Loading Events

« All Events

  • This event has passed.

CompTIA Security+ SYO-501

October 15, 2018 @ 8:00 am - October 19, 2018 @ 5:00 pm

|Recurring Event (See all)

One event on August 6, 2018 at 8:00am

One event on August 13, 2018 at 8:00am

One event on August 20, 2018 at 8:00am

One event on September 10, 2018 at 8:00am

One event on September 17, 2018 at 8:00am

One event on October 8, 2018 at 8:00am

One event on October 15, 2018 at 8:00am

One event on October 22, 2018 at 8:00am

One event on November 5, 2018 at 8:00am

One event on November 12, 2018 at 8:00am

One event on December 10, 2018 at 8:00am

One event on July 30, 2018 at 8:00am

One event on October 1, 2018 at 8:00am

One event on December 3, 2018 at 8:00am

Traditional Instructor Led and Live Online Instructor Led      outline


To ensure your success in this course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts. You can obtain this level of skills and knowledge by taking one of the following Logical Operations courses:

  • Using Microsoft® Windows® 10
  • Microsoft® Windows® 10 Transition from Windows® 7

CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months’ experience in networking, including configuring security parameters, are strongly recommended. Students can obtain this level of skill and knowledge by taking any of the following CHOICE courses:

  • CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
  • CompTIA® Network+® (Exam N10-006)


This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.


In this course, you will implement information security across a variety of different contexts.

You will:

  • Identify the fundamental components of information security.
  • Analyze risk.
  • Identify various threats to information security.
  • Conduct security assessments to detect vulnerabilities.
  • Implement security for hosts and software.
  • Implement security for networks.
  • Manage identity and access.
  • Implement cryptographic solutions in the organization.
  • Implement security at the operational level.
  • Address security incidents.
  • Ensure the continuity of business operations in the event of an incident.


Lesson 1: Identifying Security Fundamentals

 Topic A: Identify Information Security Concepts

 Topic B: Identify Basic Security Controls

 Topic C: Identify Basic Authentication and Authorization Concepts

 Topic D: Identify Basic Cryptography Concepts

Lesson 2: Analyzing Risk

 Topic A: Analyze Organizational Risk

 Topic B: Analyze the Business Impact of Risk


Lesson 3: Identifying Security Threats

 Topic A: Identify Types of Attackers

 Topic B: Identify Social Engineering Attacks

 Topic C: Identify Malware

 Topic D: Identify Software-Based Threats

 Topic E: Identify Network-Based Threats

 Topic F: Identify Wireless Threats

 Topic G: Identify Physical Threats


Lesson 4: Conducting Security Assessments

 Topic A: Identify Vulnerabilities

 Topic B: Assess Vulnerabilities

 Topic C: Implement Penetration Testing


Lesson 5: Implementing Host and Software Security

 Topic A: Implement Host Security

 Topic B: Implement Cloud and Virtualization Security

 Topic C: Implement Mobile Device Security

 Topic D: Incorporate Security in the Software Development Lifecycle


Lesson 6: Implementing Network Security

 Topic A: Configure Network Security Technologies

 Topic B: Secure Network Design Elements

 Topic C: Implement Secure Networking Protocols and Services

 Topic D: Secure Wireless Traffic


Lesson 7: Managing Identity and Access

 Topic A: Implement Identity and Access Management

 Topic B: Configure Directory Services

 Topic C: Configure Access Services

 Topic D: Manage Accounts


Lesson 8: Implementing Cryptography

 Topic A: Identify Advanced Cryptography Concepts

 Topic B: Select Cryptographic Algorithms

 Topic C: Configure a Public Key Infrastructure

 Topic D: Enroll Certificates

 Topic E: Back Up and Restore Certificates and Private Keys

 Topic F: Revoke Certificates


Lesson 9: Implementing Operational Security

 Topic A: Evaluate Security Frameworks and Guidelines

 Topic B: Incorporate Documentation in Operational Security

 Topic C: Implement Security Strategies

 Topic D: Manage Data Security Processes

 Topic E: Implement Physical Controls


Lesson 10: Addressing Security Incidents

 Topic A: Troubleshoot Common Security Issues

 Topic B: Respond to Security Incidents

 Topic C: Investigate Security Incidents


Lesson 11: Ensuring Business Continuity

 Topic A: Select Business Continuity and Disaster Recovery Processes

 Topic B: Develop a Business Continuity Plan


October 15, 2018 @ 8:00 am
October 19, 2018 @ 5:00 pm
Event Categories:
, , ,


Tony Scott


Systems IT
1855 Lakeland Drive, Suite R-101
Jackson, MS 39216 United States
+ Google Map