CompTIA Security+ (SY0-601)

This Course Includes:

Gain hands-on experience to pass the CompTIA Security+ certification exam with the CompTIA Security+ (SY0-601) course and lab. Interactive chapters and hands-on labs comprehensively cover the SY0-601 exam objectives and provide knowledge in areas such as security concepts, operating systems and application systems.

The CompTIA¬†Security+ study guide will help you get a full understanding of the challenges you’ll face as a security professional.

Here’s what you will get

The CompTIA Security+ SY0-601 exam verifies that a candidate can assess an enterprise’s security posture and recommend and implement appropriate security solutions; monitor and secure hybrid environments, such as cloud, mobile, and IoT; and operate with an understanding of applicable laws and policies, such as governance, risk, and compliance.

Lessons 1: Introduction

  • The Security+ Exam
  • What Does This Course Cover?
  • Exam SY0-601 Exam Objectives
  • SY0-601 Certification Exam Objective Map

Lessons 2: Today's Security Professional

  • Cybersecurity Objectives
  • Data Breach Risks
  • Implementing Security Controls
  • Data Protection
  • Summary
  • Exam Essentials

Lessons 3: Cybersecurity Threat Landscape

  • Exploring Cybersecurity Threats
  • Threat Data and Intelligence
  • Summary
  • Exam Essentials

Lessons 4: Malicious Code

  • Malware
  • Malicious Code
  • Adversarial Artificial Intelligence
  • Summary
  • Exam Essentials

Lessons 5: Social Engineering, Physical, and Password Attacks

  • Social Engineering
  • Password Attacks
  • Physical Attacks
  • Summary
  • Exam Essentials

Lessons 6: Security Assessment and Testing

  • Vulnerability Management
  • Security Vulnerabilities
  • Penetration Testing
  • Training and Exercises
  • Summary
  • Exam Essentials

Lessons 7: Secure Coding

  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Injection Vulnerabilities
  • Exploiting Authentication Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Application Security Controls
  • Secure Coding Practices
  • Summary
  • Exam Essentials

Lessons 8: Cryptography and the Public Key Infrastructure

  • An Overview of Cryptography
  • Goals of Cryptography
  • Cryptographic Concepts
  • Modern Cryptography
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Cryptographic Attacks
  • Emerging Issues in Cryptography
  • Summary
  • Exam Essentials

Lessons 9: Identity and Access Management

  • Identity
  • Authentication and Authorisation
  • Authentication Methods
  • Accounts
  • Access Control Schemes
  • Summary
  • Exam Essentials

Lessons 10: Resilience and Physical Security

  • Building Cybersecurity Resilience
  • Response and Recovery Controls
  • Physical Security Controls
  • Summary
  • Exam Essentials

Lessons 11: Cloud and Virtualisation Security

  • Exploring the Cloud
  • Virtualisation
  • Cloud Infrastructure Components
  • Cloud Security Issues
  • Cloud Security Controls
  • Summary
  • Exam Essentials

Lessons 12: Endpoint Security

  • Protecting Endpoints
  • Service Hardening
  • Operating System Hardening
  • Securing Embedded and Specialized Systems
  • Summary
  • Exam Essentials

Lessons 13: Network Security

  • Designing Secure Networks
  • Secure Protocols
  • Attacking and Assessing Networks
  • Network Reconnaissance and Discovery Tools and Techniques
  • Summary
  • Exam Essentials

Lessons 14: Wireless and Mobile Security

  • Building Secure Wireless Networks
  • Managing Secure Mobile Devices
  • Summary
  • Exam Essentials

Lessons 15: Incident Response

  • Incident Response
  • Incident Response Data and Tools
  • Mitigation and Recovery
  • Summary
  • Exam Essentials

Lessons 16: Digital Forensics

  • Digital Forensic Concepts
  • Conducting Digital Forensics
  • Reporting
  • Digital Forensics and Intelligence
  • Summary
  • Exam Essentials

Lessons 17: Security Policies, Standards, and Compliance

  • Understanding Policy Documents
  • Personnel Management
  • Third-Party Risk Management
  • Complying with Laws and Regulations
  • Adopting Standard Frameworks
  • Security Control Verification and Quality Control
  • Summary
  • Exam Essentials

Lessons 18: Risk Management and Privacy

  • Analysing Risk
  • Managing Risk
  • Risk Analysis
  • Disaster Recovery Planning
  • Privacy
  • Summary
  • Exam Essentials

Hands-on LAB Activities

Malicious Code

  • Identifying Virus Threats
  • Detecting Rootkits

Social Engineering, Physical, and Password Attacks

  • Using Social Engineering Techniques to Plan an Attack
  • Cracking a Linux Password Using John the Ripper

Security Assessment and Testing

  • Conducting Vulnerability Scanning Using Nessus

Secure Coding

  • Exploiting a Website Using SQL Injection
  • Conducting a Cross-Site Request Forgery Attack
  • Attacking a Website Using XSS Injection
  • Defending Against a Buffer Overflow Attack

Cryptography and the Public Key Infrastructure

  • Performing Symmetric Encryption
  • Examining Asymmetric Encryption
  • Observing an SHA-Generated Hash Value
  • Observing an MD5-Generated Hash Value
  • Examining PKI Certificates
  • Using Rainbow Tables

Identity and Access Management

  • Examining Kerberos settings
  • Installing a RADIUS Server

Resilience and Physical Security

  • Configuring RAID 5

Endpoint Security

  • Using the chmod Command
  • Examining File Manipulation Commands

Network Security

  • Configuring a Standard ACL
  • Implementing Port Security
  • Configuring a BPDU Guard on a Switch Port
  • Configuring VLANs
  • Using Windows Firewall
  • Performing ARP Poisoning
  • Using the ifconfig Command
  • Using the traceroute Command
  • Capturing Packets Using Wireshark
  • Performing Reconnaissance on a Network
  • Using the theHarvester Tool to Gather Information about a Victim
  • Using the hping Program
  • Using Reconnaissance Tools

Incident Response

  • Viewing Linux event logs
  • Using Event Viewer
  • Making Syslog Entries Readable

Digital Forensics

  • Using FTK Imager

Security Policies, Standards, and Compliance

  • Configuring a Password Policy

Exam FAQs

CompTIA Network+ and two years of experience in IT administration with a focus on security.

GBP £370

Pearson VUE



CompTIA Security+


18+ Lessons

Delivery Method:




Scroll to Top