Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Similar documents
Security+ SY0-501 Study Guide Table of Contents

CompTIA Cybersecurity Analyst+

Course overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038)

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G186eng v036)

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G186eng v036)

Course overview CompTIA A Official Study Guide

CompTIA Security+ Study Guide (SY0-501)

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

CompTIA Security+ (Exam SY0-401)

Software Development & Education Center Security+ Certification

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

IT Foundations Networking Specialist Certification with Exam

CompTIA Security+ Certification

CompTIA Network+ Study Guide Table of Contents

Syllabus: The syllabus is broadly structured as follows:

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

CompTIA Mobility+ Certification

Required Textbook and Materials. Course Objectives. Course Outline

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Learn about the Fundamental building blocks that go into building a Windows Server infrastructure with Windows Server 2012.

CompTIA Network+ (Exam N10-006)

Course Outline. CISSP - Certified Information Systems Security Professional

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Instructor PIERRE A. COLOMBEL II, M.S, CISSP-ISSAP, CEH, CIH, CHFI, LPT, PMP, MCT, Network+ & 30 more

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

E-guide Getting your CISSP Certification

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

Implementing Cisco Network Security (IINS) 3.0

Ethical Hacking and Prevention

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Understanding Cisco Cybersecurity Fundamentals

CCISO Blueprint v1. EC-Council

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Course 831 Certified Ethical Hacker v9

Advanced Diploma on Information Security

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

CompTIA A+ Accelerated course for & exams

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

CompTIA CSA+ Cybersecurity Analyst

EC-Council C EH. Certified Ethical Hacker. Program Brochure

CND Exam Blueprint v2.0

SY

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

Certified Cyber Security Analyst VS-1160

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Implementing Cisco Cybersecurity Operations

CompTIA Network+ N10-005

CompTIA Security+(2008 Edition) Exam

Pearson CISSP Lab. Course Outline. Pearson CISSP Lab. 05 Apr

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

CompTIA IT Fundamentals:

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

SY CompTIA Security+ Course Outline. SY CompTIA Security+ 31 Oct

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure

DIABLO VALLEY COLLEGE CATALOG

Ingram Micro Cyber Security Portfolio

CompTIA JK CompTIA Academic/E2C Security+ Certification. Download Full Version :

CyberVista Certify cybervista.net

Microsoft Certified System Engineer

Network Security

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

CompTIA E2C Security+ (2008 Edition) Exam Exam.

Networking Fundamentals Training

Certified Ethical Hacker (CEH)

Security+ CompTIA Certification Boot Camp

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

SECURITY & PRIVACY DOCUMENTATION

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1.

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Strategic Infrastructure Security

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Training for the cyber professionals of tomorrow

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

Mobility+ Computing Deployment and Management. Course Outline. Mobility+ Computing Deployment and Management. 07 Apr

K12 Cybersecurity Roadmap

The GenCyber Program. By Chris Ralph

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

CompTIA CASP (Advanced Security Practitioner)

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

CCNA Cybersecurity Operations. Program Overview

The Common Controls Framework BY ADOBE

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

CIT 480: Securing Computer Systems. Putting It All Together

Audience(s) : IT Professionals Level : 300 Technology : Microsoft System Center Configuration Manager Delivery Method : Instructor-led (Classroom)

Security by Default: Enabling Transformation Through Cyber Resilience

Designing Windows Server 2008 Network and Applications Infrastructure

Transcription:

Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience whose job role is focused on system security. The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. CompTIA Security+ Syllabus Courseware with Integrated Learning from Professor Messer Professor Messer has long been a web hero for CompTIA certification students. For many years, Professor Messer has provided video-based training courses for CompTIA certifications. With professionally-produced lessons covering the full exam objectives and online forums, Professor Messer is a trusted online source for exam information. Now, gtslearning has partnered with Professor Messer to take this learning to a new level. You will be able to study from the gtslearning courseware and link to the appropriate training video (by QR code, hyperlink or typing short URL) for further explanation. Equally, a student studying from the Professor Messer video course will be able to easily follow his video presentations using the same CompTIA CAQC Official courseware. Certification track This courseware bears the seal of CompTIA Approved Quality Content. This seal signifies this content covers 100% of the exam objectives and implements important instructional design principles. CompTIA recommends multiple learning tools to help increase coverage of the learning objectives. The contents of this training material were created for the CompTIA Security+ Certification SY0-501 exam covering the 2017 Edition certification exam objectives.

Target audience and course prerequisites CompTIA Security+ is aimed at IT professionals with job roles such as security engineer, security consultant / specialist, information assurance technician, junior auditor / penetration tester, security administrator, systems administrator, and network administrator. To get started with this course, you should have successfully completed gtslearning's "CompTIA Network+ Study Guide" course and obtained Network+ certification, and / or have around 24 months' experience of networking support or IT administration. It is not necessary that you pass the Network+ exam before completing Security+ certification, but it is recommended. Specifically, it is recommended that you have the following skills and knowledge before starting this course: Know the function and basic features of the components of a PC. Use Windows Server OS to create and manage files and use basic administrative features (Explorer, Control Panel, Server Manager, and Management Consoles). Operate the Linux OS using basic command-line tools. Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers). Understand TCP/IP addressing, core protocols, and troubleshooting tools. Course outcomes This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation. It will prepare you to take the CompTIA Security+ SY0-501 exam by providing 100% coverage of the objectives and content examples listed on the syllabus. Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, such as CompTIA Cybersecurity Analyst (CSA)+, CompTIA Advanced Security Practitioner (CASP), and ISC s CISSP (Certified Information Systems Security Professional). On course completion, you will be able to: Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them. Understand the principles of organizational security and the elements of effective security policies. Know the technologies and uses of cryptographic standards and products. Install and configure network- and host-based security technologies. Describe how wireless and remote access security is enforced. Describe the standards and products used to enforce security on web and communications technologies. Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery. Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.

