Online comptia security plus course
US$ 8.99 US$ 14.99
0
Number of Students Registered
Exam: SY0-501

CompTIA Security+ course covers all the information you need to pass the CompTIA Security+ Exam that is SY0-501. CompTIA Security+ workbook is designed to take a practical approach to learning with real-life examples and case studies.

  • Covers complete CompTIA Security+ SY0-501 blueprint
  • Summarized content
  • Case Study based approach
  • Downloadable vRacks
  • 100% passing guarantee
  • Mind maps

About Comptia Security+ Certification

The purpose of this certification is to make you a better IT Security Tech. All the essential principles for network security are covered in this Security+ certification.

The skills or techniques you will learn when you obtain Security+ certificate:

  • Configuring a secure network for protection against threats, malware and etc.
  • Identification of vulnerabilities in a network and provision of proper mitigation techniques.
  • Knowledge of latest threats that harm your system intelligently.
  • Implementation of secure protocols and appropriate security checks  and the establishment of end-to-end host security.
  • Implementation of access and identity management controls to have your data in legal hands.
  • Ability to use encryption, configuring wireless security for information safety purpose.

About the CompTIA Security+ Exam
  • Exam Number: SY0-501 CompTIA Security+
  • Duration: 90 minutes
  • Number of Questions: Maximum 90
  • Types of Questions: Multiple choice & performance based
  • Passing Marks: 750
  • Exam Price: $330 USD

 

The CompTIA Security+ Exam (SY0-501) is a 90-minute qualifying exam with a maximum of 90 questions for the CompTIA certification. The CompTIA Security+ Exam certifies the successful applicants that have the awareness and skills needed to configure and install the systems in order to secure the networks, devices, & applications. This Exam certifies that the successful applicant has the knowledge and skills of:

  • Environmental and personal security and controls.
  • Wireless, cloud and mobile security.
  • Risk management.
  • Authentication and authorization.
  • Host, LAN, and application security.
The following topics are general guidelines for the content that is likely to be included in the exam:
  • Threats, Attacks, and Vulnerabilities        21%
  • Technologies and Tools                                22%
  • Architecture and Design                               15%
  • Identity and Access Management               16%
  • Risk Management                                           14%
  • Cryptography and PKI                                   12%

How to become Security+ certified?
Step 1: Choose a certification:

Explore what is available and choose an IT certification that will benefit you in accomplishing your career target.

To study about various IT career tracks and to choose the best certification for yourself, you can use the “CompTIA Career Roadmap.”

CompTIA has four core IT certifications that is; IT Fundamental, A+, Network+, and Security+ that examine your knowledge from the entry to the expert level.

If you have the skills to secure a network & deter hackers and want to become a highly efficient IT Security Tech, then CompTIA Security+ is the right type of certification for you.

Step 2: Learning & Training:

Exam preparation can be done through self-study with textbooks, practice exams, and online classroom programs. However, this workbook provides you with all the information and offers complete assessments in one place to help you pass the CompTIA Security+ Exam.

IPSpecialist provides full support to the candidates in order for them to pass the exam.

Step 3: Familiarization with Exam:

A great suggestion is to first understand what you are training for. For that, we are providing you not only the exam objectives but practice questions too, in order to give you a thorough idea about your final exam of certification.

Step 4: Register & Take Exam for Certification:

After all the learning process, the next step is to take your test. Certification exams are offered at different locations all over the world. To register for an exam, contact the authorized test delivery partner of CompTIA, contact Pearson VUE.

The following are the steps for registration and scheduling an exam:
  • Buy the exam voucher from here “Buy a certification exam voucher.”
  • Find and visit a testing center “testing center.”
  • Create Pearson VUE account & Schedule your exam. Here is a link for that “Create a Pearson VUE testing account and schedule your exam.”
  • You will receive a confirmation email having testing information after the registration process.
  • You are ready for the test.

Step 5: Results:

After you complete an exam at an authorized testing center, you’ll get immediate, online notification of your pass or fail status. If you have passed the exam, a congratulatory email will be forwarded to you with guidelines to access your record.

Make sure to keep a record of the email address you used for registration and score report with exam registration number. This information is required to log in to your certification account.

