Everything you need to succeed!
5-day Tutor Led Training Course
Part 1 of the Systems Master Achievement System
Securing the best training, courseware and labs is part of what you need to achieve your goals
The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. This course will help delegates prepare for exam SY0-501 - released on October 4, 2017. Updated November 2019.
CompTIA Security+ is aimed at IT professionals with job roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator.
Ideally, you should have successfully completed the 'CompTIA Network+ Support Skills' course and have experience of networking support or IT administration. It is not necessary that you pass the Network+ exam before completing Security+ certification, but it is recommended.
Specifically, it is recommended that you have the following skills and knowledge before starting this course:
Know the function and basic features of the components of a PC.
Use Windows Server to create and manage files and use basic administrative features (Explorer, Control Panel, Server Manager, and Management Consoles).
Operate the Linux OS using basic command-line tools.
Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
Understand TCP/IP addressing, core protocols, and troubleshooting tools
This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.
Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, including CompTIA Cybersecurity Analyst (CSA)+, CompTIA Advanced Security Practitioner (CASP), and ISC’s CISSP (Certified Information Systems Security Professional).
On course completion, you will be able to:
Identify network attack strategies and defences.
Understand the principles of organizational security and the elements of effective security policies.
Know the technologies and uses of cryptographic standards and products.
Identify network- and host-based security technologies and practices.
Describe how wireless and remote access security is enforced.
Describe the standards and products used to enforce security on web and communications technologies.
Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Summarise application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
Day | Topic ID | Topic | Lesson Delivery | Lab Time | Lab and Scenario Activities | Day Total | Time |
Day One | 270 | 210 | 480 | ||||
Welcome and Course Introduction | 15 | 08:30 | |||||
Lesson 1 | 01A | Compare and Contrast Information Security Roles | 20 | 08:45 | |||
140 | 01B | Explain Threat Actor Types | 25 | 09:05 | |||
01C | Compare and Contrast Social Engineering Attack Types | 15 | 09:30 | ||||
01D | Determine Malware Types | 20 | 15 | Exploring the Lab Environment | 09:45 | ||
Break | 15 | 10:20 | |||||
01D | 45 | Determining Malware Types | 10:35 | ||||
Lesson 2 | 02A | Compare and Contrast Security Control and Framework Types | 20 | 11:20 | |||
50 | 02B | Follow Incident Response Procedures | 20 | 10 | Responding to an Incident | 11:40 | |
Lunch | 30 | 12:10 | |||||
Lesson 3 | 03A | Explain Penetration Testing Concepts | 20 | 12:40 | |||
215 | 03B | Assess Security Posture with Topology Discovery Software Tools | 15 | 30 | Performing Network Scanning with Software Tools | 13:00 | |
03C | Assess Security Posture with Fingerprinting and Sniffing Software Tools | 20 | 45 | Analyzing Network Traffic with Packet Sniffing Software Tools | 13:45 | ||
Break | 15 | 14:50 | |||||
03C | 20 | Concealing Data with Steganography Tools | 15:05 | ||||
03D | Assess Security Posture with Vulnerability Scanning Software Tools | 20 | 45 | Identifying Vulnerabilities with Scanning Software Tools | 15:25 | ||
Close | 16:30 | ||||||
Day Two | 300 | 180 | 480 | ||||
Lesson 4 | 04A | Compare and Contrast Basic Concepts of Cryptography | 30 | 08:30 | |||
110 | 04B | Explain Hashing and Symmetric Cryptographic Algorithms | 20 | 09:00 | |||
04C | Explain Asymmetric Cryptographic Algorithms | 20 | 40 | Implementing Certificate Services | 09:20 | ||
Break | 15 | 10:20 | |||||
Lesson 5 | 05A | Implement Certificates and Certificate Authorities | 20 | 10:35 | |||
90 | 05B | Implement PKI Management | 20 | 50 | Deploying Certificates and Implementing Key Recovery | 10:55 | |
Lunch | 30 | 12:05 | |||||
Lesson 6 | 06A | Compare and Contrast Identity and Authentication Concepts | 15 | 12:35 | |||
85 | 06B | Install and Configure Authentication Protocols | 20 | 30 | Cracking Passwords using Software Tools | 12:50 | |
06C | Implement Multifactor Authentication | 20 | 13:40 | ||||
Lesson 7 | 07A | Install and Configure Authorization and Directory Services | 20 | 14:00 | |||
135 | 07B | Implement Access Management Controls | 20 | 14:20 | |||
Break | 15 | 14:40 | |||||
07C | Differentiate Account Management Practices | 20 | 14:55 | ||||
