tools (37 min)
24. Penetration Testing (14 min)
25. App. Security Controls and Techniques (27 min)
26. Security for Mobile (20 min)
27. Host Security (26 min)
28. Data Security (25 min)
29. Static Environment Security (15 min)
30. Authentication Services & Protocols (34 min)
31. Authentication Methods (33 min)
32. Authorization Models (18 min)
33. Account Management (21 min)
34. Crypto Concepts (43 min)
35. Crypto Protocols (41 min)
36. PKI (29 min)
37. ACL Case Study (16 min)
38. NAT Case Study (12 min)
39. Layered Security Case Study (10 min)

Welcome and Overview


Hello, my name is Keith Barker. And on behalf of the entire CBT Nuggets family, welcome to Security+. Let's jump in. I wanted to chat with you, personally, just for a moment on how you and I can get the absolute most out of this course. The first secret is to schedule time so you can watch the videos.


The videos are about 30 minutes each, so it doesn't take a lot of time. The key is making some time, and then actually watching the videos. And as we go to the videos together there a lot of fun. So not only will you be learning from the videos and improving your knowledge about security, you'll also be having fun as we go through these videos together.


You and I. Let me share with you an insight regarding myself. Now I do not consider myself exceptionally bright, or super smart, or anything like that, but I'll tell you what I am-- is that I am persistent. For example, this week and there's this extension cord I was unraveling and I thought to myself, oh my goodness, how am I ever going to figure all this out?


And the answer is, you just start. And you start working at it, and working at it, and eventually you're done. And I still remember back in the early '90s when I first learned about a CCIE and I read an article about it. I thought to myself, wow, Cisco's, at the time, highest certification level.


And in the early '90s I didn't know anything about Cisco. So what I did was, I got some material together, I started studying, and then step by step by step, now I've got a couple of CCIEs. And I've done the same thing with Check Point, and Juniper, and Hewlett Packard, and other vendors in the learning their technologies is just starting off and keep on moving, just being persistent.


So together you and I can master this content. Another technique that I found very, very helpful is committing. And what I would like you to do is commit to an exam date-- the month and year when you're going to take the CompTS Security+ certification exam to become CompTS Security+ certified.


Now making a real commitment involves letting others know about it. And what I'd like you to do is let me know about it on my Facebook page. And the best way to reach me on Facebook is on my page at Keith Barker networking. And all you have to do is go to that page and say, I commit to Security+ exam, and then the month and year.


So maybe it's January, 20xx-- whatever the year's going to be. Or July of that year. And there's some power in that. When you commit publicly, and you let me know when you're taking your certification exam, it's going to add additional motivations for you to regularly make sure you watch those videos.


Now because it's a vendor neutral exam, there's got to be any specific configuration questions regarding Cisco, or Juniper, HP, or Check Point. It's getting more about applying the concepts of security to a network, or to a system. Not the literal commands to do it, but the concepts of how it would be applied or when would you use a certain technology.


For example, in this network, if we have Bob at this user PC, and Bob is connecting out to a bank web server, and Bob is using his browser. What technology might we implement that would use both asymmetrical and symmetrical keys? And which technology could leverage that type of cryptography between Bob, the end user, and the bank?


And then based on what we cover together in these videos, we can answer-- Well, we can use https. Which behind the scenes could either be SSL-- secure sockets layer,-- or it could be TLS-- transport layer security. Those are all talking about the basic concept of using asymmetrical encryption to negotiate a session key, and then kicking over to a symmetrical encryption algorithm using the session key that they established.


And that by the way, is what https, and the protocols that support it, bring to the table. So going back to the commitment part, please take a moment right now and I think to yourself-- OK, what's a reasonable time that I can have these videos done and take the certification exam?


And come up to Keith Barker Networking on Facebook, and please post a comment to commit of when you're going to take that exam. And my friend you will benefit by making that commitment. Another huge tip that we can leverage as we go through this course together, is to take notes.


Now that could be electronically, or it can be on paper. And the key is, the more senses that we used to learn the information-- we're going to use our eyes and our ears, obviously. But if we also write out our notes, that additional method is going to help us learn even better.


