CompTIA Security+ (Exam SYO-501)
Course Description
This course, CompTIA Security+ (Exam SYO-501), will provide you with an understanding of identifying security fundamentals. You will learn about basic security controls, identifying basic authentication, authorization concepts, and basic cryptography concepts. You will be able to explain the process of analyzing risk. You will also learn about performing a business impact analysis.
This course then explains conducting security assessments, identifying vulnerabilities, assessing vulnerabilities, and implementing penetration testing. You will learn about implementing host and software security. You will also learn about implementing network security, configuring network security techniques, and secure network design elements.
This course then wraps up discussing managing identity and access. You will learn to implement identity and access management, configure directory services, configure access services, and manage accounts. By taking this course you will learn to implement cryptography, identify advanced cryptography concepts, select cryptographic algorithms, configure a public key infrastructure, enroll certificates, back up and restore certificates and private keys, revoke certificates, troubleshoot common security issues, respond to security incidents, and implement forensic procedures. So why wait? Start learning the skills needed to become an expert in security and ensure business continuity today.
What you'll learn in this course?
-
Data Security
-
Technology
-
Network Security
-
Cybersecurity
-
Information Security
-
Cryptography
-
CompTIA
-
Penetration Testing
Course Curriculum
- Topic A: Identify Information Security Concepts
- Topic A - Demo 1 - Identifying Information Security Basics
- Topic B: Identify Basic Security Controls
- Topic B - Demo 1 - Identifying Basic Security Controls
- Topic C: Identify Basic Authentication and Authorization Concepts
- Topic C - Demo 1 - Identifying Basic Authentication and Authorization Concepts
- Topic D: Identify Basic Cryptography Concepts
- Topic D - Demo 1 - Identifying Basic Cryptography Concepts
- Review Quiz
- Topic A: Identify Types of Attackers
- Topic A - Demo 1 - Identifying Types of Attackers
- Topic B: Identify Social Engineering Attacks
- Topic B - Demo 1 - Identifying Social Engineering Attacks
- Topic C: Identify Malware
- Topic C - Demo 1 - Identifying Types of Malware
- Topic D: Identify Software-Based Threats
- Topic D - Demo 1 - Identifying Password Attacks
- Topic E: Identify Network-Based Threats
- Topic E - Demo 1 - Identifying Threats to DNS
- Topic E - Demo 2 - Identifying Port Scanning Threats
- Topic F: Identify Wireless Threats
- Topic F - Demo 1 - Identifying Wireless Threats
- Topic G: Identify Physical Threats
- Topic G - Demo 1 - Identifying Physical Threats
- Review Quiz
- Topic A: Identify Vulnerabilities
- Topic A - Demo 1 - Identifying Vulnerabilities
- Topic B: Assess Vulnerabilities
- Topic B - Demo 1 - Capturing Network Data with Wireshark
- Topic B - Demo 2 - Scanning for General Vulnerabilities
- Topic C: Implement Penetration Testing
- Topic C - Demo 1 - Implementing Penetration Testing
- Review Quiz
- Topic A: Implement Host Security
- Topic A - Demo 1 - Implementing Auditing
- Topic A - Demo 2 - Hardening a Server
- Topic B: Implement Cloud and Virtualization Security
- Topic B - Demo 1 - Securing Virtual Machine Networking
- Topic C: Implement Mobile Device Security
- Topic C - Demo 1 - Implementing Mobile Device Security
- Topic D: Incorporate Security in the Software Development Lifecycle
- Topic D - Demo 1 - Performing Static Code Analysis
- Review Quiz
- Topic A: Configure Network Security Technologies
- Topic A - Demo 1 - Configuring a Network IDS
- Topic B: Secure Network Design Elements
- Topic B - Demo 1 - Securing Network Design Elements
- Topic C: Implement Secure Networking Protocols and Services
- Topic C - Demo 1 - Installing an Internet Information Services Web Server
- Topic C - Demo 2 - Securing Network Traffic Using IPSec
- Topic D: Secure Wireless Traffic
- Topic D - Demo 1 - Securing Wireless Traffic
- Review Quiz
- Topic A: Implement Identity and Access Management
- Topic A - Demo 1 - Implementing DAC for a File Share
- Topic B: Configure Directory Services
- Topic B - Demo 1 - Backing Up Active Directory
- Topic C: Configure Access Services
- Topic C - Demo 1 - Configuring a Remote Access Server
- Topic C - Demo 2 - Setting Up Remote Access Authentication
- Topic D: Manage Accounts
- Topic D - Demo 1 - Managing Accounts
- Review Quiz
- Topic A: Identify Advanced Cryptography Concepts
- Topic A - Demo 1 - Identifying Advanced Cryptographic Concepts
- Topic B: Select Cryptographic Algorithms
- Topic B - Demo 1 - Selecting Cryptographic Algorithms
- Topic C: Configure a Public Key Infrastructure
- Topic C - Demo 1 - Installing a CA
- Topic C - Demo 2 - Securing a Windows Server 2016 CA
- Topic D: Enroll Certificates
- Topic D - Demo 1 - Enrolling Certificates
- Topic D - Demo 2 - Securing Network Traffic with Certificates
- Topic E: Back Up and Restore Certificates and Private Keys
- Topic E - Demo 1 - Backing Up a Certificate and Private Key
- Topic E - Demo 2 - Restoring a Certificate and Private Key
- Topic F: Revoke Certificates
- Topic F - Demo 1 - Revoking Certificates
- Review Quiz
- Topic A: Evaluate Security Frameworks and Guidelines
- Topic A - Demo 1 - Evaluating Security Frameworks and Guidelines
- Topic B: Incorporate Documentation in Operational Security
- Topic B - Demo 1 - Incorporating Documentation in Operational Security
- Topic C: Implement Security Strategies
- Topic C - Demo 1 - Implementing Virtual Machine Snapshots
- Topic D: Manage Data Security Processes
- Topic D - Demo 1 - Destroying Data Securely
- Topic D - Demo 2 - Encrypting a Storage Device
- Topic E: Implement Physical Controls
- Topic E - Demo 1 - Implementing Physical Controls
- Review Quiz
Workforce Academy Partnership
Ireland
By