CompTIA Security+ Certification (Exam SYO-601)

Price
$2,475.00
Duration
 5 Days
Delivery Methods
 VILT    Private Group
Eligible UT Programs: Learning Credits, Coupons, Technical Training Pass, Training Passport

In this course, students will build on their knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.

This course is also designed for students who are seeking the CompTIA Security+ certification and who want to prepare for the CompTIA Security+ SY0-601 Certification Exam.

 

Upcoming Class Dates and Times

Oct 17  - Oct 21, 2022
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Oct 31  - Nov 04, 2022
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Nov 14  - Nov 18, 2022
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Nov 28  - Dec 02, 2022
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Dec 12  - Dec 16, 2022
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Jan 23  - Jan 27, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Feb 13  - Feb 17, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Feb 27  - Mar 03, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Mar 13  - Mar 17, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Mar 27  - Mar 31, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Apr 10  - Apr 14, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Apr 24  - Apr 28, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
May 08  - May 12, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
May 22  - May 26, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Jun 05  - Jun 09, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR
Jun 19  - Jun 23, 2023
8:00AM - 4:00PM Central
5 Days
Virtual Instructor Led
 GTR

Who Should Attend

This course is designed for information technology (IT) professionals who have networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix®, or Linux®; and who want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles.

Course Objectives

    On course completion, participants will be able to:
  • Compare and contrast attacks.
  • Compare and contrast security controls.
  • Use security assessment tools.
  • Explain basic cryptography concepts.
  • Implement a public key infrastructure.
  • Implement identity and access management controls.
  • Manage access services and accounts.
  • Implement a secure network architecture.
  • Install and configure security appliances.
  • Install and configure wireless and physical access security.
  • Deploy secure host, mobile, and embedded systems.
  • Implement secure network access protocols.
  • Implement secure network applications.
  • Explain risk management and disaster recovery concepts.
  • Describe secure application development concepts.
  • Explain organizational security concepts.

Agenda

1 - Comparing Security Roles and Security Controls
  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
2 - Explaining Threat Actors and Threat Intelligence
  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
3 - Performing Security Assessments
  • Assess Organizational Security with Network Reconnaissance Tools
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts
4 - Identifying Social Engineering and Malware
  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-Based Attacks
5 - Summarizing Basic Cryptographic Concepts
  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies
6 - Implementing Public Key Infrastructure
  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
7 - Implementing Authentication Controls
  • Summarize Authentication Design Concepts
  • Implement Knowledge-Based Authentication
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts
8 - Implementing Identity and Account Management Controls
  • Implement Identity and Account Types
  • Implement Account Policies
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies
9 - Implementing Secure Network Designs
  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers
10 - Implementing Network Security Appliances
  • Implement Firewalls and Proxy Servers
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM
11 - Implementing Secure Network Protocols
  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocols
12 - Implementing Host Security Solutions
  • Implement Secure Firmware
  • Implement Endpoint Security
  • Explain Embedded System Security Implications
13 - Implementing Secure Mobile Solutions
  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections
14 - Summarizing Secure Application Concepts
  • Analyze Indicators of Application Attacks
  • Analyze Indicators of Web Application Attacks
  • Summarize Secure Coding Practices
  • Implement Secure Script Environments
  • Summarize Deployment and Automation Concepts
15 - Implementing Secure Cloud Solutions
  • Summarize Secure Cloud and Virtualization Services
  • Apply Cloud Security Solutions
  • Summarize Infrastructure as Code Concepts
16 - Explaining Data Privacy and Protection Concepts
  • Explain Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls
17 - Performing Incident Response
  • Summarize Incident Response Procedures
  • Utilize Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls
18 - Explaining Digital Forensics
  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition
19 - Summarizing Risk Management Concepts
  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts
20 - Implementing Cybersecurity Resilience
  • Implement Redundancy Strategies
  • Implement Backup Strategies
  • Implement Cybersecurity Resiliency Strategies
21 - Explaining Physical Security
  • Explain the Importance of Physical Site Security Controls
  • Explain the Importance of Physical Host Security Controls
 

Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
Contact Us about Starting Your Business Training Strategy with United Training