CompTIA Security+ (Exam SY0-501) - 93-027 Course Outline

(5 Days)

Overview

The Official CompTIA® Security+® (Exam SY0-501) course is the primary curriculum you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.

 

This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today’s job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

Audience Profile

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.

Prerequisites

To ensure your success in this course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts.

 

CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months’ experience in networking, including configuring security parameters, are strongly recommended.

 

Additional introductory courses or work experience in application development and programming, or in network and operating system administration for any software platform or system, are helpful but not required.

At Course Completion

In this course, you will implement information security across a variety of different contexts.

 

You will:

 

 

    • Identify the fundamental components of information security.

 

    • Analyze risk.

 

    • Identify various threats to information security.

 

    • Conduct security assessments to detect vulnerabilities.

 

    • Implement security for hosts and software.

 

    • Implement security for networks.

 

    • Manage identity and access.

 

    • Implement cryptographic solutions in the organization.

 

    • Implement security at the operational level.

 

    • Address security incidents.

 

    • Ensure the continuity of business operations in the event of an incident.

 

Course Outline

Course Content

 

Lesson 1: Identifying Security Fundamentals

 

Topic A: Identify Information Security Concepts

 

Topic B: Identify Basic Security Controls

 

Topic C: Identify Basic Authentication and Authorization Concepts

 

Topic D: Identify Basic Cryptography Concepts

 

Lesson 2: Analyzing Risk

 

Topic A: Analyze Organizational Risk

 

Topic B: Analyze the Business Impact of Risk

 

Lesson 3: Identifying Security Threats

 

Topic A: Identify Types of Attackers

 

Topic B: Identify Social Engineering Attacks

 

Topic C: Identify Malware

 

Topic D: Identify Software-Based Threats

 

Topic E: Identify Network-Based Threats

 

Topic F: Identify Wireless Threats

 

Topic G: Identify Physical Threats

 

Lesson 4: Conducting Security Assessments

 

Topic A: Identify Vulnerabilities

 

Topic B: Assess Vulnerabilities

 

Topic C: Implement Penetration Testing

 

Lesson 5: Implementing Host and Software Security

 

Topic A: Implement Host Security

 

Topic B: Implement Cloud and Virtualization Security

 

Topic C: Implement Mobile Device Security

 

Topic D: Incorporate Security in the Software Development Lifecycle

 

Lesson 6: Implementing Network Security

 

Topic A: Configure Network Security Technologies

 

Topic B: Secure Network Design Elements

 

Topic C: Implement Secure Networking Protocols and Services

 

Topic D: Secure Wireless Traffic

 

Lesson 7: Managing Identity and Access

 

Topic A: Implement Identity and Access Management

 

Topic B: Configure Directory Services

 

Topic C: Configure Access Services

 

Topic D: Manage Accounts

 

Lesson 8: Implementing Cryptography

 

Topic A: Identify Advanced Cryptography Concepts

 

Topic B: Select Cryptographic Algorithms

 

Topic C: Configure a Public Key Infrastructure

 

Topic D: Enroll Certificates

 

Topic E: Back Up and Restore Certificates and Private Keys

 

Topic F: Revoke Certificates

 

Lesson 9: Implementing Operational Security

 

Topic A: Evaluate Security Frameworks and Guidelines

 

Topic B: Incorporate Documentation in Operational Security

 

Topic C: Implement Security Strategies

 

Topic D: Manage Data Security Processes

 

Topic E: Implement Physical Controls

 

Lesson 10: Addressing Security Incidents

 

Topic A: Troubleshoot Common Security Issues

 

Topic B: Respond to Security Incidents

 

Topic C: Investigate Security Incidents

 

Lesson 11: Ensuring Business Continuity

 

Topic A: Select Business Continuity and Disaster Recovery Processes

 

Topic B: Develop a Business Continuity Plan