Total Seminars

CompTIA Security+ Specialization

Total Seminars

CompTIA Security+ Specialization

CompTIA Security+ Certification.

Computer Security Threats, Attacks, Vulnerabilities, CIA Triad, SY0-701

Dan LaChance
Lyndon Williams
Mike Meyers

Instructors: Dan LaChance

Access provided by Chulalongkorn University

Get in-depth knowledge of a subject
Beginner level

Recommended experience

2 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
Beginner level

Recommended experience

2 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • How to identify, analyze, and mitigate threats and vulnerabilities using security frameworks, risk management principles, and cryptographic controls

  • How to implement security architecture including network segmentation, identity and access management, wireless security, & cloud security controls

  • •How to respond to security incidents, apply security operations practices, and contribute to security program governance and compliance

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

May 2026

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Total Seminars

Specialization - 8 course series

Security Risk Management & Cryptography Fundamentals

Security Risk Management & Cryptography Fundamentals

Course 1, 5 hours

What you'll learn

  • How to orient for the Security+ exam and explain the CIA triad, authentication factors, and core security concepts that underpin every exam domain

  • How to perform risk assessments, identify threat actor types, and apply risk management frameworks to organizational security decisions

  • How to implement cryptographic algorithms, apply hashing for data integrity, and explain the role of cryptography in protecting enterprise data

Skills you'll gain

Category: Cyber Threat Hunting
Category: Cryptography
Category: Security Awareness
Category: Cyber Risk
Category: Authentications
Category: Security Controls
Category: Computer Security
Category: Risk Management Framework
Category: Threat Detection
Category: Cyber Security Assessment
Category: Cryptographic Protocols
Category: Cyber Attacks
Category: Vulnerability Assessments
Category: Threat Management
Category: Security Management
Category: Data Security
Category: Threat Modeling
Category: Encryption
Category: Cyber Threat Intelligence
Category: Cybersecurity
Physical Security & Identity Management

Physical Security & Identity Management

Course 2, 5 hours

What you'll learn

  • How to design and implement physical security controls including locks, cameras, and security measures to protect facilities and equipment

  • How to configure multi-factor authentication systems and apply zero-trust identity principles to secure enterprise access decisions

  • How to manage user accounts, enforce least privilege, and control privileged access across enterprise identity management systems

Skills you'll gain

Category: Security Management
Category: AWS Identity and Access Management (IAM)
Category: Security Awareness
Category: Security Testing
Category: Security Assertion Markup Language (SAML)
Category: Security Software
Category: Identity and Access Management
Category: User Provisioning
Category: Account Management
Category: Security Controls
Category: User Accounts
Category: Multi-Factor Authentication
Category: Zero Trust Network Access
Category: Authentications
Category: Authorization (Computing)
Security Tools & Infrastructure Testing

Security Tools & Infrastructure Testing

Course 3, 5 hours

What you'll learn

  • How to use command-line and shell-based security tools to navigate systems and diagnose security issues in enterprise environments

  • How to use network scanners, vulnerability assessment tools, and log analysis techniques to monitor systems and assess security posture

  • How to apply penetration testing methodologies and infrastructure testing techniques to evaluate and improve organizational security

Skills you'll gain

Category: Security Management
Category: Network Analysis
Category: Vulnerability
Category: Cyber Operations
Category: Event Monitoring
Category: Security Strategy
Category: Penetration Testing
Category: Network Monitoring
Category: Security Controls
Category: Infrastructure Security
Category: IT Automation
Category: Security Awareness
Category: Vulnerability Scanning
Category: Security Testing
Category: Human Factors (Security)
Category: Cyber Security Assessment
Category: Network Security
Category: Vulnerability Assessments
Category: Command-Line Interface
Endpoint & Wireless Security

Endpoint & Wireless Security

Course 4, 5 hours

What you'll learn

  • How to identify malware types, attack vectors, and system vulnerabilities to apply effective host-based security controls against endpoint threats

  • How to implement endpoint hardening controls including antivirus, host-based firewalls, EDR, and application control to defend individual systems

  • How to configure wireless security protocols and identify and mitigate common wireless attacks including evil twin and rogue access points

