CompTIA Security+ Certification (SY0-501): The Total Course

CompTIA Security+ Certification (SY0-501): The Total Course

This CompTIA Security+  course will help you to cover that topics which are required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, and laws.Once you complete the course, you will have the knowledge and confidence to pass the CompTIA exam.

Exam Prerequisites

CompTIA did not set any prerequisites for there exams. Although there is no formal restrictions related to age or educational background, the official description of thies exam includes a set of informal information of a candidates.

 

CompTIA Security+ SY0-501 Certification Exam Domains
Domain % of the Exam Content 
1.0 Threats, Attacks and Vulnerabilities 21%
2.0 Technologies and Tools 22%
3.0 Architecture and Design 15%
4.0 Identity and Access Management 16%
5.0 Risk Management 14%
6.0 Cryptography and PKI 12%
Total 100%

 

Course Content

Threats, Attacks and Vulnerabilities

  • Given a scenario, analyze indicators of compromise and determine the type of malware.
  • Compare and contrast types of attack
  • Explain threat actor types and attributes
  • Explain penetration testing concepts
  • Explain vulnerability scanning concept
  • Explain the impact associated with types of vulnerabilities
  • Threats, Attacks and Vulnerabilities

Technologies and Tools

  • Install and configure network components, both hardware and software-based, to support organizational security.
  • Given a scenario, use appropriate software tools to assess the security posture of an organization
  • Given a scenario, troubleshoot common security issues
  • Given a scenario, analyze and interpret output from security technologies
  • Given a scenario, deploy mobile devices securely
  • Given a scenario, implement secure protocols

Architecture and Design

  • Explain use cases and purpose for frameworks, best practices and secure configuration guides
  • Given a scenario, implement secure network architecture concepts.
  • Given a scenario, implement secure systems design
  • Explain the importance of secure staging deployment concepts.
  • Explain the security implications of embedded systems.
  • Summarize secure application development and deployment concepts.
  • Summarize cloud and virtualization concepts.
  • Explain how resiliency and automation strategies reduce risk.
  • Explain the importance of physical security controls.

Identity and Access Management

  • Compare and contrast identity and access management concepts.
  • Given a scenario, install and configure identity and access services.
  • Given a scenario, implement identity and access management controls.
  • Given a scenario, differentiate common account management practices.

Risk Management

  • Explain the importance of policies, plans andprocedures related to organizational security
  • Summarize business impact analysis concepts.
  • Explain risk management processes and concepts.
  • Given a scenario, follow incident response procedures.
  • Summarize basic concepts of forensics.
  • Explain disaster recoveryand continuity of operations concepts.
  • Compare and contrast various types of controls.
  • Given a scenario, carry out data security and privacy practices

Cryptography and PKI

  • Compare and contrast basic concepts of cryptography.
  • Explain cryptography algorithms and their basic characteristics
  • Given a scenario, install and configure wireless security settings
  • Given a scenario, implement public key infrastructure

Chapter 1: Risk Management

1
01 – Introduction to the CompTIA Security+ Exam SY0-501
2
02 – The CIA of Security
3
03 – Threat Actors
4
04 – What is Risk?
5
05 – Managing Risk
6
06 – Using Guides for Risk Assessment
7
07 – Security Controls
8
08 – Interesting Security Controls
9
09 – Defense in Depth
10
10 – IT Security Governance
11
11 – Security Policies
12
12 – Frameworks
13
13 – Quantitative Risk Calculations
14
14 – Business Impact Analysis
15
15 – Organizing Data
16
16 – Security Training
17
17 – Third Party Agreements

Chapter 2: Cryptography

1
01 – Cryptography Basics
2
02 – Cryptographic Methods
3
04 – Symmetric Cryptosystems
4
05 – Symmetric Block Modes
5
06 – RSA Cryptosystems
6
07 – Diffie-Hellman
7
08 – PGP/GPG
8
09 – Hashing
9
10 – HMAC
10
11 – Steganography
11
12 – Certificates and Trust
12
13 – Public Key Infrastructure
13
14 – Cryptographic Attacks

Chapter 3: Identity and Access Management

1
01 – Identification
2
02 – Authorization Concepts
3
03 – Access Control List
4
04 – Password Security
5
05 – Linux File Permissions
6
06 – Windows File Permissions
7
07 – User Account Management
8
08 – AAA
9
09 – Authentication Methods
10
10 – Single Sign-On

Chapter 4: Tools of the Trade

1
01 – OS Utilities, Part 1
2
02 – OS Utilities, Part 2
3
03 – Network Scanners
4
04 – Protocol Analyzers
5
05 – SNMP
6
06 – Logs

Chapter 5: Securing Individual Systems

1
01 – Denial of Service
2
02 – Host Threats
3
03 -Man-in-the-Middle
4
04 – System Resiliency
5
05 – RAID
6
06 – NAS and SAN
7
07 – Physical Hardening
8
08 – RFI, EMI and ESD
9
09 – Host Hardening
10
10 – Data and System Security
11
11 – Disk Encryption
12
12 – Hardware/Firmware Security
13
13 – Secure OS Types
14
14 – Securing Peripherals
15
15 – Malware
16
16 – Analyzing Output
17
17 – IDS and IPS
18
18 – Automation Strategies
19
19 – Data Destruction

Chapter 6: The Basic LAN

1
01 – LAN Review
2
02 – Network Topologies Review
3
03 – Network Zone Review
4
04 – Network Access Controls
5
05 – The Network Firewall
6
06 – Proxy Servers
7
07 – Honeypots
8
08 – Virtual Private Networks
9
09 – IPSec
10
10 – NIDS/NIPS
11
11 – SIEM

Chapter 7: Beyond the Basic LAN

1
01 – Wireless Review
2
02 – Living in Open Networks
3
03 – Vulnerabilities with Wireless Access Points
4
04 – Cracking 802.11 – WEP
5
05 – Cracking 802.11 – WPA
6
06 – Cracking 802.11 – WPS
7
07 – Wireless Hardening
8
08 – Wireless Access Points
9
09 – Virtualization Basics
10
10 – Virtual Security
11
11 – Containers
12
12 – IaaS
13
13 – PaaS
14
14 – SaaS
15
15 – Deployment Models
16
16 – Static Hosts
17
17 – Mobile Connectivity
18
18 – Deploying Mobile Devices
19
19 – Mobile Enforcement
20
20 – Mobile Device Management
21
21 – Physical Controls
22
22 – HVAC
23
23 – Fire Suppression

Chapter 8: Secure Protocols

1
01 – Secure Applications and Protocols
2
02 – Network Models
3
03 – Know Your Protocols – TCP/IP
4
04 – Know Your Protocols – Applications
5
05 – Transport Layer Security (TLS)
6
06 – Internet Service Hardening
7
07 – Protecting Your Servers
8
08 – Secure Code Development
9
09 – Code Quality and Testing

Chapter 9: Testing Your Infrastructure

Chapter 9: Testing Your Infrastructure

1
01 – Vulnerability Scanning Tools
2
02 – Vulnerability Scanning Assessment
3
03 – Social Engineering Principles
4
04 – Social Engineering Attacks
5
05 – Attacking Web Sites
6
06 – Attacking Applications
7
07 – Exploiting a Target
8
08 – Vulnerability Impact

Chapter 10: Dealing with Incidents

1
01 – Incident Response
2
02 – Digital Forensics
3
03 – Contingency Planning
4
04 – Backups

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Lectures: 120

Review

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mike Stuart

Support

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Mila Kunis

Manager

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Adam Sendler

Designer

Social Network

CompTIA Security+ Certification (SY0-501): The Total Course
Price:
$30