CompTIA Security+

Course Code: SY0-501

$1,395.00 $995.00 | Accredited Online Training with Practice Labs & Exam

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you’re ready for the job.

Price

$ 995

Delivery method

Online

Duration

32 Hours

What's included?

Labs, practice test and exam

Course overview

IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place. That’s where CompTIA Security+ comes in.

A CompTIA Security+ certification validates knowledgeable professionals in the field of security, one of the fastest-growing sectors in IT.  Security threats are increasing in number and severity, and the gap between the need for security professionals and qualified IT personnel is the largest of any IT specialty.

Prerequisites

It is recommended that you have completed CompTIA Network+ (or equivalent) and two years of experience in IT administration with a security focus

Course overview

Course overview

IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place. That’s where CompTIA Security+ comes in.

A CompTIA Security+ certification validates knowledgeable professionals in the field of security, one of the fastest-growing sectors in IT.  Security threats are increasing in number and severity, and the gap between the need for security professionals and qualified IT personnel is the largest of any IT specialty.

Prerequisites

It is recommended that you have completed CompTIA Network+ (or equivalent) and two years of experience in IT administration with a security focus

Contents

Contents

Threats, Attacks & Vulnerabilities

  • Overview
  • Determining Types Of Malware
  • Determining Types Of Malware Part 2
  • Types Of Attacks
  • Types Of Attacks Part 2
  • Types Of Attacks Part 3
  • Types Of Attacks Part 4
  • Threat Vector Types And Attributes
  • Penetration Testing Concepts
  • Impact Of Various Vulnerabilities
  • Impact Of Various Vulnerabilities Part 2

Technologies & Tools

  • Hardware Software Organizational Security
  • Hardware Software Organizational Security Part 2
  • Hardware Software Organizational Security Part 3
  • Hardware Software Organizational Security Part 4
  • Security Posture Assessment
  • Security Posture Assessment Part 2
  • Security Posture Assessment Part 3
  • Security Posture Assessment Part 4
  • Troubleshoot Common Security Issues
  • Troubleshoot Common Security Issues Part 2
  • Analyze And Interpret Outputs
  • Analyze And Interpret Outputs Part 2
  • Deploy Mobile Security
  • Implement Secure Protocols

Architecture & Design

  • Best Practices And Secure Config Guides
  • Secure Network Architecture Concepts
  • Secure System Design
  • Secure Staging Deployment Concepts
  • Security Implications Of Embedded Systems
  • Secure App Development And Deployment
  • Cloud And Virtualization Concepts
  • Cloud And Virtualization Concepts Part 2
  • Resiliency And Automation To Reduce Risk
  • Importance Of Physical Security
  • Importance Of Physical Security Part 2

Identity & Access Management

  • Identity And Access Management Concepts
  • Identity And Access Services
  • Identity And Access Management Controls
  • Identity And Access Management Controls Part 2
  • Account Management Practices
  • Account Management Practices Part 2

Risk Management

  • Policies, Plans And Procedures
  • Impact Business Analysis
  • Risk Management Processes And Concepts
  • Incident Response Procedures
  • Basic Concepts Of Forensics
  • Disaster Recovery And Business Continuity
  • Disaster Recovery And Business Continuity Part 2

Cryptography & PKI

  • Basic Concepts Of Cryptography
  • Basic Concepts Of Cryptography Part 2
  • Cryptography Algorithms Basics
  • Cryptography Algorithms Basics Part 2
  • Cryptography Algorithms Basics Part 3
  • Wireless Security
  • Public Key Infrastructure
  • Public Key Infrastructure Part 2
  • Public Key Infrastructure Part 3
  • Public Key Infrastructure Part 4

Outcomes

Outcomes

After completing this course, you will be able to:

  • Identify the fundamental concepts of computer security.
  • Identify security threats and vulnerabilities.
  • Manage data, application, and host security.
  • Implement network security.
  • Identify and implement access control and account management security measures.
  • Manage certificates.
  • Identify and implement compliance and operational security measures.
  • Manage security risks.
  • Troubleshoot and manage security incidents.
  • Plan for business continuity and disaster recovery.