Professor Messer’s CompTIA SY0-701 Security+ Training Course

Professor Messer studio

This is the index to my free CompTIA SY0-701 Security+ training course videos.
All of my training videos are completely free; watch them online right now!



121 Videos – Total Run Time: 15 hours, 11 minutes

Have you downloaded the exam objectives yet?
Click here to get them now.


Section 0: The SY0-701 CompTIA Security+ Exam

0.1 – Introduction

How to Pass Your SY0-701 Security+ Exam video title page

CompTIA’s Security+ certification is one of the most popular entry-level certifications for Information Technology professionals. In this video, you’ll learn about the certification requirements and the best methods for studying for the Security+ exam.


Section 1: General Security Concepts

1.1 – Security Controls

Security Controls video title page

We rely on security controls to monitor, alert, and recover from attacks. In this video, you’ll learn about the categories of common security controls.

1.2 – Security Concepts

The CIA Triad video title page

The CIA triad describes the foundational goals of IT security. In this video, you’ll learn more about confidentiality, integrity, and availability.

Non-repudiation video title page

Non-repudiation is an important function of cryptography. In this video, you’ll learn about hashing, digital signatures, and non-repudiation.

Authentication, Authorization, and Accounting video title page

The AAA process is an important part of network security. In this video, you’ll learn more about authentication, authorization, and accounting.

Gap Analysis video title page

There’s always room to improve your security posture. In this video, you’ll learn how a security gap analysis can be used to make your network even more secure.

The strategy of zero-trust can be a effective way to increase the security of an organization’s data. In this video, you’ll learn more about best practices regarding zero-trust.

Physical Security video title page

Security tools in the physical world can be effectively used to protect our computing systems. In this video, you’ll learn about physical security devices and techniques.

Deception and Disruption video title page

There are many ways to fool an attacker into disclosing important information about their methods and techniques. In this video, you’ll learn how to use deception and disruption to protect your network.

1.3 – Change Management

Change Management video title page

As IT professionals, we are constantly updating, modifying, and changing the devices we manage. In this video, you’ll learn how we manage this process with change management.

Technical Change Management video title page

As IT professionals, we are constantly updating, modifying, and changing the devices we manage. In this video, you’ll learn how we manage this process with change management.

1.4 – Cryptographic Solutions

Public Key Infrastructure video title page

Public key infrastructure technologies are the foundation of our modern encryption. In this video, you’ll learn about symmetric encryption, asymmetric encryption, key pair generation, and more.

Encrypting Data video title page

We use many different encryption techniques to keep our data secure. In this video, you’ll learn about database encryption, transport encryption, cryptographic keys, and more.

Key Exchange video title page

A secure key exchange method is critical for real-time encryption. In this video, you’ll learn how a symmetric key can be derived from a public and private key pair.

Encryption Technologies video title page

Encyrption technologies provide secure key storage, cryptographic functions, and data privacy. In this video, you’ll learn about HSMs, TPMs, secure enclave, and more.

Obfuscation video title page

Obfuscation can be used in IT security to hide information in unique ways. In this video, you’ll learn about steganography, tokenization, and data masking.

Hashing and Digital Signatures video title page

The hashing process can provide integrity, authentication, and non-repudiation. In this video, you’ll learn how hashes are created and how to use digital signatures.

Blockchain Technology video title page

Blockchain technology is the foundation of cryptocurrency, but it can also be used for many other purposes. In this video, you’ll learn how blockchain technology works behind the scenes.

Certificates video title page

We use certificates to provide trust when accessing other devices or services. In this video, you’ll learn about digital certificates, certificate signing requests, key revocation, OCSP stapling, and more.


Section 2: Threats, Vulnerabilities, and Mitigations

2.1 – Threat Actors

Threat Actors video title page

There are many different types of attackers. In this video, you’ll learn about threat actors from nation states, organized crime, shadow IT, and others.

2.2 – Threat Vectors and Attack Surfaces

Common Threat Vectors video title page

Attackers can use many different methods to gain access to a system. In this video, you’ll learn how messages, images, files, default credentials, and more can be used as threat vectors.

Phishing video title page

Phishing continues to be a popular method of network infiltration. In this video, you’ll learn about different phishing techniques, and I’ll demonstrate a real-world example from my email inbox.

