logo
ABD
LiveZilla Live Chat Software



Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey
While System Source is working from home, we are still available for all of your calls and support needs.

CompTIA Security+ Certification Prep (Exam SYO-601)

SS Course: 2001530

Course Overview

TOP

CompTIA Security+ is an excellent entry point for a career in information security. The latest version, SY0-601, expands coverage of cybersecurity threats, risk management, and IoT threats.

Gain the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents.

DoD approved CompTIA Security+ training prepares you for the SY0-601 exam, required for earning the vendor-neutral CompTIA Security+ certification.

                                                                  

Scheduled Classes

TOP
09/20/21 - NVT - Virtual Classroom - Live Virtual

What You'll Learn

TOP
  • Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
  • Implement secure network architecture concepts and systems design
  • Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security
  • Install and configure identity and access services, as well as management controls
  • Implement and summarize risk management best practices and the business impact
  • Install and configure wireless security settings and implement public key infrastructure

Outline

TOP
Viewing outline for:
  1. Threats, Attacks and Vulnerabilities
    1. Compare and contrast different types of social engineering techniques
    2. Analyze potential indicators to determine the type of attack
    3. Analyze potential indicators associated with application attacks
    4. Analyze potential indicators associated with network attacks
    5. Explain different threat actors, vectors, and intelligence sources
    6. Explain the security concerns associated with various types of vulnerabilities
    7. Summarize the techniques used in security assessments
    8. Explain the techniques used in penetration testing
  2. Architecture and Design
    1. Explain the importance of security concepts in an enterprise environment
    2. Summarize virtualization and cloud computing concepts
    3. Summarize secure application development, deployment, and automation concepts
    4. Summarize authentication and authorization design concepts
    5. Implement cybersecurity resilience
    6. Explain the security implications of embedded and specialized systems
    7. Explain the importance of physical security controls
    8. Summarize the basics of cryptographic concepts
  3. Implementation
    1. Implement secure protocols
    2. Implement host or application security solutions
    3. Implement secure network designs
    4. Install and configure wireless security settings
    5. Implement secure mobile solutions
    6. Apply cybersecurity solutions to the cloudGiven a scenario, implement identity and account management controls
    7. Implement authentication and authorization solutions
    8. Implement public key infrastructure
  4. Operations and Incident Response
    1. Use the appropriate tool to assess organizational security
    2. Summarize the importance of policies, processes, and procedures for incident response
    3. Utilize appropriate data sources to support an investigation
    4. Apply mitigation techniques or controls to secure an environment
    5. Explain the key aspects of digital forensics
  5. Governance, Risk, and Compliance
    1. Compare and contrast various types of controls
    2. Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
    3. Explain the importance of policies to organizational security
    4. Summarize risk management processes and concepts
    5. Explain privacy and sensitive data concepts in relation to security.

Prerequisites

TOP
  • Required

    • Two years of experience in IT administration with a security focus
    • CompTIA Network+ Certification Prep (Exam N10-007)

    Who Should Attend

    TOP
    • Systems Administrator
    • Security Administrator
    • Security Specialist
    • Security Engineer
    • Network Administrator
    • Junior IT Auditor/ Penetration Tester
    • Security Consultant

    Next Step Courses

    TOP