CompTIA - Security+

CompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.  
CompTIA Authorized Partner

Upcoming sessions

No date suits you?

Notify me when a session is added.

  • Duration: 5 days
  • Regular price: $3,500
  • Preferential price: $2,975

Course outline

Languages
These scheduled public sessions are offered in English or in French. The educational material is in English.
CertificationCertification Exam Objectives : SY0-601
Audience

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.

Prerequisites
To ensure your success in this course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts.
Objectives
In this course, you will implement information security across a variety of different contexts.
You will:
  • Identify the fundamental components of information security.
  • Analyze risk.
  • Identify various threats to information security.
  • Conduct security assessments to detect vulnerabilities.
  • Implement security for hosts and software.
  • Implement security for networks.
  • Manage identity and access.
  • Implement cryptographic solutions in the organization.
  • Implement security at the operational level.
  • Address security incidents.
  • Ensure the continuity of business operations in the event of an incident.

Contents

Lesson 1: Comparing Security Roles and Security Controls
• Compare and Contrast Information Security Roles
• Compare and Contrast Security Control and Framework Types
Lesson 2: Explaining Threat Actors and Threat Intelligence
• Explain Threat Actor Types and Attack Vectors
• Explain Threat Intelligence Sources
Lesson 3: Performing Security Assessments
• Assess Organizational Security with Network
• Reconnaissance Tools
• Explain Security Concerns with General Vulnerability Types
• Summarize Vulnerability Scanning Techniques
• Explain Penetration Testing Concepts
Lesson 4: Identifying Social Engineering and Malware
• Compare and Contrast Social Engineering Techniques
• Analyze Indicators of Malware-Based Attacks
Lesson 5: Summarizing Basic Cryptographic Concepts
• Compare and Contrast Cryptographic Ciphers
• Summarize Cryptographic Modes of Operation
• Summarize Cryptographic Use Cases and Weaknesses
• Summarize Other Cryptographic Technologies
Lesson 6: Implementing Public Key Infrastructure
• Implement Certificates and Certificate Authorities
• Implement PKI Management
Lesson 7: Implementing Authentication Controls
• Summarize Authentication Design Concepts
• Implement Knowledge-Based Authentication
• Implement Authentication Technologies
• Summarize Biometrics Authentication Concepts
Lesson 8: Implementing Identity and Account Management Controls
• Implement Identity and Account Types
• Implement Account Policies
• Implement Authorization Solutions
• Explain the Importance of Personnel Policies
Lesson 9: Implementing Secure Network Designs
• Implement Secure Network Designs
• Implement Secure Switching and Routing
• Implement Secure Wireless Infrastructure
• Implement Load Balancers
Lesson 10: Implementing Network Security Appliances
• Implement Firewalls and Proxy Servers
• Implement Network Security Monitoring
• Summarize the Use of SIEM
Lesson 11: Implementing Secure Network Protocols
• Implement Secure Network Operations Protocols
• Implement Secure Application Protocols
• Implement Secure Remote Access Protocols
Lesson 12: Implementing Host Security Solutions
• Implement Secure Firmware
• Implement Endpoint Security
• Explain Embedded System Security Implications
Lesson 13: Implementing Secure Mobile Solutions
• Implement Mobile Device Management
• Implement Secure Mobile Device Connections
Lesson 14: Summarizing Secure Application Concepts
• Analyze Indicators of Application Attacks
• Analyze Indicators of Web Application Attacks
• Summarize Secure Coding Practices
• Implement Secure Script Environments
• Summarize Deployment and Automation Concepts
Lesson 15: Implementing Secure Cloud Solutions
• Summarize Secure Cloud and Virtualization Services
• Apply Cloud Security Solutions
• Summarize Infrastructure as Code Concepts
Lesson 16: Explaining Data Privacy and Protection Concepts
• Explain Privacy and Data Sensitivity Concepts
• Explain Privacy and Data Protection Controls
Lesson 17: Performing Incident Response
• Summarize Incident Response Procedures
• Utilize Appropriate Data Sources for Incident Response
• Apply Mitigation Controls
Lesson 18: Explaining Digital Forensics
• Explain Key Aspects of Digital Forensics Documentation
• Explain Key Aspects of Digital Forensics Evidence Acquisition
Lesson 19: Summarizing Risk Management Concepts
• Explain Risk Management Processes and Concepts
• Explain Business Impact Analysis Concepts
Lesson 20: Implementing Cybersecurity Resilience
• Implement Redundancy Strategies
• Implement Backup Strategies
• Implement Cybersecurity Resiliency Strategies
Lesson 21: Explaining Physical Security
• Explain the Importance of Physical Site Security Controls
• Explain the Importance of Physical Host Security Controls

Surround yourself with the best

Frédéric Paradis
Frédéric Paradis
Certified Trainer and Cloud Architect
As a certified Microsoft trainer, Frédéric describes himself as a Cloud magician who easily navigates the mythical space between technology and reality.
Marc Maisonneuve
Marc Maisonneuve
Training program director
Marc Maisonneuve has acted as a Training Program Director, professional effectiveness trainer and user tools practice leader at AFI for several years. Mr. Maisonneuve is known for his analytical skills, his legendary calm and his undeniable desire to encourage people to develop their skills. He has the ability to present technological solutions in a natural way and to adapt them to the concrete needs of the workplace.
Vicky Moreau
Vicky Moreau
Trainer
Vicky Moreau is a passionate freelancer and professional in the area of office automation. She holds a college diploma in office automation, most of her solid experience with the Office Suite was acquired while being an autodidact. In fact, she has successfully completed an MOS (Microsoft Office Specialist) Excel certification.
Francis Ferland-Stevenson
Francis Ferland-Stevenson
Trainer
Francis began as a trainer more than 5 years ago by testing office automation tools designed specifically to met the needs of his colleagues. His calm and his empathy makes him able to adapt his language according to the level of experience of the group. This makes his learnings clear and accessible to anyone. As a trainer, he is therefore attentive to the needs of his students to make sure they meet their objectives and face the challenges.