CompTIA Security+ SY0-501 course

Everything you need to
succeed!

2014 OBJECTIVES
2019 Updated exam objectives

All our courses ensure you have everything to
succeed

Just determine what success is for you

Systems Master Advantage

Personal success plan
Official 2019 updated course and courseware
Practice labs to develop actual skills
Flash cards for rapid learning
Practice exams to identify your strengths and resolve your weaknesses
Exam readiness Indicator
Exam Prep Hub
Resources

Your personal success plan detailing what it takes to be exam ready. Customise the plan to reflect your experience, study option and available time
This is also your exam readiness Indicator
Official 2019 updated course and courseware
It is essential to not only study the right subject but the right version
We provide the official e-book with a search feature for finding answers quickly
Practice labs to develop actual skills
Labs for use in the classroom and also available from home for those serious about mastering new skills
Flash cards for rapid learning and retention
Practice exams to identify your strengths and resolve your weaknesses quickly
Your Exam Prep Hub includes your customisable exam tracker, links to your practice exams and labs, exam news such as retirement dates, e-book, Flash Cards and more
Registration is free

Study AND CERTIFICATION
OPTIONS:

Includes EVERYTHING a technical student needs to succeed
5 day tradition classroom training using official updated courseware with Systems Master Advantage
Available in our public classroom or privately to you at your site.
For exam preparation, advanced analysis and help-desk troubleshooting skills.
5 day Masterclass for exam boost
When you have everything you need to succeed, including focused time, success comes sooner.
Beyond the comprehensive classroom training and Student Success Kit, we offer a second week to prepare delegates for the exam and supper charge their technical abilities
Masterclass Courses for exam preparation, advanced analyst and help-desk troubleshooting skills.
10 DAY course includes:
5 day official course with Systems Master Advantage and
5 day Masterclass for exam boost
Security+ labs including a comprehensive labs with Microsoft Server 2016, versions of Linux and a barrage of security tools from home.
Comprehensive Self-Study Kit with Systems Master Advantage
5 day OFFICIAL COURSE with Systems master advantage
5 day masterclass for exam boost
10 DAY course includes:

5 day official course with Systems Master Advantage and
5 day masterclass for exam boost

Comprehensive Self-Study Kit

Delivery OPTIONS:

Attend our classroom

Training to You!
Establishing a technical classroom in your:
Office | Board Room | Classroom | Local Hotel | Serviced Offices | Home

Take away self-study kit

Systems Master Advantage
Masterclass
Self-Study
Success Tools
Exam Hub
Systems Master Advantage

Includes EVERYTHING a technical student needs to succeed

 

SYSTEMS MASTER ADVANTAGE

5-day classroom training course

 

Available as:
Attend our scheduled classroom course
Book the training to be delivered on your site

Classroom training experience - free from distraction

 

Official Updated CompTIA Courses

 

Official course-ware being the best course and takeaway material for professionals

 

Full course duration - courses with less time cut content

 

​Class size 1 – 12 delegates. Limiting class size ensures every delegate has a voice

 

Student computers with a second monitor for e-book and labs

 

Searchable e-book to quickly find answers

 

Labs. Comprehensive student labs in-class and from home to allow students to master the technology. Additional training materials for use outside the classroom

 

​Course flash cards to aid personal study and retention. Additional training materials for use outside the classroom

 

​Practice exam tests to rapidly develop advanced trouble shooting skills and become exam ready. Additional training materials for use outside the classroom

 

Student login 'submit a question' to the trainer and track exam readiness. Additional training materials for use outside the classroom

​​

Everything a delegate needs to succeed!

 

Student kit to boost individual understanding, retention and effectiveness.

Masterclass

For exam preparation, advanced analysis and help-desk troubleshooting skills.

 

MASTERCLASS

5-day classroom training course

 

Available as:
Attend our scheduled classroom course
Book the training to be delivered on your site

 

 

FOR EXAM PREPARATION, ADVANCED ANALYSIS AND HELP-DESK TROUBLESHOOTING SKILLS

 

MORE TIME?

 

We can't give you more time, but together we can ring-fence a few days away from distraction for highly structured and focused exam prep and skills boost.

 

Beyond the comprehensive classroom training and Student Success Kit, we offer 5 additional days to prepare delegates for the exam and supper charge their technical abilities.

 

PLEASE NOTE: THIS COURSE IS ONLY SUITABLE FOR DELEGATES WHO HAVE ATTENDED OUR OFFICIAL COURSE OR THAT OF ANOTHER TRAINING PROVIDER OR WHO HAVE SUITABLY SELF-STUDIED THE RANGE OF SKILLS DEVELOPED FROM THE OFFICIAL COURSE.

 

Classroom training experience - free from distraction

 

5 day schedule for CompTIA courses

 

​Paced and focused for success

 

​Giving the time to achieve

 

Building on the technical foundation from the Official Course

 

​Rapid Q&A sessions with the students thinking on the fly leading to..

