CompTIA Security+ SY0-701 IT Security - eLearning (exam included)
Description
CompTIA Security+ SY0-701 IT Security - eLearning (exam included)
Program Overview
CompTIA Security+ 701 is a globally trusted certification that validates foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification training covers network security and risk management principles.
Program Features
- 32 hours of instructor-led learning
- Covers six domains required to become an IT security professional
- Industry-recognized course completion certificate
- Hands-on based learning
- Exam Voucher Included
Delivery Mode
Live Virtual Classroom
Prerequisites:
There are no specific prerequisites to take up this certificatio…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
CompTIA Security+ SY0-701 IT Security - eLearning (exam included)
Program Overview
CompTIA Security+ 701 is a globally trusted certification that validates foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification training covers network security and risk management principles.
Program Features
- 32 hours of instructor-led learning
- Covers six domains required to become an IT security professional
- Industry-recognized course completion certificate
- Hands-on based learning
- Exam Voucher Included
Delivery Mode
Live Virtual Classroom
Prerequisites:
There are no specific prerequisites to take up this certification, but it is recommended that individuals take the Network+ certification before taking the CompTIA Security+ 701 training and certification exam.
Target Audience:
The CompTIA Security+ 701 course is ideal for professionals working as system administrators, network administrators, security administrators, and IT auditors.
Key Learning Outcomes:
By the end of this online CompTIA Security+ training, you will be able to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
- Identify, analyze, and respond to security events and incidents
Course Curriculum:
Lesson 01 - Attacks, Threats, and Vulnerabilities
Comparing Security Roles and Controls
- Compare and Contrast Information Security Roles
- Compare and Contrast Security Control and Framework Types
- Q&A with Knowledge Checks
Threat Actors and Threat
- Threat Actor Types and Attack Vectors
- Threat Intelligence Sources
- Q&A with Knowledge Checks
Performing Security Assessments
- Assess Organizational Security with Network Reconnaissance Tools
- Security Concerns with General Vulnerability Types
- Vulnerability Scanning Techniques
- Penetration Testing Concepts
- Q&A with Knowledge Checks
Identifying Social Engineering and Malware
- Compare and Contrast Social Engineering Techniques.
- Analyze Indicators of Malware-Based Attacks
- Q&A with Knowledge Checks
Lesson 02 - Architecture and Design
Summarizing Basic Cryptographic Concepts
- Compare and Contrast Cryptographic Ciphers
- Summarize Cryptographic Modes of Operation
- Summarize Cryptographic Use Cases and Weaknesses
- Summarize Other Cryptographic Technologies
- Q&A with Knowledge Checks
Implementing Public Key Infrastructure
- Certificates and Certificate Authorities
- PKI Management
- Q&A with Knowledge Checks
Implementing Authentication Controls
- Authentication Design Concepts
- Knowledge-Based Authentication
- Authentication Technologies
- Biometrics Authentication Concepts
- Q&A with Knowledge Checks
Implementing Identity and Account Management Controls
- Identity and Account Types
- Account Policies
- Authorization Solutions
- Importance of Personnel Policies
- Q&A with Knowledge Checks
Lesson 03 - Implementation
Implementing Secure Network Designs
- Secure Network Designs
- Secure Switching and Routing
- Secure Wireless Infrastructure
- Load Balancers
- Q&A with Knowledge Checks
Implementing Network Security Appliances
- Firewalls and Proxy Servers
- Network Security Monitoring
- Use of SIEM
- Q&A with Knowledge Checks
Implementing Secure Network Protocols
- Secure Network Operations Protocols
- Secure Application Protocols
- Secure Remote Access Protocols
- Q&A with Knowledge Checks
Implementing Host Security Solutions
- Secure Firmware
- Endpoint Security
- Embedded System Security Implications
- Q&A with Knowledge Checks
Implementing Secure Mobile Solutions
- Mobile Device Management
- Secure Mobile Device Connections
- Q&A with Knowledge Checks
Lesson 04 - Operations and Incident Response
Secure Application Concepts
- Analyze Indicators of Application Attacks
- Analyze Indicators of Web Application Attacks
- Secure Coding Practices
- Secure Script Environments
- Deployment and Automation Concepts
- Q&A with Knowledge Checks
Implementing Secure Cloud Solutions
- Secure Cloud and Virtualization Services
- Apply Cloud Security Solutions
- Infrastructure as Code Concepts
- Q&A with Knowledge Checks
Explaining Data Privacy and Protection Concepts
- Privacy and Data Sensitivity Concepts
- Privacy and Data Protection Controls
- Q&A with Knowledge Checks
Performing Incident Response
- Incident Response Procedures
- Utilize Appropriate Data Sources for Incident Response
- Apply Mitigation Controls
- Q&A with Knowledge Checks
Explaining Digital Forensics
- Key Aspects of Digital Forensics Documentation
- Key Aspects of Digital Forensics Evidence Acquisition
- Q&A with Knowledge Checks
Lesson 05 - Governance, Risk, and Compliance
Summarizing Risk Management Concepts
- Risk Management Processes and Concepts
- Business Impact Analysis Concepts
- Q&A with Knowledge Checks
Implementing Cybersecurity Resilience
- Redundancy Strategies
- Backup Strategies
- Cybersecurity Resilience Strategies
- Q&A with Knowledge Checks
Explaining Physical Security
- Importance of Physical Site Security Controls
- Importance of Physical Host Security Controls
- Q&A with Knowledge Checks
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.