CompTIA Security+ Study Guide (SY0-501)

Similar documents
Security+ SY0-501 Study Guide Table of Contents

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

SY CompTIA Security+ Course Outline. SY CompTIA Security+ 31 Oct

WHAT S NEW IN SECURITY+ SY0-401?

IT Foundations Networking Specialist Certification with Exam

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

Network Security

CRN150 Fundamentals of Network Security

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Required Textbook and Materials. Course Objectives. Course Outline

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

BSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.

CompTIA Cybersecurity Analyst+

Network Engineering/Cyber Security I & II

Software Development & Education Center Security+ Certification

Certified Cyber Security Analyst VS-1160

ITSY Information Technology Security Course Syllabus Spring 2018

EC-Council C EH. Certified Ethical Hacker. Program Brochure

CompTIA IT Fundamentals:

Bachelor of Information Technology (Network Security)

CompTIA Security+ Certification

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

Prerequisite: Completion of Computer I, Computer II, and AP Computer Science, as well as a teacher recommendation.

CompTIA Mobility+ Certification

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CompTIA Security+ (Exam SY0-401)

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

COURSE BROCHURE CISA TRAINING

CEH: CERTIFIED ETHICAL HACKER v9

CND Exam Blueprint v2.0

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

CISA Training.

Certified Ethical Hacker V9

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

CyberVista Certify cybervista.net

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

EC-Council C EH. Certified Ethical Hacker. Program Brochure

Descriptions for CIS Classes (Fall 2017)

Certified Ethical Hacker (CEH)

Certified Ethical Hacker

Monfort College of Business Semester Course Syllabus ( ) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

Core Solutions of Microsoft Lync Server 2013 (NI110) 40 Hours

CompTIA Network+ (Exam N10-006)

Standard Course Outline IS 656 Information Systems Security and Assurance

LO N LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) 04 Apr 2018

LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) ( Add-On ) 15 Jul 2018

E-guide Getting your CISSP Certification

How-To Threat Centric NAC Cisco AMP for Endpoints in Cloud and Cisco Identity Service Engine (ISE) Integration using STIX Technology

Core Solutions of Skype for Business 2015

CompTIA A+ Certification

COURSE A ADMINISTERING EXCHANGE SERVER 2016

Certified Cyber Security Specialist

7540 Unit Handbook (Units ) February 2016 (November 2015) Version 1.1 Relating to the following City & Guilds qualifications:

ISM 324: Information Systems Security Spring 2014

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

A: Administering Microsoft Exchange Server 2016

CompTIA A+ Certification ( ) Study Guide Table of Contents

Layer Security White Paper

Course Outline. CISSP - Certified Information Systems Security Professional

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Microsoft Administering Microsoft Exchange Server 2016

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

CompTIA A Course Overview. Course Goals. Syllabus

The GenCyber Program. By Chris Ralph

COURSE OUTLINE: AAdministering Microsoft Exchange Server AAdministering Microsoft Exchange Server 2016

CCISO Blueprint v1. EC-Council

Administering Microsoft Exchange Server 2016

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

CompTIA CASP (Advanced Security Practitioner)

Objectives of the Security Policy Project for the University of Cyprus

Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Program Type: Course Code: Award Type: Objective Areas:

Certified Information Security Manager (CISM) Course Overview

Are we breached? Deloitte's Cyber Threat Hunting

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Certified Information Systems Auditor (CISA)

IT Technician Pathways Course Guide

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Schedule of Maine is IT Offerings: 01/20/ /16/2015 Three Core IT Offerings:

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

CompTIA Network+ Study Guide Table of Contents

Community College of Rhode Island One (1) Week Network + Training Schedule & Syllabus

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Course 831 Certified Ethical Hacker v9

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

UNITS HANDBOOK Unit Handbook (Units ) Relating to the following City & Guilds qualifications:

Prerequisites Using Microsoft Windows 10

OVERVIEW OF SUBJECT REQUIREMENTS

Training for the cyber professionals of tomorrow

Ken Agress, Senior Consultant PlanNet Consulting, LLC.

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

ADMINISTERING MICROSOFT EXCHANGE SERVER 2016

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

Microsoft Azure for AWS Experts

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Syllabus: AIT Information Systems Infrastructure Lifecycle Management

MS-20696: Managing Enterprise Devices and Apps using System Center Configuration Manager

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Transcription:

CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes the following concepts: Risk management, covering CompTIA objectives: 5.2 Summarize business impact analysis concepts 5.3 Explain risk management processes and concepts Book Chapter: Chapter 1 Ancillary Lab 1 Session 2 At the end of this session, students will understand how security is implemented in a workplace environment. This includes the following concepts: Architecture and design, covering CompTIA objective: risk 3.8 Explain how resiliency and automation strategies reduce Risk management, covering CompTIA objectives: 5.1 Explain the importance of policies, plans, and procedures related to organizational security 5.2 Summarize business impact analysis concepts 5.3 Explain risk management processes and concepts

Book Chapter: Chapter 1 Ancillary Lab 2 Session 3 This session describes some of the issues that many security professionals face when dealing with security postures and network monitoring. This includes the following topics: Architecture and design, covering CompTIA objectives: 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides 3.2 Given a scenario, implement secure network architecture concepts Book Chapter: Chapter 2 Ancillary Lab 3 Session 4 This session starts looking at secure systems design. This includes the following topics: Architecture and design, covering CompTIA objectives: 3.3 Given a scenario, implement secure systems design 3.4 Explain the importance of secure staging deployment concepts Book Chapter: Chapter 2 Ancillary Lab 4 Session 5 This session looks at infrastructure and the devices that are used to build and secure it. This session includes the following: Technologies and tools, covering CompTIA objective: 2.1 Install and configure network components, both hardware- and software-based to support organizational security Book Chapter: Chapter 3

