CompTIA Security+ SY0-601 Exam Prep Course
Learn how to identify threats, secure networks, and respond to incidents as you prepare for the globally recognized CompTIA Security+ certification.
(SY0-601.AE1) / ISBN : 978-1-64459-242-7About This Course
Enroll in our CompTIA (SY0-601) exam prep course to build a strong foundation in cybersecurity.
In this course, get hands-on with threat detection, incident response, risk management, secure architecture, and identity access controls. Work with tools like Wireshark, Nessus, and John the Ripper through performance-based labs.
Discover how to install and configure your security systems to secure the networks, applications & devices with integrity, confidentiality & availability.
By the end of this course, you’ll be exam-ready and job-ready with practical experience that managers value.
Skills You’ll Get
- Security controls: Analyzing & understanding multiple categories & the types of controls, including technical, administrative as well and physical measures.
- Fundamentals of Security Principles: Master the core concepts of the CIA triad, non-repudiation, AAA, zero trust, as well as the importance of physical security.
- Cryptographic Solutions: Understanding PKI & multiple encryption methods, key management, hashing, digital signatures, & how they are being utilized to secure your data seamlessly.
- Threat Landscapes: Recognizing common threats, their motives, & several threat vectors, which include message-based, file-based & human-planned attacks.
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
18+ Interactive Lessons | 1+ Exercises | 340+ Quizzes | 215+ Flashcards | 170+ Glossary of terms
Gamified TestPrep
90+ Pre Assessment Questions | 2+ Full Length Tests | 90+ Post Assessment Questions | 180+ Practice Test Questions
Hands-On Labs
38+ LiveLab | 00+ Minutes
Introduction
- The Security+ Exam
- What Does This Course Cover?
- Exam SY0-601 Exam Objectives
- SY0-601 Certification Exam Objective Map
Today's Security Professional
- Cybersecurity Objectives
- Data Breach Risks
- Implementing Security Controls
- Data Protection
- Summary
- Exam Essentials
Cybersecurity Threat Landscape
- Exploring Cybersecurity Threats
- Threat Data and Intelligence
- Summary
- Exam Essentials
Malicious Code
- Malware
- Malicious Code
- Adversarial Artificial Intelligence
- Summary
- Exam Essentials
Social Engineering, Physical, and Password Attacks
- Social Engineering
- Password Attacks
- Physical Attacks
- Summary
- Exam Essentials
Security Assessment and Testing
- Vulnerability Management
- Security Vulnerabilities
- Penetration Testing
- Training and Exercises
- Summary
- Exam Essentials
Secure Coding
- Software Assurance Best Practices
- Designing and Coding for Security
- Software Security Testing
- Injection Vulnerabilities
- Exploiting Authentication Vulnerabilities
- Exploiting Authorization Vulnerabilities
- Exploiting Web Application Vulnerabilities
- Application Security Controls
- Secure Coding Practices
- Summary
- Exam Essentials
Cryptography and the Public Key Infrastructure
- An Overview of Cryptography
- Goals of Cryptography
- Cryptographic Concepts
- Modern Cryptography
- Symmetric Cryptography
- Asymmetric Cryptography
- Hash Functions
- Digital Signatures
- Public Key Infrastructure
- Asymmetric Key Management
- Cryptographic Attacks
- Emerging Issues in Cryptography
- Summary
- Exam Essentials
Identity and Access Management
- Identity
- Authentication and Authorization
- Authentication Methods
- Accounts
- Access Control Schemes
- Summary
- Exam Essentials
Resilience and Physical Security
- Building Cybersecurity Resilience
- Response and Recovery Controls
- Physical Security Controls
- Summary
- Exam Essentials
Cloud and Virtualization Security
- Exploring the Cloud
- Virtualization
- Cloud Infrastructure Components
- Cloud Security Issues
- Cloud Security Controls
- Summary
- Exam Essentials
Endpoint Security
- Protecting Endpoints
- Service Hardening
- Operating System Hardening
- Securing Embedded and Specialized Systems
- Summary
- Exam Essentials
Network Security
- Designing Secure Networks
- Secure Protocols
- Attacking and Assessing Networks
- Network Reconnaissance and Discovery Tools and Techniques
- Summary
- Exam Essentials
Wireless and Mobile Security
- Building Secure Wireless Networks
- Managing Secure Mobile Devices
- Summary
- Exam Essentials
Incident Response
- Incident Response
- Incident Response Data and Tools
- Mitigation and Recovery
- Summary
- Exam Essentials
Digital Forensics
- Digital Forensic Concepts
- Conducting Digital Forensics
- Reporting
- Digital Forensics and Intelligence
- Summary
- Exam Essentials
Security Policies, Standards, and Compliance
- Understanding Policy Documents
- Personnel Management
- Third-Party Risk Management
- Complying with Laws and Regulations
- Adopting Standard Frameworks
- Security Control Verification and Quality Control
- Summary
- Exam Essentials
Risk Management and Privacy
- Analyzing Risk
- Managing Risk
- Risk Analysis
- Disaster Recovery Planning
- Privacy
- Summary
- Exam Essentials
Malicious Code
- Identifying Virus Threats
- Detecting Rootkits
Social Engineering, Physical, and Password Attacks
- Using Social Engineering Techniques to Plan an Attack
- Cracking a Linux Password Using John the Ripper
Security Assessment and Testing
- Conducting Vulnerability Scanning Using Nessus
Secure Coding
- Exploiting a Website Using SQL Injection
- Conducting a Cross-Site Request Forgery Attack
- Attacking a Website Using XSS Injection
- Defending Against a Buffer Overflow Attack
Cryptography and the Public Key Infrastructure
- Performing Symmetric Encryption
- Examining Asymmetric Encryption
- Observing an SHA-Generated Hash Value
- Observing an MD5-Generated Hash Value
- Examining PKI Certificates
- Using Rainbow Tables to Crack Passwords
Identity and Access Management
- Examining Kerberos Settings
- Installing a RADIUS Server
Resilience and Physical Security
- Configuring RAID 5
Endpoint Security
- Using the chmod Command
- Examining File Manipulation Commands
Network Security
- Configuring a Standard ACL
- Implementing Port Security
- Configuring a BPDU Guard on a Switch Port
- Configuring VLANs
- Using Windows Firewall
- Performing ARP Poisoning
- Using the ifconfig Command
- Using the traceroute Command
- Capturing Packets Using Wireshark
- Performing Reconnaissance on a Network
- Using the theHarvester Tool to Gather Information about a Victim
- Using the hping Program
- Using Reconnaissance Tools
Incident Response
- Viewing Linux event logs
- Using Event Viewer
- Making Syslog Entries Readable
Digital Forensics
- Using FTK Imager
Security Policies, Standards, and Compliance
- Configuring a Password Policy
If you're starting now, take the 701, as it's the latest Security+ exam version and reflects current industry standards. The 601 is being phased out and will retire in July 2024.
Yes, the CompTIA Security+ certification is considered for people seeking to enter or advance in the cybersecurity field.
The CompTIA Security+ certification evaluates a range of cybersecurity skills, which includes general security concepts, threats & vulnerabilities management, security architecture & operations, and program management.
A CompTIA Security+ certification is valuable for a wide range of IT & cybersecurity roles, which include security analyst, network administrator, system administrator, and IT auditor.