CompTIA Security+ SY0-501

60 Hours / Access Length: 12 Months / Delivery: Online, Self-Paced

Course Overview:

Gain hands-on expertise in CompTIA Security+ certification exam by course and performance based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security. CompTIA Security+ SY0-501 exam covers the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and many more.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

This course prepares students to take the CompTIA Security+ SY0-501 certification exam.

Course Outline:

Lesson 1: Introduction
  • Who Should Read This Book?
  • CompTIA Security+ Exam Topics
Lesson 2: Introduction to Security
  • Security 101
  • Think Like a Hacker
  • Threat Actor Types and Attributes
  • Review Key Topics
Lesson 3: Computer Systems Security Part I
  • Malicious Software Types
  • Delivery of Malware
  • Preventing and Troubleshooting Malware
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 4: Computer Systems Security Part II
  • Implementing Security Applications
  • Securing Computer Hardware and Peripherals
  • Securing Mobile Devices
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 5: OS Hardening and Virtualization
  • Hardening Operating Systems
  • Virtualization Technology
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 6: Application Security
  • Securing the Browser
  • Securing Other Applications
  • Secure Programming
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 7: Network Design Elements
  • Network Design
  • Cloud Security and Server Defense
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 8: Networking Protocols and Threats
  • Ports and Protocols
  • Malicious Attacks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 9: Network Perimeter Security
  • Firewalls and Network Security
  • NIDS Versus NIPS
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 10: Securing Network Media and Devices
  • Securing Wired Networks and Devices
  • Securing Wireless Networks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 11: Physical Security and Authentication Models
  • Physical Security
  • Authentication Models and Components
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 12: Access Control Methods and Models
  • Access Control Models Defined
  • Rights, Permissions, and Policies
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 13: Vulnerability and Risk Assessment
  • Conducting Risk Assessments
  • Assessing Vulnerability with Security Tools
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 14: Monitoring and Auditing
  • Monitoring Methodologies
  • Using Tools to Monitor Systems and Networks
  • Conducting Audits
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 15: Encryption and Hashing Concepts
  • Cryptography Concepts
  • Encryption Algorithms
  • Hashing Basics
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 16: PKI and Encryption Protocols
  • Public Key Infrastructure
  • Security Protocols
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 17: Redundancy and Disaster Recovery
  • Redundancy Planning
  • Disaster Recovery Planning and Procedures
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 18: Social Engineering, User Education, and Facilities Security
  • Social Engineering
  • User Education
  • Facilities Security
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 19: Policies and Procedures
  • Legislative and Organizational Policies
  • Incident Response Procedures
  • IT Security Frameworks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios

Certification(s):

This course prepares students to take the CompTIA Security+ SY0-501 certification exam.

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.