Security+ Training Course Outline

Enjoy the best CompTIA Security+ Training via ILT or VILT

We have enjoyed winning the CompTIA Outstanding Partnership Award where CompTIA recognizes outstanding partners and champions that deliver superior vendor-neutral certification CompTIA Security+ training courses for the global tech workforce.

CompTIA Logo White

Exam # Reference: SY0-601

Security+ Training

Core 1

Students will benefit most from this course if they intend to take a CompTIA Security+ SY0-601 exam. This course assumes basic knowledge of using and maintaining individual workstations. Knowledge equivalent to the CompTIA A+ certification is helpful but not necessary.

Acquired Skills

  • Proactively implement sound security protocols to mitigate security risks
  • Quickly respond to security issues
  • Retroactively identify where security breaches may have occurred
  • Design a network, on-site or in the cloud, with security in mind

Chapter 1: Security Fundamentals

Module A: Security concepts
Module B: Risk management
Module C: Vulnerability assessment

Chapter 2: Understanding attacks

Module A: Understanding attackers
Module B: Social engineering
Module C: Malware
Module D: Network attacks
Module E: Application attacks

Chapter 3: Cryptography

Module A: Cryptography concepts
Module B: Public key infrastructure

Chapter 4: Network fundamentals

Module A: Network components
Module B: Network addressing
Module C: Network ports and applications

Chapter 5: Securing networks

Module A: Network security components
Module B: Transport encryption
Module C: Hardening networks
Module D: Monitoring and detection

Chapter 6: Securing hosts and data

Module A: Securing hosts
Module B: Securing data
Module C: Mobile device security

Chapter 7: Securing network services

Module A: Securing applications
Module B: Virtual and cloud systems

Chapter 8: Authentication

Module A: Authentication factors
Module B: Authentication protocols

Chapter 9: Access control

Module A: Access control principles
Module B: Account management

Chapter 10: Organizational security

Module A: Security policies
Module B: User training
Module C: Physical security and safety

Chapter 11: Disaster planning and recovery

Module A: Business continuity
Module B: Fault tolerance and recovery
Module C: Incident response

Security+ Training

Course Overview

CompTIA Security+ Certification SY0-601 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This course maps to the CompTIA Security+ certification exam. Objective coverage is marked throughout the course.

 

Security+ Training

Course Overview

CompTIA Security+ Certification SY0-601 provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This course maps to the CompTIA Security+ certification exam. Objective coverage is marked throughout the course.

 

Security+ Training

Core 1

Students will benefit most from this course if they intend to take a CompTIA Security+ SY0-601 exam. This course assumes basic knowledge of using and maintaining individual workstations. Knowledge equivalent to the CompTIA A+ certification is helpful but not necessary.

Acquired Skills

  • Proactively implement sound security protocols to mitigate security risks
  • Quickly respond to security issues
  • Retroactively identify where security breaches may have occurred
  • Design a network, on-site or in the cloud, with security in mind

Chapter 1: Security Fundamentals

Module A: Security concepts
Module B: Risk management
Module C: Vulnerability assessment

Chapter 2: Understanding attacks

Module A: Understanding attackers
Module B: Social engineering
Module C: Malware
Module D: Network attacks
Module E: Application attacks

Chapter 3: Cryptography

Module A: Cryptography concepts
Module B: Public key infrastructure

Chapter 4: Network fundamentals

Module A: Network components
Module B: Network addressing
Module C: Network ports and applications

Chapter 5: Securing networks

Module A: Network security components
Module B: Transport encryption
Module C: Hardening networks
Module D: Monitoring and detection

Chapter 6: Securing hosts and data

Module A: Securing hosts
Module B: Securing data
Module C: Mobile device security

Chapter 7: Securing network services

Module A: Securing applications
Module B: Virtual and cloud systems

Chapter 8: Authentication

Module A: Authentication factors
Module B: Authentication protocols

Chapter 9: Access control

Module A: Access control principles
Module B: Account management

Chapter 10: Organizational security

Module A: Security policies
Module B: User training
Module C: Physical security and safety

Chapter 11: Disaster planning and recovery

Module A: Business continuity
Module B: Fault tolerance and recovery
Module C: Incident response

Client Testimonials

Don’t take our word for it – here’s what our clients say:

5 Star Review

I have spent decades achieving IT certifications, and it wasn’t until I sat in an Applied Technology Academy class that I really feel like I had finally found the BEST “hands on” training provider.  No looking back, I’m here to stay with Applied Technology Academy!

–  John F.

5 Star Review

We had critical certification deadlines to meet for 75% of my team and the Applied Technology Academy team worked to ensure that my team was trained and achieved a 100% pass rate.  Some of the team members’ jobs were on the line – Applied Technology Academy to the rescue!

– Marilyn S.

5 Star Review

Having used a multitude of training providers in the past with less than stellar results, we were so excited to find Applied Technology Academy.  Their instructors, we have had four, have been consistently amazing. We are done shopping for a training provider! 

– Chris W

What you Get by Enrolling in Security+ Training Course

Our successful training results keep our corporate clients returning.
Cybersecurity Training

STRATEGIC PLANNING AND PROJECT MANAGEMENT

From Six Sigma Lean to PMI Project Management Professional, Agile and SCRUM , we offer the best in class strategic planning and project management training available.

IT AND CYBERSECURITY

As a CompTIA and EC-Council award-winning training partner, we offer the best cybersecurity and vendor driven IT training and certification courses to keep your team ahead of the technology skills curve.

security+ training

SALES AND OPERATIONS

Effective consultative sales, operations management and varying forms of leadership are just a few of the soft skills training courses that we offer.  The sky is the limit when it comes to bettering your team’s effectiveness in their designated career roles.

Looking for CompTIA Security+ Training?

Please reach out to us with any questions you might have. We welcome the opportunity to talk through your individual training needs, or that of your team. And no, we will not relentlessly hound you with sales calls, we promise!  We are a no pressure, service oriented company.

Reach out – you’ll be glad you did!