You are here

CompTIA Security+ SY0-501

E-COURSE:

CompTIA Security+ SY0-501

Instructor-led video course with presentations, workbooks, games, flashcards and quizzes.
Overview

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Objectives
  • Provide operational, information, application and infrastructure level security
  • Secure the network to maintain availability, integrity, and confidentiality of critical information
  • Operate within a set of rules, policies, and regulations wherever applicable
  • Comprehend Risk identification and mitigation
Target Audience

IT security professionals with a minimum of two years' experience in IT administration with a focus on security; users with basic day-to-day technical information security experience; those interested in gaining a broader and deeper knowledge of security concerns and implementation; and learners preparing for the Security+ SY0-501 exam

Module 1 - Threats, Attacks, and Vulnerabilities

1.1 Introduction

1.2 Types Of Malware - Part 1

1.3 Types Of Malware - Part 2

1.4 Types Of Attacks - Part 1

1.5 Types Of Attacks - Part 2

1.6 Types Of Attacks - Part 3

1.7 Types Of Attacks - Part 4

1.8 Types Of Attacks - Part 5

1.9 Threat Actors - Part 1

1.10 Threat Actors - Part 2

1.11 Penetration Testing And Vulnerability Scanning - Part 1

1.12 Penetration Testing And Vulnerability Scanning - Part 2

1.13 Impact Of Vulnerabilities - Part 1

1.14 Impact Of Vulnerabilities - Part 2

Module 2 - Technologies and Tools

2.1 Networking Hardware And Software - Part 1

2.2 Networking Hardware And Software - Part 2

2.3 Networking Hardware And Software - Part 3

2.4 Networking Hardware And Software - Part 4

2.5 Networking Hardware And Software - Part 5

2.6 Networking Hardware And Software - Part 6

2.7 Security Assessment - Part 1

2.8 Security Assessment - Part 2

2.9 Troubleshooting Issues - Part 1

2.10 Troubleshooting Issues - Part 2

2.11 Securing Mobile Devices - Part 1

2.12 Securing Mobile Devices - Part 2

2.13 Securing Mobile Devices - Part 3

2.14 Securing Mobile Devices - Part 4

2.15 Secure Protocols - Part 1

2.16 Secure Protocols - Part 2

Module 3 - Architecture and Design

3.1 Secure Network Architecture - Part 1

3.2 Secure Network Architecture - Part 2

3.3 Secure System Designs - Part 1

3.4 Secure System Designs - Part 2

3.5 Secure Staging Deployment Concepts

3.6 Embedded Systems - Part 1

3.7 Embedded Systems - Part 2

3.8 Application Development And Deployment - Part 1

3.9 Application Development And Deployment - Part 2

3.10 Application Development And Deployment - Part 3

3.11 Physical Security Controls - Part 1

3.12 Physical Security Controls - Part 2

3.13 Physical Security Controls - Part 3

3.14 Cloud Virtualization - Part 1

3.15 Cloud Virtualization - Part 2

Module 4 - Identity and Access Management

4.1 Identity And Access Management - Part 1

4.2 Identity And Access Management - Part 2

4.3 Identity And Access Services - Part 1

4.4 Identity And Access Services - Part 2

4.5 Management Controls - Part 1

4.6 Management Controls - Part 2

4.7 Account Management Practices - Part 1

4.8 Account Management Practices - Part 2

4.9 Account Management Practices - Part 3

Module 5 - Risk Management

5.1 Organizational Security - Part 1

5.2 Organizational Security - Part 2

5.3 Business Impact Analysis Concepts - Part 1

5.4 Business Impact Analysis Concepts - Part 2

5.5 Risk Management - Part 1

5.6 Risk Management - Part 2

5.7 Incident Response Procedures - Part 1

5.8 Incident Response Procedures - Part 2

5.9 Forensics - Part 1

5.10 Forensics - Part 2

5.11 Disaster Recovery - Part 1

5.12 Disaster Recovery - Part 2

5.13 Types Of Control - Part 1

5.14 Types Of Control - Part 2

5.15 Data Security And Privacy Practices - Part 1

5.16 Data Security And Privacy Practices - Part 2

Module 6 - Cryptography and PKI

6.1 Cryptographic Basics - Part 1

6.2 Cryptographic Basics - Part 2

6.3 Cryptographic Basics - Part 3

6.4 Cryptographic Algorithms - Part 1

6.5 Cryptographic Algorithms - Part 2

6.6 Wireless Security - Part 1

6.7 Wireless Security - Part 2

6.8 Implementing PKI - Part 1

6.9 Implementing PKI - Part 2

6.10 Implementing PKI - Part 3

6.11 Conclusion

E-COURSE E-Learning Expert-led video course with presentations, workbooks, quizzes, games and flashcards.
  • 20:49:00
    + Hours Of learning
  • Includes video, presentations, workbooks, quizzes, flashcards & games
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access (Unless indicated otherwise)
  • 10-Day money-back guarantee