Impersonation video title page

Attackers use impersonation to make themselves appear to be someone different. In this video, you’ll learn about some of the most popular impersonation and fraud-based attacks.

Watering Hole Attacks video title page

If can attacker can’t get into your network, then they’ll wait for you to come out. In this video, you’ll learn how watering hole attacks can be used to attack a company outside of their own network.

Other Social Engineering Attacks video title page

Attackers use many techniques to gain access to our systems. In this video, you’ll learn about misinformation campaigns and brand impersonation.

2.3 – Types of Vulnerabilities

Memory Injections video title page

Attackers can manipulate information in RAM to gain elevated access. In this video, you’ll learn how memory and DLL injections are used in an attack.

Buffer Overflows video title page

A poorly written application can be a useful vector for an attacker. In this video, you’ll learn how buffer overflows can be used to gain access to a remote system.

Race Conditions video title page

Most applications perform multiple transactions and processes at the same time. In this video, you’ll learn how attackers can take advantage of this characteristic with a race condition.

Malicious Updates video title page

Many operating systems and applications perform automated updates. In this video, you’ll learn how attackers can use this feature to gain access to our systems.

Operating System Vulnerabilities video title page

Our operating systems can contain numerous vulnerabilities. In this video, you’ll learn how attackers use these vulnerabilities and how to protect your systems from unwanted intrusion.

SQL Injection video title page

Code injection is a relatively easy attack vector to exploit. In this video, you’ll learn about SQL injections and how they are used by attackers to gain access to our data.

Cross-site Scripting video title page

Attackers can often use our browsers against us. In this video, you’ll learn how a browser vulnerability can provide an attacker with access to a third-party website.

Hardware Vulnerabilities video title page

Our hardware can also be a useful attack vector for an attacker. In this video, you’ll learn how firmware, end-of-life announcements, and legacy platforms can potentially put our data at risk.

Virtualization Vulnerabilities video title page

A virtual machine manager can be a useful starting point for an attacker. In this video, you’ll learn how VM escapes and resource reuse can be maliciously used by an attacker.

Cloud-specific Vulnerabilities video title page

An application in the cloud is susceptible to many different attack types. In this video, you’ll learn how denial of service, authentication bypass, directory traversal, and other attacks can be used against our cloud-based applications.

Supply Chain Vulnerabilities video title page

Some attacks come in through the front door. In this video, you’ll learn how the supply chain can be used as an attack vector against our organizations.

Misconfiguration Vulnerabilities video title page

Some of the most common vulnerabilities are those we create ourselves. In this video, you’ll learn many different ways that misconfigurations can weaken the security of our networks.

Mobile Device Vulnerabilities video title page

Our mobile devices can be used by attackers to gain access to our networks and data. In this video, you’ll learn about jailbreaking, rooting, and sideloading.

Zero-day Vulnerabilities video title page

An attack can sometimes take us by surprise. In this video, you’ll learn about zero-day attacks and how to prepare and respond to these attacks.

2.4 – Indicators of Malicious Activity

An Overview of Malware video title page

Malware is a significant security concern on our modern networks. In this video, you’ll learn how malware and ransomware is used in cybersecurity attacks.

Viruses and Worms video title page

Viruses and worms can be used to gain access to our systems. In this video, you’ll learn about the differences between viruses and worms, and how fileless viruses can attack from a system’s RAM.

Spyware and Bloatware video title page

Some malware is designed to track monitor, or overwhelm your system. In this video, you’ll learn about the operation of common spyware and bloatware.

Other Malware Types video title page

There are many other malware types than viruses or worms. In this video, you’ll learn about keyloggers, logic bombs, and rootkits.

Physical Attacks video title page

Some attacks take advantage of vulnerabilities in our physical world. In this video, you’ll learn about brute force attacks, RFID cloning, and environmental attacks.

Denial of Service video title page

An attacker may only be interested in disabling services on your network. In this video, you’ll learn about many different forms of denial of service attacks.

DNS Attacks video title page

Our DNS services are critical components on our networks, and attackers can use these services as attack vectors. In this video, you’ll learn about DNS spoofing, domain hijacking, and URL hijacking.

Wireless Attacks video title page

Wireless networks are susceptible to many different types of attacks. In this video, you’ll learn about deauthentication attacks, RF jamming, and more.

