
systems master advantage
COMPTIA SECURITY+ SY0-501 COURSE
updated November 2019

Everything you need to succeed!
Official CompTIA Course
13-piece Success Tool Kit

Play Video
Expect More > Get More > Achieve More
NEW November 2019 Updated exam objectives
Courses that go beyond the typical
Focused to develop the best technicians to battle to-days security threats
Official CompTIA Course-ware
13-piece Student Success Tool Kit
Built on CompTIA’s Official Course-ware and the full 5-day course duration.
The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. This course will help delegates prepare for exam SY0-501 - released on October 4, 2017. Updated November 2019.
CompTIA Security+ is aimed at IT professionals with job roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator.
Ideally, you should have successfully completed the 'CompTIA Network+ Support Skills' course and have experience of networking support or IT administration. It is not necessary that you pass the Network+ exam before completing Security+ certification, but it is recommended.
Specifically, it is recommended that you have the following skills and knowledge before starting this course:
Know the function and basic features of the components of a PC.
Use Windows Server to create and manage files and use basic administrative features (Explorer, Control Panel, Server Manager, and Management Consoles).
Operate the Linux OS using basic command-line tools.
Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
Understand TCP/IP addressing, core protocols, and troubleshooting tools
This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.
Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, including CompTIA Cybersecurity Analyst (CSA)+, CompTIA Advanced Security Practitioner (CASP), and ISC’s CISSP (Certified Information Systems Security Professional).
On course completion, you will be able to:
Identify network attack strategies and defences.
Understand the principles of organizational security and the elements of effective security policies.
Know the technologies and uses of cryptographic standards and products.
Identify network- and host-based security technologies and practices.
Describe how wireless and remote access security is enforced.
Describe the standards and products used to enforce security on web and communications technologies.
Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Summarise application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
Day | Topic ID | Topic | Lesson Delivery | Lab Time | Lab and Scenario Activities | Day Total | Time |
Day One | 270 | 210 | 480 | ||||
Welcome and Course Introduction | 15 | 08:30 | |||||
Lesson 1 | 01A | Compare and Contrast Information Security Roles | 20 | 08:45 | |||
140 | 01B | Explain Threat Actor Types | 25 | 09:05 | |||
01C | Compare and Contrast Social Engineering Attack Types | 15 | 09:30 | ||||
01D | Determine Malware Types | 20 | 15 | Exploring the Lab Environment | 09:45 | ||
Break | 15 | 10:20 | |||||
01D | 45 | Determining Malware Types | 10:35 | ||||
Lesson 2 | 02A | Compare and Contrast Security Control and Framework Types | 20 | 11:20 | |||
50 | 02B | Follow Incident Response Procedures | 20 | 10 | Responding to an Incident | 11:40 | |
Lunch | 30 | 12:10 | |||||
Lesson 3 | 03A | Explain Penetration Testing Concepts | 20 | 12:40 | |||
215 | 03B | Assess Security Posture with Topology Discovery Software Tools | 15 | 30 | Performing Network Scanning with Software Tools | 13:00 | |
03C | Assess Security Posture with Fingerprinting and Sniffing Software Tools | 20 | 45 | Analyzing Network Traffic with Packet Sniffing Software Tools | 13:45 | ||
Break | 15 | 14:50 | |||||
03C | 20 | Concealing Data with Steganography Tools | 15:05 | ||||
03D | Assess Security Posture with Vulnerability Scanning Software Tools | 20 | 45 | Identifying Vulnerabilities with Scanning Software Tools | 15:25 | ||
Close | 16:30 | ||||||
Day Two | 300 | 180 | 480 | ||||
Lesson 4 | 04A | Compare and Contrast Basic Concepts of Cryptography | 30 | 08:30 | |||
110 | 04B | Explain Hashing and Symmetric Cryptographic Algorithms | 20 | 09:00 | |||
04C | Explain Asymmetric Cryptographic Algorithms | 20 | 40 | Implementing Certificate Services | 09:20 | ||
Break | 15 | 10:20 | |||||
Lesson 5 | 05A | Implement Certificates and Certificate Authorities | 20 | 10:35 | |||
