top of page

Self Paced CompTIA Security+ (SYO 601)

Price

$199.00

Duration

40 Hours

About the Course

Part 1: Threats, Attacks, and Vulnerabilities


  Lesson 1: Comparing and Contrasting Different Types of Social Engineering Techniques

  Lesson 2: Analyzing Potential Indicators to Determine the Type of Attack

  Lesson 3: Analyzing Potential Indicators Associated with Application Attacks

  Lesson 4: Analyzing Potential Indicators Associated with Network Attacks

  Lesson 5: Understanding Different Threat Actors, Vectors and Intelligence Sources

  Lesson 6: Understanding the Security Concerns Associated with Various types of Vulnerabilities

  Lesson 7: Summarizing the Techniques Used in Security Assessments

  Lesson 8: Understanding the Techniques Used in Penetration Testing


Part 2: Architecture and Design


  Lesson 9: Understanding the Importance of Security Concepts in an Enterprise Environment

  Lesson 10: Summarizing Virtualization and Cloud Computing Concepts

  Lesson 11: Summarizing Secure Application Development, Deployment, and Automation Concepts

  Lesson 12: Summarizing Authentication and Authorization Design Concepts

  Lesson 13: Implementing Cybersecurity Resilience

  Lesson 14: Understanding the Security Implications of Embedded and Specialized Systems

  Lesson 15: Understanding the Importance of Physical Security Controls

  Lesson 16: Summarizing the Basics of Cryptographic Concepts


Part 3: Implementation


  Lesson 17: Implementing Secure Protocols

  Lesson 18: Implementing Host or Application Security Solutions

  Lesson 19: Implementing Secure Network Designs

  Lesson 20: Installing and Configuring Wireless Security Settings

  Lesson 21: Implementing Secure Mobile Solutions

  Lesson 22: Applying Cybersecurity Solutions to the Cloud

  Lesson 23: Implementing Identity and Account Management Controls

  Lesson 24: Implementing Authentications and Authorization Solutions

  Lesson 25: Implementing Public Key Infrastructure


Part 4: Operations and Incident Response


  Lesson 26: Using the Appropriate Tools to Assess Organizational Security

  Lesson 27: Summarizing the Importance of Policies, Processes, and Procedures for Incident Response

  Lesson 28: Using Appropriate Data Sources to Support an Investigation

  Lesson 29: Applying Mitigation Techniques or Controls to Secure an Environment

  Lesson 30: Understanding the Key Aspects of Digital Forensics


Part 5: Governance, Risk, and Compliance


  Lesson 31: Comparing and Contrasting the Various Types of Controls

  Lesson 32: Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture

  Lesson 33: Understanding the Importance of Policies to Organizational Security

  Lesson 34: Summarizing Risk Management Processes and Concepts

  Lesson 35: Understanding Privacy and Sensitive Data Concepts in Relation to Security


bottom of page