Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

CompTIA Security+ Certification (Exam SY0-601)

This course maps to the CompTIA Security+ certification exam (SY0-601) and establishes the core knowledge required of any cybersecurity role, as well as providing a springboard to intermediate-level cybersecurity jobs.

Description

This course emphasizes both the practical and hands-on ability to identify and address security threats, attacks and vulnerabilities. CompTIA Security+ is a globally trusted, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. CompTIA Security+ is also a DoD Approved 8570 Baseline Certification and this course meets DoD 8140/8570 Training requirements.

Course Outline

Comparing Security Roles and Controls

  • Topic 1A- Compare and Contrast Information Security Roles
  • Topic 1B- Compare and Contrast Security Control and Framework Types

Explaining Threat Actors and Threat Intelligence

  • Topic 2A- Explain Threat Actor Types and Attack Vectors

Performing Security Assessments

  • Topic 3A- Assess Organizational Security with Network Reconnaissance Tools
  • Topic 3B- Explain Security Concerns with General Vulnerability Types
  • Topic 3C- Summarize Vulnerability Scanning Techniques
  • Topic 3D- Explain Penetration Testing Concepts

Identifying Social Engineering and Malware

  • Topic 4A- Compare and Contrast Social Engineering Techniques
  • Topic 4B- Analyze Indicators of Malware-Based Attacks

Summarizing Basic Cryptographic Concepts

  • Topic 5A- Compare and Contrast Cryptographic Ciphers
  • Topic 5B- Summarize Cryptographic Modes of Operation
  • Topic 5C- Summarize Cryptographic Use Cases and Weaknesses
  • Topic 5D- Summarize Other Cryptographic Technologies

Implementing Public Key Infrastructure

  • Topic 6A- Implement Certificates and Certificate Authorities
  • Topic 6B- Implement PKI Management

Implementing Authentication Controls

  • Topic 7A- Summarize Authentication Design Concepts
  • Topic 7B- Implement Knowledge-Based Authentication
  • Topic 7C- Implement Authentication Technologies
  • Topic 7D- Summarize Biometrics Authentication Concepts

Implementing Identity and Account Management Controls

  • Topic 8A- Implement Identity and Account Types
  • Topic 8B- Implement Account Policies
  • Topic 8C- Implement Authorization Solutions
  • Topic 8D- Explain the Importance of Personnel Policies

Implementing Secure Network Designs

  • Topic 9A- Implement Secure Network Designs
  • Topic 9B- Implement Secure Switching and Routing
  • Topic 9C- Implement Secure Wireless Infrastructure
  • Topic 9D- Implement Load Balancers

Implementing Network Security Appliances

  • Topic 10A- Implement Firewalls and Proxy Servers
  • Topic 10B- Implement Network Security Monitoring
  • Topic 10C- Summarize the Use of SIEM

Implementing Secure Network Protocols

  • Topic 11A- Implement Secure Network Operations Protocols
  • Topic 11B- Implement Secure Application Protocols
  • Topic 11C- Implement Secure Remote Access Protocols

Implementing Host Security Solutions

  • Topic 12A- Implement Secure Firmware
  • Topic 12B- Implement Endpoint Security
  • Topic 12C- Explain Embedded System Security Implications

Implementing Secure Mobile Solutions

  • Topic 13A- Implement Mobile Device Management
  • Topic 13B- Implement Secure Mobile Device Connections

Summarizing Secure Application Concepts

  • Topic 14A- Analyze Indicators of Application Attacks
  • Topic 14B- Analyze Indicators of Web Application Attacks
  • Topic 14C- Summarize Secure Coding Practices
  • Topic 14D- Implement Secure Script Environments
  • Topic 14E- Summarize Deployment and Automation Concepts

Implementing Secure Cloud Solutions

  • Topic 15A- Summarize Secure Cloud and Virtualization Services
  • Topic 15B- Apply Cloud Security Solutions
  • Topic 15C- Summarize Infrastructure as Code Concepts

Explaining Data Privacy and Protection Concepts

  • Topic 16A- Explain Privacy and Data Sensitivity Concepts
  • Topic 16B- Explain Privacy and Data Protection Controls

Performing Incident Response

  • Topic 17A- Summarize Incident Response Procedures
  • Topic 17B- Utilize Appropriate Data Sources for Incident Response
  • Topic 17C- Apply Mitigation Controls

Explaining Digital Forensics

  • Topic 18A- Explain Key Aspects of Digital Forensics Documentation
  • Topic 18B- Explain Key Aspects of Digital Forensics Evidence Acquisition

Summarizing Risk Management Concepts

  • Topic 19A- Explain Risk Management Processes and Concepts

Implementing Cybersecurity Resilience

  • Topic 20A- Implement Redundancy Strategies
  • Topic 20B- Implement Backup Strategies
  • Topic 20C- Implement Cybersecurity Resiliency Strategies

Explaining Physical Security

  • Topic 21A- Explain the Importance of Physical Site Security Controls
  • Topic 21B- Explain the Importance of Physical Host Security Controls

Prerequisites

Prior Course Recommendation:

  • CompTIA IT Fundamentals+ Certification (ITF+)(Exam FCO-U61)
  • CompTIA Network+ Certification (Exam N10-008)

Similar courses

Introduction to DAX for Power BI

Using Data Analysis Expressions to solve common business problems in Power BI

More Information
EC-Council Certified Ethical Hacker (CEH) v12

This course was built to incorporate a unique, in-depth, and interactive hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential.