07D | Implement Account Auditing and Recertification | 15 | 60 | Managing Accounts in a Windows Domain | 15:15 | ||
Close | 16:30 | ||||||
Day Three | 300 | 180 | 480 | ||||
Review Days One and Two | 30 | 08:30 | |||||
Lesson 8 | 08A | Implement Secure Network Architecture Concepts | 20 | 09:00 | |||
140 | 08B | Install and Configure Secure Switching Infrastructure | 20 | 09:20 | |||
08C | Install and Configure Network Access Control | 10 | 09:40 | ||||
08D | Install and Configure Secure Routing and NAT Infrastructure | 15 | 75 | Implementing a Secure Network Design | 09:50 | ||
Break | 15 | 11:20 | |||||
Lesson 9 | 09A | Install and Configure Firewalls and Proxies | 20 | 11:35 | |||
200 | 09B | Install and Configure Load Balancers | 20 | 60 | Installing and Configuring a Firewall | 11:55 | |
Lunch | 30 | 13:15 | |||||
09C | Install and Configure Intrusion Detection/Prevention Systems | 30 | 45 | Installing and Configuring an Intrusion Detection System | 13:45 | ||
09D | Install and Configure Data Loss Prevention (DLP) Systems | 10 | 15:00 | ||||
09E | Install and Configure Logging and SIEM Systems | 15 | 15:10 | ||||
Break | 15 | 15:25 | |||||
Lesson 10 | 10A | Install and Configure Wireless Infrastructure | 15 | 15:40 | |||
50 | 10B | Install and Configure Wireless Security Settings | 20 | 15:55 | |||
10C | Explain the Importance of Physical Security Controls | 15 | 16:15 | ||||
Close | 16:30 | ||||||
Day Four | 290 | 190 | 480 | ||||
Lesson 11 | 11A | Implement Secure Hardware Systems Design | 20 | 08:30 | |||
75 | 11B | Implement Secure Host Systems Design | 20 | 08:50 | |||
11C | Implement Secure Mobile Device Systems Design | 20 | 09:10 | ||||
11D | Implement Secure Embedded Systems Design | 15 | 09:30 | ||||
Lesson 12 | 12A | Implement Secure Network Operations Protocols | 20 | 40 | Implementing Secure Network Addressing Services | 09:45 | |
165 | Break | 15 | 10:45 | ||||
12B | Implement Secure Remote Access Protocols | 20 | 75 | Implementing a Virtual Private Network | 11:00 | ||
12C | Implement Secure Remote Administration Protocols | 10 | 12:35 | ||||
Lunch | 30 | 12:45 | |||||
Lesson 13 | 13A | Implement Secure Web Services | 20 | 13:15 | |||
155 | 13B | Implement Secure Communications Services | 20 | 75 | Installing and Configuring a Secure Email Service | 13:35 | |
Break | 10 | 15:10 | |||||
13C | Summarize Secure Virtualization Infrastructure | 20 | 15:20 | ||||
13D | Summarize Secure Cloud Services | 20 | 15:40 | ||||
Review Days Three and Four | 30 | 16:00 | |||||
Close | 16:30 | ||||||
Day Five | 350 | 90 | 440 | ||||
Lesson 14 | 14A | Explain Risk Management Processes and Concepts | 30 | 15 | Performing a Business Impact Analysis | 08:30 | |
125 | 14B | Explain Resiliency and Automation Strategies | 15 | 09:15 | |||
14C | Explain Disaster Recovery and Continuity of Operations Concepts | 20 | 09:30 | ||||
14D | Summarize Basic Concepts of Forensics | 15 | 30 | Using Forensic Tools | 09:50 | ||
Break | 15 | 10:35 | |||||
Lesson 15 | 15A | Explain the Impact of Vulnerability Types | 20 | 30 | Identifying a Man-in-the-Browser Attack | 10:50 | |
70 | 15B | Summarize Secure Application Development Concepts | 20 | 11:40 | |||
Lesson 16 | 16A | Explain the Importance of Security Policies | 10 | 12:00 | |||
65 | 16B | Implement Data Security and Privacy Practices | 20 | 12:10 | |||
16C | Explain the Importance of Personnel Management | 20 | 15 | Incorporating Documentation in Operational Security | 12:30 | ||
Lunch | 30 | 13:05 | |||||
Practice Exam (30 min practice exam, 30 min review results) | 60 | 13:35 | |||||
Break | 15 | 14:35 | |||||
Course Review (45 min topic review, 15 min for exam tips + wrap up) | 60 | 14:50 | |||||
Close | 15:50 |
Don't forget to checkout the Systems Master Advantage.
GET MORE – ACHIEVE MORE
Complete certification solutions from assessment and planning to learning and passing
The CompTIA official course, properly delivered over the full five days, as per design, is a fast track way to rapidly develop a solid understanding of the technology. Efficiently covering the technologies, exploring and working the labs and having your questions answered on the spot will boost your abilities and comprehension.
This learning curve is often the biggest single step in achieving your goals. Traditional training courses will leave consider the end of the course to be job done. The best engineers in the industry know that the job has only just begun when is comes to developing competency, excellence or certification.
At Systems Master attending the official course is part of the package that will help you achieve your goals.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.