Sometimes I'll make a lot of notes and I'll never even go back to those notes, but I do know this-- writing out those notes has assisted me in internalizing that information and learning it that much better. And the benefit of learning the information and really knowing it has two benefits.


One primarily in a production environment, we can implement it and use those technologies to make a more secure network, a more secure system. And secondly, for those who are pursuing certification, by taking those notes and having a better recollection of the details, it's going to help in that certification environment, as well.


Another great technique that you and I can use is the concept of teaching others. Now why does this work? Well, let's say that you and I are going through a video, for example, on threats and vulnerabilities. And let's say for example, we're looking at a syn-flood attack.


And looking at the details of how that works, and why it works. And what techniques we might use to mitigate, or reduce the risk of, a syn-flood attack. Well if you and I are going through this together, and you know that you're going to turn around at dinner, or at the next break, and you're going to actually teach that to somebody else-- like a spouse, or sister, or brother, or friend, or coworker-- chances are you're going to pay more attention as we study it, because you know you 're going to have to teach it.


The second thing this is going to do for us, as you do share this with other friends and individuals, is that as you discuss the topics that we're learning together-- such as a syn-flood attack or any of the other hundreds of topics that we're going to be covering in this course together-- as you explain the concept to somebody else that may help identify for yourself some of the areas where you need to go back and maybe revisit that topic.


So it's a win-win situation when you teach somebody else. Because they'll get to learn about it, you'll reinforce those concepts in your mind, as well as help identifying where you need to go back and do a little bit more research or study to make sure that you can clearly explain that concept or topic to another person.


And the reason this all matters is because we really do, in the 21st century, we need to build a fortress of security for our systems and networks. Because it's critical for governments and businesses to have secure networks that have clearly identified the risks, and then taken the steps to mitigate those risks by putting in countermeasures.


Which is another way of saying putting in controls that help reduce the risk, or reduce the effectiveness of the threats against our networks and our systems. I had a lot of fun in putting this course together in every single Nugget. In fact I finished the last one this morning.


So it's all wrapped up and ready to go. And every video, while I was creating it, I was doing it as if I'm talking to you personally, with you in mind. So I am asking you for the opportunity for allowing me to be your tour guide and coach through this journey through the world of Security+.


And I've kept this intro fairly short, so we can get right to the content, which starts in the very next video. And until then, I hope this has been informative for you. And I'd like to thank you for viewing.

Network Security Devices

Security Admin Principles

Network Design Security

Protocols and Ports

Wireless Security

Control Types

Risk Calculations

3rd Party Integration Risk

Strategies to Reduce Risk


Incident Response

Security Awareness

Physical and Environmental Security

Risk Management

The Correct Controls for CIA


Attack Types

Social Engineering

Wireless Attacks

Application Attacks

Mitigation and Deterrent Techniques

Discovery Tools

Penetration Testing

App. Security Controls and Techniques

Security for Mobile

Host Security

Data Security

Static Environment Security

Authentication Services & Protocols

Authentication Methods

Authorization Models

Account Management

Crypto Concepts

Crypto Protocols


ACL Case Study

NAT Case Study

Layered Security Case Study

Please help us improve by sharing your feedback on training courses and videos. For customer service questions, please contact our support team. The views expressed in comments reflect those of the author and not of CBT Nuggets. We reserve the right to remove comments that do not adhere to our community standards.

comments powered by Disqus
Entry 17 hrs 39 videos


Training Features

Practice Exams
These practice tests help you review your knowledge and prepare you for exams.

Virtual Lab
Use a virtual environment to reinforce what you are learning and get hands-on experience.

Offline Training
Our iOS and Android mobile apps offer the ability to download videos and train anytime, anywhere offline.

Accountability Coaching
Develop and maintain a study plan with one-to-one assistance from coaches.

Supplemental Files
Files/materials that supplement the video training.

Speed Control
Play videos at a faster or slower pace.

Included in this course
Pick up where you left off watching a video.

Included in this course
Jot down information to refer back to at a later time.

Closed Captions
Follow what the trainers are saying with ease.
Keith Barker
Nugget trainer since 2012