CompTIA Security+ (SY0-601)
Offered By: Cybrary
Course Description
Overview
Cybersecurity is a growing career field with a need for more security professionals in all industries and types of organizations. One of the greatest hindrances to risk management and cybercrime mitigation is the lack of qualified and skilled professionals trained in cybersecurity.
What is Information Systems Security?
Commonly referred to as InfoSec, information systems security refers to the processes and methodologies required to keep information confidential and available while assuring its integrity. this represents the backbone of the CIA triad - Confidentiality, Integrity, and Availability. Because there are multiple threats looming throughout cyberspace, it is essential for both businesses and individuals to secure their systems.
Information security knowledge is backed by awareness of applicable threats to each domain, the IT Security policy framework, and the impact of data classification standards. What will you learn in this Security+ course? You’ll acquire core competencies as you study important information security concepts, including the CIA triad, the 7 domains of a typical IT infrastructure, and layered security solutions for each domain.
What Does the CompTIA Security+ Certification Training Involve?
The self-paced curriculum for this online Security+ training course involves the study of various areas of network security that are necessary to combat the high number of worldwide security threats.
In this CompTIA Security+ course, you will learn the fundamentals of cloud security, security protocols, information security, encryption, and network infrastructure. The instructor-led training provides you with all the information and tools that you need to successfully complete the CompTIA Security+ exam.
There are no prerequisites for this course, but it is suggested that you complete CompTIA Network+ training and pass the CompTIA Network+ exam first to be successful in this CompTIA Security+ course.
Who Should Take this CompTIA Security Plus Training?
Cybrary's online CompTIA Security+ training is designed for any security professional, including security consultants, network administrators, security engineers, and security analysts, as well as anyone who wants to begin a career in cybersecurity with a self-paced program.
What Are the Benefits of the CompTIA Security+ Certification?
Cybersecurity experts and their services are in high demand. When you receive CompTIA Security+certification, you will provide potential employers with a credential that is well-respected industry-wide.
The certification assures employers that you have mastered the basic cybersecurity concepts and skills required to protect data and help prevent information security breaches.
Additionally, this certification will help increase your earning potential in the cybersecurity industry. According to the Bureau of Labor Statistics, security administrators, specialists, and those in management typically earn over $86,000 annually.
What Jobs Will CompTIA Security+ Certification Prepare Me For?
Nowadays, nearly every business needs a team of cybersecurity professionals equipped with the knowledge, tools, and skills to implement appropriate mitigation techniques. Becoming certified in Security+ gives you access to many competitive cybersecurity positions.
You may use your skills to perform core security functions in roles such as a network administrator, systems administrator, security administrator, security specialist, security consultant, and security analyst, as well as various entry-level IT cybersecurity jobs like junior IT auditor and penetration tester.
The Security+ certification will also allow you to compete in the pool of government, military, and military contracting jobs. These positions require that all IT professionals have certifications that comply with Department of Defense (DoD) directives. The CompTIA Security+ certification meets those directives.
What Does the CompTIA Security+ Certification Entail?
Passing the exam for the CompTIA Security Plus certification certifies that you have the skills and knowledge required to install and configure systems used to secure networks, applications, and mobile devices. Certification holders also participate in risk mitigation activities, perform threat analysis and incident response, engage with identity and access management, and work with knowledge of all applicable laws, policies, and regulations.
Cybrary’s Security+ course prepares you for both the CompTIA Security+ exam for SY0-501 andthe updated SY0-601, which is more in-depth and covers new objectives. The SY0-601 exam consists of a maximum of 90 questions (multiple-choice and performance-based), which you have 90 minutes to answer. In order to successfully pass the exam, you must earn a passing score of at least 750 out of 900.
Your certification will be valid for three years. Contact CompTIA for more information on this or any other CompTIA security certification.
What Kind of Exam Questions Should I Be Prepared for?
The CompTIA Security+ SY0-601 exam includes questions based on performance – deeper than typical multiple-choice problems. This ensures that you are able to troubleshoot quickly and accurately. Application of your knowledge and experience is part of the testing, which will demonstrate that you have more than just an academic understanding of the needs of the job. It's estimated that you will spend one-third of your exam time on performance-based questions.