Course contents The course consists of a study volume, containing indexed notes and review questions, plus exam objectives mapping, exam information, and a comprehensive glossary. The course also comes with an online practice exam, pre-requisites test, and pre-/post-unit assessment tests. An instructor edition of the course is available with margin notes and tips for the trainer. Access to course resources (setup guides and data, PowerPoint slides, timetables, and extra exam information) on gtslearning's trainer portal is also available, subject to meeting minimum order requirements. Hosted versions of the classroom labs and self-paced labs to accompany the course are also available. Module 1 / Threats, Attacks, and Vulnerabilities Indicators of Compromise Why is Security Important? Security Policy Threat Actor Types The Kill Chain Social Engineering Phishing Malware Types Trojans and Spyware Open Source Intelligence Labs VM Orientation Malware Types Critical Security Controls Security Control Types Defense in Depth Frameworks and Compliance Vulnerability Scanning and Pen Tests Security Assessment Techniques Pen Testing Concepts Vulnerability Scanning Concepts Exploit Frameworks Lab Using Vulnerability Assessment Tools Security Posture Assessment Tools Topology Discovery Service Discovery Packet Capture Packet Capture Tools Remote Access Trojans Honeypots and Honeynets Labs Using Network Scanning Tools 1 Using Network Scanning Tools 2 Using Steganography Tools Incident Response Incident Response Procedures Preparation Phase Identification Phase Containment Phase Eradication and Recovery Phases Module 2 / Identity and Access Management Cryptography Uses of Cryptography Cryptographic Terminology and Ciphers Cryptographic Products Hashing Algorithms Symmetric Algorithms Asymmetric Algorithms Diffie-Hellman and Elliptic Curve Transport Encryption Cryptographic Attacks Lab Implementing Public Key Infrastructure Public Key Infrastructure PKI Standards Digital Certificates Certificate Authorities Types of Certificate Implementing PKI Storing and Distributing Keys Key Status and Revocation PKI Trust Models PGP / GPG Lab Deploying Certificates and Implementing Key Recovery Identification and Authentication Access Control Systems Identification Authentication LAN Manager / NTLM Kerberos PAP, CHAP, and MS-CHAP Password Attacks Token-based Authentication Biometric Authentication Common Access Card Lab Using Password Cracking Tools Identity and Access Services Authorization Directory Services RADIUS and TACACS+ Federation and Trusts Federated Identity Protocols

Account Management Formal Access Control Models Account Types Windows Active Directory Creating and Managing Accounts Account Policy Enforcement Credential Management Policies Account Restrictions Accounting and Auditing Lab Using Account Management Tools Module 3 / Architecture and Design (1) Secure Network Design Network Zones and Segments Subnetting Switching Infrastructure Switching Attacks and Hardening Endpoint Security Network Access Control Routing Infrastructure Network Address Translation Software Defined Networking Lab Implementing a Secure Network Design Firewalls and Load Balancers Basic Firewalls Stateful Firewalls Implementing a Firewall or Gateway Web Application Firewalls Proxies and Gateways Denial of Service Attacks Load Balancers Lab Implementing a Firewall IDS and SIEM Intrusion Detection Systems Configuring IDS Log Review and SIEM Data Loss Prevention Malware and Intrusion Response Lab Using an Intrusion Detection System Secure Wireless Access Wireless LANs WEP and WPA Wi-Fi Authentication Extensible Authentication Protocol Additional Wi-Fi Security Settings Wi-Fi Site Security Personal Area Networks Physical Security Controls Site Layout and Access Gateways and Locks Alarm Systems Surveillance Hardware Security Environmental Controls Module 4 / Architecture and Design (2) Secure Protocols and Services DHCP Security DNS Security Network Management Protocols HTTP and Web Servers SSL / TSL and HTTPS Web Security Gateways Email Services S/MIME File Transfer Voice and Video Services VoIP Labs Implementing Secure Network Addressing Services Configuring a Secure Email Service Secure Remote Access Remote Access Architecture Virtual Private Networks IPSec Remote Access Servers Remote Administration Tools Hardening Remote Access Infrastructure Lab Implementing a Virtual Private Network Secure Systems Design Trusted Computing Hardware / Firmware Security Peripheral Device Security Secure Configurations OS Hardening Patch Management Embedded Systems Security for Embedded Systems Secure Mobile Device Services Mobile Device Deployments Mobile Connection Methods Mobile Access Control Systems Enforcement and Monitoring Secure Virtualization and Cloud Services Virtualization Technologies Virtualization Security Best Practices Cloud Computing Cloud Security Best Practices

Module 5 / Risk Management Forensics Forensic Procedures Collecting Evidence Capturing System Images Handling and Analyzing Evidence Lab Using Forensic Tools Disaster Recovery and Resiliency Continuity of Operations Plans Disaster Recovery Planning Resiliency Strategies Recovery Sites Backup Plans and Policies Resiliency and Automation Strategies Risk Management Business Impact Analysis Identification of Critical Systems Risk Assessment Risk Mitigation Secure Application Development Application Vulnerabilities Application Exploits Web Browser Exploits Secure Application Design Secure Coding Concepts Auditing Applications Secure DevOps Lab Identifying a Man-in-the-Browser Attack Organizational Security Corporate Security Policy Personnel Management Policies Interoperability Agreements Data Roles Data Sensitivity Labeling and Handling Data Wiping and Disposal Privacy and Employee Conduct Policies Security Policy Training Ó gtslearning 1998-2017. All rights reserved. All trademarks are the property of their respective owners.