Ancillary Lab 5 Session 6 This session concludes the look at infrastructure ways to deal with network issues. This session includes the following: Technologies and tools, covering CompTIA objective: 2.1 Install and configure network components, both hardware- and software-based to support organizational security Book Chapter: Chapter 3 Ancillary Lab 6 Session 7 In this session, students will learn about the basics of access control. This session includes the following: Technologies and tools, covering CompTIA objectives: 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization 2.3 Given a scenario, troubleshoot common security issues 2.4 Given a scenario, analyze and interpret output from security technologies Book Chapter: Chapter 4 Ancillary Lab 7 Session 8 In this session, students continue learning about the basics of access control, authentication, and authorization. This session includes the following: Identity and access Management, including CompTIA objectives: 4.1 Compare and contrast identity and access management concepts 4.2 Given a scenario, install and configure identity and access services

4.3 Given a scenario, implement identity and access management controls Book Chapter: Chapter 4 Ancillary Lab 8 Session 9 In this section, students will learn about wireless network security. Topics include the following: Threats, attacks, and vulnerabilities, covering CompTIA objective: Book Chapter: Chapter 5 Sample Lab 9 Session 10 In this session, students will learn about cloud computing and security issues related with it, including such topics as: Architecture and design, including CompTIA objective: 3.7 Summarize cloud and virtualization concepts Book Chapter: Chapter 6 Sample Lab 10 Session 11 In this session, students will learn about host, data, and application security. Topics covered include the following: Threats, attacks, and vulnerabilities, including CompTIA objectives: 1.3 Explain threat actor types and attributes 1.6 Explain the impact associated with types of vulnerabilities Book Chapter: Chapter 7 Sample Lab 11 Sample Lab 12

Session 12 In this session, students will continue the discussion about host, data, and application security. Topics covered include the following: Architecture and design, including CompTIA objectives: 3.5 Explain the security implications of embedded systems 3.6 Summarize secure application development and deployment concepts Book Chapter: Chapter 7 Sample Lab 13 Session 13 Cryptography is one of the largest parts of communications security. In this chapter, students will learn about different types of attacks that are used to try and break cryptography. Topics include the following: Threats, attacks, and vulnerabilities, covering CompTIA objective: Cryptography and PKI, including CompTIA objective: 6.1 Compare and contrast basic concepts of cryptography Book Chapter: Chapter 8 Sample Lab 14 Session 14 In this session, students will continue learning about cryptography and how it is used. Topics include the following: Cryptography and PKI, including CompTIA objectives: 6.2 Explain cryptography algorithms and their basic characteristics 6.3 Given a scenario, install and configure wireless security settings Book Chapter: Chapter 8 Sample Lab 15

Session 15 In this session, students will finish learning about cryptography and how it is used. Topics include the following: Cryptography and PKI, including CompTIA objectives: 6.3 Given a scenario, install and configure wireless security settings 6.4 Given a scenario, implement public key infrastructure Book Chapter: Chapter 8 Sample Lab 16 Session 16 In this section, students will learn about malware, vulnerabilities, and threats to security. Topics include the following: Threats, attacks, and vulnerabilities, including CompTIA objectives: 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware Book Chapter: Chapter 9 Sample Lab 17 Session 17 In this section, students will continue to learn about malware, vulnerabilities, and threats to security. Topics include the following: Threats, attacks, and vulnerabilities, including CompTIA objectives: 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware Book Chapter: Chapter 9 Sample Lab 18

Session 18 In this section, students will learn about physical security, environmental controls, social engineering, and other foes. Topics include the following: Threats, attacks, and vulnerabilities, covering CompTIA objective: Architecture and design, including CompTIA objective: 3.9 Explain the importance of physical security controls Book Chapter: Chapter 10 Sample Lab 19 Sample Lab 20 Session 19 In this section, students will continue to learn about social engineering and the need for appropriate controls. Topics include the following: Risk management, including CompTIA objectives: 5.7 Compare and contrast various types of controls 5.8 Given a scenario, carry out data security and privacy practices Book Chapter: Chapter 10 Sample Lab 21 Sample Lab 22 Session 20 In this section, students will learn about common security administration issues, policies and procedures. Topics include the following: Technologies and tools, covering CompTIA objective: 2.5 Given a scenario, deploy mobile devices securely Identity and access management, including CompTIA objective:

4.4 Given a scenario, differentiate common account management practices Chapter 11 Sample Lab 23 Session 21 In this section, students will continue to learn about common security administration issues, policies and procedures. Topics include the following: Technologies and tools, covering CompTIA objective: 2.5 Given a scenario, deploy mobile devices securely Identity and access management, including CompTIA objective: 4.4 Given a scenario, differentiate common account management practices Chapter 11 Sample Lab 24 Sample Lab 25 Session 22 In this section, students will discuss disaster recovery and incident response policies and procedures. Topics include the following: Threats, attacks, and vulnerabilities, covering CompTIA objectives: Chapter 12 1.4 Explain penetration testing concepts 1.5 Explain vulnerability scanning concepts Sample Lab 26 Session 23 In this section, students will finish discussing disaster recovery and incident response policies and procedures. Topics include the following: Risk management, covering CompTIA objectives: 5.4 Given a scenario, following incident response procedures

5.5 Summarize basic concepts of forensics 5.6 Explain disaster recovery and continuity of operation concepts Chapter 12 Sample Lab 27 Sample Lab 28 Optional Labs Included in the labs are three optional ones that can be used to round out sessions as needed: Sample Lab 29 Sample Lab 30