CompTIA Security+ Certification (Exam SY0-601) Online Course

Save 40%

Sale price£59.00 Regular price£99.00


Course Description

The CompTIA Security+ SY0-601 training provides students with core security skills needed to function in a security role in Information Security.

Security Plus certification provided by CompTIA is a globally recognized certification for IT security professionals.  It is the foundation needed to work in and grow your career in a rewarding cybersecurity role. The official Exam ID is SY0-601.

After taking this Security+ Plus Certification training, students are prepared to sit for exam SY0-601 required by CompTIA for certification.  Following this course, students wanting to advance in a cybersecurity field should consider the more advanced CySA+ course.

As a Certified Security plus professional, you will have skills that exhibit the ability to work hands-on as a problem solver.  Your job role will typically include securing company systems, software, and hardware.   You will gain skills in risk assessment, incident response management, security controls, computer forensics, networks, and cloud operations.

Security+ Exam (SY0-601) Objectives

Per CompTIA, the following exam objectives have been established for the Security+ certification:

The CompTIA Security+ certification exam SY0-601 will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identity, analyze, and respond to security events and incidents.

Key Makeup of Exam SY0-601

  •     Up to 85 test questions
  •     A combination of multiple-choice and performance-based questions.
  •     Exam time is 90 minutes
  •     A passing score is 750 on a scale of 100-900
Testing and official certification are provided by CompTIA.  Please Note: The Official CompTIA Certification Exam is not included. Click here for testing options.

Module 1: Information Security Roles Security Control and Framework Types
  • Introduction and Overview
  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
  • Module Summary

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources
  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
  • Module Summary

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
  • Assess Organizational Security with Network Reconnaissance Tools
  • Packet Capture and Replay Demo
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts
  • Module Summary

Module 4: Social Engineering, Indicators of Malware Attacks
  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-based Attacks
  • Fork Bomb Malware Demo
  • Module Summary

Module 5: Cryptography
  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies
  • Module Summary

Module 6: Certificates and PKI
  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
  • Implementing a PKI Demo
  • Module Summary

Module 7: Authentication
  • Summarize Authentication Design Concepts
  • Implement Knowledge-based Authentication
  • Password Cracker Demo
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts
  • Module Summary

Module 8: Identity and Accounts, Authorization, Personnel Polices
  • Implement Identity and Account Types
  • Implement Account Policies
  • Account Types and Polices Demo
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies
  • Module Summary

Module 9: Network Design and Hardware (Part 1)
  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Various Types of Network Attacks Demo
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers
  • Module Summary

Module 10: Network Hardware (Part 2)
  • Implement Firewalls and Proxy Servers
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM
  • Module Summary

Module 11: Network Protocols
  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocols
  • Module Summary

Module 12: Endpoint Security
  • Implement Secure Firmware
  • Implement Endpoint Security
  • Endpoint Protection Demo
  • Explain Embedded System Security Implications
  • Module Summary

Module 13: Mobile Devices
  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections
  • Module Summary

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation
  • Analyze Indicators of Application Attack
  • Analyze Indicators of Web Application Attacks
  • Summarize Secure Coding Practices
  • Implement Secure Script Environments
  • Summarize Deployment and Automation Concepts
  • Module Summary

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization
  • Summarize Secure Cloud and Virtualization Services
  • Apply Cloud Security Solutions
  • Summarize Infrastructure as Code Concepts
  • Module Summary

Module 16: Privacy and Data Protection
  • Explain Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls
  • Module Summary

Module 17: Incident Response
  • Summarize Incident Response Procedures
  • Utilize Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls
  • Module Summary

Module 18: Forensics
  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition
  • Module Summary

Module 19: Risk Management and Business Impact Analysis
  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts
  • Module Summary

Module 20: Redundancy and Backup Strategies
  • Implement Redundancy Strategies
  • Implement Backup Strategies
  • Implement Cybersecurity Resiliency Strategies
  • Module Summary

Module 21: Physical Security
  • Explain the Importance of Physical Site Controls
  • Explain the Importance of Physical Host Security Controls
  • Module Summary

Module 22: Afterword
  • Conclusion and General Exam Tips

Example Training Video (Not From This Course)

LEARN365 Courses Include 12 Months Unlimited Online Access to:

Expert Instructor-Led Training:
Learn 365 uses only the industry's finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

Visual Demonstrations & Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios and skill-set development.

Quizzes & Exam Simulators: Learn 365's custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

Social Learning & Networking: Learn 365 has designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students and Learn 365 employees, form study groups, engage in discussions in our NOW@ Forums, rate and like different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features.

Flash Cards & Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high.

Navigation and Controls: Learn 365's self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.

Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.

Payment & Security

American Express Apple Pay Diners Club Discover Maestro Mastercard PayPal Shop Pay Visa

Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.

You may also like

Recently viewed