Course description
CompTIA Security+ Certification (Exam SY0-501) Online Course
The CompTIA Security+ course is designed to teach students security basics and prepare th for testing to become Security+ certified.
The Security+ covers many vendor neutral topics including different types of threats and attacks, networking technologies and tools, secure design and architecture, identity and access managent, risk assessment and managent, cryptography and Public Key Infrastructure, the ever-expanding virtualization of various computing systs, and industry managent of smart devices.
These topics will be covered from a 'ground-up' perspective so that even inexperienced students will be able to follow along. IT security is an ever-growing field and its importance is recognized universally throughout the industry.
This security+ course will cover security concerns from both a professional setting and on a personal level. This gives students who do not plan to apply their certificate in the immediate future the benefit of keeping up to date on the latest security practices and techniques that they can follow to keep thselves secure in a digital world.
Each of the modules of this course is designed to align with the official objectives of this certification and expand past the scope of the certification to allow for real life application. They give the student some real life examples of various attacks or security practices that they can both apply in real life or use to further their understanding of a course objective.
Upcoming start dates
Outcome / Qualification etc.
Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
Training Course Content
Module 1 - Threats, Attacks, and Vulnerabilities
- 1.1 Introduction
- 1.2 Types Of Malware - Part 1
- 1.3 Types Of Malware - Part 2
- 1.4 Types Of Attacks - Part 1
- 1.5 Types Of Attacks - Part 2
- 1.6 Types Of Attacks - Part 3
- 1.7 Types Of Attacks - Part 4
- 1.8 Types Of Attacks - Part 5
- 1.9 Threat Actors - Part 1
- 1.10 Threat Actors - Part 2
- 1.11 Penetration Testing And Vulnerability Scanning - Part 1
- 1.12 Penetration Testing And Vulnerability Scanning - Part 2
- 1.13 Impact Of Vulnerabilities - Part 1
- 1.14 Impact Of Vulnerabilities - Part 2
Module 2 - Technologies and Tools
- 2.1 Networking Hardware And Software - Part 1
- 2.2 Networking Hardware And Software - Part 2
- 2.3 Networking Hardware And Software - Part 3
- 2.4 Networking Hardware And Software - Part 4
- 2.5 Networking Hardware And Software - Part 5
- 2.6 Networking Hardware And Software - Part 6
- 2.7 Security Assessment - Part 1
- 2.8 Security Assessment - Part 2
- 2.9 Troubleshooting Issues - Part 1
- 2.10 Troubleshooting Issues - Part 2
- 2.11 Securing Mobile Devices - Part 1
- 2.12 Securing Mobile Devices - Part 2
- 2.13 Securing Mobile Devices - Part 3
- 2.14 Securing Mobile Devices - Part 4
- 2.15 Secure Protocols - Part 1
- 2.16 Secure Protocols - Part 2
Module 3 - Architecture and Design
- 3.1 Secure Network Architecture - Part 1
- 3.2 Secure Network Architecture - Part 2
- 3.3 Secure Syst Designs - Part 1
- 3.4 Secure Syst Designs - Part 2
- 3.5 Secure Staging Deployment Concepts
- 3.6 bedded Systs - Part 1
- 3.7 bedded Systs - Part 2
- 3.8 Application Development And Deployment - Part 1
- 3.9 Application Development And Deployment - Part 2
- 3.10 Application Development And Deployment - Part 3
- 3.11 Physical Security Controls - Part 1
- 3.12 Physical Security Controls - Part 2
- 3.13 Physical Security Controls - Part 3
- 3.14 Cloud Virtualization - Part 1
- 3.15 Cloud Virtualization - Part 2
Module 4 - Identity and Access Managent
- 4.1 Identity And Access Managent - Part 1
- 4.2 Identity And Access Managent - Part 2
- 4.3 Identity And Access Services - Part 1
- 4.4 Identity And Access Services - Part 2
- 4.5 Managent Controls - Part 1
- 4.6 Managent Controls - Part 2
- 4.7 Account Managent Practices - Part 1
- 4.8 Account Managent Practices - Part 2
- 4.9 Account Managent Practices - Part 3
Module 5 - Risk Managent
- 5.1 Organizational Security - Part 1
- 5.2 Organizational Security - Part 2
- 5.3 Business Impact Analysis Concepts - Part 1
- 5.4 Business Impact Analysis Concepts - Part 2
- 5.5 Risk Managent - Part 1
- 5.6 Risk Managent - Part 2
- 5.7 Incident Response Procedures - Part 1
- 5.8 Incident Response Procedures - Part 2
- 5.9 Forensics - Part 1
- 5.10 Forensics - Part 2
- 5.11 Disaster Recovery - Part 1
- 5.12 Disaster Recovery - Part 2
- 5.13 Types Of Control - Part 1
- 5.14 Types Of Control - Part 2
- 5.15 Data Security And Privacy Practices - Part 1
- 5.16 Data Security And Privacy Practices - Part 2
Module 6 - Cryptography and PKI
- 6.1 Cryptographic Basics - Part 1
- 6.2 Cryptographic Basics - Part 2
- 6.3 Cryptographic Basics - Part 3
- 6.4 Cryptographic Algorithms - Part 1
- 6.5 Cryptographic Algorithms - Part 2
- 6.6 Wireless Security - Part 1
- 6.7 Wireless Security - Part 2
- 6.8 Implenting PKI - Part 1
- 6.9 Implenting PKI - Part 2
- 6.10 Implenting PKI - Part 3
- 6.11 Conclusion
Why choose Learning247
Gain a New Qualification - Get a verifiable qualification with Learning247 and improve your career prospects. Most of our courses CPD Accredited.
Wide Range of Courses - With over 800+ courses to choose from you're sure to find a course that interests you.
Study Anywhere & Any time - All of our online courses can be studied from your PC, MacBook , tablet or smart phone device.
Request info
Learning247
As one of the market-leaders in distance-learning and self-study multimedia-based training, Learning247 provides the most cost-effective route to enable you to update and improve upon your skills; and all without the massive prices that are regularly seen throughout the training...