CompTIA Security+ SYO-501

CompTIA Security+ SYO-501

CompTIA Security+ (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. 2KO Africa is a professional training company, delivering cutting edge programs in the IT space and in selected business applications. Our training is offered online, live online and also by instructor led classes. 2KO Africa's business courses are available world-wide, many of them leading to European Certification.

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management making it an important stepping stone of an IT security career. CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

 

 

Course Objectives
Provide operational, information, application and infrastructure level security
Secure the network to maintain availability, integrity, and confidentiality of critical information
Operate within a set of rules, policies, and regulations wherever applicable
Comprehend Risk identification and mitigation

Prerequisites
IT security professionals with a minimum of two years' experience in IT administration with a focus on security; users with basic day-to-day technical information security experience; those interested in gaining a broader and deeper knowledge of security concerns and implementation; and learners preparing for the Security+ SY0-501 exam

Course Content

THREATS ATTACKS AND VULNERABILITIES
Overview
Determining Types of Malware
Determining Types of Malware Part 2
Types of Attacks
Types of Attacks Part 2
Overview
Determining Types of Malware
Determining Types of Malware Part 2
Types of Attacks
Types of Attacks Part 2
Types of Attacks Part 3
Types of Attacks Part 4
Threat Vector Types and Attributes
Penetration Testing Concepts
Vulnerability Scanning Concepts
Impact of Various Vulnerabilities
Impact of Various Vulnerabilities Part 2

TECHNOLOGIES AND TOOLS
Hardware Software Organizational Security
Hardware Software Organizational Security Part 2
Hardware Software Organizational Security Part 3
Hardware Software Organizational Security Part 4
Security Posture Assessment
Security Posture Assessment Part 2
Security Posture Assessment Part 3
Security Posture Assessment Part 4
Troubleshoot Common Security Issues

ARCHITECTURE AND DESIGN
Best Practices and Secure Config Guides
Secure Network Architecture Concepts
Secure System Design
Secure Staging Deployment Concepts
Security Implications of Embedded Systems
Secure App Development and Deployment
Cloud and Virtualization Concepts
Cloud and Virtalization Concepts Part 2
Resiliency and Automation to Reduce Risk
Importance of Physical Security

IDENTITY AND ACCESS MANAGEMENT
Identity and Access Management Concepts
Identity and Access Services
Identity and Access Management Controls
Identity and Access Management Controls Part 2
Account Management Practices
Account Management Practices Part 2

Risk Management
Policies, Plans and Procedures
Impact Business Analysis
Risk Management Processes and Concepts
Incident Response Procedures
Basic Concepts of Forensics
Disaster Recovery and Business Continuity
Disaster Recovery and Business Continuity Part 2
Data Security and Privacy
Public Key Infrastructure Part 2

CRYPTOGRAPHY AND PKI
Basic Concepts of Cryptography
Basic Concepts of Cryptography Part 2
Cryptography Algorithms Basics
Cryptography Algorithms Basics Part 2
Cryptography Algorithms Basics Part 3
Wireless Security
Public Key Infrastructure
Public Key Infrastructure Part 3
Public Key Infrastructure Part 4

 

Details about this course
Over 28
hours of learning
Includes video, presentations, workbooks, quizzes, flashcards & games
Receive a Certificate of Excellence on successful completion
Presented by highly qualified, industry leading experts
12 Months access (Unless indicated otherwise)