90 | 05B | Implement PKI Management | 20 | 50 | Deploying Certificates and Implementing Key Recovery | 10:55 | |
Lunch | 30 | 12:05 | |||||
Lesson 6 | 06A | Compare and Contrast Identity and Authentication Concepts | 15 | 12:35 | |||
85 | 06B | Install and Configure Authentication Protocols | 20 | 30 | Cracking Passwords using Software Tools | 12:50 | |
06C | Implement Multifactor Authentication | 20 | 13:40 | ||||
Lesson 7 | 07A | Install and Configure Authorization and Directory Services | 20 | 14:00 | |||
135 | 07B | Implement Access Management Controls | 20 | 14:20 | |||
Break | 15 | 14:40 | |||||
07C | Differentiate Account Management Practices | 20 | 14:55 | ||||
07D | Implement Account Auditing and Recertification | 15 | 60 | Managing Accounts in a Windows Domain | 15:15 | ||
Close | 16:30 | ||||||
Day Three | 300 | 180 | 480 | ||||
Review Days One and Two | 30 | 08:30 | |||||
Lesson 8 | 08A | Implement Secure Network Architecture Concepts | 20 | 09:00 | |||
140 | 08B | Install and Configure Secure Switching Infrastructure | 20 | 09:20 | |||
08C | Install and Configure Network Access Control | 10 | 09:40 | ||||
08D | Install and Configure Secure Routing and NAT Infrastructure | 15 | 75 | Implementing a Secure Network Design | 09:50 | ||
Break | 15 | 11:20 | |||||
Lesson 9 | 09A | Install and Configure Firewalls and Proxies | 20 | 11:35 | |||
200 | 09B | Install and Configure Load Balancers | 20 | 60 | Installing and Configuring a Firewall | 11:55 | |
Lunch | 30 | 13:15 | |||||
09C | Install and Configure Intrusion Detection/Prevention Systems | 30 | 45 | Installing and Configuring an Intrusion Detection System | 13:45 | ||
09D | Install and Configure Data Loss Prevention (DLP) Systems | 10 | 15:00 | ||||
09E | Install and Configure Logging and SIEM Systems | 15 | 15:10 | ||||
Break | 15 | 15:25 | |||||
Lesson 10 | 10A | Install and Configure Wireless Infrastructure | 15 | 15:40 | |||
50 | 10B | Install and Configure Wireless Security Settings | 20 | 15:55 | |||
10C | Explain the Importance of Physical Security Controls | 15 | 16:15 | ||||
Close | 16:30 | ||||||
Day Four | 290 | 190 | 480 | ||||
Lesson 11 | 11A | Implement Secure Hardware Systems Design | 20 | 08:30 | |||
75 | 11B | Implement Secure Host Systems Design | 20 | 08:50 | |||
11C | Implement Secure Mobile Device Systems Design | 20 | 09:10 | ||||
11D | Implement Secure Embedded Systems Design | 15 | 09:30 | ||||
Lesson 12 | 12A | Implement Secure Network Operations Protocols | 20 | 40 | Implementing Secure Network Addressing Services | 09:45 | |
165 | Break | 15 | 10:45 | ||||
12B | Implement Secure Remote Access Protocols | 20 | 75 | Implementing a Virtual Private Network | 11:00 | ||
12C | Implement Secure Remote Administration Protocols | 10 | 12:35 | ||||
Lunch | 30 | 12:45 | |||||
Lesson 13 | 13A | Implement Secure Web Services | 20 | 13:15 | |||
155 | 13B | Implement Secure Communications Services | 20 | 75 | Installing and Configuring a Secure Email Service | 13:35 | |
Break | 10 | 15:10 | |||||
13C | Summarize Secure Virtualization Infrastructure | 20 | 15:20 | ||||
13D | Summarize Secure Cloud Services | 20 | 15:40 | ||||
Review Days Three and Four | 30 | 16:00 | |||||
Close | 16:30 | ||||||
Day Five | 350 | 90 | 440 | ||||
Lesson 14 | 14A | Explain Risk Management Processes and Concepts | 30 | 15 | Performing a Business Impact Analysis | 08:30 | |
125 | 14B | Explain Resiliency and Automation Strategies | 15 | 09:15 | |||
14C | Explain Disaster Recovery and Continuity of Operations Concepts | 20 | 09:30 | ||||
14D | Summarize Basic Concepts of Forensics | 15 | 30 | Using Forensic Tools | 09:50 | ||
Break | 15 | 10:35 | |||||
Lesson 15 | 15A | Explain the Impact of Vulnerability Types | 20 | 30 | Identifying a Man-in-the-Browser Attack | 10:50 | |
70 | 15B | Summarize Secure Application Development Concepts | 20 | 11:40 | |||
Lesson 16 | 16A | Explain the Importance of Security Policies | 10 | 12:00 | |||
65 | 16B | Implement Data Security and Privacy Practices | 20 | 12:10 | |||
16C | Explain the Importance of Personnel Management | 20 | 15 | Incorporating Documentation in Operational Security | 12:30 | ||
Lunch | 30 | 13:05 | |||||
Practice Exam (30 min practice exam, 30 min review results) | 60 | 13:35 | |||||
Break | 15 | 14:35 | |||||
Course Review (45 min topic review, 15 min for exam tips + wrap up) | 60 | 14:50 | |||||
Close | 15:50 |
Don't forget to checkout the Systems Master Advantage.
