CompTIA Security+ 2019
US$ 8.99 US$ 14.99
CompTIA Security+ course covers all the information you need to pass the CompTIA Security+ Exam that is SY0-501. CompTIA Security+ workbook is designed to take a practical approach to learning with real-life examples and case studies.
- Covers complete CompTIA Security+ SY0-501 blueprint
- Summarized content
- Case Study based approach
- Downloadable vRacks
- 100% passing guarantee
- Mind maps
About Comptia Security+ Certification
The purpose of this certification is to make you a better IT Security Tech. All the essential principles for network security are covered in this Security+ certification.
The skills or techniques you will learn when you obtain Security+ certificate:
- Configuring a secure network for protection against threats, malware and etc.
- Identification of vulnerabilities in a network and provision of proper mitigation techniques.
- Knowledge of latest threats that harm your system intelligently.
- Implementation of secure protocols and appropriate security checks and the establishment of end-to-end host security.
- Implementation of access and identity management controls to have your data in legal hands.
- Ability to use encryption, configuring wireless security for information safety purpose.
About the CompTIA Security+ Exam
- Exam Number: SY0-501 CompTIA Security+
- Duration: 90 minutes
- Number of Questions: Maximum 90
- Types of Questions: Multiple choice & performance based
- Passing Marks: 750
- Exam Price: $330 USD
The CompTIA Security+ Exam (SY0-501) is a 90-minute qualifying exam with a maximum of 90 questions for the CompTIA certification. The CompTIA Security+ Exam certifies the successful applicants that have the awareness and skills needed to configure and install the systems in order to secure the networks, devices, & applications. This Exam certifies that the successful applicant has the knowledge and skills of:
- Environmental and personal security and controls.
- Wireless, cloud and mobile security.
- Risk management.
- Authentication and authorization.
- Host, LAN, and application security.
The following topics are general guidelines for the content that is likely to be included in the exam:
- Threats, Attacks, and Vulnerabilities 21%
- Technologies and Tools 22%
- Architecture and Design 15%
- Identity and Access Management 16%
- Risk Management 14%
- Cryptography and PKI 12%
How to become Security+ certified?
Step 1: Choose a certification:
Explore what is available and choose an IT certification that will benefit you in accomplishing your career target.
To study about various IT career tracks and to choose the best certification for yourself, you can use the “CompTIA Career Roadmap.”
If you have the skills to secure a network & deter hackers and want to become a highly efficient IT Security Tech, then CompTIA Security+ is the right type of certification for you.
Step 2: Learning & Training:
Exam preparation can be done through self-study with textbooks, practice exams, and online classroom programs. However, this workbook provides you with all the information and offers complete assessments in one place to help you pass the CompTIA Security+ Exam.
IPSpecialist provides full support to the candidates in order for them to pass the exam.
Step 3: Familiarization with Exam:
A great suggestion is to first understand what you are training for. For that, we are providing you not only the exam objectives but practice questions too, in order to give you a thorough idea about your final exam of certification.
Step 4: Register & Take Exam for Certification:
After all the learning process, the next step is to take your test. Certification exams are offered at different locations all over the world. To register for an exam, contact the authorized test delivery partner of CompTIA, contact Pearson VUE.
The following are the steps for registration and scheduling an exam:
- Buy the exam voucher from here “Buy a certification exam voucher.”
- Find and visit a testing center “testing center.”
- Create Pearson VUE account & Schedule your exam. Here is a link for that “Create a Pearson VUE testing account and schedule your exam.”
- You will receive a confirmation email having testing information after the registration process.
- You are ready for the test.
Step 5: Results:
After you complete an exam at an authorized testing center, you’ll get immediate, online notification of your pass or fail status. If you have passed the exam, a congratulatory email will be forwarded to you with guidelines to access your record.
Make sure to keep a record of the email address you used for registration and score report with exam registration number. This information is required to log in to your certification account.
Chapter 01: Threats, Attacks, and Vulnerabilities
An Overview of Malware
How does Malware get in?
Types of Attacks
Application / Service Attacks
Introduction to Threat Actors
Types of Threat Actors
Vulnerability Assessment Process:
LAB 01-1: Installing and Using Vulnerability Assessment Tool
LAB 01-2: Malware Scanning using Nessus Vulnerability Scanning tool
Threat Actor Attributes
Level of Sophistication
Use of Open Source Intelligence
Escalation of Privilege
Types of Penetration Tests
Pen Testing Process
Difference between Vulnerability Assessment and Penetration Testing
Why Is Pen Testing and Vulnerability Assessment Necessary?
