CompTIA Complete Cybersecurity Career Pathway Bundle with Labs

Prepare for CompTIA Certifications

With the increase in cyberattacks and the number of new connected devices, the need for skilled cybersecurity professionals is growing at a rapid pace. In fact, the U.S. Bureau of Labor Statistics predicts that the number of information security jobs will increase 18 percent from 2014 to 2024, making it one of the fastest-growing fields. Employers, from government to Fortune 500 companies, value CompTIA as an authority in cybersecurity certifications.

A vector image of cybersecurity icons with people sitting on them.

Job Outlook for Computer Support Specialists

According the Bureau of Labor Statistics the employment of computer support specialists is expected to grow 8% during the next few years, which equals 67,300 new jobs.

The BLS also states that the average salary for these developers is just under $65,000 per year with top earners making more than $110,000.

Course Objectives

Configure and use threat detection tools

Perform data analysis

Interpret the results to identify vulnerabilities, threats and risks to an organization

Prepare to sit for the CompTIA A+ Certification (Exams 220-1001 & 220-1002) exam

Prepare to sit for the CompTIA Network+ Certification (Exam N10-007) exam

Prepare to sit for the CompTIA Security+ Certification (Exam SYO-501) exam

Prepare to sit for the CompTIA Advanced Security Practitioner (CASP) exam

Prerequisites and Requirements

There are no prerequisites to take this course.

This course can be taken on either a PC or Mac.

Instructor

Brandon Smith

  • CompTIA FC0-U61: IT Fundamentals

    Module 1 - IT Concepts and Terminology

    • 0.1 Instructor Intro
    • 1.1 Compare and Contrast Notational Systems
    • 1.1 Compare and Contrast Notational Systems Demo
    • 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
    • 1.3 Illustrate the Basics of Computing and Processing
    • 1.4 Explain the Value of Data and Information
    • 1.5 Compare and Contrast Common Units of Measure
    • 1.5 Compare and Contrast Common Units of Measure Demo
    • 1.6 Explain the Troubleshooting Methodology

    Module 2 - Infrastructure

    • 2.1 Classify Common Types of Input-Output Devices Interfaces
    • 2.2 Given a Scenario, Set Up & Install Common Peripheral Devices to a PC
    • 2.2 Given a Scenario, Set Up & Install Common Peripheral Devices to a PC Demo
    • 2.3 Explain the Purpose of Common Internal Computing Components
    • 2.4 Compare & Contrast Common Internet Service Types-
    • 2.5 Compare & Contrast Storage Types
    • 2.6 Compare & Contrast Common Computing Devices & Their Purposes
    • 2.7 Explain Basic Networking Concepts
    • 2.7 Explain Basic Networking Concepts Part 2
    • 2.7 Explain Basic Networking Concepts Part 3
    • 2.7 Explain Basic Networking Concepts Part 4
    • 2.7 Explain Basic Networking Concepts Part 5
    • 2.8 Given a Scenario Install, Configure, & Service a Basic Wireless Network
    • 2.8 Given a Scenario Install, Configure, & Service a Basic Wireless Network Demo

    Module 3 - Applications and Software

    • 3.1 Explain the Purpose of Operating Systems
    • 3.1 Explain the Purpose of Operating Systems Demo
    • 3.2 Compare & Contrast Components of an Operating System
    • 3.2 Compare & Contrast Components of an Operating System Demo
    • 3.3 Explain the Purpose & Proper Use of Software
    • 3.4 Explain Methods of Application Architecture & Delivery Models
    • 3.5 Given a Scenario Configure & Use Web Browsers
    • 3.5 Given a Scenario Configure & Use Web Browsers FireFox
    • 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
    • 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
    • 3.6 Compare & Contrast General Application Concepts & Uses

    Module 4 - Software Development  

    • 4.1 Compare & Contrast Programming Language Categories-
    • 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
    • 4.3 Explain the Purpose & Use of Programming Concepts-
    • 4.3 HTML Demo

    Module 5 - Database Fundamentals

    • 5.1 Explain Database Concepts and the Purpose of Databases
    • 5.2 Compare and Contrast Various Database Structures
    • 5.3 Summarize Methods Used to Interface with Databases
    • 5.3 Summarize Methods Used to Interface with Databases Demo

    Module 6 - Security

    • 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
    • 6.2 Explain Methods to Secure Devices and Best Practices
    • 6.3 Summarize Behavioral Security Concepts
    • 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
    • 6.5 Explain Password Best Practices
    • 6.6 Explain Common Uses of Encryption
    • 6.7 Explain Business Continuity Concepts
    • 6.8 Takeaways
    • 6.9 ITF Fundamentals Conclusion

