SKU: secplus601 Categories: ,

CompTIA Security+ SY0-601

$99.00

SY0-601 Security+ is a beneficial cybersecurity-specific certification for IT job candidates to hold, often being the first instance where candidates learn to identify and handle InfoSec threats. Instructor Gordon Shenkle has over 30 years of IT experience with 15 of those years specializing in IT security. Students will learn the best real-world troubleshooting practices for identifying and handling cybersecurity incidents. It is recommended that students complete CompTIA A+ and Network+ before beginning this course.
Learn how to explain threat actors and threat intelligence, about comparing security roles and security controls, and perform security assessments in order to identify social engineering attacks or malware. Gain knowledge on basic cryptographic concepts, authentication controls, data privacy, account management, network security protocols, and many other topics.
Modules in this course will cover:
  • Information Security Roles Security Control and Framework Types
  • Threat Actor Types, Attack Vectors, and Intelligence Sources
  • Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
  • Social Engineering, Indicators of Malware Attacks
  • Cryptography
  • Certificates and PKI
  • Authentication
  • Identity and Accounts, Authorization, Personnel Policies
  • Network Design and Hardware - Two Parts
  • Network Protocols
  • Endpoint Security
  • Mobile Devices
  • Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment, and Automation
  • Secure Coding, Scripting, Deployment, Cloud, and Virtualization
  • Privacy and Data Protection
  • Incident Response
  • Data Forensics
  • Risk Management, Business Impact Analysis
  • Redundancy and Backup Strategies
  • Physical Security
  • Security+ SY0-601 Exam Prep

Course Outline

Module 1: Information Security Roles Security Control and Framework Types
  •  Introduction and Overview
  •  Compare and Contrast Information Security Roles
  •  Compare and Contrast Security Control and Framework Types
  •  Module Summary
Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
  •  Explain Threat Actor Types and Attack Vectors
  •  Explain Threat Intelligence Sources
  •  Module Summary
Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
  •  Assess Organizational Security with Network Reconnaissance Tools
  •  Packet Capture and Replay Demo
  •  Explain Security Concerns with General Vulnerability Types
  •  Summarize Vulnerability Scanning Techniques
  •  Explain Penetration Testing Concepts
  •  Module Summary
Module 4: Social Engineering, Indicators of Malware Attacks
  •  Compare and Contrast Social Engineering Techniques
  •  Analyze Indicators of Malware-based Attacks
  •  Fork Bomb Malware Demo
  •  Module Summary
Module 5: Cryptography
  •  Compare and Contrast Cryptographic Ciphers
  •  Summarize Cryptographic Modes of Operation
  •  Summarize Cryptographic Use Cases and Weaknesses
  •  Summarize Other Cryptographic Technologies
  •  Module Summary
Module 6: Certificates and PKI
  •  Implement Certificates and Certificate Authorities
  •  Implement PKI Management
  •  Implementing a PKI Demo
  •  Module Summary
Module 7: Authentication
  •  Summarize Authentication Design Concepts
  •  Implement Knowledge-based Authentication
  •  Password Cracker Demo
  •  Implement Authentication Technologies
  •  Summarize Biometrics Authentication Concepts
  •  Module Summary
Module 8: Identity and Accounts, Authorization, Personnel Polices
  •  Implement Identity and Account Types
  •  Implement Account Policies
  •  Account Types and Polices Demo
  •  Implement Authorization Solutions
  •  Explain the Importance of Personnel Policies
  •  Module Summary
Module 9: Network Design and Hardware (Part 1)
  •  Implement Secure Network Designs
  •  Implement Secure Switching and Routing
  •  Various Types of Network Attacks Demo
  •  Implement Secure Wireless Infrastructure
  •  Implement Load Balancers
  •  Module Summary
Module 10: Network Hardware (Part 2)
  •  Implement Firewalls and Proxy Servers
  •  Implement Network Security Monitoring
  •  Summarize the Use of SIEM
  •  Module Summary
Module 11: Network Protocols
  •  Implement Secure Network Operations Protocols
  •  Implement Secure Application Protocols
  •  Implement Secure Remote Access Protocols
  •  Module Summary
Module 12: Endpoint Security
  •  Implement Secure Firmware
  •  Implement Endpoint Security
  •  Endpoint Protection Demo
  •  Explain Embedded System Security Implications
  •  Module Summary
Module 13: Mobile Devices
  •  Implement Mobile Device Management
  •  Implement Secure Mobile Device Connections
  •  Module Summary
Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
  •  Analyze Indicators of Application Attack
  •  Analyze Indicators of Web Application Attacks
  •  Summarize Secure Coding Practices
  •  Implement Secure Script Environments
  •  Summarize Deployment and Automation Concepts
  •  Module Summary
Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
  •  Summarize Secure Cloud and Virtualization Services
  •  Apply Cloud Security Solutions
  •  Summarize Infrastructure as Code Concepts
  •  Module Summary
Module 16: Privacy and Data Protection
  •  Explain Privacy and Data Sensitivity Concepts
  •  Explain Privacy and Data Protection Controls
  •  Module Summary
Module 17: Incident Response
  •  Summarize Incident Response Procedures
  •  Utilize Appropriate Data Sources for Incident Response
  •  Apply Mitigation Controls
  •  Module Summary
Module 18: Forensics
  •  Explain Key Aspects of Digital Forensics Documentation
  •  Explain Key Aspects of Digital Forensics Evidence Acquisition
  •  Module Summary
Module 19: Risk Management and Business Impact Analysis
  •  Explain Risk Management Processes and Concepts
  •  Explain Business Impact Analysis Concepts
  •  Module Summary
Module 20: Redundancy and Backup Strategies
  •  Implement Redundancy Strategies
  •  Implement Backup Strategies
  •  Implement Cybersecurity Resiliency Strategies
  •  Module Summary
Module 21: Physical Security
  •  Explain the Importance of Physical Site Controls
  •  Explain the Importance of Physical Host Security Controls
  •  Module Summary
Module 22: Afterword
  •  Conclusion and General Exam Tips
CompTIA Security+ SY0-601

14 Hours 4 Minutes

91 Course Videos

100 Test Questions


Save For Later
Add to Wishlist