CompTIA Security+ Certification Course (SY0-501)

$99.00

SY0-601 Security+ is a beneficial cybersecurity-specific certification for IT job candidates to hold, often being the first instance where candidates learn to identify and handle InfoSec threats.

Save for later
Save for later
Category:
Instructor Gordon Shenkle has over 30 years of IT experience with 15 of those years specializing in IT security. Students will learn the best real-world troubleshooting practices for identifying and handling cybersecurity incidents. It is recommended that students complete CompTIA A+ and Network+ before beginning this course.
Learn how to explain threat actors and threat intelligence, about comparing security roles and security controls, and perform security assessments in order to identify social engineering attacks or malware. Gain knowledge on basic cryptographic concepts, authentication controls, data privacy, account management, network security protocols, and many other topics.
Modules in this course will cover:
  • Information Security Roles Security Control and Framework Types
  • Threat Actor Types, Attack Vectors, and Intelligence Sources
  • Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
  • Social Engineering, Indicators of Malware Attacks
  • Cryptography
  • Certificates and PKI
  • Authentication
  • Identity and Accounts, Authorization, Personnel Policies
  • Network Design and Hardware – Two Parts
  • Network Protocols
  • Endpoint Security
  • Mobile Devices
  • Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment, and Automation
  • Secure Coding, Scripting, Deployment, Cloud, and Virtualization
  • Privacy and Data Protection
  • Incident Response
  • Data Forensics
  • Risk Management, Business Impact Analysis
  • Redundancy and Backup Strategies
  • Physical Security
  • Security+ SY0-601 Exam Prep

Course Outline

Module 1: Information Security Roles Security Control and Framework Types

  •  Introduction and Overview
  •  Compare and Contrast Information Security Roles
  •  Compare and Contrast Security Control and Framework Types
  •  Module Summary

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

  •  Explain Threat Actor Types and Attack Vectors
  •  Explain Threat Intelligence Sources
  •  Module Summary

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

  •  Assess Organizational Security with Network Reconnaissance Tools
  •  Packet Capture and Replay Demo
  •  Explain Security Concerns with General Vulnerability Types
  •  Summarize Vulnerability Scanning Techniques
  •  Explain Penetration Testing Concepts
  •  Module Summary

Module 4: Social Engineering, Indicators of Malware Attacks

  •  Compare and Contrast Social Engineering Techniques
  •  Analyze Indicators of Malware-based Attacks
  •  Fork Bomb Malware Demo
  •  Module Summary

Module 5: Cryptography

  •  Compare and Contrast Cryptographic Ciphers
  •  Summarize Cryptographic Modes of Operation
  •  Summarize Cryptographic Use Cases and Weaknesses
  •  Summarize Other Cryptographic Technologies
  •  Module Summary

Module 6: Certificates and PKI

  •  Implement Certificates and Certificate Authorities
  •  Implement PKI Management
  •  Implementing a PKI Demo
  •  Module Summary

Module 7: Authentication

  •  Summarize Authentication Design Concepts
  •  Implement Knowledge-based Authentication
  •  Password Cracker Demo
  •  Implement Authentication Technologies
  •  Summarize Biometrics Authentication Concepts
  •  Module Summary

Module 8: Identity and Accounts, Authorization, Personnel Polices

  •  Implement Identity and Account Types
  •  Implement Account Policies
  •  Account Types and Polices Demo
  •  Implement Authorization Solutions
  •  Explain the Importance of Personnel Policies
  •  Module Summary

Module 9: Network Design and Hardware (Part 1)

  •  Implement Secure Network Designs
  •  Implement Secure Switching and Routing
  •  Various Types of Network Attacks Demo
  •  Implement Secure Wireless Infrastructure
  •  Implement Load Balancers
  •  Module Summary

Module 10: Network Hardware (Part 2)

  •  Implement Firewalls and Proxy Servers
  •  Implement Network Security Monitoring
  •  Summarize the Use of SIEM
  •  Module Summary

Module 11: Network Protocols

  •  Implement Secure Network Operations Protocols
  •  Implement Secure Application Protocols
  •  Implement Secure Remote Access Protocols
  •  Module Summary

Module 12: Endpoint Security

  •  Implement Secure Firmware
  •  Implement Endpoint Security
  •  Endpoint Protection Demo
  •  Explain Embedded System Security Implications
  •  Module Summary

Module 13: Mobile Devices

  •  Implement Mobile Device Management
  •  Implement Secure Mobile Device Connections
  •  Module Summary

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

  •  Analyze Indicators of Application Attack
  •  Analyze Indicators of Web Application Attacks
  •  Summarize Secure Coding Practices
  •  Implement Secure Script Environments
  •  Summarize Deployment and Automation Concepts
  •  Module Summary

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

  •  Summarize Secure Cloud and Virtualization Services
  •  Apply Cloud Security Solutions
  •  Summarize Infrastructure as Code Concepts
  •  Module Summary

Module 16: Privacy and Data Protection

  •  Explain Privacy and Data Sensitivity Concepts
  •  Explain Privacy and Data Protection Controls
  •  Module Summary

Module 17: Incident Response

  •  Summarize Incident Response Procedures
  •  Utilize Appropriate Data Sources for Incident Response
  •  Apply Mitigation Controls
  •  Module Summary

Module 18: Forensics

  •  Explain Key Aspects of Digital Forensics Documentation
  •  Explain Key Aspects of Digital Forensics Evidence Acquisition
  •  Module Summary

Module 19: Risk Management and Business Impact Analysis

  •  Explain Risk Management Processes and Concepts
  •  Explain Business Impact Analysis Concepts
  •  Module Summary

Module 20: Redundancy and Backup Strategies

  •  Implement Redundancy Strategies
  •  Implement Backup Strategies
  •  Implement Cybersecurity Resiliency Strategies
  •  Module Summary

Module 21: Physical Security

  •  Explain the Importance of Physical Site Controls
  •  Explain the Importance of Physical Host Security Controls
  •  Module Summary

Module 22: Afterword

  •  Conclusion and General Exam Tips

Reviews

There are no reviews yet.

Be the first to review “CompTIA Security+ Certification Course (SY0-501)”

Your email address will not be published. Required fields are marked *