Prepare to confidently pass the CompTIA Security+ (SY0-601) certification with this comprehensive and practical course. Designed to deepen your understanding of cybersecurity fundamentals, the course focuses on risk management and the various types of risks organizations face today.
You’ll explore key security standards such as PCI DSS and the Cloud Controls Matrix (CCM) to understand how to implement effective security controls in both on-premises and cloud environments. Additionally, you’ll learn about data protection methods and the cryptographic techniques used to secure critical communication keys.
Who should take this Course?
The CompTIA Security+ (SY0-601) Online Course is ideal for aspiring cybersecurity professionals, network administrators, IT support specialists, and anyone seeking to build a strong foundation in information security. It’s also suitable for individuals preparing for the Security+ SY0-601 certification exam, covering essential topics like threat management, risk mitigation, and network security. Basic knowledge of networking and IT concepts is recommended for the best learning experience.
What You’ll Learn:
How to manage and mitigate different types of risks
Essential encryption and cryptographic practices
The use and purpose of digital certificates (web, email, code-signing, machine, and user)
The “Three As” of cybersecurity: Authentication, Authorization, and Accounting (Auditing)
How auditing enhances accountability and monitors access to sensitive resources
Security strategies for dedicated systems, including IoT devices
By the end of this course, you'll be fully equipped with the knowledge and skills needed to not only succeed in the SY0-601 exam but also apply your expertise in real-world security roles.
Course Curriculum
Chapter 1 - Risk Management
Introduction
About the Security+ (SY0-601) Exam
Defining Risk
Threats and Vulnerabilities
Threat Intelligence
Risk Management Concepts
Security Controls
Risk Assessments and Treatments
Quantitative Risk Assessments
Qualitative Risk Assessments
Business Impact Analysis
Data Types and Roles
Security and the Information Life Cycle
Data Destruction
Personnel Risk and Policies
Third-Party Risk Management
Agreement Types
Chapter 1 Exam Question Review
Wiping Disks with the dd Command Lab
Chapter 2 - Cryptography
Cryptography Basics
Data Protection
Cryptographic Methods
Symmetric Cryptosystems
Symmetric Block Modes
Asymmetric Cryptosystems
Diffie-Hellman
Hashing
Understanding Digital Certificates
Trust Models
Public Key Infrastructure
Certificate Types
Touring Certificates
Cryptographic Attacks
Password Cracking
Password Cracking Demo
Chapter 2 Exam Question Review
SSH Public Key Authentication Lab
Chapter 3 - Identity and Account Management
Identification, Authentication, and Authorization
Enabling Multifactor Authentication
Authorization
Accounting
Authentication Methods
Access Control Schemes
Account Management
Network Authentication
Identity Management Systems
Chapter 3 Exam Question Review
Creating Linux Users and Groups Lab
Chapter 4 - Tools of the Trade
Touring the CLI
Shells
The Windows Command Line
Microsoft PowerShell
Linux Shells
Python Scripts
Windows Command-Line Tools
Linux Command-Line Tools
Network Scanners
Network Scanning with Nmap
Network Protocol Analyzers
Using Wireshark to Analyze Network Traffic
Using tcpdump to Analyze Network Traffic
Log Files
Centralized Logging
Configuring Linux Log Forwarding
Chapter 4 Exam Question Review
Linux Shell Script Lab
Nmap Lab
Chapter 4 Ask Me Anything (AMA)
Chapter 5 - Securing Individual Systems
Malware
Weak Configurations
Common Attacks
Driver and Overflow Attacks
Password Attacks
Bots and Botnets
Disk RAID Levels
Securing Hardware
Securing Endpoints
Chapter 3 Exam Question Review
Linux Software RAID Lab
Chapter 3 Ask Me Anything (AMA)
Chapter 6 - The Basic LAN
The OSI Model
ARP Cache Poisoning
Other Layer 2 Attacks
Network Planning
Load Balancing
Securing Network Access
Honeypots
Firewalls
Proxy Servers
Network and Port Address Translation
IP Security (IPsec)
Virtual Private Networks (VPNs)
Intrusion Detection and Prevention Systems (IDS/IPS)