More Information
PL-400T00 Microsoft Power Platform Developer

The Microsoft Power Platform helps organizations optimize their operations by simplifying, automating and transforming business tasks and processes.

More Information
Cisco® Solutions: Implementation and Administration (CCNA 200-301)

In this course, you will implement and administer networks by using Cisco solutions.

More Information
MD-102T00 : Microsoft 365 Endpoint Administrator

In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies

More Information
CompTIA A+ Part 1 Certification (Exam 220-1101)

Install and configure mobile devices; Compare and contrast networking hardware; Configure internet connections and wireless networking,; Troubleshoot hardware and networks; Install motherboards, RAM, storage devices, CPUs and add-on cards; Deploy and configure connected devices; Summarize cloud-computing concepts and virtualization

More Information
Oracle PL/SQL

This course is designed to create PL/SQL blocks both anonymous and named. This course will cover PL/SQL objects and data types. It will also cover packages and how to debug and improve performance within PL/SQL. It will address deploying PL/SQL objects and using Oracle pre-define packages, procedures, and functions.

More Information
CompTIA Network+ Certification (Exam N10-008)

CompTIA Network+ validates the technical skills needed to securely establish, maintain and troubleshoot the essential networks that businesses rely on. CompTIA Network+ is the only certification that covers the specific skills that network professionals need.

More Information
EC-Council Certified Chief Information Security Officer (C|CISO)

The CCISO program is a first-of-its-kind training and certification course that aims to produce cybersecurity executives of the highest caliber and ethics.

More Information
Agile Fundamentals Workshop

In this course, you will understand and use Agile core terms, explain key Agile concepts and their importance in achieving agility, identify, engage, and leverage key stakeholders in an Agile environment, apply common Agile tools and techniques, embrace and advocate for an Agile mindset to benefit from an Agile approach, select the best practices for a project and apply them appropriately to benefit the project and organization.

More Information
CompTIA Cybersecurity Analyst (CySA+) Certification (Exam CS0-002 & CS0-003)

This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

More Information
Advanced Java 9

Students who attend this course will leave armed with new skills to leverage modules, scale applications into multi-core environments, and improve the performance of Java 9 applications. This course will teach students everything they need to successfully master and implement the latest features and benefits of Java 9 and become a more effective Java 9 developer.

More Information
55339 Programming in C#

In this course, students will review the basics of C# program structure, language syntax, and implementation details, and then consolidate their knowledge throughout the week as they build an application that incorporates several features of .NET. The course aims to follow the spirit of the Microsoft Official Curriculum course 20483, while bringing it completely up-to-date with the latest features of C#, .NET 6.0 and Visual Studio 2022.

More Information
55337 Introduction to Programming

In this course you will, explain core programming fundamentals such as computer storage and processing, create and use variables and constants in programs, discuss how to create and use functions in a program, use decisions structures in a computer program, create and use repetition (loops) in a computer program, explain pseudocode and its role in programming, implement object-oriented programming concepts, and identify application errors and explain how to debug an application and handle errors.

More Information
AngularJS Training: AngularJS Programming

In this course, you will create single page web applications using the MVC pattern of AngularJS, understand the programming model provided by the AngularJS framework, define Angular controllers and directives, and control Angular data bindings.

More Information
Comprehensive Angular 12 Programming

In this course, you will develop single page Angular applications using Typescript, set up a complete Angular development environment, create components, directives, services, pipes, forms and custom validators, handle advanced network data retrieval tasks using observables, consume data from REST web services using the Angular HTTP Client, handle push-data connections using the WebSockets protocol, work with Angular Pipes to format data, and use advanced Angular Component Router features.

More Information
Introduction to Programming with Python®

This course is designed for people who want to learn the Python programming language in preparation for using Python to develop software for a wide range of applications, such as data science, machine learning, artificial intelligence, and web development.

More Information
Data Wrangling with Python

This course teaches concepts by deep-dive on-hand exercises. Throughout the course, you will learn data wrangling with hands-on exercises and activities. You’ll find checklists, best practices, and critical points mentioned throughout the lessons, making things more interesting.

More Information
Developing Advanced Automation with Red Hat Ansible Automation Platform (DO374)

In this course, you will apply recommended practices for effective and efficient automation with Ansible, perform automation operations as rolling updates, use advanced features of Red Hat Ansible Automation Platform to work with data, including filters and plugins, create automation execution environments to contain and scale Red Hat Ansible Automation, and leverage capabilities of the automation content navigator to develop Ansible Playbooks.