Skills you'll gain

Category: Brute-force attacks
Category: Hardening
Category: IT Security Architecture
Category: Wireless Networks
Category: Intrusion Detection and Prevention
Category: Security Strategy
Category: Security Management
Category: Security Awareness
Category: Network Security
Category: Cryptographic Protocols
Category: Endpoint Detection and Response
Category: System Configuration
Category: Encryption
Category: Threat Detection
Category: Security Testing
Category: Cyber Attacks
Category: Application Security
Category: Endpoint Security
Category: Authentications
Category: Security Controls
Securing the Network

Securing the Network

Course 5, 4 hours

What you'll learn

  • How to design network architectures using segmentation, firewalls, and network access control to enforce least privilege across enterprise networks

  • How to implement and configure VPN, IDS/IPS, and network perimeter defenses to protect enterprise network infrastructure

  • How to use SIEM and network monitoring tools to detect, analyze, and respond to network-based attacks and security events

Skills you'll gain

Category: Network Security
Category: Security Controls
Category: Security Engineering
Category: Security Information and Event Management (SIEM)
Category: Threat Detection
Category: Zero Trust Network Access
Category: Intrusion Detection and Prevention
Category: Security Awareness
Category: Network Architecture
Category: Network Monitoring
Category: Encryption
Category: Hardening
Category: IT Security Architecture
Category: Firewall
Category: Network Planning And Design
Category: Remote Access Systems
Category: Virtual Private Networks (VPN)
Category: Security Management
Category: Network Administration
Applied Cryptography, PKI, & Cloud Security

Applied Cryptography, PKI, & Cloud Security

Course 6, 5 hours

What you'll learn

  • How to implement advanced cryptographic protocols including TLS, IPSec, and key management solutions to protect data in transit and at rest

  • How to manage PKI infrastructure, configure digital certificates, and apply certificate-based authentication across enterprise environments

  • How to apply cloud security controls using the shared responsibility model and secure IaaS, PaaS, and SaaS environments and virtual infrastructure

Skills you'll gain

Category: Virtualization
Category: Data Management
Category: Security Engineering
Category: Security Software
Category: Public Key Cryptography Standards (PKCS)
Category: Security Awareness
Category: Key Management
Category: Cloud Services
Category: Cloud Security
Category: Enterprise Architecture
Category: Cryptographic Protocols
Category: Security Management
Category: Cloud Computing
Category: Network Security
Category: TCP/IP
Category: IT Security Architecture
Category: Public Key Infrastructure
Category: Cryptography
Category: Cloud Infrastructure
Category: Threat Detection
Secure Mobile, IoT & Secure Applications

Secure Mobile, IoT & Secure Applications

Course 7, 4 hours

What you'll learn

Skills you'll gain

Category: Hardening
Category: Web Applications
Category: Embedded Software
Category: Open Web Application Security Project (OWASP)
Category: Application Security
Category: Secure Coding
Category: Internet Of Things
Category: Security Controls
Category: SQL
Category: Security Testing
Category: Security Management
Category: Security Awareness
Category: Security Software
Category: Infrastructure Security
Category: Security Strategy
Category: Mobile Security
Category: API Testing
Category: Vulnerability Management
Category: Endpoint Security
Category: IT Security Architecture
Business Security, Governance, & Incident Response

Business Security, Governance, & Incident Response

Course 8, 5 hours

What you'll learn

  • How to develop business continuity and disaster recovery plans, conduct impact analyses, and ensure resilience in the face of security incidents

  • How to apply security governance frameworks, manage organizational risk, and demonstrate compliance with regulatory and industry requirements

  • How to execute incident response procedures and apply digital forensics techniques to identify, contain, and recover from security incidents

Skills you'll gain

Category: Risk Management
Category: Computer Security Incident Management
Category: Incident Management
Category: Incident Response
Category: Digital Forensics
Category: Business Continuity
Category: Security Software
Category: Business Continuity Planning
Category: Security Awareness
Category: Computer Security
Category: Automation
Category: Security Management
Category: Governance Risk Management and Compliance
Category: Disaster Recovery
Category: Cyber Governance
Category: Change Management
Category: Regulatory Compliance
Category: Enterprise Security
Category: Compliance Management
Category: Security Testing

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructors

Dan LaChance
Total Seminars
8 Courses21 learners
Lyndon Williams
Total Seminars
8 Courses21 learners
Mike Meyers
Total Seminars
8 Courses21 learners

Offered by

Total Seminars

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."