Class Is Recorded with Unlimited Access for 90-Days
We Coach Until You Pass
100 % Exam Pass Guarantee
12-Additional Hours of Exam Review at No Charge
Overview
Welcome to CompTIA Security+ SY0-601. This course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format; this includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This course maps to the CompTIA Security+ certification exam.
You will benefit most from this course if you intend to take a CompTIA Security+ SY0-601 exam.
This course assumes that you have basic knowledge of using and configuring individual workstations and simple networks. Knowledge equivalent to the CompTIA A+ and Network+ certifications is helpful but not necessary.
Benefits:
- Pass your exam, guaranteed (if you don’t pass, you’ll be coached until you do)
- Intensive Authorized Virtual-Live Training (online live sessions)
- Post-training Virtual-Live exam mentoring and coaching sessions for 3-weeks (6 total events or 12-hours of exam coaching) via the student portal
- YOUR live class is recorded and turned into eLearning with 3-months access via the student portal
- Message your trainer in-platform until you pass
- Access mock exams, exam prep, and assessments to ensure you are ready to test
Curriculum
Introduction
Course setup
Chapter 1: Security fundamentals
Chapter 1: Security fundamentals
Module A: Security concepts
Module B: Enterprise security strategy
Module C: Security program components
Chapter 2: Risk management
Module A: Understanding threats
Module B: Risk management programs
Module C: Security assessments
Chapter 3: Cryptography
Module A: Cryptography concepts
Module B: Public key infrastructure
Chapter 4: Network connectivity
Module A: Network attacks
Module B: Packet flow
Chapter 5: Network security technologies
Module A: Network security components
Module B: Monitoring tools
Chapter 6: Secure network configuration
Module A: Secure network protocols
Module B: Hardening networks
Chapter 7: Authentication
Module A: Authentication factors
Module B: Authentication protocols
Chapter 8: Access control
Module A: Access control principles
Module B: Account management
Chapter 9: Securing hosts and data
Module A: Malware
Module B: Securing data
Module C: Securing hosts
Chapter 10: Securing specialized systems
Module A: Mobile security
Module B: Embedded and specialized systems
Chapter 11: Application security
Module A: Application attacks
Module B: Securing applications
Chapter 12: Cloud security
Module A: Virtual and cloud systems
Module B: Securing cloud services
Chapter 13: Organizational security
Module A: Social engineering
Module B: Security policies
Module C: User roles and training
Module D: Physical security and safety
Chapter 14: Disaster planning and recovery
Module A: Business continuity
Module B: Resilient systems
Module C: Incident response procedures
Appendix A: Glossary