Stay ahead by continuously learning and advancing your career. Learn More

CompTIA Security+ (SY0-601) Online Course

description

Bookmark Enrolled Intermediate

CompTIA Security+ (SY0-601) Online Course

Prepare to confidently pass the CompTIA Security+ (SY0-601) certification with this comprehensive and practical course. Designed to deepen your understanding of cybersecurity fundamentals, the course focuses on risk management and the various types of risks organizations face today.

You’ll explore key security standards such as PCI DSS and the Cloud Controls Matrix (CCM) to understand how to implement effective security controls in both on-premises and cloud environments. Additionally, you’ll learn about data protection methods and the cryptographic techniques used to secure critical communication keys.

What You’ll Learn:

  • How to manage and mitigate different types of risks
  • Essential encryption and cryptographic practices
  • The use and purpose of digital certificates (web, email, code-signing, machine, and user)
  • The “Three As” of cybersecurity: Authentication, Authorization, and Accounting (Auditing)
  • How auditing enhances accountability and monitors access to sensitive resources
  • Security strategies for dedicated systems, including IoT devices
  • By the end of this course, you'll be fully equipped with the knowledge and skills needed to not only succeed in the SY0-601 exam but also apply your expertise in real-world security roles.

Course Curriculum

Chapter 1 - Risk Management

  • Introduction
  • About the Security+ (SY0-601) Exam
  • Defining Risk
  • Threats and Vulnerabilities
  • Threat Intelligence
  • Risk Management Concepts
  • Security Controls
  • Risk Assessments and Treatments
  • Quantitative Risk Assessments
  • Qualitative Risk Assessments
  • Business Impact Analysis
  • Data Types and Roles
  • Security and the Information Life Cycle
  • Data Destruction
  • Personnel Risk and Policies
  • Third-Party Risk Management
  • Agreement Types
  • Chapter 1 Exam Question Review
  • Wiping Disks with the dd Command Lab

Chapter 2 - Cryptography

  • Cryptography Basics
  • Data Protection
  • Cryptographic Methods
  • Symmetric Cryptosystems
  • Symmetric Block Modes
  • Asymmetric Cryptosystems
  • Diffie-Hellman
  • Hashing
  • Understanding Digital Certificates
  • Trust Models
  • Public Key Infrastructure
  • Certificate Types
  • Touring Certificates
  • Cryptographic Attacks
  • Password Cracking
  • Password Cracking Demo
  • Chapter 2 Exam Question Review
  • SSH Public Key Authentication Lab

Chapter 3 - Identity and Account Management

  • Identification, Authentication, and Authorization
  • Enabling Multifactor Authentication
  • Authorization
  • Accounting
  • Authentication Methods
  • Access Control Schemes
  • Account Management
  • Network Authentication
  • Identity Management Systems
  • Chapter 3 Exam Question Review
  • Creating Linux Users and Groups Lab

Chapter 4 - Tools of the Trade

  • Touring the CLI
  • Shells
  • The Windows Command Line
  • Microsoft PowerShell
  • Linux Shells
  • Python Scripts
  • Windows Command-Line Tools
  • Linux Command-Line Tools
  • Network Scanners
  • Network Scanning with Nmap
  • Network Protocol Analyzers
  • Using Wireshark to Analyze Network Traffic
  • Using tcpdump to Analyze Network Traffic
  • Log Files
  • Centralized Logging
  • Configuring Linux Log Forwarding
  • Chapter 4 Exam Question Review
  • Linux Shell Script Lab
  • Nmap Lab
  • Chapter 4 Ask Me Anything (AMA)

Chapter 5 - Securing Individual Systems

  • Malware
  • Weak Configurations
  • Common Attacks
  • Driver and Overflow Attacks
  • Password Attacks
  • Bots and Botnets
  • Disk RAID Levels
  • Securing Hardware
  • Securing Endpoints
  • Chapter 3 Exam Question Review
  • Linux Software RAID Lab
  • Chapter 3 Ask Me Anything (AMA)

Chapter 6 - The Basic LAN

  • The OSI Model
  • ARP Cache Poisoning
  • Other Layer 2 Attacks
  • Network Planning
  • Load Balancing
  • Securing Network Access
  • Honeypots
  • Firewalls
  • Proxy Servers
  • Network and Port Address Translation
  • IP Security (IPsec)
  • Virtual Private Networks (VPNs)
  • Intrusion Detection and Prevention Systems (IDS/IPS)
  • Chapter 6 Exam Question Review
  • Linux Snort IDS Lab
  • Chapter 6 Ask Me Anything (AMA)

Chapter 7 - Securing Wireless LANs

  • Wi-Fi Encryption Standards
  • RFID, NFC, and Bluetooth
  • Wi-Fi Coverage and Performance
  • Wi-Fi Discovery and Attacks
  • Cracking WPA2
  • Wi-Fi Hardening
  • Chapter 7 Exam Question Review
  • WPA2 Cracking Lab
  • Chapter 7 Ask Me Anything (AMA)

Chapter 8 - Securing Public Servers

  • Defining a Public Server
  • Common Attacks and Mitigations
  • Containers and Software-Defined Networking
  • Hypervisors and Virtual Machines
  • Cloud Deployment Models
  • Cloud Service Models
  • Securing the Cloud
  • Chapter 8 Exam Question Review
  • Docker Container Lab
  • Chapter 8 Ask Me Anything (AMA)

Chapter 9 - Securing Dedicated Systems

  • Embedded Systems
  • Industrial Control System (ICS)
  • Internet of Things (IoT) Devices
  • Connecting to Dedicated and Mobile Systems
  • Security Constraints for Dedicated Systems
  • Mobile Device Deployment and Hardening
  • Chapter 9 Exam Question Review
  • Smartphone Hardening Lab
  • Chapter 9 Ask Me Anything (AMA)

Chapter 10 - Physical Security

  • Physical Security Overview
  • Physical Security
  • Keylogger Demo
  • Environmental Controls
  • Chapter 10 Exam Question Review
  • Physical Security Lab
  • Chapter 10 Ask Me Anything (AMA)

Chapter 11- Securing Dedicated Systems

  • DNS Security
  • FTP Packet Capture
  • Secure Web and E-mail
  • Request Forgery Attacks
  • Cross-Site Scripting Attacks
  • Web Application Security
  • Web App Vulnerability Scanning
  • Chapter 11 Exam Question Review
  • OWASP ZAP Web App Scan Lab
  • Chapter 11 Ask Me Anything (AMA)

Chapter 12 - Testing Infrastructure

  • Testing Infrastructure Overview
  • Social Engineering
  • Social Engineering Attacks
  • Vulnerability Assessments
  • Penetration Testing
  • Security Assessment Tools
  • The Metasploit Framework
  • Chapter 12 Exam Question Review
  • hping3 Forged Packet Lab
  • Chapter 12 Ask Me Anything (AMA)

Chapter 13 - Dealing with Incidents

  • Incident Response Overview
  • Incident Response Plans (IRPs)
  • Threat Analysis and Mitigating Actions
  • Digital Forensics
  • Gathering Digital Evidence
  • Business Continuity and Alternate Sites
  • Data Backup
  • Chapter 13 Exam Question Review
  • Autopsy Forensic Browser Lab
  • Chapter 13 Ask Me Anything (AMA)

 

Reviews

Be the first to write a review for this product.

Write a review

Note: HTML is not translated!
Bad           Good

Tags: CompTIA Security+ (SY0-601) Online Course,