Vulnerability Scanning Concepts
Impact associated with Types of Vulnerabilities
Improper Input Handling
Improper Error Handling
Improperly Configured Accounts
Vulnerable Business Processes
Weak Cipher Suites and Implementations
System Sprawl/Undocumented Assets
Improper Certificate and Key Management
Chapter 02: Technologies and Tools
An Overview of Security Components
LAB 2-1: Configuring Zone-based Policy Firewall
LAB 2-2: IPSEC Site-to-Site VPN Configuration
LAB 2-3: VPN configuration
Network Intrusion Detection and Prevention
Router and Switch Security
SIEM (Security Information and Event Management)
Network Access Control (NAC)
Hardware Security Module
Data Sanitization Tools
Passive vs. Active
Wireless Scanner and Cracker
Command Line Security Tools
Common Security Issues
Logs and Events Anomalies
Weak Security Configurations
License Compliance Violation
Analysing Security Output
File Integrity Check:
Advance Malware Tool:
Securing Mobile Devices
Mobile Device connection methods
Mobile Device Management:
Mobile Device Deployment Models:
Chapter 03: Architecture and Design
Frameworks and Configuration Guide
Industry Standard Frameworks and Reference Architecture
Benchmarks/Secure Configuration Guides
Defense in depth/ Layered Security
Secure Network Architecture Concept
Zone / Topology
Segmentation of a Network
Security Technology Placement
Introduction to Security System Design
Hardware / Firmware Security
Operating System (OS) Security
Smart Devices/ IOT (Internet of Things)
Special Purpose Systems
Secure Application Development and Deployment
Development of Life Cycle Models
Version Control and Change Management
Provisioning and De-Provisioning
Secure Coding Technique
Code Quality and Testing
Compiled vs Runtime Code
Cloud and Virtualization
VM Sprawl Avoidance
VM Escape Protection
Cloud Deployment Models
On-Premise vs. Hosed vs. Cloud
Cloud Access Security Broker (CASB)
Security as a Service (SECaaS)
Resiliency and Automation Strategies
Physical Security Controls
Chapter 04: Identity and Access Management
Introduction to Identity and Access Management
AAA (Authentication, Authorization, and Accounting) Framework
Single Sign-on (SSO)
Identity and Access Services
Introduction to PAP, CHAP, & MS-CHAP
LAB 04-1: Configuring PPP PAP and CHAP authentication and verification
An Overview of Federated Identities
Identity & Access Control Management
Access Control Models
File System Security
Access Control Technologies
Account Policy Enforcement
Chapter 05: Risk Management
Overview of Security Policies, Plans, and Procedures
Standard Operating Procedure
General Security Policies
Mission Essential Function
Single Point of Failure
Privacy Impact Assessment
Privacy Threshold Assessment
Risk Management Processes and Concept
Incidence Response Procedure
Incident Response Plan
Incident Response Process
Basic Concept of Forensics
Order of Volatility
Chain of Custody
Strategic Intelligence/Counter-Intelligence Gathering
Basic Concept of Disaster Recovery and Continuity of Operation
Disaster Recovery Sites
Order of Restoration
Continuity of Operation Planning
Types of Security Control
Data Security and Privacy Practices
Data Destruction and Media Sanitization
Data Sensitivity Labelling and Handling
Legal and compliance
Chapter 06: Cryptography & PKI
The Concept of Cryptography:
Symmetric Key Cryptography:
Asymmetric Key Cryptography:
Public Key Infrastructure PKI
What does a Digital Certificate contain?
Commercial Certificate Authorities
Private Certificate Authority
PKI Trust Relationship
Single Certificate Authority
Reasons of Certificate revocation
Browser-based Revocation updates
Online and Offline CA
PKI Trust Relationships
Types of Certificates
Web Server SSL Certificate
Domain Validation (DV) Certificate
Extended Validation (EV) Certificate
Subject Alternative Name (SAN) Certificate
Wildcard Domain Certificate
Machine and Computer Certificate
Code Signing Certificate
About Our Products
CompTIA is a performance-based certification that helps you develop a career in IT fundamental by approving the hands-on skills required to troubleshoot, configure, and manage both wired and wireless networks. CompTIA certifications help individuals build exceptional in Information Technology and enable organizations to form a skilled and confident staff.
CompTIA certifications have four IT certification series that test different knowledge standards-from entry level to expert level. CompTIA offers certification programs at the core level to professional level, which begins with the core IT fundamentals, infrastructure, cyber security leads to the professional level.
CompTIA certification helps to establish and build your IT career. It benefits you in various ways either seeking certification to have a job in IT or want to upgrade your IT career with a leading certification, that is, CompTIA certification.
Get 20% instant discount when shared to your social account
*Product must be added in cart to apply coupon
Complete Blueprint, Labs Performed, Quick Reference Sheet, Certificate & 100+ Practice Questions Quiz