Total Seminars

CompTIA Security+ Specialization

Total Seminars

CompTIA Security+ Specialization

CompTIA Security+ Certification.

Computer Security Threats, Attacks, Vulnerabilities, CIA Triad, SY0-701

Dan LaChance
Lyndon Williams
Mike Meyers

Instructors: Dan LaChance

Access provided by DAVIbank y BNP Paribas Cardif

Get in-depth knowledge of a subject
Beginner level

Recommended experience

2 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
Beginner level

Recommended experience

2 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • How to identify, analyze, and mitigate threats and vulnerabilities using security frameworks, risk management principles, and cryptographic controls

  • How to implement security architecture including network segmentation, identity and access management, wireless security, & cloud security controls

  • •How to respond to security incidents, apply security operations practices, and contribute to security program governance and compliance

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

May 2026

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Total Seminars

Specialization - 8 course series

Security Risk Management & Cryptography Fundamentals

Security Risk Management & Cryptography Fundamentals

Course 1, 5 hours

What you'll learn

  • How to orient for the Security+ exam and explain the CIA triad, authentication factors, and core security concepts that underpin every exam domain

  • How to perform risk assessments, identify threat actor types, and apply risk management frameworks to organizational security decisions

  • How to implement cryptographic algorithms, apply hashing for data integrity, and explain the role of cryptography in protecting enterprise data

Skills you'll gain

Category: Cybersecurity
Category: Cryptography
Category: Data Security
Category: Cyber Attacks
Category: Security Controls
Category: Vulnerability Assessments
Category: Cryptographic Protocols
Category: Cyber Threat Hunting
Category: Threat Detection
Category: Threat Modeling
Category: Cyber Threat Intelligence
Category: Cyber Security Assessment
Category: Encryption
Category: Risk Management Framework
Category: Cyber Risk
Category: Threat Management
Category: Computer Security
Category: Security Awareness
Category: Authentications
Category: Security Management
Physical Security & Identity Management

Physical Security & Identity Management

Course 2, 5 hours

What you'll learn

  • How to design and implement physical security controls including locks, cameras, and security measures to protect facilities and equipment

  • How to configure multi-factor authentication systems and apply zero-trust identity principles to secure enterprise access decisions

  • How to manage user accounts, enforce least privilege, and control privileged access across enterprise identity management systems

Skills you'll gain

Category: Security Management
Category: Authorization (Computing)
Category: Security Testing
Category: Authentications
Category: Multi-Factor Authentication
Category: AWS Identity and Access Management (IAM)
Category: Security Controls
Category: Identity and Access Management
Category: Zero Trust Network Access
Category: Account Management
Category: Security Assertion Markup Language (SAML)
Category: Security Awareness
Category: User Provisioning
Category: User Accounts
Category: Security Software
Security Tools & Infrastructure Testing

Security Tools & Infrastructure Testing

Course 3, 5 hours

What you'll learn

  • How to use command-line and shell-based security tools to navigate systems and diagnose security issues in enterprise environments

  • How to use network scanners, vulnerability assessment tools, and log analysis techniques to monitor systems and assess security posture

  • How to apply penetration testing methodologies and infrastructure testing techniques to evaluate and improve organizational security

Skills you'll gain

Category: Security Testing
Category: IT Automation
Category: Cyber Operations
Category: Infrastructure Security
Category: Cyber Security Assessment
Category: Security Controls
Category: Security Strategy
Category: Event Monitoring
Category: Penetration Testing
Category: Vulnerability
Category: Human Factors (Security)
Category: Network Monitoring
Category: Security Awareness
Category: Security Management
Category: Network Analysis
Category: Command-Line Interface
Category: Vulnerability Scanning
Category: Vulnerability Assessments
Category: Network Security
Endpoint & Wireless Security

Endpoint & Wireless Security

Course 4, 5 hours

What you'll learn

  • How to identify malware types, attack vectors, and system vulnerabilities to apply effective host-based security controls against endpoint threats

  • How to implement endpoint hardening controls including antivirus, host-based firewalls, EDR, and application control to defend individual systems

  • How to configure wireless security protocols and identify and mitigate common wireless attacks including evil twin and rogue access points

