S+ – Security Plus (SYO-601)

  • Vendor: CompTIA
  • Class: 5 Days
  • Voucher: Yes
  • Certification: Security+ Certified
  • Exam Method: Virtual Exam at Home
  • 5 Days
  • Virtual - Live


Welcome to CompTIA Security+ SY0-601. This course provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format; this includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This course maps to the CompTIA Security+ certification exam.

You will benefit most from this course if you intend to take a CompTIA Security+ SY0-601 exam.

This course assumes that you have basic knowledge of using and configuring individual workstations and simple networks. Knowledge equivalent to the CompTIA A+ and Network+ certifications is helpful but not necessary.


    1. Pass your exam, guaranteed
    2. Intensive and Authorized Virtual-Live Training (online live sessions)
    3. Post-training Virtual-Live exam mentoring and coaching sessions for 6-weeks (12 total events) via student portal
    4. YOUR live class is recorded and turned into eLearning with 3-months access via student portal
    5. Message your trainer in-platform for 6-weeks
    6. Access mock exams, exam prep, and assessments to ensure you are ready to test



Course setup

Chapter 1: Security fundamentals

Chapter 1: Security fundamentals

Module A: Security concepts

Module B: Enterprise security strategy

Module C: Security program components

Chapter 2: Risk management

Module A: Understanding threats

Module B: Risk management programs

Module C: Security assessments

Chapter 3: Cryptography

Module A: Cryptography concepts

Module B: Public key infrastructure

Chapter 4: Network connectivity

Module A: Network attacks

Module B: Packet flow

Chapter 5: Network security technologies

Module A:  Network security components

Module B: Monitoring tools

Chapter 6: Secure network configuration

Module A: Secure network protocols

Module B: Hardening networks

Chapter 7: Authentication

Module A: Authentication factors

Module B: Authentication protocols

Chapter 8: Access control

Module A: Access control principles

Module B: Account management

Chapter 9: Securing hosts and data

Module A: Malware

Module B: Securing data

Module C: Securing hosts

Chapter 10: Securing specialized systems

Module A: Mobile security

Module B: Embedded and specialized systems

Chapter 11: Application security

Module A: Application attacks

Module B: Securing applications

Chapter 12: Cloud security

Module A: Virtual and cloud systems

Module B: Securing cloud services

Chapter 13: Organizational security

Module A: Social engineering

Module B: Security policies

Module C: User roles and training

Module D: Physical security and safety

Chapter 14: Disaster planning and recovery

Module A: Business continuity

Module B: Resilient systems

Module C: Incident response procedures

Appendix A: Glossary

Upcoming Classes


Type of Training: ISACA

Virtual – Live,




Type of Training: ISC2

Virtual – Live,



Risk Management Framework (RMF) v2 DoD/IC

Type of Training: RMF

Virtual – Live,




Type of Training: ISACA

Virtual – Live,




Type of Training: ISACA

S+ – Security Plus (SYO-601),


Do not sell my info