 

Troubleshooting analysis and into the labs to Identify and fix the problem.

 

Practice exams with individual result analysis and group discussion

 

Individual student progress assessments and mentoring

 

Group and individual homework assignments

 

Student portal to ask the trainer course related questions

 

We incorporate the additional training materials ​from the Systems Master Advantage course

 

Actual exam on the Friday morning / afternoon

 

​Results assessment and personal feedback

Ideally this course should follow directly on from the Official Course

 

Masterclass training can be purchased independently for any of the course subjects we deliver, but ideally would be booked to run immediately following the official course for best effect.

 

WHEN YOU HAVE EVERYTHING YOU NEED TO SUCCEED, INCLUDING WELL MANAGED TIME, SUCCESS COMES SOONER.

 

Masterclass Courses for exam preparation, advanced analyst and help-desk troubleshooting skills.

Self-Study
Security+ labs including a comprehensive labs with Microsoft Server 2016, versions of Linux and a barrage of security tools from home.
Comprehensive labs with Microsoft Server 2016, versions of Linux and a barrage of security tools from home.

 

SYSTEMS MASTER SELF-STUDY COURSE

80+ hours personal training time

 

Self-managed training time

 

Official Updated CompTIA Courses

 

Official course-ware being the best course and takeaway material for professionals

 

Student computer recommendations, a second monitor for e-book and labs

 

Searchable e-book to quickly find answers

 

Labs: Comprehensive student labs from home to allow students to master the technology. 

 

​Course flash cards to aid personal study and retention. 

 

​Practice exam tests to rapidly develop advanced trouble shooting skills and become exam ready. 

 

Student login 'submit a question' to the trainer and track exam readiness. 

​​

Everything a delegate needs to succeed!

 

CompTIA complete Self Study kit from Systems Master
Everything you need for self study success with the CompTIA Security + exam
Success Tools

Official CompTIA Security+ 2019 updated course searchable e-book

Security+ labs
 
Flash cards
 
Practice questions
 
security+ exam voucher
Exam Hub

News and updates for CompTIA Security+ course material and exams including exam retirement dates and new releases.

 

 

 

 

 

 

 

Log in

 

 

 

 

 

Combining the Systems Master Advantage course with a Masterclass delivers outstanding results.

CompTIA Official Security+ SY0-501 Updated Course

The foundation for Systems Master Advantage and Masterclass

Overview
Prerequisites
Learning outcomes
Course Outline
Overview

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. This course will help delegates prepare for exam SY0-501 - released on October ​4, 2017.

Prerequisites

CompTIA Security+ is aimed at IT professionals with job roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator.

 

Ideally, you should have successfully completed the 'CompTIA Network+ Support Skills' course and have experience of networking support or IT administration. It is not necessary that you pass the Network+ exam before completing Security+ certification, but it is recommended.

 

Specifically, it is recommended that you have the following skills and knowledge before starting this course:

 

Know the function and basic features of the components of a PC.

 

Use Windows Server to create and manage files and use basic administrative features (Explorer, Control Panel, Server Manager, and Management Consoles).

 

Operate the Linux OS using basic command-line tools.

 

Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).

 

Understand TCP/IP addressing, core protocols, and troubleshooting tools

Learning outcomes

This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.

 

Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, including CompTIA Cybersecurity Analyst (CSA)+, CompTIA Advanced Security Practitioner (CASP), and ISC’s CISSP (Certified Information Systems Security Professional).

 

On course completion, you will be able to:

 

Identify network attack strategies and defences.

 

Understand the principles of organizational security and the elements of effective security policies.

 

Know the technologies and uses of cryptographic standards and products.

 

Identify network- and host-based security technologies and practices.

 

Describe how wireless and remote access security is enforced.

 

Describe the standards and products used to enforce security on web and communications technologies.

 

Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.

 

Summarise application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.

Course Outline

Module 1 / Threats, Attacks, and Vulnerabilities

Indicators of Compromise

Why is Security Important?

Security Policy

Threat Actor Types

The Kill Chain

Social Engineering

Phishing

Malware Types

Trojans and Spyware

Open Source Intelligence

 

Labs:

VM Orientation

Malware Types

 

Critical Security Controls

Security Control Types

Defense in Depth

Frameworks and Compliance

Vulnerability Assessments and Pentests

Security Assessment Techniques

Pen Testing Concepts

Vulnerability Scanning Concepts

Exploit Frameworks

 

Lab:

Using Vulnerability Assessment Tools

 

Security Posture Assessment Tools

Topology Discovery

Service Discovery

Packet Capture & Packet Capture Tools

Remote Access Trojans

Honeypots and Honeynets

 

Labs:

Using Network Scanning Tools 1

Using Network Scanning Tools 2

Using Steganography Tools

 