On-path Attacks video title page

An on-path attack allows an attacker to intercept and redirect critical network traffic. In this video, you’ll learn about the processes used to implement an on-path attack.

Replay Attacks video title page

An on-path attack allows an attacker to intercept and redirect critical network traffic. In this video, you’ll learn about the processes used to implement an on-path attack.

Malicious Code video title page

An attacker often writes their own software to exploit a vulnerability. In this video, you’ll learn about malicious code and how it has been used to gain access to some of the largest networks in the world.

Application Attacks video title page

Our applications can be the weakest links in our security armor. In this video, you’ll learn about privilege escalation, directory traversal, and more.

Cryptographic Attacks video title page

Poorly implemented cryptography can often be the source of an attack. In this video, you’ll learn about downgrade attacks, SSL stripping, and hash collisions.

Password Attacks video title page

Our passwords are often the first and last security measure we use. In this video, you’ll learn how attackers obtain our credentials using password spraying and brute force.

Indicators of Compromise video title page

An on-path attack allows an attacker to intercept and redirect critical network traffic. In this video, you’ll learn about the processes used to implement an on-path attack.

2.5 – Mitigation Techniques

Segmentation and Access Control video title page

Segmenting the network can provide significant security advantages. In this video, you’ll learn about access control lists, application allow lists, and more.

Mitigation Techniques video title page

There are many ways to prevent or reduce the impact of a cybersecurity attack. In this video, you’ll learn about patching, encryption, monitoring, least privilege, and more.

Hardening Techniques video title page

There are many different techniques for making a system more difficult to exploit. In this video, you’ll learn about encryption, open ports, default passwords, and more.

Section 3: Security Architecture

3.1 – Architecture Models

Cloud Infrastructures video title page

Security in the cloud is a constant challenge. In this video, you’ll learn about infrastructure as code, serverless architectures, APIs, and more.

Network Infrastructure Concepts video title page

Cloud-based network infrastructures can provide significant security features. In this video, you’ll learn about logical segmentation and how software defined networking can be securely deployed.

Other Infrastructure Concepts video title page

New network services can introduce additional security concerns. In this video, you’ll learn about virtualization, containerization, Internet of things, embedded systems, and more.

Infrastructure Considerations video title page

When designing a network, there are many different considerations. In this video, you’ll learn about resilience, cost, responsiveness, scalability, and more.

3.2 – Applying Security Principles

Secure Infrastructures video title page

It’s important to place services where they can be easily secured. In this video, you’ll learn about security zones, attack surfaces, and connectivity.

Intrusion Prevention video title page

Intrusion prevention can be a useful method of blocking attacks against known vulnerabilities. In this video, you’ll learn about IPS failure modes, device connections, and differences between active and passive monitoring.

Network Appliances video title page

It can require many different network appliances to properly secure a network. In this video, you’ll learn about jump servers, application proxies, load balancing, sensors, collectors, and more.

Port Security video title page

Securing network interfaces is another important security best practice. In this video, you’ll learn about EAP, IEEE 802.1X, and more.

Firewall Types video title page

There are many different ways to secure network flows in real-time. In this video, you’ll learn about UTMs, NGFWs, and WAFs.

Secure Communication video title page

Security also includes the packets flowing across the network. In this video, you’ll learn about different VPN technologies, features of SD-WANs, and SASE solutions.

3.3 – Protecting Data

Data Types and Classifications video title page

There are many types of data that need to be secured. In this video, you’ll learn about different data types, data classifications, and classifying sensitive data.

States of Data video title page

The state of data is an important security consideration. In this video, you’ll learn about data at rest, data in transit, data in use, and more.

Protecting Data video title page

Protecting data can take many different forms. In this video, you’ll learn about geographic restrictions, encryption, hashing, obfuscation, tokenization, and more.

3.4 – Resiliency and Recovery

Resiliency video title page

It can be challenging to maintain uptime and availability of our modern networks. In this video, you’ll learn about server clustering, load balancing, site resiliency, multi-cloud systems, and more.

Capacity Planning video title page

It’s important to match the supply of network resources to the demand. In this video, you’ll learn how people, technology, and infrastructure should be evaluated to provide the proper capacity.

Recovery Testing video title page

A disaster recovery plan isn’t very useful if it doesn’t work. In this video, you’ll learn how organizations test their recovery plans before an actual disaster occurs.

