Cyber Security for Beginners: Part 3 – CompTIA Security+

Installment Options

Want to spread the cost? Choose a plan that suits you.

**See Cyber Security for Beginners with 4 Official CompTIA Exams for the full course**

If you’ve ever considered working within the cyber security industry, but felt you lacked the knowledge or skills to launch your career, this cyber security for beginners course might be what you’re looking for.
This course is aimed at absolute beginners to IT who want to start a career in cyber security or just develop their skills in this area. The course assumes you have no technical knowledge of IT whatsoever. To understand cyber security and practice it at a technical level, you must first possess an understanding of basic IT technology such as computer systems and networks, which you will be taught in this course.
This course is designed to gradually build your knowledge and confidence to sit the final certification exam: the CompTIA Security+. Of all the certifications you will gain in this course, the CompTIA Security+ is by far the most prestigious. It is held in high regard within the cyber security industry and attracts an average salary of £48,850 p.a. on its own. (source: ITjobswatch).
From the beginning, Hudson Courses will teach you about basic IT literacy, basic software features and functions, basic networking, operating systems, and basic security threats. From there, the course steps up a notch exploring these areas in more depth. As you progress through the various stages, your knowledge of the systems based around cyber security will gradually begin to develop.

Who are CompTIA? Watch this video to find out.