Exam prep for any CompTIA Security+ certification needs to be comprehensive, so that you have a thorough understanding of the objectives. Cybrary's CompTIA Security+ training course is self-paced to allow you to develop skills on your own schedule. You can watch video training to study CompTIA security concepts as much and as often as you need to become well-versed and ready for the CompTIA Security+ certification exam.
Syllabus
- Risk Management and Security Basics
- Why Security+
- Risk Management and Security Basics
- Risk Management Overview
- Use and Misuse Cases
- Risk Assessment
- Risk Mitigation
- Risk Monitoring
- Security Principles - Confidentiality
- Integrity and Availability Threats and Mitigation
- Security Principles Wrap-Up
- Threats, Attacks and Vulnerabilities
- Understanding Attacks
- Social Engineering
- Malware
- Network-Based Attacks
- Spoofing and Redirection
- DNS Service
- Passwords
- Wireless Security Part 1
- Wireless Security Part 2
- Application Attacks
- Code Injection and Cross Site Scripting
- XSRF Race Conditions and Memory Issues
- Cryptography
- Cryptography Introduction and Services
- Cryptography Definitions: Initialization Vectors
- Algorithms and Keys
- Desirable Qualities of Algorithms and Keys
- Symmetric Cryptography
- Symmetric Ciphers Stream and Block
- Asymmetric Cryptography
- Hashing for Integrity
- MAC Message Authentication Code
- Hybrid Cryptography SSL and TLS
- SSL, TLS and PKI Introduction
- PKI Continued
- PGP and SMIME
- Network Security
- Networking Concepts
- Network Connectivity
- Network Services Continued: DHCP and IPAM
- OSI Model Introduction and Encapsulation
- OSI Layers 1 and 2
- OSI Layers 3 and 4
- OSI Layers 5, 6, 7 and Summary
- Ports and Protocols Introduction
- Protocols of the TCPIP Suite Part 1
- Protocols of the TCPIP Suite Part 2
- Network Services DNS
- Network Storage
- Remote Access
- Tunneling and IPSec Part 1
- Tunneling and IPSec Part 2
- Network Connectivity Devices
- Network Connectivity Devices Part 1
- Network Connectivity Devices Part 2
- Switch and VLAN Configuration Part 1
- Switch and VLAN Configuration Part 2
- Routing
- Network Address Translation
- Firewalls
- Firewall Best Practices
- Intrusion Detection and Prevention
- Operational Security
- Introduction and Policy
- Policies and Best Practices Part 1
- Policies and Best Practices Part 2
- Scanning, Monitoring and Patching
- Patch Lifecycle Baselines and Traffic Analysis
- Fault Management
- RAID and Data Backups
- Business Continuity and Disaster Recovery Part 1
- Business Continuity and Disaster Recovery Part 2
- Virtualization Part 1
- Virtualization Part 2
- Cloud Computing
- Cloud Services
- Cloud Deployment Models and Cloud Wrap-Up
- IoT Introduction
- OWASP IoT and Wrap-Up
- Hardening the System Part 1
- Hardening the System Part 2
- Vulnerability Assessments and Penetration Tests
- Incident Response
- Forensic Investigations
- Identity and Access Management
- Identity and Access Management Introduction
- Authentication
- Single Sign-On Kerberos Part 1
- Single Sign-On Kerberos Part 2
- Single Sign-On with Federated Services Part 1
- Single Sign-On with Federated Services Part 2
- Network Access Control and Authentication Wrap-Up
- Authorization
- Auditing and Wrap-Up
Taught by
Kelly Handerhan and Ebie Prideaux
Related Courses
Academia de auditoría en la nube: independencia en la nube (Español LATAM) | Cloud Audit Academy - Cloud Agnostic (Spanish from Latin America)Amazon Web Services via AWS Skill Builder Accelerating GKE Incident Response with Prisma Cloud and Cortex XSOAR
Google via Google Cloud Skills Boost Amazon Detective Deep Dive
A Cloud Guru AWS Certified Cloud Practitioner (CLF-C01)
A Cloud Guru AWS Certified Security - Specialty 2020
A Cloud Guru