Total Seminars

CompTIA Security+ Specialization

4 days left! Save on skills that make you shine with 40% off 3 months of Coursera Plus. Save now

Total Seminars

CompTIA Security+ Specialization

CompTIA Security+ Certification.

Computer Security Threats, Attacks, Vulnerabilities, CIA Triad, SY0-701

Dan LaChance
Lyndon Williams
Mike Meyers

Instructors: Dan LaChance

Included with Coursera Plus

Get in-depth knowledge of a subject
Beginner level

Recommended experience

2 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
Beginner level

Recommended experience

2 months to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • How to identify, analyze, and mitigate threats and vulnerabilities using security frameworks, risk management principles, and cryptographic controls

  • How to implement security architecture including network segmentation, identity and access management, wireless security, & cloud security controls

  • •How to respond to security incidents, apply security operations practices, and contribute to security program governance and compliance

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English
Recently updated!

May 2026

91% of learners achieved a positive career outcome

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Total Seminars

Specialization - 8 course series

Security Risk Management & Cryptography Fundamentals

Security Risk Management & Cryptography Fundamentals

Course 1, 5 hours

What you'll learn

  • How to orient for the Security+ exam and explain the CIA triad, authentication factors, and core security concepts that underpin every exam domain

  • How to perform risk assessments, identify threat actor types, and apply risk management frameworks to organizational security decisions

  • How to implement cryptographic algorithms, apply hashing for data integrity, and explain the role of cryptography in protecting enterprise data

Skills you'll gain

Category: Data Security
Category: Cryptography
Category: Cyber Risk
Category: Encryption
Category: Risk Management Framework
Category: Security Controls
Category: Cyber Threat Intelligence
Category: Cyber Threat Hunting
Category: Cyber Security Assessment
Category: Vulnerability Assessments
Category: Security Awareness
Category: Authentications
Category: Cyber Attacks
Category: Threat Modeling
Category: Threat Management
Category: Security Management
Category: Threat Detection
Category: Computer Security
Category: Cryptographic Protocols
Category: Cybersecurity
Physical Security & Identity Management

Physical Security & Identity Management

Course 2, 5 hours

What you'll learn

  • How to design and implement physical security controls including locks, cameras, and security measures to protect facilities and equipment

  • How to configure multi-factor authentication systems and apply zero-trust identity principles to secure enterprise access decisions

  • How to manage user accounts, enforce least privilege, and control privileged access across enterprise identity management systems

Skills you'll gain

Category: Identity and Access Management
Category: Multi-Factor Authentication
Category: Authentications
Category: Security Controls
Category: Authorization (Computing)
Category: User Provisioning
Category: Security Software
Category: AWS Identity and Access Management (IAM)
Category: Account Management
Category: Security Management
Category: Security Testing
Category: User Accounts
Category: Security Awareness
Category: Zero Trust Network Access
Category: Security Assertion Markup Language (SAML)
Security Tools & Infrastructure Testing

Security Tools & Infrastructure Testing

Course 3, 5 hours

What you'll learn

  • How to use command-line and shell-based security tools to navigate systems and diagnose security issues in enterprise environments

  • How to use network scanners, vulnerability assessment tools, and log analysis techniques to monitor systems and assess security posture

  • How to apply penetration testing methodologies and infrastructure testing techniques to evaluate and improve organizational security

Skills you'll gain

Category: Penetration Testing
Category: Security Testing
Category: Vulnerability
Category: Vulnerability Assessments
Category: Command-Line Interface
Category: Cyber Security Assessment
Category: IT Automation
Category: Security Strategy
Category: Human Factors (Security)
Category: Security Controls
Category: Event Monitoring
Category: Vulnerability Scanning
Category: Cyber Operations
Category: Network Monitoring
Category: Security Awareness
Category: Network Security
Category: Infrastructure Security
Category: Security Management
Category: Network Analysis
Endpoint & Wireless Security

Endpoint & Wireless Security

Course 4, 5 hours

What you'll learn

  • How to identify malware types, attack vectors, and system vulnerabilities to apply effective host-based security controls against endpoint threats

  • How to implement endpoint hardening controls including antivirus, host-based firewalls, EDR, and application control to defend individual systems

  • How to configure wireless security protocols and identify and mitigate common wireless attacks including evil twin and rogue access points

