CompTIA Security+ (Exam SYO-701)
Retail Price: $2,795.00
Next Date: 01/27/2025
Course Days: 5
Enroll in Next Date
Request Custom Course
At Course Completion
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-701) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of IT security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your cybersecurity skill set so that you can confidently perform your duties in any entry-level security role.
On course completion, you will be able to do the following:
- Summarize fundamental security concepts.
- Compare threat types.
- Explain appropriate cryptographic solutions.
- Implement identity and access management.
- Secure enterprise network architecture.
- Secure cloud network architecture.
- Explain resiliency and site security concepts.
- Explain vulnerability management.
- Evaluate network security capabilities.
- Assess endpoint security capabilities.
- Enhance application security capabilities.
- Explain incident response and monitoring concepts.
- Analyze indicators of malicious activity.
- Summarize security governance concepts.
- Explain risk management processes.
- Summarize data protection and compliance concepts
Audience Profile
The Official CompTIA Security+ (Exam SY0-701) is the primary course you will need to take if your job responsibilities include safeguarding networks, detecting threats, and securing data in your organization. You can take this course to prepare for the CompTIA Security+ (Exam SY0-701) certification examination.
Prerequisites
To ensure your success in this course, you should have a minimum of two years of experience in IT administration with a focus on security, hands-on experience with technical information security, and a broad knowledge of security concepts. CompTIA A+ and CompTIA Network+, or the equivalent knowledge, is strongly recommended.
Outline
Lesson 1: Summarize Fundamental Security Concepts
- Topic 1A: Security Concepts
- Topic 1B: Security Controls
Lesson 2: Compare Threat Types
- Topic 2A: Threat Actors
- Topic 2B: Attack Surfaces
- Topic 2C: Social Engineering
Lesson 3: Explain Cryptographic Solutions
- Topic 3A: Cryptographic Algorithms
- Topic 3B: Public Key Infrastructure
- Topic 3C: Cryptographic Solutions
Lesson 4: Implement Identity and Access Management
- Topic 4A: Authentication
- Topic 4B: Authorization
- Topic 4C: Identity Management
Lesson 5: Secure Enterprise Network Architecture
- Topic 5A: Enterprise Network Architecture
- Topic 5B: Network Security Appliances
- Topic 5C: Secure Communications
Lesson 6: Secure Cloud Network Architecture
- Topic 6A: Cloud Infrastructure
- Topic 6B: Embedded Systems and Zero Trust Architecture
Lesson 7: Explain Resiliency and Site Security Concepts
- Topic 7A: Asset Management
- Topic 7B: Redundancy Strategies
- Topic 7C: Physical Security
Lesson 8: Explain Vulnerability Management
- Topic 8A: Device and OS Vulnerabilities
- Topic 8B: Application and Cloud Vulnerabilities
- Topic 8C: Vulnerability Identification Methods
- Topic 8D: Vulnerability Analysis and Remediation
Lesson 9: Evaluate Network Security Capabilities
- Topic 9A: Network Security Baselines
- Topic 9B: Network Security Capability Enhancement
Lesson 10: Assess Endpoint Security Capabilities
- Topic 10A: Implement Endpoint Security
- Topic 10B: Mobile Device Hardening
Lesson 11: Enhance Application Security Capabilities
- Topic 11A: Application Protocol Security Baselines
- Topic 11B: Cloud and Web Application Security Concepts
Lesson 12: Explain Incident Response and Monitoring Concepts
- Topic 12A: Incident Response
- Topic 12B: Digital Forensics
- Topic 12C: Data Sources
- Topic 12D: Alerting and Monitoring Tools
Lesson 13: Analyze Indicators of Malicious Activity
- Topic 13A: Malware Attack Indicators
- Topic 13B: Physical and Network Attack Indicators
- Topic 13C: Application Attack Indicators
Lesson 14: Summarize Security Governance Concepts
- Topic 14A: Policies, Standards, and Procedures
- Topic 14B: Change Management
- Topic 14C: Automation and Orchestration
Lesson 15: Explain Risk Management Processes
- Topic 15A: Risk Management Processes and Concepts
- Topic 15B: Vendor Management Concepts
- Topic 15C: Audits and Assessments
Lesson 16: Summarize Data Protection and Compliance Concepts
- Topic 16A: Data Classification and Compliance
- Topic 16B: Personnel Policies
Course Dates | Course Times (EST) | Delivery Mode | GTR | |
---|---|---|---|---|
12/16/2024 - 12/20/2024 | 10:00 AM - 6:00 PM | Virtual | Enroll | |
1/27/2025 - 1/31/2025 | 10:00 AM - 6:00 PM | Virtual | Enroll | |
3/10/2025 - 3/14/2025 | 10:00 AM - 6:00 PM | Virtual | Enroll | |
4/28/2025 - 5/2/2025 | 10:00 AM - 6:00 PM | Virtual | Enroll | |
6/23/2025 - 6/27/2025 | 10:00 AM - 6:00 PM | Virtual | Enroll |