CompTIA Security+ Certification Training CompTIA Security+ Certification Trang (SY0-601)
Commitment | 5 days, 7-8 hours a day. |
Language | English |
User Ratings | Average User Rating 4.8 See what learners said |
Price | REQUEST |
Delivery Options | Instructor-Led Onsite, Online, and Classroom Live |
COURSE OVERVIEW
Prepare for the CompTIA Security+ SYO-601 certification while building your cybersecurity knowledge, skills, and abilities. Our CompTIA Security+ Certification Training (SY0-601) Workshop provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This CompTIA Security+ Certification Training (SY0-601) Workshop course maps to the CompTIA Security+ certification exam (SY0-601). Our Classroom and Classroom Live courses utilize official CompTIA courseware and labs. Objective coverage is marked throughout the course.
WHAT IS SECURITY+ CERTIFICATION?
The Security+ certification is considered to be the minimum level of certification for all IT security positions beyond entry-level. This CompTIA Security+ Certification Training (SY0-601) course delivers the core knowledge required to pass the exam and the skills necessary to advance to an intermediate-level security job.
Students will benefit most from this course if they intend to take the CompTIA Security+ SY0-601 exam. Read our white paper titled “New Topics on the New Security+ SY0-601 Exam.” This CompTIA Security+ Certification Training (SY0-601) course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.
EXAM INFORMATION
- Duration: 90 minutes
- Number of questions: 90 questions per exam
- Question format: Multiple choice and performance-based
- Pass score: 750 (on a scale of 100-900)
- This course prepares you for the Security+ certification exam based on the 2020 objectives (exam SY0-601).
- The SY0-601 exam is included in the approved list of certifications that meet DoD Directive 8570.1 requirements.
WHAT'S INCLUDED?
- 5 Days of CompTIA Security+ Training from an Authorized CompTIA Instructor
- CompTIA-approved CompTIA Security+ Training Courseware (Digital and Print)
- CompTIA-approved Security+ Practice Exams
- CompTIA Security+ Certification (SYO-601) exam voucher
- 100% Satisfaction Guarantee
- Exam Pass Guarantee
RESOURCES
- CompTIA Security+ Certification Training (SY0-601) – https://www.wiley.com/
- CompTIA Security+ Certification Training (SY0-601) – https://www.packtpub.com/
- CompTIA Security+ Certification Training (SY0-601) – https://store.logicaloperations.com/
- CompTIA Security+ Certification Training (SY0-601) – https://us.artechhouse.com/
- CompTIA Security+ Certification Training (SY0-601) – https://www.amazon.com/
RELATED COURSES
- CompTIA A+ Certification Training (Exam 220-1001/1002)
- Certified Authorization Professional (CAP) Training
- CompTIA IT Fundamentals+ (ITF+) Certification Training
- CompTIA Cloud+ Certification Training (CVO-003)
- CompTIA Advanced Security Practitioner (CASP+) Training
- CompTIA Penetration Tester+ Certification Training (PenTest+)
- CompTIA Cybersecurity Analyst (CySA+) Certification Training
- CompTIA Linux+ Certification Training (XK0-004)
- CompTIA Network+ Certification Training (N10-008)
- CompTIA Server+ Certification Training (SK0-005)
ADDITIONAL INFORMATION
COURSE OBJECTIVES
Security+ holders should be able to help organizations proactively identify potential security risks and respond more quickly when security breaches do occur. Upon completing this CompTIA Security+ Certification, you will have learned valuable knowledge and skills, including the ability to:
- Proactively implement sound security protocols to mitigate security risks
- Quickly respond to security issues
- Retroactively identify where security breaches may have occurred
- Design a network, on-site or in the cloud, with security in mind
CUSTOMIZE IT
- We can adapt this CompTIA Security+ Certification Training (SY0-601) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this CompTIA Security+ Certification Training (SY0-601) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the CompTIA Security+ Certification Training (SY0-601) around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CompTIA Security+ Certification Training (SY0-601) course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The CompTIA Security+ Certification (SY0-601) program, much like the certification itself, is intended for professionals who are responsible for network security and risk management. Some example job functions may include, but are not limited to:
- IT support technicians
- Help desk support
- Junior network administrators
- Application support analysts
- Security analysts
- Security specialists
- Anyone looking to learn a baseline of information security concepts
CLASS PREREQUISITES
Attendees should be CompTIA A+ certified (or have equivalent experience) and CompTIA Network+ certified (or have equivalent experience) with 2-3 years of networking experience.
COURSE SYLLABUS
Lesson 1: Comparing Security Roles and Controls
- Topic 1A: Compare and Contrast Information Security Roles
- Topic 1B: Compare and Contrast Security Control and Framework Types
Lesson 2: CompTIA Security+ Certification Training – Explaining Threat Actors and Threat Intelligence
- Topic 2A: Explain Threat Actor Types and Attack Vectors
- Topic 2B: Explain Threat Intelligence Sources
Lesson 3: Performing Security Assessments
- Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
- Topic 3B: Explain Security Concerns with General Vulnerability Types
- Topic 3C: Summarize Vulnerability Scanning Techniques
- Topic 3D: Explain Penetration Testing Concepts
Lesson 4: Identifying Social Engineering and Malware
- Topic 4A: Compare and Contrast Social Engineering Techniques
- Topic 4B: Analyze Indicators of Malware-Based Attacks
Lesson 5: Summarizing Basic Cryptographic Concepts
- Topic 5A: Compare and Contrast Cryptographic Ciphers
- Topic 5B: Summarize Cryptographic Modes of Operation
- Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
- Topic 5D: Summarize Other Cryptographic Technologies
Lesson 6: Implementing Public Key Infrastructure
- Topic 6A: Implement Certificates and Certificate Authorities
- Topic 6B: Implement PKI Management
Lesson 7: Implementing Authentication Controls
- Topic 7A: Summarize Authentication Design Concepts
- Topic 7B: Implement Knowledge-Based Authentication
- Topic 7C: Implement Authentication Technologies
- Topic 7D: Summarize Biometrics Authentication Concepts
Lesson 8: Implementing Identity and Account Management Controls
- Topic 8A: Implement Identity and Account Types
- Topic 8B: Implement Account Policies
- Topic 8C: Implement Authorization Solutions
- Topic 8D: Explain the Importance of Personnel Policies
Lesson 9: Implementing Secure Network Designs
- Topic 9A: Implement Secure Network Designs
- Topic 9B: Implement Secure Switching and Routing
- Topic 9C: Implement Secure Wireless Infrastructure
- Topic 9D: Implement Load Balancers
Lesson 10: CompTIA Security+ Certification Training – Implementing Network Security Appliances
- Topic 10A: Implement Firewalls and Proxy Servers
- Topic 10B: Implement Network Security Monitoring
- Topic 10C: Summarize the Use of SIEM
Lesson 11: Implementing Secure Network Protocols
- Topic 11A: Implement Secure Network Operations Protocols
- Topic 11B: Implement Secure Application Protocols
- Topic 11C: Implement Secure Remote Access Protocols
Lesson 12: Implementing Host Security Solutions
- Topic 12A: Implement Secure Firmware
- Topic 12B: Implement Endpoint Security
- Topic 12C: Explain Embedded System Security Implications
Lesson 13: Implementing Secure Mobile Solutions
- Topic 13A: Implement Mobile Device Management
- Topic 13B: Implement Secure Mobile Device Connections
Lesson 14: Summarizing Secure Application Concepts
- Topic 14A: Analyze Indicators of Application Attacks
- Topic 14B: Analyze Indicators of Web Application Attacks
- Topic 14C: Summarize Secure Coding Practices
- Topic 14D: Implement Secure Script Environments
- Topic 14E: Summarize Deployment and Automation Concepts
Lesson 15: Implementing Secure Cloud Solutions
- Topic 15A: Summarize Secure Cloud and Virtualization Services
- Topic 15B: Apply Cloud Security Solutions
- Topic 15C: Summarize Infrastructure as Code Concepts
Lesson 16: Explaining Data Privacy and Protection Concepts
- Topic 16A: Explain Privacy and Data Sensitivity Concepts
- Topic 16B: Explain Privacy and Data Protection Controls
Lesson 17: CompTIA Security+ Certification Training – Performing Incident Response
- Topic 17A: Summarize Incident Response Procedures
- Topic 17B: Utilize Appropriate Data Sources for Incident Response
- Topic 17C: Apply Mitigation Controls
Lesson 18: Explaining Digital Forensics
- Topic 18A: Explain Key Aspects of Digital Forensics Documentation
- Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
Lesson 19: Summarizing Risk Management Concepts
- Topic 19A: Explain Risk Management Processes and Concepts
- Topic 19B: Explain Business Impact Analysis Concepts
Lesson 20: Implementing Cybersecurity Resilience
- Topic 20A: Implement Redundancy Strategies
- Topic 20B: Implement Backup Strategies
- Topic 20C: Implement Cybersecurity Resiliency Strategies
Lesson 21: Explaining Physical Security
- Topic 21A: Explain the Importance of Physical Site Security Controls
- Topic 21B: Explain the Importance of Physical Host Security Controls
LABS:
Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
- Assisted Lab: Exploring the Lab Environment
- Assisted Lab: Scanning and Identifying Network Nodes
- Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools
Topic 3C: Summarize Vulnerability Scanning Techniques
- Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan
Topic 4B: Analyze Indicators of Malware-Based Attacks
- Assisted Lab: Installing, Using, and Blocking a Malware-based Backdoor
- APPLIED LAB: Performing Network Reconnaissance and Vulnerability Scanning
Topic 6A: Implement Certificates and Certificate Authorities
- Assisted Lab: Managing the Lifecycle of a Certificate
- Assisted Lab: Managing Certificates with OpenSSL
Topic 7B: Implement Knowledge-Based Authentication
- Assisted Lab: Auditing Passwords with a Password Cracking Utility
Topic 7C: Implement Authentication Technologies
- Assisted Lab: Managing Centralized Authentication
Topic 8B: Implement Account Policies
- Assisted Lab: Managing Access Controls in Windows Server
- Assisted Lab: Configuring a System for Auditing Policies
Topic 8C: Implement Authorization Solutions
- Assisted Lab: Managing Access Controls in Linux
Topic 8D: Explain the Importance of Personnel Policies
- APPLIED LAB: Configuring Identity and Access Management Controls
Topic 9B: Implement Secure Switching and Routing
- Assisted Lab: Implementing a Secure Network Design
Topic 10A: Implement Firewalls and Proxy Servers
- Assisted Lab: Configuring a Firewall
Topic 10B: Implement Network Security Monitoring
- Assisted Lab: Configuring an Intrusion Detection System
Topic 11B: Implement Secure Application Protocols
- Assisted Lab: Implementing Secure Network Addressing Services
Topic 11C: Implement Secure Remote Access Protocols
- Assisted Lab: Implementing a Virtual Private Network
- Assisted Lab: Implementing a Secure SSH Server
Topic 12B: Implement Endpoint Security
- Assisted Lab: Implementing Endpoint Protection
- APPLIED LAB: Securing the Network Infrastructure
Topic 14A: Analyze Indicators of Application Attacks
- Assisted Lab: Identifying Application Attack Indicators
Topic 14B: CompTIA Security+ Certification Training – Analyze Indicators of Web Application Attacks
- Assisted Lab: Identifying a Browser Attack
Topic 14D: Implement Secure Script Environments
- Assisted Lab: Implementing PowerShell Security
- Assisted Lab: Identifying Malicious Code
Topic 14E: Summarize Deployment and Automation Concepts
- APPLIED LAB: Identifying Application Attacks
Topic 17B: Utilize Appropriate Data Sources for Incident Response
- Assisted Lab: Managing Data Sources for Incident Response
Topic 17C: Apply Mitigation Controls
- Assisted Lab: Configuring Mitigation Controls
Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
Evidence Acquisition
- Assisted Lab: Acquiring Digital Forensics Evidence
Topic 20B: Implement Backup Strategies
- Assisted Lab: Backing Up and Restoring Data in Windows and Linux
Topic 20C: Implement Cybersecurity Resiliency Strategies
- APPLIED LAB: Managing Incident Response, Mitigation, and Recovery