Supporting you beyond the classroom
#13-piece Student Success Tool Kit
Everything you needs to succeed!
PLAN | STUDY | PASS | MASTER
We analyse the exam criteria and source the best training materials so you can study with confidence.
PLAN | STUDY | PASS | MASTER
We analyse the exam criteria and source the best training materials so you can study with confidence.
PLAN | STUDY | PASS | MASTER
We analyse the exam criteria and source the best training materials so you can study with confidence.
“At the start of every class, I ask for a show of hands, to indicate who intends to take the exam? Typically 20 out of 22 student will raise their hand. Checking back 12 months latter only 1 from 2 classes (44 students) will have successfully passed the exam” (Martin Dyer)
Knowing what can hinder or stop your achievement and progress empowers you to avoid the pitfalls.
Commercial training for decades has been offered in three general delivery formats:
Generally a one size fits all approach.
Time for something new, something better.
Zenos was a phenomenal IT apprenticeship scheme founded by George Anderson. Apprentices of 16, 17 and 18 routinely passed exams first time. Pitman Training Maidstone Stepping-stones, CompTIA and Microsoft NT 4.0 / 2000 training also had great first time pass rates. Their secret was…
So the secret is just a little mundane, but it works!
Everything you need to succeed.
Our strategy is simply to give you everything you need to succeed. We have revamped two great and brilliantly effective training solutions, updated them with fantastic official new content that we know is accurate and on point. This has been packaged into The Plan.
.
Our strategy is simply to give you everything you need to succeed. We have revamped two great and brilliantly effective training solutions, updated them with fantastic official new content that we know is accurate and on point. This has been packaged into The Plan.
Assessing the exam objectives from the vendor regularly is essential as they change. In our would that is CompTIA and Microsoft.
We have this covered for you!
Feel free to read the news articles and follow the links, go to the Exam Prep Hub and select your training course. Alternative leave it to us and we will let you know about changes effecting your exam.
Everyone will start studying from a different state of preparedness. Previous study, work experience, available time, end goal. All these factors will effect the time it will take you to achieve.
The level of achievement is specific to the individual, identify yours and adjust the plan.
Plan to succeed to-day. No registration.
Strategy description cont – Blowing my own trumpet I have helped hundreds of students develop real skills and the knowledge to pass CompTIA and Microsoft exams first-time. At Pitman Training and Zenos we gave the students a plan and everything they needed to achieve. 91% and 85% fist-time passes in a couple of weeks.
Strategy description cont – Blowing my own trumpet I have helped hundreds of students develop real skills and the knowledge to pass CompTIA and Microsoft exams first-time. At Pitman Training and Zenos we gave the students a plan and everything they needed to achieve. 91% and 85% fist-time passes in a couple of weeks.
Know what you need
Know what it takes
Know how to get it
Set your path for success
5-days are needed to cover the course syllabus
100% exam objectives & updated
Latin for “Let the buyer beware”. CompTIA and Microsoft course-ware buyers need to know what makes a good training course and what to avoid.
Too many books that accompany CompTIA training are not fit for purpose.
Beware that many course providers use their own or out of date course-ware. Download our course quality checklist before buying any CompTIA course.
Poor or old (GTS) CompTIA course-ware will not help you become a good technician or pass the exams.
Unfortunately both books fail to meet the current CompTIA standard, one is just poor imitation of a study guide and the other is now too old and out of date.
Some training companies will save money at your expense either by producing cheap versions of the book or using old stock.
GTS have ceased trading following being bought out by CompTIA. GTS was the market leader in authorised CompTIA courseware. The good news is that the GTS experts are now employed directly by CompTIA and produce the CompTIA Official courseware that is guaranteed to cover 100% of the CompTIA exam syllabus.
What’s included
What you’ll learn
The Official CompTIA Security+ Student Guide has been developed by CompTIA for the CompTIA certification candidate. Rigorously evaluated by third party subject matter experts to validate coverage of the Security+ exam objectives, The Official CompTIA Security+ Student Guide teaches the essential skills and information needed to troubleshoot and problem solve, helps learners understand a wide variety of issues ranging from networking and operating systems to mobile devices and security, and prepares candidates to take the CompTIA Security+ certification exam (SY0-501).
