CompTIA Security+ 601 (SY0 601)

Course Description

CompTIA Security+ is the first security certification a candidate should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to: - Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions - Monitor and secure hybrid environments, including cloud, mobile, and IoT - Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance - Identify, analyze, and respond to security events and incidents
5 Days
Contact us for pricing
 

Learning Objectives

Participants will:
Get to grips with security fundamentals, from the CIA triad through to IAM
Explore cloud security and techniques used in penetration testing
Discover different authentication methods and troubleshoot security issues
Secure the devices and applications that are used by your company
Identify and protect against various types of malware and virus
Protect your environment against social engineering and advanced attacks
Understand and implement PKI concepts
Delve into secure application development, deployment, and automation concepts

Understanding Security Fundamentals

CIA Triad
Understanding Security Fundamentals
Comparing Security Controls
Physical Security Controls
Understanding Digital Forensics

Implementing Public Key Infrastructure

PKI Concepts
Asymmetric v Symmetric Encryption
Key Stretching Algorithms
Quantum Computing
Blockchain and The Public Ledger
Comparing and Contrasting Basic Concepts of Cryptography
Common Use Cases for Cryptography

Investigating Identify and Access Management

Understanding Identity and Access Management Concepts
Implementing Authentication and Authorization Solutions
Cloud v On-Premise Authentication
Implementing Data Security and Privacy Practices
Common Account Management Policies

Exploring Virtualization and Cloud Concepts

Overview of Cloud Computing and Different Models
Understanding Cloud Service Models
Understanding Cloud Computing Concepts
Understanding Cloud Storage Concepts
Selecting Cloud Security Controls

Monitoring, Scanning and Penetration Testing

Penetration Testing Concepts
Passive and Active Reconnaissance
Exercise Types, Red, Blue and White Team
Syslog and SIEM Systems
Security Orchestration, Automation and Response (SOAR)

Understanding Secure and Insecure Protocols

Introduction to Protocols
Insecure Protocol and their Use Cases
Secure Protocol and their Use Cases
Additional Use Cases and Their Protocols

Delving into Network and Security Concepts

Installing and Configuration Network Components
Remote Access Capabilities
Secure Network Architecture
Network Reconnaissance and Discovery
Forensic Tools
IP Addressing

Securing Wireless and Mobile Solutions

Implementing Wireless Security
Wireless Access Point Controllers
Deploying Mobile Devices Securely
Mobile Device Connection Methods

Identifying Threats, Attacks and Vulnerabilities

Virus and Malware Attacks
Social Engineering Attacks
Threat Actors
Advanced Attacks

Governance, Risk, and Compliance

Risk Management Processes and Concepts
Attack Vectors and Intelligence Concepts
The importance of Policies for Organizational Security
Regulations, Standards and Legislation
Privacy and Sensitive Data Concepts

Managing Application Security

Implementing Host or Application Security
Understanding the Security Implications of Embedded and Specialist Systems
Understanding Secure Application Development, Deployment, and Automation

Dealing with Incident Response Procedures

Incident Response Procedures
Utilizing Data Sources to Support Investigations
Knowing How to Apply Techniques or Concepts to Secure and Environment
Implementing Cyber Security Resilience

CompTIASecurity+601SY0601