CompTIA Security+ Certification (Exam SY0-601)
Who Should Attend
This course is designed for information technology (IT) professionals who have networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix®, or Linux®; and who want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles. This course is also designed for students who are seeking the CompTIA Security+ certification and who want to prepare for the CompTIA Security+ SY0-601 Certification Exam.
In this course, students will use fundamental security principles to install and configure cybersecurity controls and participate in incident response and risk mitigation. Students will: – Compare and contrast attacks. – Compare and contrast security controls. – Use security assessment tools. – Explain basic cryptography concepts. – Implement a public key infrastructure. – Implement identity and access management controls. – Manage access services and accounts. – Implement a secure network architecture. – Install and configure security appliances. – Install and configure wireless and physical access security. – Deploy secure host, mobile, and embedded systems. – Implement secure network access protocols. – Implement secure network applications. – Explain risk management and disaster recovery concepts. – Describe secure application development concepts. – Explain organizational security concepts.
Compare and Contrast Information Security Roles Compare and Contrast Security Control and Framework Types
Explain Threat Actor Types and Attack Vectors Explain Threat Intelligence Sources
Assess Organizational Security with Network Reconnaissance Tools Explain Security Concerns with General Vulnerability Types Summarize Vulnerability Scanning Techniques Explain Penetration Testing Concepts
Compare and Contrast Social Engineering Techniques Analyze Indicators of Malware-Based Attacks
Compare and Contrast Cryptographic Ciphers Summarize Cryptographic Modes of Operation Summarize Cryptographic Use Cases and Weaknesses Summarize Other Cryptographic Technologies
Implement Certificates and Certificate Authorities Implement PKI Management
Summarize Authentication Design Concepts Implement Knowledge-Based Authentication Implement Authentication Technologies Summarize Biometrics Authentication Concepts`
Implement Identity and Account Types Implement Account Policies Implement Authorization Solutions Explain the Importance of Personnel Policies
Implement Secure Network Designs Implement Secure Switching and Routing Implement Secure Wireless Infrastructure Implement Load Balancers
Implement Firewalls and Proxy Servers Implement Network Security Monitoring Summarize the Use of SIEM
Implement Secure Network Operations Protocols Implement Secure Application Protocols Implement Secure Remote Access Protocols
Implement Secure Firmware Implement Endpoint Security Explain Embedded System Security Implications
Implement Mobile Device Management Implement Secure Mobile Device Connections
Analyze Indicators of Application Attacks Analyze Indicators of Web Application Attacks Summarize Secure Coding Practices Implement Secure Script Environments Summarize Deployment and Automation Concepts
Summarize Secure Cloud and Virtualization Services Apply Cloud Security Solutions Summarize Infrastructure as Code Concepts
Explain Privacy and Data Sensitivity Concepts Explain Privacy and Data Protection Controls
Summarize Incident Response Procedures Utilize Appropriate Data Sources for Incident Response Apply Mitigation Controls
Explain Key Aspects of Digital Forensics Documentation Explain Key Aspects of Digital Forensics Evidence Acquisition
Explain Risk Management Processes and Concepts Explain Business Impact Analysis Concepts
Implement Redundancy Strategies Implement Backup Strategies Implement Cybersecurity Resiliency Strategies
Explain the Importance of Physical Site Security Controls Explain the Importance of Physical Host Security Controls
Enroll in this course
Select a start date for your 5 Day course
This course begins at 9:00 Eastern
And ends at 17:00 Eastern
Questions About This Course?
Need Help Finding The Right Training Solution?
Our training advisors are here for you.