Backups video title page

Backups can be one of the best recovery methods when things go wrong. In this video, you’ll learn about backup frequency, encryption, snapshots, replication, and more.

Power Resiliency video title page

Our computing systems rely on a stable power source. In this video, you’ll learn how UPS technologies and generators can be used to maintain power.

Section 4: Security Operations

4.1 – Security Techniques

Secure Baselines video title page

The security of an application
environment should be well defined. In this video, you’ll learn about establishing, deploying, and maintaining security baselines.

Hardening Targets video title page

No system is secure with the default configurations. In this video, you’ll learn about hardening mobile devices, servers, embedded systems, IoT devices, and more.

Securing Wireless and Mobile video title page

Many different strategies work together to provide security for wireless and mobile systems. In this video, you’ll learn about site surveys, mobile device management, BYOD, COPE, and more.

Wireless Security Settings video title page

Wireless network security requires the configuration of many different options. In this video, you’ll learn about wireless encryption protocols, the AAA framework, and authentication options such as RADIUS, 802.1X, and EAP.

Application Security video title page

Application developers will follow best practices for security in their code. In this video, you’ll learn about input validation, secure cookies, code signing, sandboxing, and more.

4.2 – Asset Management

Asset Management video title page

An important part of IT security is the management of hardware and software. In this video, you’ll learn best practices for the procurement process, asset tracking, media sanitization, physical destruction, and more.

4.3 – Vulnerability Management

Vulnerability Scanning video title page

Security researchers may use many techniques to identify vulnerabilities on a system or in software. In this video, you’ll learn about vulnerability scans, static code analyzers, and fuzzing.

Threat Intelligence video title page

To identify threats, we first must know the threats exist. In this video, you’ll learn about threat intelligence gathering techniques such as OSINT, third-parties, information sharing, the dark web, and more.

Penetration Testing video title page

Penetration tests can simulate an attack to exploit vulnerabilities. In this video, you’ll learn about rules of engagement, the exploitation process, responsible disclosure programs, and more.

Analyzing Vulnerabilities video title page

Identifying and analyzing vulnerabilities can be a relatively complex process. In this video, you’ll learn about vulnerability databases, classification, exposure factor, risk tolerance, and more.

Vulnerability Remediation video title page

Once a vulnerability is identified, a security professional is required to mitigate the issue. In this video, you’ll learn about patching, insurance, segmentation, compensating controls, and more.

4.4 – Security Monitoring

Security Monitoring video title page

There are many methods for monitoring and reacting to security events. In this video, you’ll learn about log aggregation, scanning, reporting, alerting, and more.

Security Tools video title page

Security administrators have many tools to help protect network resources. In this video, you’ll learn about Security Content Automation Protocol (SCAP), secure baselines, SIEMs, and more.

4.5 – Enterprise Security

Firewalls video title page

Firewalls are an important part of any security protection strategy. In this video, you’ll learn about next-generation firewalls, firewall rules, screen subnets, and more.

Web Filtering video title page

Many filtering methods are available to protect against attacks. In this video, you’ll learn about content filtering, URL scanning, proxies, DNS filtering, and more.

Operating System Security video title page

Operating systems are important resources to secure. In this video, you’ll learn about Active Directory, Group Policy, and Security-Enhanced Linux (SELinux).

Secure Protocols video title page

Encrypting network traffic is an important security best practice. In this video, you’ll learn about protocol and port selection, transport methods, and VPN tunnels.

Email Security video title page

We rely on email as one of our most common methods of communication. In this video, you’ll learn about SPF (Secure Policy Framework), DKIM (Domain Keys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance).

Monitoring Data video title page

A good offense against an attacker is to have a good defense. In this video, you’ll learn about data loss prevention, file integrity monitoring, USB blocking, and more.

Endpoint Security video title page

The endpoint is one of the best vectors for an attacker. In this video, you’ll learn about posture assessments, health checks, EDR (Endpoint Detection and Response), and more.

4.6 – Identity and Access Management

Identity and Access Management video title page

An important aspect of security is to match the right permissions to the right people at the right time. In this video, you’ll learn about IAM (Identity and Access Management), account provisioning, permission assignments, single sign-on, and more.