More Information
Building Data Analytics Solutions using Amazon Redshift

In this course, you will build a data analytics solution using Amazon Redshift, a cloud data warehouse service.

More Information
Data Warehousing on AWS

In this course, you will learn new concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS.

More Information
Building Data Lakes on AWS

In this course, you will apply data lake methodologies in planning and designing a data lake, articulate the components and services required for building an AWS data lake, secure a data lake with appropriate permission, ingest, store, and transform data in a data lake and query, analyze, and visualize data within a data lake.

More Information
Building Batch Data Analytics Solutions on AWS

In this course, you will learn to build batch data analytics solutions using Amazon EMR, an enterprise-grade Apache Spark and Apache Hadoop managed service.

More Information
Developing on AWS

In this course, you will learn how to use the AWS SDK to develop secure and scalable cloud applications using multiple AWS services such as Amazon DynamoDB, Amazon Simple Storage Service, and AWS Lambda. You explore how to interact with AWS using code and learn about key concepts, best practices, and troubleshooting tips.

More Information
Cloud Operations on AWS

In this course, you will learn how to manage and operate automatable and repeatable deployments of networks and systems on AWS.

More Information
DevOps Engineering on AWS

In this course, you will learn how to use the combination of tools, practices, and cultural philosophy of DevOps to improve an organization’s ability to develop, deliver, and maintain applications and services at high velocity on AWS.

More Information
55315: Introduction to SQL Databases

In this course you will describe key database concepts in the context of SQL Server, characterize database languages used in SQL Server, describe data modeling techniques, discuss normalization and denormalization techniques, distinguish relationship types and effects in database design, describe the effects of database design on performance, and define commonly used database objects.

More Information
55366 Querying Data with Transact-SQL

In this course, you will create single table SELECT queries, create multiple table SELECT queries, insert, update, and delete data, query data using built-in functions, create queries that aggregate data, create subqueries, create queries that use table expressions, use UNION, INTERSECT, and EXCEPT on multiple sets of data, implement window functions in queries, use PIVOT and GROUPING SETS in queries, use stored procedures in queries, add error handling to queries, and use transactions in queries.

More Information
55321 SQL Server Integration Services

In this course you will, create sophisticated SSIS packages for extracting, transforming, and loading data, use containers to efficiently control repetitive tasks and transactions, configure packages to dynamically adapt to environment changes, use Data Quality Services to cleanse data, successfully troubleshoot packages, create and manage the SSIS Catalog, deploy, configure, and schedule packages, secure the SSIS Catalog.

More Information
55316 Administering a SQL Database

In this course you will authenticate and authorize users, assign server and database roles, authorize users to access resources, use encryption and auditing features to protect data, describe recovery models and backup strategies, backup and restore SQL Server databases, automate database management, configure security for the SQL Server agent, manage alerts and notifications, managing SQL Server using PowerShell, trace access to SQL Server, monitor a SQL Server infrastructure, and import and export data.

More Information
Building Modern Data Analytics Solutions on AWS

In this course, you will learn how to leverage AWS data Services to store, process, analyze, stream, and query data to make decisions with speed and agility at scale, how to modernize data solutions end to end, and obtain skills to put your data to work to make better, more informed decisions, respond faster to the unexpected, and uncover new opportunities.

More Information
Developing Serverless Solutions on AWS

In this course, you will practice and deploy serverless solutions on AWS.

More Information
Amazon SageMaker Studio for Data Scientists

In this course, you will learn to accelerate the process to prepare, build, train, deploy, and monitor ML solutions using Amazon SageMaker Studio.

More Information
CompTIA A+ Part 2 Certification (Exam 220-1102)

In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems.

More Information
AZ-305T00 Designing Microsoft Azure Infrastructure Solutions

This course teaches Azure Solution Architects how to design infrastructure solutions.

More Information
SC-200T00: Microsoft Security Operations Analyst

This course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

More Information
ISACA CISM Training Boot Camp

Certified Information Security Manager (CISM) Boot Camp is a five-day training focused on preparing you for the ISACA CISM exam. You will leave with the knowledge and domain expertise needed to pass the CISM exam the first time you take it.

More Information
ISC2 CISSP® Training Boot Camp

Take your career to the next level by earning one of the most in-demand cybersecurity certifications. CISSP training provides a proven method for mastering the broad range of knowledge required to become a Certified Information Systems Security Professional.

More Information
ISACA CISA Training Boot Camp

Certified Information Systems Auditor (CISA) Boot Camp is a five-day training focused on preparing you for the ISACA CISA exam. You’ll leave with the knowledge and domain expertise needed to pass the CISA exam the first time you take it.

More Information
CompTIA Cloud+ Certification (Exam CV0-003)

CompTIA Cloud+ shows you have the expertise needed to deploy and automate secure cloud environments and protect mission-critical applications and data.

More Information
55348: Administering Microsoft Endpoint Configuration Manager

In this 5-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize Endpoint Protection, manage compliance, and create management queries and reports. Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and 2019.

More Information

Press enter to see more results