Official CompTIA Security+ SY0-601 Course

Systems Master Advantage Courses

Everything you need to succeed!

5-day Tutor Led Training Course

Part 1 of the Systems Master Achievement System

Securing the best training, courseware and labs is part of what you need to achieve your goals

Security+ Course Details

Learning outcomes
Course Outline

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. 


CompTIA Security+ is the 3rd Essential Technology that engineers should master to defend IT systems. As a systems engineer you are on the front line and need to recognise risk and respond appropriately. It is also aimed at IT professionals with job roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator.


Ideally, you should have successfully completed the 'CompTIA Network+ Support Skills' course and have experience of networking support or IT administration. It is not necessary that you pass the Network+ exam before completing Security+ certification, but it is recommended.

Specifically, it is recommended that you have the following skills and knowledge before starting this course:

Know the function and basic features of the components of a PC.

Use Windows Server to create and manage files and use basic administrative features (Explorer, Control Panel, Server Manager, and Management Consoles).

Operate the Linux OS using basic command-line tools.

Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).

Understand TCP/IP addressing, core protocols, and troubleshooting tools.

Learning outcomes

This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.

Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, including CompTIA Cybersecurity Analyst (CSA)+, CompTIA Advanced Security Practitioner (CASP), and ISC’s CISSP (Certified Information Systems Security Professional).

On course completion, you will be able to:

