CompTIA Security+ (Exam SYO-501)
9/28/2020 - 10/2/2020COURSE LENGTH:
9:00am - 4:30pm
CompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
AUDIENCE AND PREREQUISITES
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.
To ensure your success in this course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts. You can obtain this level of skills and knowledge by taking one of the following Logical Operations courses:
Using Microsoft® Windows® 10
Microsoft® Windows® 10 Transition from Windows® 7
CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months’ experience in networking, including configuring security parameters, are strongly recommended
Additional introductory courses or work experience in application development and programming, or in network and operating system administration for any software platform or system, are helpful but not required:
Microsoft® Windows® Server 2016: Install, Store, and Compute
Microsoft® Windows® Server 2016: Networking
Microsoft® Windows® Server 2016: Identity
*Course Cost listed does not include the cost of courseware. Please refer to your Invoice for the additional cost. If you have any questions, please contact us at firstname.lastname@example.org or 207-775-0244. Course to run is subject to minimum enrollment. If minimum is not met this class may run as a virtual instructor led class.
Lesson 1: Identifying Security Fundamentals Topic A: Identify Information Security Concepts Topic B: Identify Basic Security Controls Topic C: Identify Basic Authentication and Authorization Concepts Topic D: Identify Basic Cryptography ConceptsLesson 2: Analyzing Risk Topic A: Analyze Organizational Risk Topic B: Analyze the Business Impact of RiskLesson 3: Identifying Security Threats Topic A: Identify Types of Attackers Topic B: Identify Social Engineering Attacks Topic C: Identify Malware Topic D: Identify Software-Based Threats Topic E: Identify Network-Based Threats Topic F: Identify Wireless Threats Topic G: Identify Physical ThreatsLesson 4: Conducting Security Assessments Topic A: Identify Vulnerabilities Topic B: Assess Vulnerabilities Topic C: Implement Penetration TestingLesson 5: Implementing Host and Software Security Topic A: Implement Host Security Topic B: Implement Cloud and Virtualization Security Topic C: Implement Mobile Device Security Topic D: Incorporate Security in the Software Development LifecycleLesson 6: Implementing Network Security Topic A: Configure Network Security Technologies Topic B: Secure Network Design Elements Topic C: Implement Secure Networking Protocols and Services Topic D: Secure Wireless TrafficLesson 7: Managing Identity and Access Topic A: Implement Identity and Access Management Topic B: Configure Directory Services Topic C: Configure Access Services Topic D: Manage AccountsLesson 8: Implementing Cryptography Topic A: Identify Advanced Cryptography Concepts Topic B: Select Cryptographic Algorithms Topic C: Configure a Public Key Infrastructure Topic D: Enroll Certificates Topic E: Back Up and Restore Certificates and Private Keys Topic F: Revoke CertificatesLesson 9: Implementing Operational Security Topic A: Evaluate Security Frameworks and Guidelines Topic B: Incorporate Documentation in Operational Security Topic C: Implement Security Strategies Topic D: Manage Data Security Processes Topic E: Implement Physical ControlsLesson 10: Addressing Security Incidents Topic A: Troubleshoot Common Security Issues Topic B: Respond to Security Incidents Topic C: Investigate Security IncidentsLesson 11: Ensuring Business Continuity Topic A: Select Business Continuity and Disaster Recovery Processes Topic B: Develop a Business Continuity Plan