CompTIA Security+ Training

CompTIA SY0-401 Security+

$395.00

In this eLearning course, you will understand the important foundational principles for securing a network and managing risk.

Product Description

The CompTIA Security+ exam covers the most important foundational principles for securing a network and managing risk. Access control, identity management, and cryptography are important topics on the exam, as well as selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities. Security concerns associated with cloud computing, BYOD and SCADA are addressed in the SY0-401 exam.

Course Introduction


1 year subscription


Video lecture: 17 hrs 50 min


Video lecture & study activities: 24 hrs


Exam Preparation

This course will prepare you for the SY0-401 & JK0-018, we guarantee it.

Course Syllabus

Module 1: Networking Terminology
1.1 Course Introduction
1.2 Network Devices Part 1
1.3 Network Devices Part 2
1.4 Networking Cabling
1.5 Networking Addressing Part 1
1.6 Networking Addressing Part 2
1.7 Networking Addressing Part 3
1.8 Networking Addressing Part 4

Module 2: Locking Down Or Network
2.1 Firewalls Part 1
2.2 Firewalls Part 2
2.3 Intrusion Detection Systems
2.4 Network Design
2.5 Securing Devices

Module 3: Wireless
3.1 Wireless Basics Part 1
3.2 Wireless Basics Part 2
3.3 Securing Wireless Part 1
3.4 Securing Wireless Part 2
3.5 Configuring Wireless, Bluetooth And Infrared

Module 4: Intro To Security Terminology
4.1 Goals Of Information Security
4.2 Authentication And Authorization
4.3 Security Principles And Terminology Part 1
4.4 Security Principles And Terminology Part 2

Module 5: Policies And Standards
5.1 Introduction To Security Policies
5.2 Looking At Some Security Policies Part 1
5.3 Looking At Some Security Policies Part 2
5.4 Looking At Some Security Policies Part 3
5.5 Human Resource Policies Part 1
5.6 Human Resource Policies Part 2
5.7 User Education And Awareness Part 1
5.8 User Education And Awareness Part 2

Module 6: Physical Security„„
6.1 Business Location
6.2 Physical Access Controls
6.3 Implementing Environmental Controls

Module 7: Risk Analysis
7.1 Introduction Risk Analysis Part 1
7.2 Introduction Risk Analysis Part 2
7.3 Types Of Risk Analysis
7.4 Risk Mitigation Strategies

Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
8.1 Business Continuity
8.2 Business Impact Analysis
8.3 Disaster Recovery
8.4 Backup And Restore

Module 9: Introduction To Computer Forensics
9.1 Working With Evidence
9.2 Collecting Digital Evidence Part 1
9.3 Collecting Digital Evidence Part 2
9.4 Looking At Incident Response

Module 10: Types Of Attacks
10.1 Social Engineering
10.2 Network Attacks Part 1
10.3 Network Attacks Part 2
10.4 Password And Application Attacks

Module 11: System Security Threats
11.1 Identifying Physical Threats
11.2 Malicious Software Part 1
11.3 Demo
11.4 Malicious Software Part 2
11.5 Threats Against Hardware

Module 12: Security Assessments
12.1 Types Of Assessments
12.2 Penetration Testing

Module 13: Monitoring And Auditing
13.1 Introduction To Monitoring And Monitoring Tools
13.2 Implementing Logging And Auditing

Module 14: Authentication
14.1 Authentication Models
14.2 Authentication Protocols
14.3 Implementing Authentication

Module 15: Access Control
15.1 Introducing Access Control
15.2 Access Control Models
15.3 Implementing Access Control Part 1
15.4 Implementing Access Control Part 2

Module 16: Mitigating Security Threats
„„
16.1 Operating System Hardening
16.2 System Hardening Procedures
16.3 Application Security
16.4 Server Hardening Best Practices Part 1
16.5 Server Hardening Best Practices Part 2

Module 17: Implementing System Security
17.1 Implementing Personal Firewalls And HIDS
17.2 Protecting Against Malware
17.3 Device Security And Data Security Part 1
17.4 Device Security And Data Security Part 2
17.5 Understanding Virtualization And Cloud Computing

Module 18: Cryptography
18.1 Introduction To Cryptography
18.2 Symmetric And Asymmetric Encryption
18.3 Understanding Hashing And Encryption Uses

Module 19: Public Key Infrastructure
19.1 Intro To PKI
19.2 Managing And Implementing PKI
19.3 Course Conclusion


Study Tools

  • Instructor led lectures from professionals with over 15 years of industry expertise.
  • Educational games, flashcards, and quizzes.
  • Social learning: chat with other people taking the same course!
  • Simulation test to make sure you’ll pass the certification exam.
  • Works great on mobile.
  • All Boost eLearning courses include robust features to help you master the material, learn more.


    Amazing phone, email, & chat support

    Support hours
    • Weekday 8:30am – 10pm EST
    • Weekend 12pm – 6pm EST

    Support levels

    • Customer Service: All customer calls, emails or live forum inquiries related to how to use courses, logging in, features, password resets, etc
    • Educational Support: Customer inquiries related to questions involving course content
    • Instructor Support: Customer inquiries above level of educational support department

    Have a question?

    Our salespeople are experts on understanding the courses and certifications you need to advance your career. We’d love to help!

    Contact Sales