  • Identify network attack strategies and defences.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and uses of cryptographic standards and products.
  • Identify network- and host-based security technologies and practices.
  • Describe how wireless and remote access security is enforced.
  • Describe the standards and products used to enforce security on web and communications technologies.
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
  • Summarise application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
Course Outline
Day Topic ID Topic Lesson Delivery Lab Time Lab and Scenario Activities Day Total Time
Day One     270 210   480  
    Welcome and Course Introduction 15       08:30
Lesson 1 01A Compare and Contrast Information Security Roles 20       08:45
140 01B Explain Threat Actor Types 25       09:05
  01C Compare and Contrast Social Engineering Attack Types 15       09:30
  01D Determine Malware Types 20 15 Exploring the Lab Environment   09:45
    Break 15       10:20
  01D     45 Determining Malware Types   10:35
Lesson 2 02A Compare and Contrast Security Control and Framework Types 20       11:20
50 02B Follow Incident Response Procedures 20 10 Responding to an Incident   11:40
    Lunch 30       12:10
Lesson 3 03A Explain Penetration Testing Concepts 20       12:40
215 03B Assess Security Posture with Topology Discovery Software Tools 15 30 Performing Network Scanning with Software Tools   13:00
  03C Assess Security Posture with Fingerprinting and Sniffing Software Tools 20 45 Analyzing Network Traffic with Packet Sniffing Software Tools   13:45
    Break 15       14:50
  03C     20 Concealing Data with Steganography Tools   15:05
  03D Assess Security Posture with Vulnerability Scanning Software Tools 20 45 Identifying Vulnerabilities with Scanning Software Tools   15:25
    Close         16:30
Day Two     300 180   480  
Lesson 4 04A Compare and Contrast Basic Concepts of Cryptography 30       08:30
110 04B Explain Hashing and Symmetric Cryptographic Algorithms 20       09:00
  04C Explain Asymmetric Cryptographic Algorithms 20 40 Implementing Certificate Services   09:20
    Break 15       10:20
Lesson 5 05A Implement Certificates and Certificate Authorities 20       10:35
90 05B Implement PKI Management 20 50 Deploying Certificates and Implementing Key Recovery   10:55
    Lunch 30       12:05
Lesson 6 06A Compare and Contrast Identity and Authentication Concepts 15       12:35
85 06B Install and Configure Authentication Protocols 20 30 Cracking Passwords using Software Tools   12:50
  06C Implement Multifactor Authentication 20       13:40
Lesson 7 07A Install and Configure Authorization and Directory Services 20       14:00
135 07B Implement Access Management Controls 20       14:20
    Break 15       14:40
  07C Differentiate Account Management Practices 20       14:55
  07D Implement Account Auditing and Recertification 15 60 Managing Accounts in a Windows Domain   15:15
    Close         16:30
Day Three     300 180   480  
    Review Days One and Two 30       08:30
Lesson 8 08A Implement Secure Network Architecture Concepts 20       09:00
140 08B Install and Configure Secure Switching Infrastructure 20       09:20
  08C Install and Configure Network Access Control 10       09:40
  08D Install and Configure Secure Routing and NAT Infrastructure 15 75 Implementing a Secure Network Design   09:50
    Break 15       11:20
Lesson 9 09A Install and Configure Firewalls and Proxies 20       11:35
200 09B Install and Configure Load Balancers 20 60 Installing and Configuring a Firewall   11:55
    Lunch 30       13:15
  09C Install and Configure Intrusion Detection/Prevention Systems 30 45 Installing and Configuring an Intrusion Detection System   13:45
  09D Install and Configure Data Loss Prevention (DLP) Systems 10       15:00
  09E Install and Configure Logging and SIEM Systems 15       15:10
    Break 15       15:25
Lesson 10 10A Install and Configure Wireless Infrastructure 15       15:40
50 10B Install and Configure Wireless Security Settings 20       15:55
  10C Explain the Importance of Physical Security Controls 15       16:15
    Close         16:30
Day Four     290 190   480  
Lesson 11 11A Implement Secure Hardware Systems Design 20       08:30
75 11B Implement Secure Host Systems Design 20       08:50
  11C Implement Secure Mobile Device Systems Design 20       09:10
  11D Implement Secure Embedded Systems Design 15       09:30
Lesson 12 12A Implement Secure Network Operations Protocols 20 40 Implementing Secure Network Addressing Services   09:45
165   Break 15       10:45
  12B Implement Secure Remote Access Protocols 20 75 Implementing a Virtual Private Network   11:00
  12C Implement Secure Remote Administration Protocols 10       12:35
    Lunch 30       12:45
Lesson 13 13A Implement Secure Web Services 20       13:15
155 13B Implement Secure Communications Services 20 75 Installing and Configuring a Secure Email Service   13:35
    Break 10       15:10
  13C Summarize Secure Virtualization Infrastructure 20       15:20
  13D Summarize Secure Cloud Services 20       15:40
    Review Days Three and Four 30       16:00
    Close         16:30
Day Five     350 90   440  
Lesson 14 14A Explain Risk Management Processes and Concepts 30 15 Performing a Business Impact Analysis   08:30
125 14B Explain Resiliency and Automation Strategies 15       09:15
  14C Explain Disaster Recovery and Continuity of Operations Concepts 20       09:30
  14D Summarize Basic Concepts of Forensics 15 30 Using Forensic Tools   09:50
    Break 15       10:35
Lesson 15 15A Explain the Impact of Vulnerability Types 20 30 Identifying a Man-in-the-Browser Attack   10:50
70 15B Summarize Secure Application Development Concepts 20       11:40
Lesson 16 16A Explain the Importance of Security Policies 10       12:00
65 16B Implement Data Security and Privacy Practices 20       12:10
  16C Explain the Importance of Personnel Management 20 15 Incorporating Documentation in Operational Security   12:30
    Lunch 30       13:05
    Practice Exam (30 min practice exam, 30 min review results) 60       13:35
    Break 15       14:35
    Course Review (45 min topic review, 15 min for exam tips  + wrap up) 60       14:50
    Close         15:50


Complete certification solutions from assessment and planning to learning and passing

Skyrocket Your Technical Understanding

The CompTIA official course, properly delivered over the full five days, as per design, is a fast track way to rapidly develop a solid understanding of the technology. Efficiently covering the technologies, exploring and working the labs and having your questions answered on the spot will boost your abilities and comprehension. 

This learning curve is often the biggest single step in achieving your goals. Traditional training courses will leave consider the end of the course to be job done. The best engineers in the industry know that the job has only just begun when is comes to developing competency, excellence or certification.

At Systems Master attending the official course is part of the package that will help you achieve your goals.

What Will You Achieve with Your Achievement Kit

The Training Systems that we deliver includes:

  • Smart planning
  • Efficient time management
  • Structured training and practice
  • Achievement Kit
  • Exam Practice Systems
  • Mentoring

Checkout the full Training System

Share this: