Professor Messer’s CompTIA SY0-501 Security+ Course
This is the index to my free CompTIA SY0-501 Security+ training course videos.
All of my training videos are completely free; watch them online right now!
![]() |
![]() |
Are you ready for your exam? Test your knowledge with my |
![]() |
You can download all of my video, audio, and my Course Notes! |
Who is Professor Messer? Are all of these videos really free? Read our frequently asked questions here.
Have you downloaded the exam objectives yet? Click here to get them now.
CompTIA SY0-501 Security+ Training Videos
Section 0: The SY0-501 Security+ Exam

0.1 – Introduction
Section 1 – Threats, Attacks, and Vulnerabilities









1.1 – Malware
An Overview of Malware (4:00)
Viruses and Worms (5:01)
Ransomware and Crypto-Malware (4:01)
Trojans and RATs (4:27)
Rootkits (2:54)
Keyloggers (2:36)
Adware and Spyware (3:45)
Bots and Botnets (4:22)
Logic Bombs (3:52)
1.2 – Attack Types
Phishing (6:38)
Tailgating and Impersonation (5:07)
Dumpster Diving (3:02)
Shoulder Surfing (2:16)
Hoaxes (3:26)
Watering Hole Attacks (4:03)
Principles of Social Engineering (5:24)
Denial of Service (5:29)
Man-in-the-Middle (8:51)
Buffer Overflows (3:06)
Data Injection (4:19)
Cross-site Scripting (7:02)
Cross-site Request Forgery (2:48)
Privilege Escalation (2:47)
DNS Poisoning and Domain Hijacking (4:29)
Zero-Day Attacks (2:40)
Replay Attacks (2:16)
Client Hijacking Attacks (9:01)
Driver Manipulation (4:32)
Spoofing (3:26)
Wireless Replay Attacks (3:32)
Rogue Access Points and Evil Twins (2:31)
Wireless Jamming (2:47)
WPS Attacks (3:46)
Bluejacking and Bluesnarfing (2:11)
RFID and NFC Attacks (3:16)
Wireless Disassociation Attacks (4:05)
Cryptographic Attacks (9:54)
1.3 – Threat Actors
1.4 – Penetration Testing
1.5 – Vulnerability Scanning
1.6 – Vulnerability Types
Section 2 – Technologies and Tools





2.1 – Security Components
Firewalls (9:18)
VPN Concentrators (7:59)
Network Intrusion Detection and Prevention (7:51)
Router and Switch Security (12:31)
Proxies (4:13)
Load Balancers (5:43)
Access Points (10:25)
SIEM (7:11)
Data Loss Prevention (4:59)
Network Access Control (3:56)
Mail Gateways (4:00)
Other Security Devices (6:51)
2.2 – Security Software
2.3 – Common Security Issues
2.4 – Analyzing Security Output
2.5 – Securing Mobile Devices
Mobile Device Connection Methods (6:47)
Mobile Device Management (13:17)
Mobile Device Enforcement (11:37)
Mobile Device Deployment Models (4:04)
2.6 – Secure Protocols
Section 3 – Architecture and Design







3.1 – Security Frameworks
3.2 – Securing the Network
Secure Network Topologies (6:59)
Network Segmentation (5:19)
VPN Technologies (3:00)
Security Technology Placement (11:28)
Securing SDN (2:39)
3.3 – Secure Systems Design
3.4 – Secure Deployments
3.5 – Embedded Systems
3.6 – Secure Application Development
Development Life Cycle Models (3:33)
Secure DevOps (6:18)
Version Control and Change Management (3:22)
Provisioning and Deprovisioning (2:56)
Secure Coding Techniques (12:35)
Code Quality and Testing (7:35)
3.7 – Cloud Technologies
Virtualization Overview (3:37)
Virtualization Security (3:25)
Cloud Deployment Models (3:43)
Security in the Cloud (5:58)
3.8 – Resiliency and Automation
3.9 – Physical Security Controls
Section 4 – Identity and Access Management



4.1 – Identity and Access Management
4.2 – Identity and Access Services
4.3 – Identity and Access Controls
4.4 – Account Management
Section 5 – Risk Management





5.1 – Security Policies
Agreement Types (4:10)
Personnel Management (5:17)
Role-based Awareness Training (2:43)
General Security Policies (1:56)
5.2 – Business Impact Analysis
5.3 – Risk Management
5.4 – Incident Response
5.5 – Forensics
5.6 – Disaster Recovery
Disaster Recovery Sites (1:51)
Application Recovery (5:25)
Geographic Considerations (3:18)
Continuity of Operations (4:49)
5.7 – Security Controls
5.8 – Data Security and Privacy
Section 6 – Cryptography and PKI





6.1 – Cryptography
Cryptography Concepts (7:52)
Symmetric and Asymmetric Encryption (6:07)
Hashing and Digital Signatures (7:33)
Randomizing Cryptography (3:35)
Weak Encryption (3:19)
Cryptographic Keys (3:47)
Steganography (2:34)
Stream and Block Ciphers (1:55)
States of Data (3:07)
Perfect Forward Secrecy (2:10)
Common Cryptography Use Cases (4:21)
6.2 – Cryptography Algorithms
Symmetric Algorithms (4:45)
Block Cipher Modes (5:44)
Asymmetric Algorithms (5:04)
Hashing Algorithms (3:36)
Key Stretching Algorithms (1:32)
Obfuscation (3:53)
6.3 – Wireless Security
Wireless Cryptographic Protocols (3:30)
Wireless Authentication Protocols (5:21)
Wireless Security (4:46)
6.4 – Public Key Infrastructure
Security+ Study Group Replays


2019 Replays
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
2018 Replays
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
2017 Replays
Category: CompTIA Security+ SY0-501