Accessing the Course Materials
An access key and instructions for accessing the CompTIA Learning Center, the online platform through which the eBook and all digital materials as described above are delivered, are emailed within 3-4 hours of purchase. The eBook is provided in an interactive online version, along with a downloadable PDF.
Product Information
ISBN: 978-1-64274-236-7
Pub. Date: 2019-07-15
Author(s): James Pengelly
Pages: 801
Table of Contents
Lesson 1: Comparing and Contrasting Attacks
Lesson 2: Comparing and Contrasting Security Controls
Lesson 3: Using Security Assessment Tools
Lesson 4: Comparing and Contrasting Basic Concepts of Cryptography
Lesson 5: Implementing Public Key Infrastructure
Lesson 6: Implementing Identity and Access Management Controls
Lesson 7: Managing Access Services and Accounts
Lesson 8: Implementing Secure Network Architecture Concepts
Lesson 9: Installing and Configuring Security Appliances
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Lesson 11: Deploying Secure Host, Embedded, and Mobile Systems
Lesson 12: Implementing Secure Network Access Protocols
Lesson 13: Implementing Secure Network Applications
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts
Lesson 15: Summarizing Secure Application Development Concepts
Lesson 16: Explaining Organizational Security Concepts
Appendix A: Mapping Course Content to CompTIA Security+ (Exam SY0-501)
Solutions
Glossary
Index
About CompTIA Security+
CompTIA Security+ is an international, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
No other certification that assesses baseline cybersecurity skills has performance-based questions on the exam. Security+ emphasizes hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of issues.
More choose Security+ for DoD 8570 compliance than any other certification because it focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
Your takeaway success manual
100% exam objectives covered
Most security+ material on offer is old!
Old course, old version, not authorised
MCT, MCSA, MCITP, MCTS, MCSE, MCP MTA CompTIA A+, Network+, Security+
Has been delivering expert systems training since 1997, helping launch careers, upgrade skills and develop the computer systems experts needed today.
Specialising in CompTIA and Microsoft courses in hardware, desktop and server operating systems, networking and security. Martin developed the outstandingly effective training package we now call Systems Master Advantage while working with IT and telecoms apprentices.
Martin Dyer is your Security+ Trainer
Martin has been delivering expert CompTIA and Microsoft systems training since 1997
Master some of the worlds most sought after security skills
In class and at home for 6 months
Covering some of the most challenging exam topics, clearly and memorably
Short learning skills boosts. Learn quickly there is a lot to cover
For rapid learning and retention
To identify your strengths and resolve your weaknesses quickly
CompTIA CertMaster Practice
The hub of security+ Learning
Your course links, news
exam criteria, and more…
Know when you are exam ready
Courses that go beyond the typical
Focused to develop the best technicians to battle to-days security threats
Official CompTIA Course-ware
13-piece Student Success Tool Kit
Everything you need to succeed with CompTIA’s Security+
Latin for “Let the buyer beware”. CompTIA and Microsoft course-ware buyers need to know what makes a good training course and what to avoid.
Too many books that accompany CompTIA training are not fit for purpose.
Beware that many course providers use their own or out of date course-ware. Download our course quality checklist before buying any CompTIA course.
Poor or old (GTS) CompTIA course-ware will not help you become a good technician or pass the exams.
Unfortunately both books fail to meet the current CompTIA standard, one is just poor imitation of a study guide and the other is now too old and out of date.
Some training companies will save money at your expense either by producing cheap versions of the book or using old stock.
GTS have ceased trading following being bought out by CompTIA. GTS was the market leader in authorised CompTIA courseware. The good news is that the GTS experts are now employed directly by CompTIA and produce the CompTIA Official courseware that is guaranteed to cover 100% of the CompTIA exam syllabus.
What’s included
What you’ll learn
The Official CompTIA Security+ Student Guide has been developed by CompTIA for the CompTIA certification candidate. Rigorously evaluated by third party subject matter experts to validate coverage of the Security+ exam objectives, The Official CompTIA Security+ Student Guide teaches the essential skills and information needed to troubleshoot and problem solve, helps learners understand a wide variety of issues ranging from networking and operating systems to mobile devices and security, and prepares candidates to take the CompTIA Security+ certification exam (SY0-501).
Accessing the Course Materials
An access key and instructions for accessing the CompTIA Learning Center, the online platform through which the eBook and all digital materials as described above are delivered, are emailed within 3-4 hours of purchase. The eBook is provided in an interactive online version, along with a downloadable PDF.
