Looking for a computer to use for your courses? Consider exploring options from Mitchell Technologies.

MitchellTec
MitchellTec
  • Home
  • Cybersecurity 101
  • IT Technical Support 101
  • Security Awareness B2B
  • About
  • Hands On Labs
  • More
    • Home
    • Cybersecurity 101
    • IT Technical Support 101
    • Security Awareness B2B
    • About
    • Hands On Labs
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Cybersecurity 101
  • IT Technical Support 101
  • Security Awareness B2B
  • About
  • Hands On Labs

Account

  • My Account
  • Sign out

  • Sign In
  • My Account

Cybersecurity 101

Lesson 1: Security Concepts

You'll learn about the importance of incident response, network security, and risk management in protecting sensitive data. We'll also delve into security frameworks and vulnerability assessment, as well as the role of penetration testing in identifying potential threats.  

Lesson 2: Threats, Vulnerabilities, and Mitigations

We'll explore the importance of vulnerability testing and analysis in identifying potential risks and developing strategies for risk mitigation. By the end of this lesson, you'll have a solid grasp of cybersecurity basics and be able to implement security best practices to bolster your cyber defense. 

Lesson 3: Cryptographic Solutions

 Learn how security protocols ensure secure communication and protect information integrity through the use of hash functions and encryption methods. Discover the importance of cryptographic keys, advanced encryption, and digital signatures in facilitating secure transactions and maintaining digital privacy 

Lesson 4: Identity and Access Management

This video is designed to educate individuals on the importance of secure coding practices and how they can be applied to protect sensitive information. By the end of this lesson, you will have a thorough understanding of the role Identity and Access Management plays in maintaining the integrity of digital systems. 

Lesson 5: Network Architecture

Understanding ip addressing is crucial in network architecture, as it enables devices to communicate with each other effectively. We also explore network topology, including the different types of topologies and their advantages, as well as routing protocols that facilitate data transmission between networks.

Lesson 6: Resiliency and Site Security

 By implementing robust security protocols and following security best practices, organizations can improve their cyber resilience and reduce the risk of incidents. Incident response and risk management are also essential in minimizing the impact of security breaches, and vulnerability assessment can help identify potential weaknesses in the system. 

Lesson 7: Vulnerability Management

  Understanding how to identify and mitigate vulnerabilities is crucial for maintaining network security and protecting against potential threats.  

Lesson 8: Network and Endpoint Security

We will delve into the importance of incident response and how a zero-trust approach can help prevent security breaches. You will learn about the significance of conducting regular vulnerability assessments to identify and mitigate potential risks. 

Lesson 9: Incident Response

In this comprehensive lesson, we'll dive into the world of incident response, covering the essential steps to take when faced with a security breach. From initial detection to containment, eradication, recovery, and post-incident activities, we'll explore the best practices to minimize the impact of an incident and ensure business continuity. 

Lesson 10: Protocol, App, and Cloud Security

  Learn how to protect your online presence from threats and vulnerabilities by understanding the security measures and protocols in place for applications and cloud-based systems. From encryption and access control to threat detection and incident response, we'll cover it all.  

Lesson 11: Security Governance Concepts

Learn about the importance of risk management and how it's integrated into a governance framework to ensure regulatory compliance and adherence to safety standards.  

Lesson 12: Risk Management Processes

 As part of our online learning series, we'll explore the importance of identifying, assessing, and mitigating risks to ensure the integrity of your organization's data and systems.  

Lesson 13: Data Protection and Compliance

 As organizations handle increasingly large amounts of sensitive information, ensuring the security and privacy of that data is more important than ever. Effective data governance is key to minimizing risk and avoiding legal repercussions, and it's essential to stay up-to-date on the latest security regulations and compliance training.  

The Full Course to Pass the CompTIA Security+

CompTIA Security+ (SY0-701) Exam Objectives

General Security Concepts (12%)

Threats, Vulnerabilities, and Mitigations (22%)

Security Program Management & Oversight (20%)

Security Controls: Compare and contrast technical, preventive, managerial, deterrent, operational, detective, physical, corrective, compensating, and directive controls.