     

    CompTIA A+ 220-1001 (Core 1) and CompTIA A+ 220-1002 (Core 2)

    220-1001 Module 1 - Mobile Devices

    • 0.1 Intro to A+ Core 1 Instructor
    • 1.0 CompTIA A+ Course Intro
    • 1.1 Mobile Devices Part 1
    • 1.1 Mobile Devices Part 2
    • 1.1 Mobile Devices Part 3
    • 1.2 Installing Components in Laptop
    • 1.3 Laptop Features Part 1
    • 1.3 Laptop Features Part 2
    • 1.4 Compare and Contrast Types of Mobile Devices
    • 1.5 Accessories and Ports of Other Mobile Devices Part 1
    • 1.5 Accessories and Ports of Other Mobile Devices Part 2
    • 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
    • 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
    • 1.7 Use Methods to Perform Mobile Device Synchronization
    • 1.8 Laptop Disassemble and Assemble

    220-1001 Module 2 - Networking

    • 2.1 Networking Part 1
    • 2.1 Networking Part 2
    • 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
    • 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
    • 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
    • 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
    • 2.3 Setting up a Wireless Router
    • 2.4 Compare and Contrast Wireless Networking Protocols
    • 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
    • 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
    • 2.6 Explain Common Network Configuration Concepts Part 1
    • 2.6 Explain Common Network Configuration Concepts Part 2
    • 2.7 Compare and Contrast Internet Connection Types Network Types and Features
    • 2.8 Given a Scenario Using Appropriate Networking Tools

    220-1001 Module 3 - Hardware

    • 3.1 Hardware Part 1
    • 3.1 Hardware Part 2
    • 3.1 Hardware Part 3
    • 3.2 Identify Common Connector Types

     

    CompTIA N10-007: CompTIA Network+

    Module 1: Networking Concepts

    1. Intro Network Plus N10 007
    2. Basic Networking
    3. Activity Basic Networking
    4. OSI Model
    5. Exploring the OSI Model- Act
    6. Protocol and Ports
    7. Activity Examining Protocols and Ports
    8. Connection-oriented vs. connectionless
    9. Activity Comparing TCP and UDP
    10. Internet Protocol (IP)
    11. Activity Examining the Lower Layer Protocols
    12. Layer 7 Remote Control Protocols
    13. Layer 7 File Transfer Protocols
    14. Layer 7 Messaging Protocols
    15. Activity Examining Messaging Protocols
    16. Layer 7 Web Traffic Protocols
    17. Layer 7 Streaming Media Protocols
    18. Layer 7 Infrastructure Management Protocols
    19. Switching
    20. Activity Creating Collision and Broadcast Domains
    21. Interface Properties and Segmentation
    22. Activity Creating a Basic Network Segment
    23. Switching prt 2
    24. Activity Switching
    25. Switching Loop Management
    26. Activity Managing Switching Loops
    27. VLANs
    28. Activity Creating VLANs
    29. Routing
    30. Activity Examining ARP
    31. IP Addressing Basics
    32. Activity Configuring IP
    33. Routers
    34. Activity Setting Up a Router
    35. Routing Basics
    36. Activity Adding Static Routes
    37. VLAN Routing
    38. Activity Routing Between VLANs
    39. NAT/PAT
    40. Activity Configuring NAT/PAT
    41. Routing Protocols
    42. Activity Configuring a Routing Protocol
    43. Firewalls
    44. Activity Configuring Firewalls
    45. Advanced Switching and Routing Concepts
    46. Activity Exploring IPv6
    47. Performance Concepts
    48. IP Addressing
    49. Subnetting
    50. Activity Learning to Subnet
    51. Address Assignments
    52. Network Types and Topologies
    53. Wireless Topologies
    54. Network Types
    55. Technologies that Facilitate the Internet of Things (IoT)
    56. Wireless Technologies
    57. 802.11 Standards
    58. Wi-Fi Frequencies
    59. Wi-Fi Antenna Concepts
    60. Bluetooth
    61. Cellular
    62. Activity Using an RF Spectrum Analyzer
    63. Cloud Concepts
    64. Activity Exploring Cloud Services
    65. Network Services
    66. Activity Setting up DNS
    67. DHCP Service
    68. Activity Setting Up DHCP
    69. NTP