Product Information
ISBN: 978-1-64274-236-7
Pub. Date: 2019-07-15
Author(s): James Pengelly
Pages: 801
Table of Contents
Lesson 1: Comparing and Contrasting Attacks
Lesson 2: Comparing and Contrasting Security Controls
Lesson 3: Using Security Assessment Tools
Lesson 4: Comparing and Contrasting Basic Concepts of Cryptography
Lesson 5: Implementing Public Key Infrastructure
Lesson 6: Implementing Identity and Access Management Controls
Lesson 7: Managing Access Services and Accounts
Lesson 8: Implementing Secure Network Architecture Concepts
Lesson 9: Installing and Configuring Security Appliances
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Lesson 11: Deploying Secure Host, Embedded, and Mobile Systems
Lesson 12: Implementing Secure Network Access Protocols
Lesson 13: Implementing Secure Network Applications
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts
Lesson 15: Summarizing Secure Application Development Concepts
Lesson 16: Explaining Organizational Security Concepts
Appendix A: Mapping Course Content to CompTIA Security+ (Exam SY0-501)
Solutions
Glossary
Index
About CompTIA Security+
CompTIA Security+ is an international, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
No other certification that assesses baseline cybersecurity skills has performance-based questions on the exam. Security+ emphasizes hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of issues.
More choose Security+ for DoD 8570 compliance than any other certification because it focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
Latin for “Let the buyer beware”. CompTIA and Microsoft course-ware buyers need to know what makes a good training course and what to avoid.
Too many books that accompany CompTIA training are not fit for purpose.
Beware that many course providers use their own or out of date course-ware. Download our course quality checklist before buying any CompTIA course.
Poor or old (GTS) CompTIA course-ware will not help you become a good technician or pass the exams.
Unfortunately both books fail to meet the current CompTIA standard, one is just poor imitation of a study guide and the other is now too old and out of date.
Some training companies will save money at your expense either by producing cheap versions of the book or using old stock.
GTS have ceased trading following being bought out by CompTIA. GTS was the market leader in authorised CompTIA courseware. The good news is that the GTS experts are now employed directly by CompTIA and produce the CompTIA Official courseware that is guaranteed to cover 100% of the CompTIA exam syllabus.
What’s included
What you’ll learn
The Official CompTIA Security+ Student Guide has been developed by CompTIA for the CompTIA certification candidate. Rigorously evaluated by third party subject matter experts to validate coverage of the Security+ exam objectives, The Official CompTIA Security+ Student Guide teaches the essential skills and information needed to troubleshoot and problem solve, helps learners understand a wide variety of issues ranging from networking and operating systems to mobile devices and security, and prepares candidates to take the CompTIA Security+ certification exam (SY0-501).
Accessing the Course Materials
An access key and instructions for accessing the CompTIA Learning Center, the online platform through which the eBook and all digital materials as described above are delivered, are emailed within 3-4 hours of purchase. The eBook is provided in an interactive online version, along with a downloadable PDF.
Product Information
ISBN: 978-1-64274-236-7
Pub. Date: 2019-07-15
Author(s): James Pengelly
Pages: 801
Table of Contents
Lesson 1: Comparing and Contrasting Attacks
Lesson 2: Comparing and Contrasting Security Controls
Lesson 3: Using Security Assessment Tools
Lesson 4: Comparing and Contrasting Basic Concepts of Cryptography
Lesson 5: Implementing Public Key Infrastructure
Lesson 6: Implementing Identity and Access Management Controls
Lesson 7: Managing Access Services and Accounts
Lesson 8: Implementing Secure Network Architecture Concepts
Lesson 9: Installing and Configuring Security Appliances
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Lesson 11: Deploying Secure Host, Embedded, and Mobile Systems
Lesson 12: Implementing Secure Network Access Protocols
Lesson 13: Implementing Secure Network Applications
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts
Lesson 15: Summarizing Secure Application Development Concepts
Lesson 16: Explaining Organizational Security Concepts
Appendix A: Mapping Course Content to CompTIA Security+ (Exam SY0-501)
Solutions
Glossary
Index
About CompTIA Security+
CompTIA Security+ is an international, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
No other certification that assesses baseline cybersecurity skills has performance-based questions on the exam. Security+ emphasizes hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of issues.
More choose Security+ for DoD 8570 compliance than any other certification because it focuses on the latest trends and techniques in risk management, risk mitigation, threat management and intrusion detection.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.