CompTIA Security+ SY0-501

60 Hours / 12 Months / Self-Paced

Course Overview:

Gain hands-on expertise in CompTIA Security+ certification exam by course and performance based labs. Performance based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security. CompTIA Security+ SY0-501 exam covers the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and many more.

This course includes FREE access for 12 months to a cloud based lab platform to assist students develop the practical information technology (IT) skills necessary to succeed in high in demand IT jobs.  This cloud based lab solution uses real equipment that enables our students to execute each practical task in a safe environment that is accessible from anywhere without needing to buy their own hardware or risk damage to their own system.

Along with providing the necessary hardware in a virtual environment, students gain access to high quality practical exercises that cover many of the exam topics they will encounter on their certifying exams.

This course prepares students to take the CompTIA Security+ SY0-501 certification exam.

Course Outline:

Lesson 1: Introduction
  • Who Should Read This Book?
  • CompTIA Security+ Exam Topics
Lesson 2: Introduction to Security
  • Security 101
  • Think Like a Hacker
  • Threat Actor Types and Attributes
  • Review Key Topics
Lesson 3: Computer Systems Security Part I
  • Malicious Software Types
  • Delivery of Malware
  • Preventing and Troubleshooting Malware
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 4: Computer Systems Security Part II
  • Implementing Security Applications
  • Securing Computer Hardware and Peripherals
  • Securing Mobile Devices
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 5: OS Hardening and Virtualization
  • Hardening Operating Systems
  • Virtualization Technology
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 6: Application Security
  • Securing the Browser
  • Securing Other Applications
  • Secure Programming
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 7: Network Design Elements
  • Network Design
  • Cloud Security and Server Defense
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 8: Networking Protocols and Threats
  • Ports and Protocols
  • Malicious Attacks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 9: Network Perimeter Security
  • Firewalls and Network Security
  • NIDS Versus NIPS
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 10: Securing Network Media and Devices
  • Securing Wired Networks and Devices
  • Securing Wireless Networks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 11: Physical Security and Authentication Models
  • Physical Security
  • Authentication Models and Components
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 12: Access Control Methods and Models
  • Access Control Models Defined
  • Rights, Permissions, and Policies
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 13: Vulnerability and Risk Assessment
  • Conducting Risk Assessments
  • Assessing Vulnerability with Security Tools
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 14: Monitoring and Auditing
  • Monitoring Methodologies
  • Using Tools to Monitor Systems and Networks
  • Conducting Audits
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 15: Encryption and Hashing Concepts
  • Cryptography Concepts
  • Encryption Algorithms
  • Hashing Basics
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 16: PKI and Encryption Protocols
  • Public Key Infrastructure
  • Security Protocols
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 17: Redundancy and Disaster Recovery
  • Redundancy Planning
  • Disaster Recovery Planning and Procedures
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 18: Social Engineering, User Education, and Facilities Security
  • Social Engineering
  • User Education
  • Facilities Security
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
Lesson 19: Policies and Procedures
  • Legislative and Organizational Policies
  • Incident Response Procedures
  • IT Security Frameworks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios

Certification(s):

This course prepares students to take the CompTIA Security+ SY0-501 certification exam.


System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended.

Hardware Requirements:
  • Minimum Pentium 400 Mhz CPU or G3 Macintosh. 1 GHz or greater CPU recommended.
  • 256MB RAM minimum. 1 GB RAM recommended.
  • 800x600 video resolution minimum. 1025x768 recommended.
  • Speakers/Headphones to listen to Dialogue steaming audio sessions.
  • A microphone to speak in Dialogue streaming audio sessions.
Operating System Requirements:
  • Windows Vista, 7, 8, 8.1, 9, 10
  • Mac OSX 10 or higher.
  • OpenSUSE Linux 9.2 or higher.
Web Browser Requirements:
  • Google Chrome is recommended.
  • Firefox 13.x or greater.
  • Internet Explorer 6.x or greater.
  • Safari 3.2.2 or greater.
Software Requirements:
  • Adobe Flash Player 6 or greater.
  • Oracle Java 7 or greater.
  • Adobe Reader 7 or greater.
Web Browser Settings:
  • Accept Cookies
  • Disable Pop-up Blocker.


**Outlines are subject to change, as courses and materials are updated.**