Search courses 👉
Professional Course

CompTIA Security+ (Exam SYO-501)

Length
10-15 Hours
Next course start
Start Anytime! See details
Delivery
Self-paced Online
Length
10-15 Hours
Next course start
Start Anytime! See details
Delivery
Self-paced Online
This provider usually responds within 48 hours 👍

Course description

This course, CompTIA Security+ (Exam SYO-501), will provide you with an understanding of identifying security fundamentals. You will learn about basic security controls, identifying basic authentication, authorization concepts, and basic cryptography concepts. You will be able to explain the process of analyzing risk. You will also learn about performing a business impact analysis.

This course then explains conducting security assessments, identifying vulnerabilities, assessing vulnerabilities, and implementing penetration testing. You will learn about implementing host and software security. You will also learn about implementing network security, configuring network security techniques, and secure network design elements.

This course then wraps up discussing managing identity and access. You will learn to implement identity and access management, configure directory services, configure access services, and manage accounts. By taking this course you will learn to implement cryptography, identify advanced cryptography concepts, select cryptographic algorithms, configure a public key infrastructure, enroll certificates, back up and restore certificates and private keys, revoke certificates, troubleshoot common security issues, respond to security incidents, and implement forensic procedures. So why wait? Start learning the skills needed to become an expert in security and ensure business continuity today.

Upcoming start dates

1 start date available

Start Anytime!

  • Self-paced Online
  • Online

Training content

Identifying Security Fundamentals

Description: In this module, you will learn to identify information security concepts, basic security controls, basic authentication and authorization, as well as basic cryptography concepts.

  • Topic A: Identify Information Security Concepts
  • Topic A - Demo 1 - Identifying Information Security Basics
  • Topic B: Identify Basic Security Controls
  • Topic B - Demo 1 - Identifying Basic Security Controls
  • Topic C: Identify Basic Authentication and Authorization Concepts
  • Topic C - Demo 1 - Identifying Basic Authentication and Authorization Concepts
  • Topic D: Identify Basic Cryptography Concepts
  • Topic D - Demo 1 - Identifying Basic Cryptography Concepts
  • Assessment: Review Quiz

Analyzing Risk

Description: In this module, you will learn about analyzing the organizational and business impact of risks. The process of identifying risks, analyzing them, developing a response strategy for them, and mitigating their future impact is all part of being a security professional.

  • Topic A: Analyze Organizational Risk
  • Topic A - Demo 1 - Analyzing Risks to the Organization
  • Topic B: Analyze the Business Impact of Risk
  • Topic B - Demo 1 - Performing a Business Impact Analysis
  • Assessment: Review Quiz

Identifying Security Threats

Description: In this module, you will learn to identify types of attackers, social engineering attacks, malware, software-based threats, network-based threats, wireless threats, as well as physical threats. This module also contains demos for these topics.

  • Topic A: Identify Types of Attackers
  • Topic A - Demo 1 - Identifying Types of Attackers
  • Topic B: Identify Social Engineering Attacks
  • Topic B - Demo 1 - Identifying Social Engineering Attacks
  • Topic C: Identify Malware
  • Topic C - Demo 1 - Identifying Types of Malware
  • Topic D: Identify Software-Based Threats
  • Topic D - Demo 1 - Identifying Password Attacks
  • Topic E: Identify Network-Based Threats
  • Topic E - Demo 1 - Identifying Threats to DNS
  • Topic E - Demo 2 - Identifying Port Scanning Threats
  • Topic F: Identify Wireless Threats
  • Topic F - Demo 1 - Identifying Wireless Threats
  • Topic G: Identify Physical Threats
  • Topic G - Demo 1 - Identifying Physical Threats
  • Assessment: Review Quiz

Conducting Security Assessments

Description: In this module, you will learn about identifying and assessing vulnerabilities, and implementing penetration testing. This module covers software vulnerabilities such as zero-day, improper input handling, improper error handling, resource exhaustion, race condition and memory vulnerabilities.

  • Topic A: Identify Vulnerabilities
  • Topic A - Demo 1 - Identifying Vulnerabilities
  • Topic B: Assess Vulnerabilities
  • Topic B - Demo 1 - Capturing Network Data with Wireshark
  • Topic B - Demo 2 - Scanning for General Vulnerabilities
  • Topic C: Implement Penetration Testing
  • Topic C - Demo 1 - Implementing Penetration Testing
  • Assessment: Review Quiz

Implementing Host and Software Security

Description: In this module, you will learn about implementing host, cloud and virtualization and mobile device securities, and incorporating everything in the software development lifecycle.

  • Topic A: Implement Host Security
  • Topic A - Demo 1 - Implementing Auditing
  • Topic A - Demo 2 - Hardening a Server
  • Topic B: Implement Cloud and Virtualization Security
  • Topic B - Demo 1 - Securing Virtual Machine Networking
  • Topic C: Implement Mobile Device Security
  • Topic C - Demo 1 - Implementing Mobile Device Security
  • Topic D: Incorporate Security in the Software Development Lifecycle
  • Topic D - Demo 1 - Performing Static Code Analysis
  • Assessment: Review Quiz

Implementing Network Security

Description: In this module students will learn about configuring network security technologies, secure network design elements, implementing secure networking protocols and services, and securing wireless traffic.

