COMPTIA SECURITY+ CERTIFICATION
Prepare for the CompTIA Security+ SYO-701 certification while building your cybersecurity knowledge, skills, and abilities.
Our Security+ Certification Prep Course provides the basic knowledge needed to
plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This course maps to the CompTIA Security+ certification exam (SY0-701). Objective coverage is marked throughout the course.
This course includes an exam voucher.
WHAT YOU’LL LEARN
• Compare Security Roles and Security Controls
• Explain Threat Actors and Threat Intelligence
• Perform Security Assessments
• Identify Social Engineering and Malware
• Summarize Basic Cryptographic Concepts
• Implement Public Key Infrastructure
• Implement Authentication Controls
• Implement Identity and Account Management Controls
• Implement Secure Network Designs
• Implement Network Security Appliances
• Implement Secure Network Protocols
• Implement Host Security Solutions
• Implement Secure Mobile Solutions
• Summarize Secure Application Concepts
• Implement Secure Cloud Solutions
• Explain Data Privacy and Protection Concepts
• Perform Incident Response
• Explain Digital Forensics
• Summarize Risk Management Concepts
• Implement Cybersecurity Resilience
• Explain Physical Security
WHAT IS SECURITY+ CERTIFICATION?
The Security+ certification is considered to be the minimum level of certification for all IT security positions beyond entry-level. This course delivers the core knowledge required to pass the exam and the skills necessary to advance to an intermediate-level security job.
Students will benefit most from this course if they intend to take the CompTIA Security+ SY0-601 exam.
This course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.
WHO NEEDS TO ATTEND?
• Network Administrators
• Cybersecurity Associates
• IT personnel interested in pursuing a career in cybersecurity
Prerequisites
This course assumes basic knowledge of using and maintaining individual workstations.
Attendees should be CompTIA A+ certified (or have equivalent experience) and CompTIA Network+ certified (or have equivalent experience) with 2-3 years networking experience.
TABLE OF CONTENTS
• Lesson 1: Comparing Security Roles and Security Controls
• Lesson 2: Explaining Threat Actors and Threat Intelligence
• Lesson 3: Performing Security Assessments
• Lesson 4: Identifying Social Engineering and Malware
• Lesson 5: Summarizing Basic Cryptographic Concepts
• Lesson 6: Implementing Public Key Infrastructure
• Lesson 7: Implementing Authentication Controls
• Lesson 8: Implementing Identity and Account Management Controls
• Lesson 9: Implementing Secure Network Designs
• Lesson 10: Implementing Network Security Appliances
• Lesson 11: Implementing Secure Network Protocols
• Lesson 12: Implementing Host Security Solutions
• Lesson 13: Implementing Secure Mobile Solutions
• Lesson 14: Summarizing Secure Application Concepts
• Lesson 15: Implementing Secure Cloud Solutions
• Lesson 16: Explaining Data Privacy and Protection Concepts
• Lesson 17: Performing Incident Response
• Lesson 18: Explaining Digital Forensics
• Lesson 19: Summarizing Risk Management Concepts
• Lesson 20: Implementing Cybersecurity Resilience
• Lesson 21: Explaining Physical Security
• Appendix A: Mapping Course Content to CompTIA Security+ SY0-601 Exam
Objectives
• Appendix B: Course Acronyms
CLASSROOM LIVE LABS
• Assisted Lab: Exploring the Lab Environment
• Assisted Lab: Scanning and Identifying Network Nodes
• Assisted Lab: Intercepting and Interpreting Network Traffic with Packet
Sniffing Tools
• Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan
• Assisted Lab: Installing, Using, and Blocking a Malware-based Backdoor
• Applied Lab: Performing Network Reconnaissance and Vulnerability Scanning
• Assisted Lab: Managing the Lifecycle of a Certificate
• Assisted Lab: Managing Certificates with OpenSSL
• Assisted Lab: Auditing Passwords with a Password Cracking Utility
• Assisted Lab: Managing Centralized Authentication
• Assisted Lab: Managing Access Controls in Windows Server
• Assisted Lab: Configuring a System for Auditing Policies
• Assisted Lab: Managing Access Controls in Linux
• Applied Lab: Configuring Identity and Access Management Controls
• Assisted Lab: Implementing a Secure Network Design
• Assisted Lab: Configuring a Firewall
• Assisted Lab: Configuring an Intrusion Detection System
• Assisted Lab: Implementing Secure Network Addressing Services
• Assisted Lab: Implementing a Virtual Private Network
• Assisted Lab: Implementing a Secure SSH Server
• Assisted Lab: Implementing Endpoint Protection
• Applied Lab: Securing the Network Infrastructure
• Assisted Lab: Identifying Application Attack Indicators
• Assisted Lab: Identifying a Browser Attack
• Assisted Lab: Implementing PowerShell Security
• Assisted Lab: Identifying Malicious Code
• Applied Lab: Identifying Application Attacks
• Assisted Lab: Managing Data Sources for Incident Response
• Assisted Lab: Configuring Mitigation Controls
• Assisted Lab: Acquiring Digital Forensics Evidence
• Assisted Lab: Backing Up and Restoring Data in Windows and Linux
• Applied Lab: Managing Incident Response, Mitigation and Recovery