Skills you'll gain

Category: Security Awareness
Category: Wireless Networks
Category: Brute-force attacks
Category: Security Management
Category: Intrusion Detection and Prevention
Category: Endpoint Detection and Response
Category: Authentications
Category: Security Controls
Category: Threat Detection
Category: System Configuration
Category: Hardening
Category: Application Security
Category: Encryption
Category: Security Strategy
Category: Cryptographic Protocols
Category: Network Security
Category: Security Testing
Category: IT Security Architecture
Category: Endpoint Security
Category: Cyber Attacks
Securing the Network

Securing the Network

Course 5, 4 hours

What you'll learn

  • How to design network architectures using segmentation, firewalls, and network access control to enforce least privilege across enterprise networks

  • How to implement and configure VPN, IDS/IPS, and network perimeter defenses to protect enterprise network infrastructure

  • How to use SIEM and network monitoring tools to detect, analyze, and respond to network-based attacks and security events

Skills you'll gain

Category: Network Security
Category: Security Awareness
Category: Network Monitoring
Category: Intrusion Detection and Prevention
Category: Virtual Private Networks (VPN)
Category: Zero Trust Network Access
Category: Security Management
Category: Network Planning And Design
Category: Security Information and Event Management (SIEM)
Category: Security Engineering
Category: IT Security Architecture
Category: Hardening
Category: Firewall
Category: Encryption
Category: Network Architecture
Category: Network Administration
Category: Remote Access Systems
Category: Security Controls
Category: Threat Detection
Applied Cryptography, PKI, & Cloud Security

Applied Cryptography, PKI, & Cloud Security

Course 6, 5 hours

What you'll learn

  • How to implement advanced cryptographic protocols including TLS, IPSec, and key management solutions to protect data in transit and at rest

  • How to manage PKI infrastructure, configure digital certificates, and apply certificate-based authentication across enterprise environments

  • How to apply cloud security controls using the shared responsibility model and secure IaaS, PaaS, and SaaS environments and virtual infrastructure

Skills you'll gain

Category: Network Security
Category: Cryptography
Category: Cloud Security
Category: Data Management
Category: Security Awareness
Category: Key Management
Category: Cryptographic Protocols
Category: Threat Detection
Category: Security Software
Category: Virtualization
Category: Public Key Infrastructure
Category: Enterprise Architecture
Category: Public Key Cryptography Standards (PKCS)
Category: Security Engineering
Category: Cloud Computing
Category: Cloud Infrastructure
Category: Cloud Services
Category: Security Management
Category: IT Security Architecture
Category: TCP/IP
Secure Mobile, IoT & Secure Applications

Secure Mobile, IoT & Secure Applications

Course 7, 4 hours

What you'll learn

Skills you'll gain

Category: Internet Of Things
Category: Infrastructure Security
Category: Secure Coding
Category: Endpoint Security
Category: Vulnerability Management
Category: Security Strategy
Category: Web Applications
Category: Mobile Security
Category: Security Testing
Category: SQL
Category: IT Security Architecture
Category: Application Security
Category: Open Web Application Security Project (OWASP)
Category: Security Management
Category: Embedded Software
Category: API Testing
Category: Security Controls
Category: Security Awareness
Category: Hardening
Category: Security Software
Business Security, Governance, & Incident Response

Business Security, Governance, & Incident Response

Course 8, 5 hours

What you'll learn

  • How to develop business continuity and disaster recovery plans, conduct impact analyses, and ensure resilience in the face of security incidents

  • How to apply security governance frameworks, manage organizational risk, and demonstrate compliance with regulatory and industry requirements

  • How to execute incident response procedures and apply digital forensics techniques to identify, contain, and recover from security incidents

Skills you'll gain

Category: Cyber Governance
Category: Security Testing
Category: Enterprise Security
Category: Regulatory Compliance
Category: Incident Management
Category: Incident Response
Category: Risk Management
Category: Automation
Category: Disaster Recovery
Category: Security Software
Category: Governance Risk Management and Compliance
Category: Business Continuity
Category: Computer Security Incident Management
Category: Security Management
Category: Security Awareness
Category: Business Continuity Planning
Category: Change Management
Category: Compliance Management
Category: Computer Security
Category: Digital Forensics

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructors

Dan LaChance
Total Seminars
8 Courses81 learners
Lyndon Williams
Total Seminars
8 Courses81 learners
Mike Meyers
Total Seminars
14 Courses93 learners

Offered by

Total Seminars

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Frequently asked questions