CompTIA Security+ (SY0-601)

Paths

CompTIA Security+ (SY0-601)

Author: Christopher Rees

In this series, you will expand your knowledge of attacks, threats, and vulnerabilities; security architecture and design; security operations and incident response; and... Read more

What you will learn

  • How to identify different types of social engineering techniques
  • How to analyze potential indicators to determine the type of attack
  • How to analyze potential indicators associated with application attacks
  • How to analyze potential indicators associated with network attacks
  • How to detail different threat actors, vectors, and intelligence sources
  • How to identify security concerns associated with various types of vulnerabilities
  • How to differentiate the techniques used in security assessments
  • How to detail the techniques used in penetration testing
  • How to explain secure application development, deployment, and automation
  • How to summarize authentication and authorization design concepts, as they pertain to information security
  • How to implement cybersecurity resilience
  • How to explain the security implications of embedded and specialized systems
  • How to explain the importance of physical security controls
  • How to implement secure protocols
  • How to implement host or application security solutions
  • How to implement secure network designs
  • How to implement secure mobile solutions
  • How to apply cybersecurity solutions to the cloud
  • How to implement identity and account management controls
  • How to implement authentication and authorization solutions
  • How to implement public key infrastructure
  • How to use the appropriate tool to assess organizational security
  • How to summarize the importance of policies, processes, and procedures for incident response
  • How to utilize appropriate data sources to support an investigation
  • How to use mitigation techniques or controls to secure an environment
  • How to compare various types of controls
  • How to explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture

Pre-requisites

CompTIA recommends CompTIA Security+ candidates have a minimum of two years of experience in IT systems administration with a focus on security and hands-on technical information security experience. It’s also recommended that candidates hold the CompTIA Network+ certification or have the equivalent networking experience.

CompTIA Security+ (SY0-601)

In this series, you will learn to evaluate the security posture of an enterprise environment, monitor and secure enterprise environments, operate with an awareness of applicable policies, laws, and regulations, and identify, analyze, and respond to security events and incidents.

Attacks, Threats, and Vulnerabilities for CompTIA Security+

by Christopher Rees

Nov 16, 2020 / 5h 7m

5h 7m

Start Course
Description

In this course, you’ll learn about the various threats faced by social engineering techniques like phishing, pharming, and identity fraud. First, you’ll learn about potential indicators of compromise used to determine the types of attack to systems, applications, and networks. Next, you’ll discover the various intelligence sources used to identify and combat these threats. Finally, you’ll become familiar with various penetration testing tools and techniques. When you’re finished with this course, you’ll have the skills and knowledge needed to pass the Threats, Attacks, and Vulnerabilities section of Security+, along with the skills needed to help protect your company from attacks both internal and external.

Table of contents
  1. Course Overview
  2. Comparing Different Types of Social Engineering Techniques
  3. Analyzing Malware and Other Attacks
  4. Recognizing Application Attacks
  5. Identifying Network Attacks
  6. Distinguishing Threat Actors, Vectors, and Intelligence Sources
  7. Understanding Vulnerabilities and Security Risks
  8. Defining Security Assessment Techniques
  9. Defining Penetration Testing

Architecture and Design for CompTIA Security+

by Christopher Rees

Nov 16, 2020 / 5h 39m

5h 39m

Start Course
Description

In this course, you’ll learn about the tools and technologies used to secure the environment. First you’ll learn various methods to ensure data is secure, changes are tracked, and disruptions are minimized. Next, you’ll learn how virtualization and cloud computing can be leverage securely to enhance both productivity and security. Then, you'll learn about automation, resiliency, and failover to strengthen your company’s security posture. Lastly, you’ll dive into the basics of cryptographic concepts to ensure data is secure at-rest, in-transit and in-use. When you’ve finished this courses, you’ll have the knowledge required to pass the architecture and design section of Security+, along with the skills needed to help ensure your companies critical data and assets are secure from attacks both internal and external.

Table of contents
  1. Course Overview
  2. Understanding Security Concepts in an Enterprise Environment
  3. Understanding Virtualization and Cloud Computing
  4. Implementing Secure Application Development, Deployment, and Automation
  5. Understanding Authentication and Authorizations Methods
  6. Implementing Cybersecurity Resilience
  7. Recognizing Security Implications of Embedded and Specialized Systems
  8. Understanding the Importance of Physical Security Controls
  9. Understanding the Basics of Cryptographic Concepts

Coming Soon

Implementation of Secure Solutions for CompTIA Security+

Coming Soon

by Christopher Rees

Coming Soon

Operations and Incident Response for CompTIA Security+

Coming Soon

by Pluralsight

Coming Soon

Governance, Risk, and Compliance for CompTIA Security+

Coming Soon

by Pluralsight