CompTIA Security+ (SY0-601)

Understanding Today's IT Security

4.88 (4 reviews)
Udemy
platform
English
language
IT Certification
category
CompTIA Security+ (SY0-601)
29
students
16 hours
content
Mar 2022
last update
$59.99
regular price

What you will learn

Learn Information Security Roles, Security Control and Framework Types

Understand Threat Actor Types, Attack Vectors, and Intelligence Sources

Learn Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

Learn Social Engineering, Indicators of Malware Attacks

Learn Network Protocols

Prepare for the Security+ SY0-601 Exam

Description

 SY0-601 Security+ is a beneficial cyber security-specific certification for IT job candidates to hold, often being the first instance where candidates learn to identify and handle InfoSec threats. This CompTIA training course is presented by instructor Vision Training Systems. The instructor has over 30 years of IT experience with 15 of those years specializing in IT security. Students will learn the best real-world troubleshooting practices for identifying and handling cybersecurity incidents. It is recommended that students complete CompTIA A+ training and CompTIA Network+ Training before beginning this course.


In this CompTIA training, you will learn how to explain threat actors and threat intelligence, about comparing security roles and security controls, and perform security assessments in order to identify social engineering attacks or malware. Gain knowledge on basic cryptographic concepts, authentication controls, data privacy, account management, network security protocols, and many other topics.


Modules in this CompTIA training course will cover:


  • Information Security Roles Security Control and Framework Types

  • Threat Actor Types, Attack Vectors, and Intelligence Sources

  • Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

  • Social Engineering, Indicators of Malware Attacks

  • Cryptography

  • Certificates and PKI

  • Authentication

  • Identity and Accounts, Authorization, Personnel Policies

  • Network Design and Hardware - Two Parts

  • Network Protocols

  • Endpoint Security

  • Mobile Devices

  • Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment, and Automation

  • Secure Coding, Scripting, Deployment, Cloud, and Virtualization

  • Privacy and Data Protection

  • Incident Response

  • Data Forensics

  • Risk Management, Business Impact Analysis

  • Redundancy and Backup Strategies

  • Physical Security

  • Security+ SY0-601 Exam Prep

Content

Module 1: Information Security Roles Security Control and Framework Types

Introduction and Overview
Compare and Contrast Information Security Roles
Compare and Contrast Security Control and Framework Types
Module Summary

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

Explain Threat Actor Types and Attack Vectors
Explain Threat Intelligence Sources
Module Summary

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability

Assess Organizational Security with Network Reconnaissance Tools
Packet Capture and Replay Demo
Explain Security Concerns with General Vulnerability Types
Summarize Vulnerability Scanning Techniques
Explain Penetration Testing Concepts
Module Summary

Module 4: Social Engineering, Indicators of Malware Attacks

Compare and Contrast Social Engineering Techniques
Analyze Indicators of Malware-based Attacks
Fork Bomb Malware Demo
Module Summary

Module 5: Cryptography

Compare and Contrast Cryptographic Ciphers
Summarize Cryptographic Modes of Operation
Summarize Cryptographic Use Cases and Weaknesses
Summarize Other Cryptographic Technologies
Module Summary

Module 6: Certificates and PKI

Implement Certificates and Certificate Authorities
Implement PKI Management
Implementing a PKI Demo
Module Summary

Module 7: Authentication

Summarize Authentication Design Concepts
Implement Knowledge-based Authentication
Password Cracker Demo
Implement Authentication Technologies
Summarize Biometrics Authentication Concepts
Module Summary

Module 8: Identity and Accounts, Authorization, Personnel Polices

Implement Identity and Account Types
Implement Account Policies
Account Types and Polices Demo
Implement Authorization Solutions
Explain the Importance of Personnel Policies
Module Summary

Module 9: Network Design and Hardware (Part 1)

Implement Secure Network Designs
Implement Secure Switching and Routing
Various Types of Network Attacks Demo
Implement Secure Wireless Infrastructure
Implement Load Balancers
Module Summary

Module 10: Network Hardware (Part 2)

Implement Firewalls and Proxy Servers
Implement Network Security Monitoring
Summarize the Use of SIEM
Module Summary

Module 11: Network Protocols

Implement Secure Network Operations Protocols
Implement Secure Application Protocols
Implement Secure Remote Access Protocols
Module Summary

Module 12: Endpoint Security

Implement Secure Firmware
Implement Endpoint Security
Endpoint Protection Demo
Explain Embedded System Security Implications
Module Summary

Module 13: Mobile Devices

Implement Mobile Device Management
Implement Secure Mobile Device Connections
Module Summary

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment

Analyze Indicators of Application Attack
Analyze Indicators of Web Application Attacks
Summarize Secure Coding Practices
Implement Secure Script Environments
Summarize Deployment and Automation Concepts
Module Summary

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

Summarize Secure Cloud and Virtualization Services
Apply Cloud Security Solutions
Summarize Infrastructure as Code Concepts
Module Summary

Module 16: Privacy and Data Protection

Explain Privacy and Data Sensitivity Concepts
Explain Privacy and Data Protection Controls
Module Summary

Module 17: Incident Response

Summarize Incident Response Procedures
Utilize Appropriate Data Sources for Incident Response
Apply Mitigation Controls
Module Summary

Module 18: Forensics

Explain Key Aspects of Digital Forensics Documentation
Explain Key Aspects of Digital Forensics Evidence Acquisition
Module Summary

Module 19: Risk Management and Business Impact Analysis

Explain Risk Management Processes and Concepts
Explain Business Impact Analysis Concepts
Module Summary

Module 20: Redundancy and Backup Strategies

Implement Redundancy Strategies
Implement Backup Strategies
Implement Cybersecurity Resiliency Strategies
Module Summary

Module 21: Physical Security

Explain the Importance of Physical Site Controls
Explain the Importance of Physical Host Security Controls
Module Summary

Module 22: Afterword

Conclusion and General Exam Tips

CompTIA Security+ (SY0-601) Final Practice Test

CompTIA Security+ (SY0-601) Final Practice Test

Reviews

Ralf-Peter
January 11, 2024
Ich habe hier die Fachbücher CompTIA Network+, CompTIA Security+, CompTIA Linux+ und lerne seit einigen Jahren. Dieser Lehrgang hier war für mich Quasi nur eine Vorbereitung zu den CompTIA Prüfungen. I have the specialist books CompTIA Network+, CompTIA Security+, CompTIA Linux+ here and have been learning for several years. For me, this course was basically just preparation for the CompTIA exams. Sehr guter Lehrgang.

Charts

Price

CompTIA Security+ (SY0-601) - Price chart

Rating

CompTIA Security+ (SY0-601) - Ratings chart

Enrollment distribution

CompTIA Security+ (SY0-601) - Distribution chart

Related Topics

4620052
udemy ID
3/30/2022
course created date
5/8/2022
course indexed date
Bot
course submited by