Access Controls video title page

There are many different ways to provide authorization, rights, and permissions. In this video, you’ll learn about least privilege, access control types, time-of-day restrictions, and more.

Multifactor Authentication video title page

A username and password can be enhanced through the use of multifactor authentication. In this video, you’ll learn about something you know, something you have, something you are, and somewhere you are.

Password Security video title page

There are many ways to increase the security of a password. In this video, you’ll learn about password complexity, password managers, passwordless authentication, and more.

4.7 – Automation and Orchestration

Scripting and Automation video title page

Scripting enables automation, speed, and a more streamlined security posture. In this video, you’ll learn about automation benefits, cases for automation, and scripting consideration.

4.8 – Incident Response

Incident Response video title page

When a security incident occurs, it’s important to properly address the incident. In this video, you’ll learn about preparation, isolation, recovery, and more.

Incident Planning video title page

The incident response process can be refined through the use of event planning. In this video, you’ll learn about tabletop exercises, simulations, root cause analysis, and more.

Digital Forensics video title page

The data collection process is an important part of digital forensics. In this video, you’ll learn about legal hold, chain of custody, event reporting, e-discovery, and more.

4.9 – Security Data Sources

Log Data video title page

Log files can provide a comprehensive record of data flows, firewall dispositions, and many other important data points. In this video, you’ll learn about logs from firewalls, applications, endpoints, operating systems, and more.

Section 5: Security Program Management and Oversight

5.1 – Security Governance

Security Policies video title page

Policies are the foundation of our security processes and procedures. In this video, you’ll learn about information security policies, acceptable use policies, business continuity, and more.

Security Standards video title page

Some security parameters are administratively managed. In this video, you’ll learn about standards for password policies, access control, physical security, and more.

Security Procedures video title page

IT security maintains a number of procedures to ensure control of data and services. In this video, you’ll learn about change management, onboarding, offboarding, playbooks, and more.

Security Considerations video title page

There are many requirements associated with IT security. In this video, you’ll learn about regulatory requirements, legal issues, industry standards, and more.

Data Roles and Responsibilities video title page

The management of data is the responsibility of many individuals. In this video, you’ll learn about data owners, data controllers, data processors, and more.

5.2 – Risk Management

Risk Management video title page

Risk management helps to understand the potential risks to an organization. In this video, you’ll learn about risk assessments, ad hoc assessments, and recurring assessments.

Risk Analysis video title page

To manage risk, we have to understand the risk we carry. In this video, you’ll learn about risk assessments, risk appetite, risk tolerance, and risk registers.

Risk Management Strategies video title page

We have many options with managing risk. In this video, you’ll learn about transferring risk, accepting risk, avoiding risk, and more.

Business Impact Analysis video title page

A security event can have a significant impact to the organization. In this video, you’ll learn how to determine a recovery time objective, recovery point objective, mean time to repair, and mean time between failures.

5.3 – Third-party Risk

Third-party Risk Assessment video title page

It’s often necessary to work with third-parties to mitigate risk. In this video, you’ll learn about right-to-audit clauses, supply chain analysis, vendor monitoring, and more.

Agreement Types video title page

Contracts and agreements are an important part of risk management. In this video, you’ll learn about service level agreements, memorandums of understanding, non-disclosure agreements, and more.

5.4 – Security Compliance

Compliance video title page

Many organizations must meet a specific standard of laws, policies, and regulations. In this video, you’ll learn about regulatory compliance, reputational damage, compliance monitoring, and more.

Privacy video title page

There are many laws and guidelines associated with the data collected by an organization. In this video, you’ll learn about legal implications associated with privacy, data responsibilities, and data inventory and retention.

5.5 – Audits and Assessments

Audits and Assessments video title page

There are many good reasons to perform ongoing technology audits. In this video, you’ll learn about internal audits, external audits, and more.

Penetration Tests video title page

Many audits use penetration tests to gather information about a company’s security posture. In this video, you’ll learn about pentesting perspectives, reconnaissance techniques, and more.

5.6 – Security Awareness

Security Awareness video title page

It’s important to involve everyone in the organization when discussing security awareness. In this video, you’ll learn about phishing campaigns, anomalous behavior recognition, reporting options, and more.

User Training video title page

User training can involve employees, management, third-parties, and other business parties. In this video, you’ll learn about training methods, security education, and more.