Chapter 01: Threats, Attacks, and Vulnerabilities
An Overview of Malware
How does Malware get in?
Malware Types
Types of Attacks
Application / Service Attacks
Wireless Attacks
Cryptographic Attacks
Introduction to Threat Actors
Types of Threat Actors
Vulnerability Assessment
Vulnerability Assessment Process:
LAB 01-1: Installing and Using Vulnerability Assessment Tool
LAB 01-2: Malware Scanning using Nessus Vulnerability Scanning tool
Threat Actor Attributes
Internal/External
Level of Sophistication
Resources/Funding
Intent/Motivation
Use of Open Source Intelligence
Penetration Testing
Reconnaissance
Pivot
Initial Exploitation
Persistence
Escalation of Privilege
Types of Penetration Tests
Pen Testing Process
Difference between Vulnerability Assessment and Penetration Testing
Why Is Pen Testing and Vulnerability Assessment Necessary?
Vulnerability Scanning Concepts
Impact associated with Types of Vulnerabilities
Race Condition
Improper Input Handling
Improper Error Handling
Weak Configuration
Default Configuration
Resource Exhaustion
Untrained Users
Improperly Configured Accounts
Vulnerable Business Processes
Weak Cipher Suites and Implementations
Buffer Vulnerability
System Sprawl/Undocumented Assets
Design Weaknesses
Improper Certificate and Key Management


Chapter 02: Technologies and Tools
An Overview of Security Components
Firewall
LAB 2-1: Configuring Zone-based Policy Firewall
VPN Concentrator
LAB 2-2: IPSEC Site-to-Site VPN Configuration
LAB 2-3: VPN configuration
Network Intrusion Detection and Prevention
Router and Switch Security
Proxies
Load Balancer
Access Points
SIEM (Security Information and Event Management)
DLP
Network Access Control (NAC)
Mail Gateways
Bridges
SSL/TLS accelerator
SSL decryption
Media gateway
Hardware Security Module
Security Software
Protocol Analyzer
Network Scanner
Password Cracker
Vulnerability Scanner
Exploitation Framework
Data Sanitization Tools
Steganography Tools
Honeypot
Backup Utilities
Passive vs. Active
Wireless Scanner and Cracker
Command Line Security Tools
Common Security Issues
Unencrypted Credentials
Logs and Events Anomalies
Permission Issues
Access Violations
Certificate Issues
Data Exfiltration
Misconfigured Devices
Weak Security Configurations
Personnel Issues
Unauthorized software:
Baseline Deviation:
License Compliance Violation
Asset Management
Authentication Issues
Analysing Security Output
Host-based IDS/IPS
Anti-Virus:
File Integrity Check:
Host-based Firewall:
Advance Malware Tool:
Securing Mobile Devices
Mobile Device connection methods
Mobile Device Management:
Mobile Device Deployment Models:
Secure Protocols
SRTP
NTP
S/MIME
SSL/TLS
FTPS
LDAP
SSH
DHCP


Chapter 03: Architecture and Design
Frameworks and Configuration Guide
Industry Standard Frameworks and Reference Architecture
Benchmarks/Secure Configuration Guides
Defense in depth/ Layered Security
Secure Network Architecture Concept
Zone / Topology
Segmentation of a Network
VPN Technologies
Security Technology Placement
Introduction to Security System Design
Hardware / Firmware Security
Operating System (OS) Security
Peripheral Security
Secure Deployments
Sandboxing
Working Environment
Embedded System
SCADA
Smart Devices/ IOT (Internet of Things)
HVAC
SOC
RTOS
Special Purpose Systems
Secure Application Development and Deployment
Development of Life Cycle Models
Secure DevOps
Version Control and Change Management
Provisioning and De-Provisioning
Secure Coding Technique
Code Quality and Testing
Compiled vs Runtime Code
Cloud and Virtualization
Hypervisor
VM Sprawl Avoidance
VM Escape Protection
Cloud Storage
Cloud Deployment Models
On-Premise vs. Hosed vs. Cloud
VDI/VDE
Cloud Access Security Broker (CASB)
Security as a Service (SECaaS)
Resiliency and Automation Strategies
Automation/Scripting
Templates
Master Image
Non-Persistence
Elasticity
Scalability
Distributive Allocation
Redundancy
Fault Tolerance
High Availability
RAID
Physical Security Controls
Lighting
Signs
Fence/Cage
Security Guard
Alarms
Safes
Protected Cabling
Airgap
Mantrap
Screen Filters
Key Management