Core Principles: Understand confidentiality, integrity, and availability (CIA); non-repudiation; AAA (authentication, authorization, and accounting); zero trust; and deception/disruption technologies.


Change Management: Explain change processes, technical impact, documentation requirements, and version control.


Cryptography Fundamentals: Apply PKI, encryption, obfuscation, hashing, digital signatures, and blockchain technologies.

Security Program Management & Oversight (20%)

Threats, Vulnerabilities, and Mitigations (22%)

Security Program Management & Oversight (20%)

 Governance: Define policies, standards, procedures, and roles; account for external frameworks and compliance requirements.
 

Risk Management: Identify, assess, analyze, and report on risks; understand tolerance, appetite, and mitigation strategies, including business impact analysis (BIA).
 

Third-Party Risk: Evaluate vendors, manage contracts, perform monitoring, and enforce engagement rules.
 

Security Compliance: Address reporting requirements, monitor compliance, and understand the consequences of non-compliance.
 

Audits & Assessments: Conduct internal/external audits, attestations, and penetration tests.
 

Security Awareness: Train users on phishing recognition, anomaly detection, proper reporting, and responsible behavior.

Threats, Vulnerabilities, and Mitigations (22%)

Threats, Vulnerabilities, and Mitigations (22%)

Threats, Vulnerabilities, and Mitigations (22%)

  Threat Actors & Motivations: Distinguish between nation-states, script kiddies, hacktivists, insiders, organized crime, shadow IT, and motivations such as espionage, data theft, and financial gain.
 

Attack Vectors & Surfaces: Identify vectors like phishing, unsecure networks, social engineering, malicious files, voice phishing, supply chain risks, and software vulnerabilities.
 

Vulnerabilities: Understand weaknesses in applications, hardware, mobile devices, virtual environments, OSs, cloud systems, web platforms, and supply chains.
 

Malicious Activities: Analyze various attack types: malware, password cracking, application exploits, physical intrusions, network threats, and cryptographic attacks.
 

Mitigation Strategies: Use segmentation, access controls, configuration baselines, system hardening, isolation, and patch management to reduce risk.
 

Security Architecture (18%)

Security Architecture (18%)

Threats, Vulnerabilities, and Mitigations (22%)

 Architecture Types: Compare on-premises, cloud, virtual environments, IoT, ICS, and infrastructure as code (IaC) models.
 

Enterprise Infrastructure: Apply security best practices to systems, access control, and secure communications.
 

Data Protection: Differentiate data types and apply appropriate protection methods and classifications.
 

Resiliency & Recovery: Understand high availability, disaster recovery, power systems, platform diversity, backups, and continuity planning.

Security Operations (28%)

Security Architecture (18%)

Security Operations (28%)

 Computing Environments: Secure endpoints using baselines, mobile security, system hardening, wireless protocols, sandboxing, and application protection.
 

Asset Management: Track acquisition, disposal, assignment, and lifecycle of hardware, software, and data assets.
 

Vulnerability Management: Conduct vulnerability identification, analysis, remediation, validation, and reporting.
 

Monitoring & Alerting: Use monitoring tools to observe systems and detect anomalies.
 

Enterprise Security Tools: Implement and manage firewalls, IDS/IPS, DNS filtering, DLP, NAC, and endpoint detection tools (EDR/XDR).
 

Identity & Access Management (IAM): Deploy provisioning, MFA, SSO, and privilege access tools.
 

Automation & Orchestration: Understand use cases, benefits of scripting, and automation in security operations.
 

Incident Response: Apply incident handling procedures, conduct training and testing, analyze root causes, perform threat hunting, and carry out forensic investigations.
 

Data Sources for Investigations: Leverage logs and other data sources to support incident response.

Downloads

Security + General security concepts Study guide (pdf)Download

Copyright © 2025 Mitchell Technologies  - All Rights Reserved.


Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept