CompTIA Security+ Certification (Exam SY0-601)
This course maps to the CompTIA Security+ certification exam (SY0-601) and establishes the core knowledge required of any cybersecurity role, as well as providing a springboard to intermediate-level cybersecurity jobs. This course emphasizes both the practical and hands-on ability to identify and address security threats, attacks and vulnerabilities. CompTIA Security+ is a globally trusted, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. CompTIA Security+ is also a DoD Approved 8570 Baseline Certification and this course meets DoD 8140/8570 Training requirements
This course may earn a Credly Badge.
Objectives
In this course you will:
- Prepare for the CompTIA Security+ exam
- Confidently explain and define an array of security vulnerabilities
- Navigate the complexities of secure system and network design
- Explore the defensive measures like PKI, firewalls and IDS
- Implement robust identity management and access control
Target Audience
This course is designed for information technology (IT) professionals who have networking and administrative skills in Windows-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS, Unix, or Linux; and who want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles.
This course is also designed for students who are seeking the CompTIA Security+ certification and who want to prepare for the CompTIA Security+ SY0-601 Certification Exam.
Prerequisites
A+, Network+
Starts Ends Time Sessions Price Enroll 01/08/2024 01/19/2024 9:00 am - 1:00 pm PT 10 $2,475.00 02/05/2024 02/16/2024 2:00 pm - 6:00 pm PT 10 $2,475.00 03/18/2024 03/29/2024 9:00 am - 1:00 pm PT 10 $2,475.00 04/15/2024 04/26/2024 2:00 pm - 6:00 pm PT 10 $2,475.00 06/03/2024 06/14/2024 9:00 am - 1:00 pm PT 10 $2,475.00 Comparing Security Roles and Controls
- Topic 1A- Compare and Contrast Information Security Roles
- Topic 1B- Compare and Contrast Security Control and Framework Types
Explaining Threat Actors and Threat Intelligence
- Topic 2A- Explain Threat Actor Types and Attack Vectors
Performing Security Assessments
- Topic 3A- Assess Organizational Security with Network Reconnaissance Tools
- Topic 3B- Explain Security Concerns with General Vulnerability Types
- Topic 3C- Summarize Vulnerability Scanning Techniques
- Topic 3D- Explain Penetration Testing Concepts
Identifying Social Engineering and Malware
- Topic 4A- Compare and Contrast Social Engineering Techniques
- Topic 4B- Analyze Indicators of Malware-Based Attacks
Summarizing Basic Cryptographic Concepts
- Topic 5A- Compare and Contrast Cryptographic Ciphers
- Topic 5B- Summarize Cryptographic Modes of Operation
- Topic 5C- Summarize Cryptographic Use Cases and Weaknesses
- Topic 5D- Summarize Other Cryptographic Technologies
Implementing Public Key Infrastructure
- Topic 6A- Implement Certificates and Certificate Authorities
- Topic 6B- Implement PKI Management
Implementing Authentication Controls
- Topic 7A- Summarize Authentication Design Concepts
- Topic 7B- Implement Knowledge-Based Authentication
- Topic 7C- Implement Authentication Technologies
- Topic 7D- Summarize Biometrics Authentication Concepts
Implementing Identity and Account Management Controls
- Topic 8A- Implement Identity and Account Types
- Topic 8B- Implement Account Policies
- Topic 8C- Implement Authorization Solutions
- Topic 8D- Explain the Importance of Personnel Policies
Implementing Secure Network Designs
- Topic 9A- Implement Secure Network Designs
- Topic 9B- Implement Secure Switching and Routing
- Topic 9C- Implement Secure Wireless Infrastructure
- Topic 9D- Implement Load Balancers
Implementing Network Security Appliances
- Topic 10A- Implement Firewalls and Proxy Servers
- Topic 10B- Implement Network Security Monitoring
- Topic 10C- Summarize the Use of SIEM
Implementing Secure Network Protocols
- Topic 11A- Implement Secure Network Operations Protocols
- Topic 11B- Implement Secure Application Protocols
- Topic 11C- Implement Secure Remote Access Protocols
Implementing Host Security Solutions
- Topic 12A- Implement Secure Firmware
- Topic 12B- Implement Endpoint Security
- Topic 12C- Explain Embedded System Security Implications
Implementing Secure Mobile Solutions
- Topic 13A- Implement Mobile Device Management
- Topic 13B- Implement Secure Mobile Device Connections
Summarizing Secure Application Concepts
- Topic 14A- Analyze Indicators of Application Attacks
- Topic 14B- Analyze Indicators of Web Application Attacks
- Topic 14C- Summarize Secure Coding Practices
- Topic 14D- Implement Secure Script Environments
- Topic 14E- Summarize Deployment and Automation Concepts
Implementing Secure Cloud Solutions
- Topic 15A- Summarize Secure Cloud and Virtualization Services
- Topic 15B- Apply Cloud Security Solutions
- Topic 15C- Summarize Infrastructure as Code Concepts
Explaining Data Privacy and Protection Concepts
- Topic 16A- Explain Privacy and Data Sensitivity Concepts
- Topic 16B- Explain Privacy and Data Protection Controls
Performing Incident Response
- Topic 17A- Summarize Incident Response Procedures
- Topic 17B- Utilize Appropriate Data Sources for Incident Response
- Topic 17C- Apply Mitigation Controls
Explaining Digital Forensics
- Topic 18A- Explain Key Aspects of Digital Forensics Documentation
- Topic 18B- Explain Key Aspects of Digital Forensics Evidence Acquisition
Summarizing Risk Management Concepts
- Topic 19A- Explain Risk Management Processes and Concepts
Implementing Cybersecurity Resilience
- Topic 20A- Implement Redundancy Strategies
- Topic 20B- Implement Backup Strategies
- Topic 20C- Implement Cybersecurity Resiliency Strategies
Explaining Physical Security
- Topic 21A- Explain the Importance of Physical Site Security Controls
- Topic 21B- Explain the Importance of Physical Host Security Controls