CourseInfo | SimpliTrain

CompTIA Security+ (SY0-601) - ML

Learning plan iconE-Learning

Description

This course will prepare students for the CompTIA Security+ SY0-601 exam. Topics covered include understanding threats, analyzing attacks, cryptography, implementing secure networks, operational procedures, forensics, and more.

This course will prepare students for the CompTIA Security+ SY0-601 exam. Topics covered include understanding threats, analyzing attacks, cryptography, implementing secure networks, operational procedures, forensics, and more.

Lesson Id Title Description
1 Understanding Threats, Attacks, and Vulnerabilities Instructor Introduction
Course Introduction
Understanding Threats, Attacks, and Vulnerabilities
Topic A: Introduction to Security Concepts
Security Fundamentals
Security Terms
Topic B: Identifying Threat Actors and Vectors
Actors and Threats
Hackers
Actor Attributes
Attack Vectors
Information Gathering
Intelligence Sources
Research Sources
Demo - Research Sources
Topic C: Understanding Vulnerabilities
Vulnerability Fundamentals
Security Impacts
Vulnerability Types
Vulnerability Types (cont.)
Topic D: Understanding Attack Types
Attack Types
Understanding Malware Types
Attacking Passwords and User Credentials
Physical Attacks
Other Attack Types
Topic E: Identifying Social Engineering Techniques
Social Engineering Principles
Phishing
Other Social Engineering Types
Other Social Engineering Types (cont.)
Chapter 1 Review
2 Analyzing Attacks Analyzing Attacks
Topic A: Security Assessment Tools and Techniques
Understanding Assessments
Threat Hunting
Vulnerability Scanning
Syslog and SIEM
SIEM Components
Topic B: Application Attacks
Application Attacks
Privilege Escalation
Cross
-Site Scripting
Injections
Application Attack Issues
Session Attacks
Additional Attacks
Topic C: Network Attacks
Introduction to Network Attacks
Wireless Network Attacks
Layer 2 Attacks
Service Attacks
Demo
- DNS Poisoning
Malicious Code Topic D: Penetration Testing
Penetration Testing
Environment Types
Pentesting Concepts
Network Reconnaissance
Exercise Types
Chapter 2 Review
3 Architecture and Design Architecture and Design
Topic A: Enterprise Security Architecture
Enterprise Standardization Needs
Configuration Management
Data Protection
Additional Security Concepts
Disaster Recovery
Deception and Disruption
Topic B: Designing Authentication and Authorization
Authentication and Authorization
Authentication Methods
Authentication Technologies
Biometrics
Multifactor Authentication
Demo
- Multifactor Authentication
Topic C: Designing Resiliency
Resiliency and Cybersecurity
Redundancy Concepts
Replication Concepts
Backup Concepts
Additional Resiliency Options
Topic D: Cloud and Virtualization Concepts
Cloud Models
Cloud Types
Cloud Service Providers
Additional Cloud Concepts
Additional Cloud Concepts (cont.)
Demo
- Cloud Computing Security
Topic E: Securing Application Development and Deployment
Application Development Environments
Secure Coding Techniques
Automation Techniques
Application Design Concepts
Chapter 3 Review
4 Physical and System Security Physical and System Security
Topic A: Physical Security Controls
Importance of Physical Controls
Standard Controls
Security Monitoring
Security Personnel
Secure Areas
Secure Data Destruction
Demo
- Data Destruction Software
Topic B: Securing Embedded and Specialized Systems
Embedded Systems
Specialized Systems
Additional System Types
Communication Considerations
Constraints
Chapter 4 Review
5 Cryptography Cryptography
Topic A: Cryptographic Concepts
Introduction to Cryptography
Common Use Cases
Integrity Verification
Understanding Keys
Crypto Limitations
Quantum
Additional Cryptographic Types
Topic B: Public Key Infrastructures
Introduction to PKIs
Certificate Authorities
Certificates
Certificate Verification
Certificate Formats
Demo
- Implementing PKI
Additional Concepts
Chapter 5 Review
6 Implementing Secure Networks Implementing Secure Networks
Topic A: Implement Secure Protocols
Network Protocols
Use Cases
Application Layer Protocols
IP Security
Topic B: Implement Secure Network Designs
Network Segmentation
High Availability
Virtual Private Networks
Secure Network Appliances
Firewalls
Demo- Configuring a Host -Based Firewall
Additional Network Security Concepts
Topic C: Implementing Security in the Cloud
Cloud Security Controls
Cloud Storage Security
Cloud Network Security
Compute Security
Additional Cloud Solutions
Topic D: Implement Wireless Security
Cryptographic Protocols
Authentication Protocols
Authentication Methods
Installation Considerations
Topic E: Implement Secure Mobile Solutions
Deployment Models
Connection Methods and Receivers
Mobile Device Management (MDM)
Mobile Devices
Enforcement and Monitoring
Additional Controls
Chapter 6 Review
7 Implementing Secure Hosts and Identities Implementing Secure Hosts and Identities
Topic A: Implement Authentication and Authorization Systems
Understanding Identity
Access Control Methods
Demo
- Role
-Based Access Control
Authentication Management
Remote Access Authentication
Authentication and Authorization Protocols
Topic B: Implement Identity and Account Management Controls
Account Types
Account Policies
Demo
- Configuring Account Policies
Additional Identity Terms
Topic C: Implement Host and Application Security Solutions
Endpoint Protection
Client Level Protections
Network Level Protections
Boot Integrity
Database Security
System Hardening
Application Security
Chapter 7 Review
8 Operational Procedures Operational Procedures
Topic A: Using Tools to Assess Security
Network Reconnaissance and Discovery
Network Tools
Network Tools (cont.)
Demo
- Using Network Tools
File Manipulation Tools
Packet Capture and Relay
Shell and Script Environments
Forensics Tools
Topic B: Utilizing Data Sources for Investigation
Vulnerability Scan Output
SIEM Dashboards
Log Files
Additional Monitoring
Topic C: Applying Mitigation Techniques
Reconfiguring Endpoint Solutions
Configuration Changes
Additional Mitigation Techniques
Chapter 8 Review
9 Incident Response and Forensics Incident Response and Forensics
Topic A: Incident Response Policies and Procedures
Incident Response Plans
Incident Response Process
Exercises
Attack Frameworks
Additional Plans
Demo
- Examining IRPs
Topic B: Understanding Digital Forensics
Introduction to Forensics
Evidence Categories
Documentation and Evidence
Acquisition Concepts
Integrity
Additional Concepts
Chapter 9 Review
10 Governance, Risk, and Compliance Governance, Risk, and Compliance
Topic A: Introduction to Control Types
Security Controls
Control Categories
Control Types
Topic B: Understanding Governance
Introduction to Governance
Regulations and Standards
Key Frameworks
Benchmarks
Demo - Data Loss Prevention (DLP)
Topic C: Implementing Security Policies
Personnel-Based Policies
Personnel-Based Policies (cont.)
Third-Party Risk Management
Data
Credential Policies
Topic D: Implementing Risk Management
Risk Types
Risk Management Strategies
Risk Analysis
Risk Analysis (cont.)
Disasters
Business Impact Analysis
Topic E: Compliance with Privacy and Sensitive Data
Organizational Consequences
Data Types
Privacy Enhancing Technologies
Roles and Responsibilities
Chapter 10 Review
Course Closure
Self-Paced

Free

Enroll icon
This course includes: :
Full lifetime access