CompTIA Security+ (SY0-501) Online Course
This course covers everything you need to know to pass your CompTIA Security+ Certification SY0-501 exam. The first goal of the course is to make you a good IT security tech and, in the process, make sure you are ready to pass the CompTIA Security+ exam.
Course Curriculum
Risk Management
- Introduction to the CompTIA Security+ Exam SY0-501
- The CIA of Security
- Threat Actors
- What is Risk?
- Managing Risk
- Using Guides for Risk Assessment
- Security Controls
- Interesting Security Controls
- Defense in Depth
- IT Security Governance
- Security Policies
- Frameworks
- Quantitative Risk Calculations
- Business Impact Analysis
- Organizing Data
- Security Training
- Third Party Agreements
Cryptography
- Cryptography Basics
- Cryptographic Methods
- Symmetric Cryptosystems
- Symmetric Block Modes
- RSA Cryptosystems
- Diffie-Hellman
- PGP/GPG
- Hashing
- HMAC
- Steganography
- Certificates and Trust
- Public Key Infrastructure
- Cryptographic Attacks
Identity and Access Management
- Identification
- Authorization Concepts
- Access Control List
- Password Security
- Linux File Permissions
- Windows File Permissions
- User Account Management
- AAA
- Authentication Methods
- Single Sign-On
Tools of the Trade
- OS Utilities, Part 1
- OS Utilities, Part 2
- Network Scanners
- Protocol Analyzers
- SNMP
- Logs
Securing Individual Systems
- Denial of Service
- Host Threats
- Man-in-the-Middle
- System Resiliency
- RAID
- NAS and SAN
- Physical Hardening
- RFI, EMI and ESD
- Host Hardening
- Data and System Security
- Disk Encryption
- Hardware/Firmware Security
- Secure OS Types
- Securing Peripherals
- Malware
- Analyzing Output
- IDS and IPS
- Automation Strategies
- Data Destruction
The Basic LAN
- LAN Review
- Network Topologies Review
- Network Zone Review
- Network Access Controls
- The Network Firewall
- Proxy Servers
- Honeypots
- Virtual Private Networks
- IPSec
- NIDS/NIPS
- SIEM
Beyond the Basic LAN
- Wireless Review
- Living in Open Networks
- Vulnerabilities with Wireless Access Points
- Cracking 802.11 - WEP
- Cracking 802.11 - WPA
- Cracking 802.11 - WPS
- Wireless Hardening
- Wireless Access Points
- Virtualization Basics
- Virtual Security
- Containers
- IaaS
- PaaS
- SaaS
- Deployment Models
- Static Hosts
- Mobile Connectivity
- Deploying Mobile Devices
- Mobile Enforcement
- Mobile Device Management
- Physical Controls
- HVAC
- Fire Suppression
Secure Protocols
- Secure Applications and Protocols
- Network Models
- Know Your Protocols - TCP/IP
- Know Your Protocols - Applications
- Transport Layer Security (TLS)
- Internet Service Hardening
- Protecting Your Servers
- Secure Code Development
- Secure Deployment Concepts
- Code Quality and Testing
Testing Your Infrastructure
- Vulnerability Scanning Tools
- Vulnerability Scanning Assessment
- Social Engineering Principles
- Social Engineering Attacks
- Attacking Web Sites
- Attacking Applications
- Exploiting a Target
- Vulnerability Impact
Dealing with Incidents
- Incident Response
- Digital Forensics
- Contingency Planning
- Backups