Incident Response

Incident Response Procedures

Preparation Phase

Identification Phase

Containment Phase

Eradication and Recovery Phases

 

Module 2 / Identity and Access Management

Cryptography

Uses of Cryptography

Cryptographic Terminology and Ciphers

Cryptographic Products

Hashing Algorithms

Symmetric Algorithms

Asymmetric Algorithms

Diffie-Hellman and Elliptic Curve

Transport Encryption

Cryptographic Attacks

 

Lab:

Implementing Public Key Infrastructure

 

Public Key Infrastructure

PKI Standards

Digital Certificates

Certificate Authorities

Types of Certificate

Implementing PKI

Storing and Distributing Keys

Key Status and Revocation

PKI Trust Models

PGP / GPG

 

Lab:

Deploying Certificates and Implementing Key Recovery

 

Identification and Authentication

Access Control Systems

Identification

Authentication

LAN Manager / NTL

Kerberos

PAP, CHAP, and MS-CHAP

Password Attacks

Token-based Authentication

Biometric Authentication

Common Access Card

 

Lab:

Using Password Cracking Tools

 

Identity and Access Services

Authorization

Directory Services

RADIUS and TACACS+

Federation and Trusts

Federated Identity Protocols

 

Account Management

Formal Access Control Models

Account Types

Windows Active Directory

Creating and Managing Accounts

Account Policy Enforcement

Credential Management Policies

Account Restrictions

Accounting and Auditing

 

Lab:

Using Account Management Tools

 

Module 3 / Architecture and Design (1)

Secure Network Design

Network Zones and Segments

Subnetting

Switching Infrastructure

Switching Attacks and Hardening

Endpoint Security

Network Access Control

Routing Infrastructure

Network Address Translation

Software Defined Networking

 

Lab:

Implementing a Secure Network Design

 

Firewalls and Load Balancers

Basic Firewalls

Stateful Firewalls

Implementing a Firewall or Gateway

Web Application Firewalls

Proxies and Gateways

Denial of Service Attacks

Load Balancers

 

Lab:

Implementing a Firewall

 

IDS and SIEM

Intrusion Detection Systems

Configuring IDS

Log Review and SIEM

Data Loss Prevention

Malware and Intrusion Response

 

Lab:

Using an Intrusion Detection System

 

Secure Wireless Access

Wireless LANs

WEP and WPA

Wi-Fi Authentication

Extensible Authentication Protocol

Additional Wi-Fi Security Settings

Wi-Fi Site Security

Personal Area Networks

 

Physical Security Controls

Site Layout and Access

Gateways and Locks

Alarm Systems

Surveillance

Hardware Security

Environmental Controls

 

Module 4 / Architecture and Design (2)

Secure Protocols and Services

DHCP Security

DNS Security

Network Management Protocols

HTTP and Web Servers

SSL / TSL and HTTPS

Web Security Gateways

Email Services

S/MIME

File Transfer

Voice and Video Services (VoIP and VTC)

 

Labs:

Implementing Secure Network Addressing Services

Configuring a Secure Email Service

 

Secure Remote Access

Remote Access Architecture

Virtual Private Networks

IPSec

Remote Access Servers

Remote Administration Tools

Hardening Remote Access Infrastructure

 

Lab:

Implementing a Virtual Private Network

 

Secure Systems Design

Trusted Computing

Hardware / Firmware Security

Peripheral Device Security

Secure Configurations

OS Hardening

Patch Management

Embedded Systems

Security for Embedded Systems

 

Secure Mobile Device Services

Mobile Device Deployments

Mobile Connection Methods

Mobile Access Control Systems

Enforcement and Monitoring

 

Secure Virtualization and Cloud Services

Virtualization Technologies

Virtualization Security Best Practices

Cloud Computing

Cloud Security Best Practices

 

Module 5 / Risk Management

Forensics

Forensic Procedures

Collecting Evidence

Capturing System Images

Handling and Analyzing Evidence

 

Lab:

Using Forensic Tools

 

Disaster Recovery and Resiliency

Continuity of Operations Plans

Disaster Recovery Planning

Resiliency Strategies

Recovery Sites

Backup Plans and Policies

Resiliency and Automation Strategies

 

Risk Management

Business Impact Analysis

Identification of Critical Systems

Risk Assessment

Risk Mitigation

 

Secure Application Development

Application Vulnerabilities

Application Exploits

Web Browser Exploits

Secure Application Design

Secure Coding Concepts

Auditing Applications

Secure DevOps

 

Lab:

Identifying a Man-in-the-Browser Attack

 

Organizational Security

Corporate Security Policy

Personnel Management Policies

Interoperability Agreements

Data Roles

Data Sensitivity Labeling and Handling

Data Wiping and Disposal

Privacy and Employee Conduct Policies

Security Policy Training

Systems Master Advantage. Everything a delegate needs to succeed!