CompTIA Security+ SYO-501
December 3 @ 8:00 am - December 7 @ 5:00 pm
One event on August 6, 2018 at 8:00am
One event on August 13, 2018 at 8:00am
One event on August 20, 2018 at 8:00am
One event on September 10, 2018 at 8:00am
One event on September 17, 2018 at 8:00am
One event on October 8, 2018 at 8:00am
One event on October 15, 2018 at 8:00am
One event on October 22, 2018 at 8:00am
One event on November 5, 2018 at 8:00am
One event on November 12, 2018 at 8:00am
One event on December 10, 2018 at 8:00am
One event on July 30, 2018 at 8:00am
One event on October 1, 2018 at 8:00am
One event on December 3, 2018 at 8:00am
Traditional Instructor Led and Live Online Instructor Led outline
To ensure your success in this course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts. You can obtain this level of skills and knowledge by taking one of the following Logical Operations courses:
- Using Microsoft® Windows® 10
- Microsoft® Windows® 10 Transition from Windows® 7
CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months’ experience in networking, including configuring security parameters, are strongly recommended. Students can obtain this level of skill and knowledge by taking any of the following CHOICE courses:
- CompTIA® A+®: A Comprehensive Approach (Exams 220-901 and 220-902)
- CompTIA® Network+® (Exam N10-006)
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.
In this course, you will implement information security across a variety of different contexts.
- Identify the fundamental components of information security.
- Analyze risk.
- Identify various threats to information security.
- Conduct security assessments to detect vulnerabilities.
- Implement security for hosts and software.
- Implement security for networks.
- Manage identity and access.
- Implement cryptographic solutions in the organization.
- Implement security at the operational level.
- Address security incidents.
- Ensure the continuity of business operations in the event of an incident.
Lesson 1: Identifying Security Fundamentals
Topic A: Identify Information Security Concepts
Topic B: Identify Basic Security Controls
Topic C: Identify Basic Authentication and Authorization Concepts
Topic D: Identify Basic Cryptography Concepts
Lesson 2: Analyzing Risk
Topic A: Analyze Organizational Risk
Topic B: Analyze the Business Impact of Risk
Lesson 3: Identifying Security Threats
Topic A: Identify Types of Attackers
Topic B: Identify Social Engineering Attacks
Topic C: Identify Malware
Topic D: Identify Software-Based Threats
Topic E: Identify Network-Based Threats
Topic F: Identify Wireless Threats
Topic G: Identify Physical Threats
Lesson 4: Conducting Security Assessments
Topic A: Identify Vulnerabilities
Topic B: Assess Vulnerabilities
Topic C: Implement Penetration Testing
Lesson 5: Implementing Host and Software Security
Topic A: Implement Host Security
Topic B: Implement Cloud and Virtualization Security
Topic C: Implement Mobile Device Security
Topic D: Incorporate Security in the Software Development Lifecycle
Lesson 6: Implementing Network Security
Topic A: Configure Network Security Technologies
Topic B: Secure Network Design Elements
Topic C: Implement Secure Networking Protocols and Services
Topic D: Secure Wireless Traffic
Lesson 7: Managing Identity and Access
Topic A: Implement Identity and Access Management
Topic B: Configure Directory Services
Topic C: Configure Access Services
Topic D: Manage Accounts
Lesson 8: Implementing Cryptography
Topic A: Identify Advanced Cryptography Concepts
Topic B: Select Cryptographic Algorithms
Topic C: Configure a Public Key Infrastructure
Topic D: Enroll Certificates
Topic E: Back Up and Restore Certificates and Private Keys
Topic F: Revoke Certificates
Lesson 9: Implementing Operational Security
Topic A: Evaluate Security Frameworks and Guidelines
Topic B: Incorporate Documentation in Operational Security
Topic C: Implement Security Strategies
Topic D: Manage Data Security Processes
Topic E: Implement Physical Controls
Lesson 10: Addressing Security Incidents
Topic A: Troubleshoot Common Security Issues
Topic B: Respond to Security Incidents
Topic C: Investigate Security Incidents
Lesson 11: Ensuring Business Continuity
Topic A: Select Business Continuity and Disaster Recovery Processes
Topic B: Develop a Business Continuity Plan