CompTIA Security+ SY0-601
Prepare and pass your Comptia Security+ (SY0-601) certification - without information overload!
Welcome Message
Lesson 01: What is Social Engineering
Lesson 02: Phishing
Lesson 03: Spam and Spim
Lesson 04: Dumpster diving and Shoulder surfing
Lesson 05: Tailgaiting and Eliciting information
Lesson 06: Pharming
Lesson 07: Impersonation, Pre-texting and Identity fraud
Lesson 08: Hoaxes and Invoice Scams
Lesson 09: Reconnaissance and Credential harvesting
Lesson 10: Watering hole attack and Typosquatting
Lesson 11: Influence campaigns and Hybrid warfare
Lesson 12: Principles of Social engineering
1.1 Slides (PDF)
Lesson 01: What is a malware
Lesson 02: Ransomware and Cryptowalware
Lesson 03: Trojan and Worms
Lesson 04: Rootkits and Backdoor
Lesson 05: Bots, Botnet and Command & Control
Lesson 06: Keyloggers and Logic bombs
Lesson 07: Viruses
Lesson 08: Spyware and PuPs
Lesson 09: Password Attacks I
Lesson 10: Password Attacks II
Lesson 11: Malicious USB
Lesson 12: Card skimming and Card cloning
Lesson 13: Adversarial AI
Lesson 14: Supply chain attack
Lesson 15: Cloud vs. On-premise attack
1.2 Slides (PDF)
Lesson 01: Privelege escalation
Lesson 02: SQL injection
Lesson 03: DLL injection
Lesson 04: LDAP injection
Lesson 05: XML injection
Lesson 06: Pointer object dereference
Lesson 07: Directory traversal attack
Lesson 08: Buffer overflows
Lesson 09: Race conditions
Lesson 10: Error handling and Improper input handling
Lesson 11: Replay attack
Lesson 12: Integer overflow and API attack
Lesson 13: Request forgeries
Lesson 14: Resource exhaustion and Memory leak
Lesson 15: SSL stripping and Pass the hash
Lesson 16: Driver manipulation
1.3 Slides (PDF)
Lesson 01: Rouge AP and Evil twin
Lesso 02: Bluesnarfing and Bluejacking
Lesson 03: Disassociation and Jamming
Lesson 04: RFID, NFC and Initialization Vector
Lesson 05: On-path attack
Lesson 06: ARP Poisoning
Lesson 07: MAC flooding and MAC cloning
Lesson 08: DNS attacks
Lesson 09: DDoS
Lesson 10: Malicious script execution
1.4 Slides(PDF)
Lesson 01: Actors and Threats I
Lesson 02: Actors and Threats II
Lesson 03: Attributes of actors
Lesson 04: Threat vectors
Lesson 05: Threat Intelligence sources I
Lesson 06: Threat Intelligence sources II
Lesson 07: Threat Intelligence sources III
Lesson 08: Threat Research sources
1.5 Slides(PDF)
The course will cover all the basics and fundamentals of I.T security. We'll follow the topics included in the official Comptia Security+ SY0-601 curriculum.
Once you enrolled, you'll get full access to the program immediately. It is a self-paced online course(all videos are recorded) so you can study and learn at your own phase. Learn anytime and anywhere!
100% yes! This course was designed from a beginner's perspective para sa mga 0-knowledge at newbie na kagaya mo. Almost all lessons are divided into small 'chunks' para hindi ka ma-information overload.
Join the wait list so you can get the first hand notification when it will be open again for enrollment.
Once you enrolled, you'll have full and lifetime access to the course. Meaning, you'll get access to all the content and resources we have now and in the future(for the program).
Yes! Once you finished the course, you'll be able to download your training certificate. You can use them in any legal purposes you need.
See payment instructions below.
Send the copy/screenshot of the receipt or transaction slip to [email protected] we will respond to you immediately for the next steps.