101 Labs – CompTIA Security+

CompTIA Security+ labs are a vital part of your study program if you want to pass the exam. Much of the syllabus expects you to know how to install, configure and troubleshoot firewalls, packet sniffers, Linux, hacking tools and more.

CompTIA certifications are ideal for beginners who want to pass a vendor-neutral exam. They are required if you want to work in any government role, including for companies that subcontract on government work.

Updated for the latest exam syllabus:

  • SY0-601 – CompTIA Security+

Security+ certification requires you passing the tough exam questions, many are based on real-world security problems and devices. Getting hands-on experience is vital if you want to pass your Security+ exam first time (around 50% fail).

101 Labs – CompTIA Security+ covers every aspect of the exam including configuring firewalls, Linux, scripting, IP Scanners, packet sniffers, penetration testing, credential harvesting and more. We take you by the hand and guide you through the Security+ exam syllabus topics. There are more than $400 worth of practice exams included to guarantee your success come exam day.

This is 100% hands-on training, if you need to learn the theory please check out our Security+ course on howtonetwork.com.

Security+ certification is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

The CompTIA Security+ is the perfect starting block for a range of careers including cyber security, ethical hacker, security consultant and many others. There is currently a massive shortfall in certified security engineers with most Cyber Security departments having to run 24/7.

This course shows you how to configure multiple security protocols and devices including firewalls, routers, wireless controllers. You use free-trial software, virtual machines and free-to-download software (such as Cisco Packet Tracer) to configure all the labs. By the end of the course you will have configured more security protocols and services than most security engineers do in five years on the job.

Follow along every step of the way as our expert instructor shares tips and secrets you can use not only to pass the exam but to succeed in the real world of internetworking. We only ever use industry experts to create your labs and never IT Trainers. Your course instructor configures, supports and troubleshoots the security infrastructure for a large corporation. He’s both Security+ and SSCP certified.

Take this course if you:

  • Want to lay a foundation for a career in security
  • Are new to the world of IT security and want to learn all the basics
  • Want to learn how to protect networks from hacking attacks
  • Have an interest in Penetration Testing, CyberOps or Info Security
  • Don’t feel ready for advanced exams such as Certified Ethical Hacker
  • Want an understanding of network security, hacking tools and technology
  • Want to gain confidence in your hands-on IT skills
  • Want to gain an edge in your Security+ exam
  • Want access to four Security+ practice tests (200 questions)
Module 1 Module 1
Unit 1 Credential Harvesting Using Site Cloning  
Unit 2 Nmap  
Unit 3 Gathering DNS Information Using Recon-ng  
Unit 4 Online Dictionary Attack Using Hydra  
Unit 5 Conducting an XXS Attack  
Unit 6 Using Burp Suite to Intercept Client-side Requests  
Unit 7 Information Gathering Using theHarvester  
Unit 8 Evil Twin Attack Using Airgeddon  
Unit 9 Curl  
Unit 10 Using Tracert  
Unit 11 PING  
Unit 12 PuTTY  
Unit 13 Using SSH  
Unit 14 Kali Linux VM setup  
Unit 15 Nslookup  
Unit 16 Dig  
Unit 17 IPconfig  
Unit 18 Ifconfig  
Unit 19 Hping  
Module 2 Module 2
Unit 1 Using Netstat  
Unit 2 Netcat  
Unit 3 IP Scanners  
Unit 4 Using ARP  
Unit 5 Using Route  
Unit 6 Scanless  
Unit 7 Directory Traversal  
Unit 8 Using dnsenum  
Unit 9 Using openvpn  
Unit 10 Using Hashcat  
Unit 11 Using fuzzing  
Unit 12 Macchanger  
Unit 13 Using wpscan  
Unit 14 Reaver  
Unit 15 CSRF  
Unit 16 Gobuster  
Unit 17 Burp Suite Intruder  
Unit 18 Manual SQL Injection  
Unit 19 Broken Access Control  
Module 3 Module 3
Unit 1 Getting a Shell Through a File Upload  
Unit 2 Manual Priv Escalation with Python  
Unit 3 Nikto  
Unit 4 ZAP  
Unit 5 Responder  
Unit 6 Kismet  
Unit 7 Sniper  
Unit 8 BeEf  
Unit 9 Wifite  
Unit 10 Wireshark  
Unit 11 Tcpdump  
Unit 12 Airodump-ng  
Unit 13 Aireplay-ng  
Unit 14 Aircrack-Ng  
Unit 15 Checksums for Files in Windows  
Unit 16 Sysinternals - Process Explorer  
Unit 17 Fundamental Linux Concepts  
Unit 18 Advanced Linux Operations  
Unit 19 Basic File Operations  
Module 4 Module 4
Unit 1 Advanced File Operations  
Unit 2 John the Ripper - Basic Hashes  
Unit 3 John the Ripper - Advanced Hashes  
Unit 4 John the Ripper - More advanced Uses of John the Ripper  
Unit 5 Reverse shell with Netcat  
Unit 6 Bind shell with netcat  
Unit 7 How to stabilize a netcat shell  
Unit 8 Reverse shell with socat  
Unit 9 bind shell with socat  
Unit 10 stabilise a socat shell  
Unit 11 Upgrading a normal shell to a meterpreter shell  
Unit 12 Exploiting a vulnerable FTP service to gain a shell using Metasploit  
Unit 13 Running a vulnerability scan with Nessus  
Unit 14 msfvenom  
Unit 15 Establishing a reverse shell on a Linux target with Msfvenom and Metasploit  
Unit 16 Establishing a bind shell on a Linux target with Msfvenon and Metasploit  
Unit 17 Basic meterpreter commands  
Unit 18 More Advanced Meterpreter Commands  
Unit 19 Introduction to Bash Scripting  
Unit 20 More Bash Scripting  
Module 5 Module 5
Unit 1 Advanced Bash Scripting  
Unit 2 How establish a Meterpreter shell on a Windows target using SET  
Unit 3 How to migrate to a different process on the target machine after establishing a Meterpreter shell  
Unit 4 How to use Mimikatz to extract all the passwords from a Windows machine  
Unit 5 How to enumerate for privilege escalation on a Windows target with winPEAS  
Unit 6 How to enumerate for privilege escalation on a Linux target with LinPEAS  
Unit 7 OWASP A1 - Command Injection  
Unit 8 OWASP A2 Broken Authentication and Session Management - Username enumeration vulnerability  
Unit 9 OWASP A3 Sensitive data Exposure  
Unit 10 OWASP A4 XXE Vulnerability  
Unit 11 OWASP A5 Broken Access Control  
Unit 12 OWASP A6 Security Misconfiguration  
Unit 13 OWASP A7 – Cross Site Scripting (XSS)  
Unit 14 OWASP A8 - Insecure Deserialization  
Unit 15 OWASP Top 10 - A9 Using Components With Known Vulnerabilities  
Unit 16 OWASP Top 10 – A10 Unvalidated Redirects and Forwards  
Unit 17 Introduction to Python scripting  
Unit 18 More Advanced Python Scripting  
Unit 19 More Advanced Python Scripting  
Unit 20 Introduction to PowerShell Scripting  
Unit 21 More Advanced PowerShell Scripting  
Module 6 Exams
Unit 1 Exam 1  
Unit 2 Exam 2  
Unit 3 Exam 3  
Unit 4 Exam 4