Overview
CompTIA SY0-701, your gateway to a career in information security, enhances your knowledge in areas like cryptography, security infrastructure, and incident response and validates your skills and knowledge needed to secure computer networks and devices.
About the course
The CompTIA Security+ Certification Prep (Exam SY0-701) course provides a thorough foundation in security concepts, threat mitigation, and incident response. This CompTIA Security+ training covers key areas such as security operations, architecture, and vulnerability management. You'll learn to apply security techniques, manage risk, and ensure compliance. Designed for IT professionals, this security plus certification course prepares you to handle modern security challenges. Enroll in this SY0-701 course to advance your cybersecurity skills.
Course Objectives
- Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
- Implement secure network architecture concepts and systems design
- Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security
- Install and configure identity and access services, as well as management controls
- Implement and summarize risk management best practices and the business impact
- Install and configure wireless security settings and implement public key infrastructure
Upcoming Schedules
Date | Time | Enroll | |
---|---|---|---|
Nov 18 - Nov 22, 2024 | 9:00 AM - 5:00 PM CST |
GTR
|
|
Dec 16 - Dec 20, 2024 | 9:00 AM - 5:00 PM CST |
GTR
|
|
Jan 13 - Jan 17, 2025 | 9:00 AM - 5:00 PM CST | ||
Feb 10 - Feb 14, 2025 | 9:00 AM - 5:00 PM CST |
Exams and Certifications
SY0-701: CompTIA Security+ Exam
CompTIA Security+ Certification
Who should attend
- Security Administrator
- Network Administrator
- Security Consultant
Course Outline
General Security Concepts
- Compare and contrast various types of security controls.
- Summarize fundamental security concepts.
- Explain the importance of change management processes and the impact to security.
- Explain the importance of using appropriate cryptographic solutions.
Security Operations
Security Architecture
Threats, Vulnerabilities, and Mitigations
Security Program Management and Oversight
Training solutions
Resources
Course content
Course Outline
General Security Concepts
- Compare and contrast various types of security controls.
- Summarize fundamental security concepts.
- Explain the importance of change management processes and the impact to security.
- Explain the importance of using appropriate cryptographic solutions.
Security Operations
- Given a scenario, apply common security techniques to computing resources.
- Explain the security implications of proper hardware, software, and data asset management.
- Explain various activities associated with vulnerability management.
- Explain security alerting and monitoring concepts and tools.
- Given a scenario, modify enterprise capabilities to enhance security.
- Given a scenario, implement and maintain identity and access management.
- Explain the importance of automation and orchestration related to secure operations.
- Explain appropriate incident response activities.
- Given a scenario, use data sources to support an investigation.
Security Architecture
- Compare and contrast security implications of different architecture models.
- Given a scenario, apply security principles to secure enterprise infrastructure.
- Compare and contrast concepts and strategies to protect data.
- Explain the importance of resilience and recovery in security architecture.
Threats, Vulnerabilities, and Mitigations
- Compare and contrast common threat actors and motivations.
- Explain common threat vectors and attack surfaces.
- Explain various types of vulnerabilities.
- Given a scenario, analyze indicators of malicious activity.
- Explain the purpose of mitigation techniques used to secure the enterprise.
Security Program Management and Oversight
- Summarize elements of effective security governance.
- Explain elements of the risk management process
- Explain the processes associated with third-party risk assessment and management.
- Summarize elements of effective security compliance.
- Explain types and purposes of audits and assessments.
- Given a scenario, implement security awareness practices.