    Module 2: Infrastructure

    1. Activity Testing a Fiber Optic Cable
    2. Plenum vs. PVC
    3. Activity Crimping on an RJ-45 Connector
    4. Transceivers
    5. Activity Terminating Cable to a 110 Block
    6. Copper Cable Standards
    7. Activity Creating a Crossover Cable
    8. Ethernet Deployment Standards
    9. Network Device Placement and Installation
    10. Repeater
    11. Router
    12. Modem
    13. Activity Setting up a WAP
    14. Firewall
    15. Media Converter
    16. Advanced Network Devices
    17. Wireless Controller
    18. Proxy Server
    19. Activity Configuring Proxy Settings
    20. VPN Concentrator
    21. Virtual Networking Components
    22. Network Storage Types
    23. WAN Technologies
    24. Transmission Mediums
    25. Activity Configuring WAN Links
    26. Termination

    Module 3: Network Operation

    1. Change Management
    2. IDF-MDF Documentation
    3. Labeling
    4. Logical vs Physical Diagrams
    5. Network Operations Documentation
    6. Rack Diagrams
    7. Standard Operation Procedures
    8. Using Documentation Act
    9. Wiring and Ports Locations
    10. Continuity and Disaster
    11. MTTR Mean Time Repair
    12. Recovery
    13. Backing Up Your Data Act
    14. Event Management
    15. Metrics
    16. Scanning Monitoring Patching
    17. Testing the Network Act
    18. HTTPS-Management
    19. Out-of-Band Management
    20. RDP
    21. Remote Access Methods
    22. Remote File Access
    23. Making Remote Connections Act
    24. SSH
    25. VNC
    26. Policies and Best Practices
    27. Creating Policies and Procedures Act

    Module 4: Network Security

    1. Physical Security Devices
    2. Examining Security Devices Act
    3. Authentication and Access
    4. Access Controls Methods Act
    5. Multifactor Authentication
    6. Basic Wireless Network Security
    7. Demonstrating the Need for Wireless Act
    8. Common Network Attacks
    9. Conducting a Phishing Campaign Act
    10. Network Device Hardening
    11. Supporting Secure Authentication Encryption Act
    12. Updating Firmware
    13. Explain Common Mitigation Techniques
    14. Implementing a Honey Pot Act

    Module 5: Network Troubleshooting and Tools

    1. Network Troubleshoot
    2. Hardware Tools Analyzers
    3. Troubleshooting with Hardware Tools Act
    4. Software Tools Command Line
    5. Troubleshooting with Command Line Tools Act
    6. Software Tools
    7. Troubleshooting with Software Tools Act
    8. Using the Appropriate Tools
    9. Physical Issues
    10. Traffic Flow Issues
    11. Transceiver Issues
    12. Troubleshoot Common Wired Connectivity
    13. Troubleshooting Signal Problems
    14. Troubleshooting Transceiver Problems
    15. Incorrect WAP Types
    16. Latency and Jitter
    17. Troubleshoot Common Wireless Connectivity
    18. Troubleshooting WAP Issues
    19. Advanced Network Issues
    20. Case Study Troubleshooting
    21. DHCP Issues
    22. 22. Firewall ACL Issues
    23. 23. Troubleshooting Common Network
    24. 24. Unresponsive Services
    25. 25. Outro N10 007

     

    CompTIA SY0-501: Security+

    Module 1 - Threats, Attacks, and Vulnerabilities
            1.1 Introduction
            1.2 Types of Malware - Part 1
            1.3 Types of Malware - Part 2
            1.4 Types of Attacks - Part 1
            1.5 Types of Attacks - Part 2
            1.6 Types of Attacks - Part 3
            1.7 Types of Attacks - Part 4
            1.8 Types of Attacks - Part 5
            1.9 Threat Actors - Part 1
            1.10 Threat Actors - Part 2
            1.11 Penetration Testing and Vulnerability Scanning - Part 1
            1.12 Penetration Testing and Vulnerability Scanning - Part 2
            1.13 Impact of Vulnerabilities - Part 1
            1.14 Impact of Vulnerabilities - Part 2
    Module 2 - Technologies and Tools
            2.1 Networking Hardware and Software - Part 1
            2.2 Networking Hardware and Software - Part 2
            2.3 Networking Hardware and Software - Part 3
            2.4 Networking Hardware and Software - Part 4
            2.5 Networking Hardware and Software - Part 5
            2.6 Networking Hardware and Software - Part 6
            2.7 Security Assessment - Part 1
            2.8 Security Assessment - Part 2
            2.9 Troubleshooting Issues - Part 1
            2.10 Troubleshooting Issues - Part 2
            2.11 Securing Mobile Devices - Part 1
            2.12 Securing Mobile Devices - Part 2

     

