CompTIA Security+
Select an option below to show price
Cyber security is everywhere and we use it and hear of it every day
It is the fastest growing area in Tech
Forecasted to be worth over £400 billion by 2030
It's time to handle Cyber Security and profit from it
Average Salary Indicator
CompTIA Security + Module Outline
The new CompTIA Security+ SY0-601 course will prepare you to become CompTIA Security+ SY0-601 certified. The new CompTIA Security+ SY0-601 covers many vendor neutral topics including how to explain threat actors and threat intelligence, about comparing security roles and security controls, and perform security assessments in order to identify social engineering attacks or malware. Gain knowledge on basic cryptographic concepts, authentication controls, data privacy, account management, network security protocols, and many other topics.
You will cover everything from the ever-expanding virtualisation of computing systems to industry management of smart devices. These topics will be covered from a ground up perspective so that even inexperienced students will be able to follow. IT security is the fastest growing IT sector and its importance is recognised by every company.
Module 1: Information Security Roles Security Control and Framework Types
Introduction and Overview
Compare and Contrast Information and Security Roles
Compare and Contrast Security Control and Framework Types
Module Summary
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
Explain Threat Actor Types and Attack Vectors
Explain Threat Intelligence Sources
Module Summary
Module 3: Organisational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
Access Organisational Security with Network Reconnaissance Tools
Packet Capture and Replay Demo
Explain Security Concerns with General Vulnerability Types
Summarize Vulnerability Scanning Techniques
Explain Penetration Testing Concepts
Module Summary
Module 4: Social Engineering, Indicators of Malware Attacks
Compare and Contrast Social Engineering Techniques
Analyse Indicators of Malware-based Attacks
Fork Bomb Malware Demo
Module Summary
Module 5: Cryptography
Compare and Contrast Cryptographic Ciphers
Summarize Cryptographic Modes of Operation
Summarize Cryptographic Use Cases and Weaknesses
Summarize Other Cryptographic Technologies
Module Summary
Module 6: Certificates and PKI
Implement Certificates and Certificate Authorities
Implement PKI Management
Implementing a PKI Demo
Module Summary
Module 7: Authentication
Summarize Authentication Design Concepts
Implement Knowledge-based Authentication
Password Cracker Demo
Summarize Biometrics Authentication Concepts
Module Summary
Module 8: Identity and Accounts, Authorization, Personnel Polices
Implement Identity and Account Types
Implement Account Policies
Account Types and Polices Demo
Implement Authorization Solutions
Explain the Importance of Personnel Policies
Module Summary
Module 9: Network Design and Hardware (Part 1)
Implement Secure Network Designs
Implement Secure Switching and Routing
Various Types of Network Attacks Demo
Implement Secure Wireless Infrastructure
Implement Load Balancers
Module Summary
Module 10: Network Hardware (Part 2)
Implement Firewalls and Proxy Servers
Implement Network Security Monitoring
Summarize the Use of SIEM
Module Summary
Module 11: Network Protocols
Implement Secure Network Operations Protocols
Implement Secure Application Protocols
Implement Secure Remote Access Protocols
Module Summary
Module 12: Endpoint Security
Implement Secure Firmware
Implement Endpoint Security
Endpoint Protection Demo
Explain Embedded System Security Implications
Module Summary
Module 13: Mobile Devices
Implement Mobile Device Management
Implement Secure Mobile Device Connections
Module Summary
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
Analyse Indicators of Application Attack
Analyse Indicators of Web Application Attacks
Summarize Secure Coding Practices
Implement Secure Script Environments
Summarize Deployment and Automation Concepts
Module Summary
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
Summarize Secure Cloud and Virtualization Services
Apply Cloud Security Solutions
Summarize Infrastructure as Code Concepts
Module Summary
Module 16: Privacy and Data Protection
Explain Privacy and Data Sensitivity Concepts
Explain Privacy and Data Protection Controls
Module Summary
Module 17: Incident Response
Summarize Incident Response Procedures
Utilize Appropriate Data Sources for Incident Response
Apply Mitigation Controls
Module Summary
Module 18: Forensics
Explain Key Aspects of Digital Forensics Documentation
Explain Key Aspects of Digital Forensics Evidence Acquisition Module Summary
Module 19: Risk Management and Business Impact Analysis
Explain Risk Management Processes and Concepts
Explain Business Impact Analysis Concepts
Module Summary
Module 20: Redundancy and Backup Strategies
Implement Redundancy Strategies
Implement Backup Strategies
Implement Cybersecurity Resiliency Strategies
Module Summary
Module 21: Physical Security
Explain the Importance of Physical Site Controls
Explain the Importance of Physical Host Security Controls
Module Summary
Module 22: Afterword
Conclusion and General Exam Tips
Additional information
Course Name | CompTIA Security+ (SY0-601) |
---|---|
Course Code | comptia-syo-601 |
Awarded By | CompTIA (EXAMS NOT INCLUDED) |
Hours | 14 |
Included In Bundles | Yes |
Access | 12 Months |
Prior courses / experience needed | No previous experience required. Open to everyone |
Exam Code | CompTIA-SY0-601 |
Practise Lab Available | Yes: CompTIA Security+SYO-601 |
Part of a Badge with multiple courses | Yes CompTIA offer Stackable certifications. Get in touch for further details |
Just some of the job roles available
Systems Administrator
Security Administrator
Security Specialist
Security Engineer
Network Administrator
Junior IT Administrator
Junior IT Auditor
Junior Penetration Tester
Security Consultant
Security Support
Find out more about CompTIA certificates
All delivered through our world class learning portal
Navigation and Controls
Our self paced training programmes allow you to study anywhere at any time. Pause, Rewind and play as many times as you like with 24 hour access.
Expert instructor led training
Our instructors are experts in the IT industry with a minimum of 15 years real world experience backed with many certifications in their subject of expertise
Visual demonstrations and multimedia presentations
Expert-led demonstrations and content rich presentations allow ITcertify students to develop their skills based on real world scenarios
Quizzes and exam simulators
Custom made practice exams reflect progress you have made throughout the course. Practice quizzes after each module build your confidence before moving to the next level.
Flash cards and educational games
ITcertify understand every student is unique and learns at a different pace. Our Flashcards and Educational Games are engineered to keep you engaged and 100% focused by providing a bit more fun to learning.