CompTIA Security+ 601 (SY0 601)
Course Description
CompTIA Security+ is the first security certification a candidate should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
- Identify, analyze, and respond to security events and incidents
5 Days
Contact us for pricing
Learning Objectives
Participants will:Get to grips with security fundamentals, from the CIA triad through to IAM
Explore cloud security and techniques used in penetration testing
Discover different authentication methods and troubleshoot security issues
Secure the devices and applications that are used by your company
Identify and protect against various types of malware and virus
Protect your environment against social engineering and advanced attacks
Understand and implement PKI concepts
Delve into secure application development, deployment, and automation concepts
Understanding Security Fundamentals
CIA TriadUnderstanding Security Fundamentals
Comparing Security Controls
Physical Security Controls
Understanding Digital Forensics
Implementing Public Key Infrastructure
PKI ConceptsAsymmetric v Symmetric Encryption
Key Stretching Algorithms
Quantum Computing
Blockchain and The Public Ledger
Comparing and Contrasting Basic Concepts of Cryptography
Common Use Cases for Cryptography
Investigating Identify and Access Management
Understanding Identity and Access Management ConceptsImplementing Authentication and Authorization Solutions
Cloud v On-Premise Authentication
Implementing Data Security and Privacy Practices
Common Account Management Policies
Exploring Virtualization and Cloud Concepts
Overview of Cloud Computing and Different ModelsUnderstanding Cloud Service Models
Understanding Cloud Computing Concepts
Understanding Cloud Storage Concepts
Selecting Cloud Security Controls
Monitoring, Scanning and Penetration Testing
Penetration Testing ConceptsPassive and Active Reconnaissance
Exercise Types, Red, Blue and White Team
Syslog and SIEM Systems
Security Orchestration, Automation and Response (SOAR)
Understanding Secure and Insecure Protocols
Introduction to ProtocolsInsecure Protocol and their Use Cases
Secure Protocol and their Use Cases
Additional Use Cases and Their Protocols
Delving into Network and Security Concepts
Installing and Configuration Network ComponentsRemote Access Capabilities
Secure Network Architecture
Network Reconnaissance and Discovery
Forensic Tools
IP Addressing
Securing Wireless and Mobile Solutions
Implementing Wireless SecurityWireless Access Point Controllers
Deploying Mobile Devices Securely
Mobile Device Connection Methods
Identifying Threats, Attacks and Vulnerabilities
Virus and Malware AttacksSocial Engineering Attacks
Threat Actors
Advanced Attacks
Governance, Risk, and Compliance
Risk Management Processes and ConceptsAttack Vectors and Intelligence Concepts
The importance of Policies for Organizational Security
Regulations, Standards and Legislation
Privacy and Sensitive Data Concepts
Managing Application Security
Implementing Host or Application SecurityUnderstanding the Security Implications of Embedded and Specialist Systems
Understanding Secure Application Development, Deployment, and Automation
Dealing with Incident Response Procedures
Incident Response ProceduresUtilizing Data Sources to Support Investigations
Knowing How to Apply Techniques or Concepts to Secure and Environment
Implementing Cyber Security Resilience
CompTIASecurity+601SY0601