    CompTIA Cybersecurity Analyst (CSA+)

    Module 1: Threat Management

    • 1.1 Introduction
    • 1.2 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 1
    • 1.3 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 2
    • 1.4 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 3
    • 1.5 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 4
    • 1.6 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 5
    • 1.7 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 6
    • 1.8 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 7
    • 1.9 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 8
    • 1.10 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 9
    • 1.11 Given a scenario, analyze the results of a network reconnaissance - Part 1
    • 1.12 Given a scenario, analyze the results of a network reconnaissance - Part 2
    • 1.13 Given a scenario, analyze the results of a network reconnaissance - Part 3
    • 1.14 Given a scenario, analyze the results of a network reconnaissance - Part 4
    • 1.15 Given a scenario, analyze the results of a network reconnaissance - Part 5
    • 1.16 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 1
    • 1.17 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 2
    • 1.18 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 3
    • 1.19 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 4
    • 1.20 Explain the purpose of practices used to secure a corporate environment - Part 1

     

    CompTIA CAS-001: Advanced Security Practitioner (CASP)

    Module 1: Underlying Security Models

    • 1.0 Course Guide
    • 1.1 Underlying Security Models Part 1
    • 1.2 Underlying Security Models Part 2
    • 1.3 Underlying Security Models Part 3
    • 1.4 Underlying Security Models Part 4
    • 1.5 Underlying Security Models Part 5
    • 1.6 Underlying Security Models Part 6
    • 1.7 Underlying Security Models Part 7
    • 1.8 General Security Part 1
    • 1.9 General Security Part 2

    Module 2: Selecting Security

    • 2.0 Selecting Security Products Part 1
    • 2.1 Selecting Security Products Part 2
    • 2.2 Selecting Security Products Part 3
    • 2.3 Control Selection Process Part 1
    • 2.4 Control Selection Process Part 2

    Module 3: Cryptography

    • 3.0 Cryptography Symmetric and Asymmetric Part 1
    • 3.1 Cryptography Symmetric and Asymmetric Part 2
    • 3.2 Cryptography Symmetric and Asymmetric Part 3
    • 3.3 Cryptography Symmetric and Asymmetric Part 4
    • 3.4 Cryptography Message Integrity Controls Part 1
    • 3.5 Cryptography Message Integrity Controls Part 2
    • 3.6 Cryptography Message Integrity Controls Part 3
    • 3.7 Cryptography Digital Signatures Part 1
    • 3.8 Cryptography Digital Signatures Part 2
    • 3.9 Cryptography PKI and PGP Part 1
    • 3.10 Cryptography PKI and PGP Part 2
    • 3.11 Cryptography PKI and PGP Part 3
    • 3.12 Cryptography PKI and PGP Part 4

    Module 4: Storage

    • 4.0 Storage Part 1
    • 4.1 Storage Part 2
    • 4.2 Storage Part 3
    • 4.3 Storage Part 4

    Module 5: Virtual Computing

    • 5.0 Virtual Computing
    • 5.1 Cloud Computing Part 1
    • 5.2 Cloud Computing Part 2
    • 5.3 Cloud Computing Part 3
    • 5.4 Cloud Computing Part 4
    • 5.5 Cloud Computing Part 5

    Module 6: IPv6

    • 6.0 IPV6 Part 1
    • 6.1 IPV6 Part 2

    Module 7: Remote Access Security

    • 7.0 Remote Access Security Part 1
    • 7.1 Remote Access Security Part 2

    Module 8: Domain Name System

    • 8.0 Domain Name System Part 1
    • 8.1 Domain Name System Part 2
    • 8.2 Domain Name System Part 3
    • 8.3 Domain Name System Part 4
    • 8.4 Domain Name System Part 5
    • 8.5 Domain Name System Part 6
    • 8.6 Domain Name System Part 7
    • 8.7 Domain Name System Part 8

    Module 9: Directory Services

    • 9.0 Directory Services

    Module 10: Firewall and VPN

    • 10.0 Firewall and VPN Part 1
    • 10.1 Firewall and VPN Part 2
    • 10.2 Firewall and VPN Part 3
    • 10.3 Firewall and VPN Part 4
    • 10.4 Firewall Policy Part 1
    • 10.5 Firewall Policy Part 2
    • 10.6 Firewall Policy Part 3
    • 10.7 Firewall Policy Part 4

    Module 11: Security Configuration Management

    • 11.0 Security Configuration Management Part 1
    • 11.1 Security Configuration Management Part 2
    • 11.2 Security Configuration Management Part 3