Chapter 04: Identity and Access Management
Introduction to Identity and Access Management
AAA (Authentication, Authorization, and Accounting) Framework
Multifactor Authentication
Single Sign-on (SSO)
Transitive Trust
Identity and Access Services
Gaining Access:
Introduction to PAP, CHAP, & MS-CHAP
LAB 04-1: Configuring PPP PAP and CHAP authentication and verification
An Overview of Federated Identities
Federation
Identity & Access Control Management
Access Control Models
File System Security
Database Security
Access Control Technologies
Account Management
Account Types
General Concepts
Account Policy Enforcement


Chapter 05: Risk Management
Overview of Security Policies, Plans, and Procedures
Standard Operating Procedure
Agreement Types
Personnel Management
General Security Policies
Impact Analysis
RTO/RPO
MTBF
MTTR
Mission Essential Function
Single Point of Failure
Impact
Privacy Impact Assessment
Privacy Threshold Assessment
Risk Management Processes and Concept
Threat Assessment
Risk Assessment
Incidence Response Procedure
Incident Response Plan
Incident Response Process
Basic Concept of Forensics
Order of Volatility
Chain of Custody
Legal Hold
Data Acquisition
Preservation
Recovery
Strategic Intelligence/Counter-Intelligence Gathering
Basic Concept of Disaster Recovery and Continuity of Operation
Disaster Recovery Sites
Order of Restoration
Backup Concepts
Geographical Considerations
Continuity of Operation Planning
Types of Security Control
Deterrent Control
Preventive Control
Detective Control
Corrective Control
Compensating Control
Technical Control
Administrative Control
Physical Control
Data Security and Privacy Practices
Data Destruction and Media Sanitization
Data Sensitivity Labelling and Handling
Data Roles
Data Retention
Legal and compliance


Chapter 06: Cryptography & PKI
The Concept of Cryptography:
Cryptographic Terminologies:
Cryptographic Algorithm:
Symmetric Key Cryptography:
Asymmetric Key Cryptography:
Hashing
Cryptography Uses
Confidentiality
Integrity
Obfuscation
Authentication
Non-Repudiation
Wireless Security
Cryptographic Protocols
Authentication Protocols
Methods
Public Key Infrastructure PKI
PKI Components
Key Management
Digital Certificates
What does a Digital Certificate contain?
Certificate Extensions
Standard Extension
Commercial Certificate Authorities
Private Certificate Authority
PKI Trust Relationship
Single Certificate Authority
Hierarchical
Key Revocation
Reasons of Certificate revocation
Browser-based Revocation updates
PKI Concept
Online and Offline CA
OCSP Stapling
Pinning
PKI Trust Relationships
Types of Certificates
Root Certificate
Web Server SSL Certificate
Domain Validation (DV) Certificate
Extended Validation (EV) Certificate
Subject Alternative Name (SAN) Certificate
Wildcard Domain Certificate
Self-Signed Certificate
Machine and Computer Certificate
User Certificate
Email Certificate
Code Signing Certificate
Answer Key


References
About Our Products

CompTIA is a performance-based certification that helps you develop a career in IT fundamental by approving the hands-on skills required to troubleshoot, configure, and manage both wired and wireless networks. CompTIA certifications help individuals build exceptional in Information Technology and enable organizations to form a skilled and confident staff.

CompTIA certifications have four IT certification series that test different knowledge standards-from entry level to expert level. CompTIA offers certification programs at the core level to professional level, which begins with the core IT fundamentals, infrastructure, cyber security leads to the professional level.

CompTIA certification helps to establish and build your IT career. It benefits you in various ways either seeking certification to have a job in IT or want to upgrade your IT career with a leading certification, that is, CompTIA certification.

comptia security + online course

Get 20% instant discount when shared to your social account

*Product must be added in cart to apply coupon

Buy Now

Course Materials

Complete Blueprint, Labs Performed, Quick Reference Sheet, Certificate & 100+ Practice Questions Quiz

Send a Message