**See Cyber Security for Beginners with 4 Official CompTIA Exams for the full course**

Part 3 curriculum:
CompTIA Security+ SY0-701
Module 1 – SY0-701 General Security Concepts
1.0 Introduction to the Course
1.1 Fundamental Security Concepts
1.2 Zero Trust
1.3 Deception and Disruption
1.3.1 ACTIVITY – Testing a Honeypot
1.4 Security Controls
1.5 Change Management and Security
1.6 Cryptography Basics
1.6.1 ACTIVITY – Examining Symmetric Encryption
1.7 Asymmetric Encryption
1.7.1 ACTIVITY – Exploring Asymmetric Encryption
1.8 Hashing
1.8.1 ACTIVITY – Verifying Integrity with Hashing
1.9 Digital Certificates
1.10 Public Key Infrastructure
1.11 Data and Keys
1.12 Crypto Implementations
1.13 Blockchain
1.14 Non-Cryptographic Data Protection
Module 2 – SY0-701 Threats, Vulnerabilities, and Mitigations
2.1 Threat Actors and Motivations
2.2 Threat Vectors
2.2.1 ACTIVITY – O.MG Cable Baiting
2.2.2 O.MG-No Cable
2.3 Social Engineering
2.4 Operating System Vulnerabilities and Attacks
2.5 Application Vulnerabilities and Attacks
2.5.1 ACTIVITY – Performing a Buffer Overflow
2.6 Web-based Vulnerabilities and Attacks
2.6.1 ACTIVITY – Abusing Unsanitised Input
2.6.2 ACTIVITY – Grabbing Passwords with SQL Injection
2.6.3 ACTIVITY – Swiping a Token with XSS
2.7 Other Vulnerabilities
2.8 Common Malicious Activity Indicators
2.9 Insider Threat Indicators
2.10 Social Engineering Indicators
2.10.1 ACTIVITY – Capturing Credentials through Social Engineering
2.11 Malware Activity Indicators
2.12 Operating System Attack Indicators
2.13 Application Attack Indicators
2.13.1 ACTIVITY – Recognizing Directory Traversal
2.14 Physical Attack Indicators
2.14.1 ACTIVITY – Quickly Cloning an RFID Badge
2.15 Network Attack Indicators
2.15.1 ACTIVITY – Crashing a Target with DoS
2.16 Cryptographic Attack Indicators
2.17 Password Attack Indicators
2.17.1 ACTIVITY – Password Cracking
2.18 Network Segmentation
2.19 Access Control
2.20 Enterprise Device Hardening
Module 3 – SY0-701 Security Architecture
3.1 Network Segmentation
3.1.1 ACTIVITY – Segmenting a Network
3.2 High Availability
3.3 Virtualization
3.3.1 ACTIVITY – Deploying Docker Containers
3.4 Cloud
3.5 Serverless Computing
3.6 IoT
3.7.1 ACTIVITY – Operating a SCADA System
3.8 RTOS and Embedded Systems
3.9 Reducing the Attack Surface
3.10 Firewalls
3.11 IDS IPS.mp4
3.12 Secure Communications – Access
3.13 Port Security
3.14 SD-WAN and SASE
3.15 Data Classifications
3.16 Protecting Data Types
3.17 Data Considerations
3.18 Redundancy
3.19 Alternate Sites
3.20 Multiple Platforms
3.21 Business Continuity
Module 4 – SY0-701 Security Operations
4.1 Secure Baselines
4.2 Attack Surface Reduction
4.3 Wireless Installation
4.4 Wireless Security Settings
4.5 Mobile Solutions
4.5.1 ACTIVITY – Pawning a Mobile Device
4.6 Application Security Management
4.7 Asset Management
4.8 Vulnerability Management
4.9 Monitoring Activities
4.10 Monitoring Tools
4.10.1 ACTIVITY – Scanning a Network for Vulnerabilities
4.11 Firewall Configuration
4.11.1 ACTIVITY – Configuring Firewall Rules
4.12 Intrusion Detection Configuration
4.13 Web Traffic Filtering
4.14 Operating System Policy
4.14.1 ACTIVITY – Examining Windows Group Policy
4.15 Network Service Security
4.16 Data Loss Protection
4.16.1 ACTIVITY – Checking File Integrity
4.17 Network Access Control
4.17.1 ACTIVITY – Require Multifactor Authentication
4.18 Identity Management
4.19 Access Management
4.19.1 ACTIVITY – Implementing Access Control
4.20 Security Automation
4.21 Incident Response
4.22 Digital Forensics
Module 5 – SY0-701 Security Program Management and Oversight
5.1 Elements of Effective Security Governance
5.2 Elements of the Risk Management Process
5.3 Third Party Risk Assessment and Management
5.3.1 ACTIVITY – Analysing the Solar Winds Supply Chain Failure
5.4 Effective Security Compliance
5.5 Audits and Assessments
5.5.1 ACTIVITY – Conducting OSINT
5.5.2 ACTIVITY – Performing Active Reconnaissance
5.6 Security Awareness Practices
5.7 Course Outro
Certification exams included:

  1. CompTIA Security+ SY0-701

MeasureUP practice tests included:

  1. CompTIA Security+ SY0-701

What career paths are available to me through this course?

  • Cyber Security Engineer
  • Cyber Security Analyst
  • Cyber Security Investigator
  • Cyber Threat Analyst
  • Cyber Threat Consultant
  • IT Security Specialist
  • IT Security Consultant
  • IT Support Technician
  • Network Engineer
  • Network Consultant
  • Data Centre Manager
  • IT Manager
  • IT Sales Account Manager
  • IT Consultant
  • Systems Administrator

What do I need?

To access your cyber security for beginners course, all you need is an internet connection and a device, such as a smart phone, tablet, laptop or PC, and an internet connection. To get the most out of the course, we recommend you access it using either a laptop or desktop computer through Google Chrome. cyber security course fees, cyber security training, how to get into cyber security uk, cyber security jobs, cyber security course, cyber security courses, junior security jobs

**See Cyber Security for Beginners with 4 Official CompTIA Exams for the full course**

IT Exam Pass Rate

Customer Reviews

Meet Some Learners

Course Brochure


Meet a Tutor



Trusted By

More About Us

Get More Information

  • Please give us as much detail as possible and we will get back to you with all of the information requested.
    See Hudson's Privacy Policy and Terms & Conditions for more information
Shopping Basket
Scroll to Top