    Module 12: Network Infrastructure Security

    • 12.0 Network Infrastructure Security Part 1
    • 12.1 Network Infrastructure Security Part 2
    • 12.2 Network Infrastructure Security Part 3
    • 12.3 Network Infrastructure Security Part 4

    Module 13: Secure Web Services

    • 13.0 Secure Web Services Part 1
    • 13.1 Secure Web Services Part 2
    • 13.2 OWASP top Ten Part 1
    • 13.3 OWASP top Ten Part 2
    • 13.4 OWASP top Ten Part 3
    • 13.5 OWASP top Ten Part 4
    • 13.6 OWASP top Ten Part 5

    Module 14: Buffer Overflows

    • 14.0 Buffer Overflows Part 1
    • 14.1 Buffer Overflows Part 2

    Module 15: SQL Injection

    • 15.0 SQL Injection Part 1
    • 15.1 SQL Injection Part 2

    Module 16: Access Control

    • 16.0 Access Control Part 1
    • 16.1 Access Control Part 2

    Module 17: Single Sign-On

    • 17.0 Single Sign-On Part 1
    • 17.1 Single Sign-On Part 2
    • 17.2 Single Sign-On Part 3

    Module 18: Risk Assessment

    • 18.0 Risk Assessment Part 1
    • 18.1 Risk Assessment Part 2

    Module 19: Testing and Assessment

    • 19.0 Testing and Assessment Part 1
    • 19.1 Testing and Assessment Part 2
    • 19.2 Testing and Assessment Part 3

    Module 20: Common Vulnerability

    • 20.0 Common Vulnerability Scoring System Part 1
    • 20.1 Common Vulnerability Scoring System Part 2
    • 20.2 Common Vulnerability Scoring System Part 3
    • 20.3 Common Vulnerability Scoring System Part 4

    Module 21: Common Criteria

    • 21.0 Common Criteria Part 1
    • 21.1 Common Criteria Part 2
    • 21.2 Common Criteria Part 3
    • 21.3 Common Criteria Part 4
    • 21.4 Common Criteria Part 5

    Module 22: Personally Identifiable Information

    • 22.0 Personally Identifiable Information Part 1
    • 22.1 Personally Identifiable Information Part 2

    Module 23: Risk Management

    • 23.0 Risk Management Part 1
    • 23.1 Risk Management Part 2
    • 23.2 Risk Management Part 3

    Module 24: Frameworks

    • 24.0 Frameworks Part 1
    • 24.1 Frameworks Part 2
    • 24.2 Frameworks Part 3
    • 24.3 Frameworks Part 4

    Module 25: Interconnecting Systems

    • 25.0 Interconnecting Systems Part 1
    • 25.1 Interconnecting Systems Part 2

    Module 26: Security Services

    • 26.0 Security Services Part 1
    • 26.1 Security Services Part 2
    • 26.2 Security Services Part 3
    • 26.3 Security Services Part 4

    Module 27: Continuous Monitoring

    • 27.0 Continuous Monitoring Part 1
    • 27.1 Continuous Monitoring Part 2
    • 27.2 Continuous Monitoring Part 3
    • 27.3 Continuous Monitoring Part 4

    Module 28: Incident Handling

    • 28.0 Incident Handling Part 1
    • 28.1 Incident Handling Part 2
    • 28.2 Incident Handling Part 3
    • 28.3 Incident Handling Part 4

    Module 29: Forensic & Incident Response

    • 29.0 Forensic and Incident Response Part 1
    • 29.1 Forensic and Incident Response Part 2
    • 29.2 Forensic and Incident Response Part 3

    Module 30: Requirements Processing

    • 30.0 Requirements Processing Part 1
    • 30.1 Requirements Processing Part 2
    • 30.2 Requirements Processing Part 3

    Module 31: Standards Bodies

    • 31.0 Standards Bodies

    Module 32: Secure System Life Cycle

    • 32.0 Secure System Life Cycle Part 1
    • 32.1 Secure System Life Cycle Part 2
    • 32.2 Secure System Life Cycle Part 3

    Module 33: Email

    • 33.0 Email

    Module 34: Mobile and BYOD

    • 34.0 Mobile and BYOD Part 1
    • 34.1 Mobile and BYOD Part 2

    Module 35: Voiceover IP

    • 35.0 Voiceover IP

    Module 36: Physical Facilities Assessment Process

    • 36.0 Physical Facilities Assessment Process Part 1
    • 36.1 Physical Facilities Assessment Process Part 2

    Module 37: Security Requirements Traceability Matrix

    • 37.0 Security Requirements Traceability Matrix