Skills you'll gain

Category: IT Security Architecture
Category: Authentications
Category: Application Security
Category: Cryptographic Protocols
Category: Security Testing
Category: Security Controls
Category: Security Strategy
Category: Security Management
Category: Encryption
Category: System Configuration
Category: Endpoint Detection and Response
Category: Brute-force attacks
Category: Endpoint Security
Category: Network Security
Category: Wireless Networks
Category: Security Awareness
Category: Cyber Attacks
Category: Hardening
Category: Threat Detection
Category: Intrusion Detection and Prevention
Securing the Network

Securing the Network

Course 5, 4 hours

What you'll learn

  • How to design network architectures using segmentation, firewalls, and network access control to enforce least privilege across enterprise networks

  • How to implement and configure VPN, IDS/IPS, and network perimeter defenses to protect enterprise network infrastructure

  • How to use SIEM and network monitoring tools to detect, analyze, and respond to network-based attacks and security events

Skills you'll gain

Category: Security Awareness
Category: Network Security
Category: Threat Detection
Category: Firewall
Category: Security Information and Event Management (SIEM)
Category: Intrusion Detection and Prevention
Category: Zero Trust Network Access
Category: Network Administration
Category: Network Architecture
Category: Security Controls
Category: Hardening
Category: Network Monitoring
Category: Encryption
Category: Remote Access Systems
Category: Security Management
Category: Virtual Private Networks (VPN)
Category: Network Planning And Design
Category: IT Security Architecture
Category: Security Engineering
Applied Cryptography, PKI, & Cloud Security

Applied Cryptography, PKI, & Cloud Security

Course 6, 5 hours

What you'll learn

  • How to implement advanced cryptographic protocols including TLS, IPSec, and key management solutions to protect data in transit and at rest

  • How to manage PKI infrastructure, configure digital certificates, and apply certificate-based authentication across enterprise environments

  • How to apply cloud security controls using the shared responsibility model and secure IaaS, PaaS, and SaaS environments and virtual infrastructure

Skills you'll gain

Category: TCP/IP
Category: Cloud Infrastructure
Category: Cloud Security
Category: Security Software
Category: Public Key Infrastructure
Category: Security Engineering
Category: Data Management
Category: Cloud Computing
Category: Virtualization
Category: Key Management
Category: Threat Detection
Category: Enterprise Architecture
Category: Cryptographic Protocols
Category: Security Management
Category: Public Key Cryptography Standards (PKCS)
Category: Cloud Services
Category: Cryptography
Category: IT Security Architecture
Category: Security Awareness
Category: Network Security
Secure Mobile, IoT & Secure Applications

Secure Mobile, IoT & Secure Applications

Course 7, 4 hours

What you'll learn

Skills you'll gain

Category: Mobile Security
Category: SQL
Category: Security Strategy
Category: Hardening
Category: API Testing
Category: Vulnerability Management
Category: Security Management
Category: Open Web Application Security Project (OWASP)
Category: Security Testing
Category: Endpoint Security
Category: Security Awareness
Category: Secure Coding
Category: Internet Of Things
Category: Security Software
Category: IT Security Architecture
Category: Security Controls
Category: Web Applications
Category: Application Security
Category: Embedded Software
Category: Infrastructure Security
Business Security, Governance, & Incident Response

Business Security, Governance, & Incident Response

Course 8, 5 hours

What you'll learn

  • How to develop business continuity and disaster recovery plans, conduct impact analyses, and ensure resilience in the face of security incidents

  • How to apply security governance frameworks, manage organizational risk, and demonstrate compliance with regulatory and industry requirements

  • How to execute incident response procedures and apply digital forensics techniques to identify, contain, and recover from security incidents

Skills you'll gain

Category: Risk Management
Category: Computer Security
Category: Change Management
Category: Digital Forensics
Category: Compliance Management
Category: Cyber Governance
Category: Business Continuity
Category: Automation
Category: Security Software
Category: Security Management
Category: Security Awareness
Category: Incident Management
Category: Computer Security Incident Management
Category: Enterprise Security
Category: Regulatory Compliance
Category: Incident Response
Category: Security Testing
Category: Business Continuity Planning
Category: Governance Risk Management and Compliance
Category: Disaster Recovery

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructors

Dan LaChance
Total Seminars
8 Courses16 learners
Lyndon Williams
Total Seminars
8 Courses16 learners
Mike Meyers
Total Seminars
8 Courses16 learners

Offered by

Total Seminars

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."