  • Topic A: Configure Network Security Technologies
  • Topic A - Demo 1 - Configuring a Network IDS
  • Topic B: Secure Network Design Elements
  • Topic B - Demo 1 - Securing Network Design Elements
  • Topic C: Implement Secure Networking Protocols and Services
  • Topic C - Demo 1 - Installing an Internet Information Services Web Server
  • Topic C - Demo 2 - Securing Network Traffic Using IPSec
  • Topic D: Secure Wireless Traffic
  • Topic D - Demo 1 - Securing Wireless Traffic
  • Assessment: Review Quiz

Managing Identity and Access

Description: In this module you will learn about implementing identity and access management, configuring directory and access services, and managing accounts. Identity and access management is a security process that provides identity, authentication and authorization mechanisms.

  • Topic A: Implement Identity and Access Management
  • Topic A - Demo 1 - Implementing DAC for a File Share
  • Topic B: Configure Directory Services
  • Topic B - Demo 1 - Backing Up Active Directory
  • Topic C: Configure Access Services
  • Topic C - Demo 1 - Configuring a Remote Access Server
  • Topic C - Demo 2 - Setting Up Remote Access Authentication
  • Topic D: Manage Accounts
  • Topic D - Demo 1 - Managing Accounts
  • Assessment: Review Quiz

Implementing Cryptography

Description: In this module, you will learn to identify advanced cryptography concepts, select cryptographic algorithms, configure a public key infrastructure, enrol certificates, back up and restore certificates and private keys, and revoke certificates. This module covers cryptography elements such as confusion, diffusion, collision, obfuscation, PRNG, and PFS.

  • Topic A: Identify Advanced Cryptography Concepts
  • Topic A - Demo 1 - Identifying Advanced Cryptographic Concepts
  • Topic B: Select Cryptographic Algorithms
  • Topic B - Demo 1 - Selecting Cryptographic Algorithms
  • Topic C: Configure a Public Key Infrastructure
  • Topic C - Demo 1 - Installing a CA
  • Topic C - Demo 2 - Securing a Windows Server 2016 CA
  • Topic D: Enroll Certificates
  • Topic D - Demo 1 - Enrolling Certificates
  • Topic D - Demo 2 - Securing Network Traffic with Certificates
  • Topic E: Back Up and Restore Certificates and Private Keys
  • Topic E - Demo 1 - Backing Up a Certificate and Private Key
  • Topic E - Demo 2 - Restoring a Certificate and Private Key
  • Topic F: Revoke Certificates
  • Topic F - Demo 1 - Revoking Certificates
  • Assessment: Review Quiz

Implementing Operational Security

Description: In this module you will learn to evaluate security frameworks and guidelines, incorporate documentation in operational security, manage data security processes, and implement physical controls. Security frameworks define how to categorize and identify elements of security operations, focus tasks at a high level, and helps avoid building security in a vacuum or without considering important concepts.

  • Topic A: Evaluate Security Frameworks and Guidelines
  • Topic A - Demo 1 - Evaluating Security Frameworks and Guidelines
  • Topic B: Incorporate Documentation in Operational Security
  • Topic B - Demo 1 - Incorporating Documentation in Operational Security
  • Topic C: Implement Security Strategies
  • Topic C - Demo 1 - Implementing Virtual Machine Snapshots
  • Topic D: Manage Data Security Processes
  • Topic D - Demo 1 - Destroying Data Securely
  • Topic D - Demo 2 - Encrypting a Storage Device
  • Topic E: Implement Physical Controls
  • Topic E - Demo 1 - Implementing Physical Controls
  • Assessment: Review Quiz

Addressing Security Issues

Description: In this module, you will learn to troubleshoot common security issues, respond to security incidents, and investigate security incidents. Students will learn about authentication and permissions issues, and access violations.

  • Topic A: Troubleshoot Common Security Issues
  • Topic A - Demo 1 - Identifying Event Log Anomalies
  • Topic B: Respond to Security Incidents
  • Topic B - Demo 1 - Responding to a Security Incident
  • Topic C: Investigate Security Incidents
  • Topic C - Demo 1 - Implementing Forensic Procedures
  • Assessment: Review Quiz

Ensuring Business Continuity

Description: In this module, students will learn to select a business continuity and disaster recovery process and develop a business continuity plan. Business continuity is a collection of processes enabling an organization to maintain normal business operations after an adverse event and is a key aspect of a security specialist's skillset.

  • Topic A: Select Business Continuity and Disaster Recovery Processes
  • Topic A - Demo 1 - Selecting Business Continuity and Disaster Recovery Process
  • Topic B: Develop a Business Continuity Plan
  • Topic B - Demo 1 - Developing a BCP
  • Assessment: Review Quiz

Course assessment

  • Assessment: CompTIA Security+ (Exam SYO-501) - Course Assessment

Certification / Credits

By the end of this course, you will be able to:

  • Describe the process for analyzing risk
  • Discuss identifying security threats
  • Explain implementing host and software security
  • Indicate managing identity and access
  • Recall advanced cryptography concepts
  • Explain the disaster recovery process
  • Develop a business continuity plan

Quick stats about Alison?

Providing Free Online Learning since 2007

Over 45 Million Learners across 193 Countries have studied with us

Over 5 Million people use the Alison Learning App, where you can study anywhere and anytime

Contact this provider

Contact course provider

Fill out your details to find out more about CompTIA Security+ (Exam SYO-501).

  Contact the provider

  Get more information

  Register your interest

Country *

reCAPTCHA logo This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Alison Free Learning
Mount Carmel, Cappagh Road
H62 AV62 Loughrea Galway

Alison Free Learning

Alison is the world’s largest free online empowerment platform for education and skills training, offering thousands of CPD-accredited courses and a range of impactful career development tools. It is a for-profit social enterprise dedicated to making it possible for anyone,...

Read more and show all training delivered by this supplier

Ads