CompTIA Security+ SYO-501

CompTIA Security+ SYO-501

CompTIA Security+ (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. 2KO Africa offers IT consulting, technical IT services and top-of-the-range IT training on multiple platforms. Our best-of-breed computer courses are presented as instructor led classes or as online internet-based elearning.

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management - making it an important stepping stone of an IT security career. CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents - not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

 

Course Objectives
Provide operational, information, application and infrastructure level security
Secure the network to maintain availability, integrity, and confidentiality of critical information
Operate within a set of rules, policies, and regulations wherever applicable
Comprehend Risk identification and mitigation

Prerequisites
IT security professionals with a minimum of two years' experience in IT administration with a focus on security; users with basic day-to-day technical information security experience; those interested in gaining a broader and deeper knowledge of security concerns and implementation; and learners preparing for the Security+ SY0-501 exam
 

To buy a course now using Credit Card, click the icon below

credit-cards-accepted 


Course Content
Threats Attacks And Vulnerabilities

Overview
Determining Types Of Malware
Determining Types Of Malware Part 2
Types Of Attacks
Types Of Attacks Part 2
Overview
Determining Types Of Malware
Determining Types Of Malware Part 2
Types Of Attacks
Types Of Attacks Part 2
Types Of Attacks Part 3
Types Of Attacks Part 4
Threat Vector Types And Attributes
Penetration Testing Concepts
Vulnerability Scanning Concepts
Impact Of Various Vulnerabilities
Impact Of Various Vulnerabilities Part 2

Technologies And Tools
Hardware Software Organizational Security
Hardware Software Organizational Security Part 2
Hardware Software Organizational Security Part 3
Hardware Software Organizational Security Part 4
Security Posture Assessment
Security Posture Assessment Part 2
Security Posture Assessment Part 3
Security Posture Assessment Part 4
Troubleshoot Common Security Issues

Architecture And Design
Best Practices And Secure Config Guides
Secure Network Architecture Concepts
Secure System Design
Secure Staging Deployment Concepts
Security Implications Of Embedded Systems
Secure App Development And Deployment
Cloud And Virtualization Concepts
Cloud And Virtalization Concepts Part 2
Resiliency And Automation To Reduce Risk
Importance Of Physical Security

Identity And Access Management
Identity And Access Management Concepts
Identity And Access Services
Identity And Access Management Controls
Identity And Access Management Controls Part 2
Account Management Practices
Account Management Practices Part 2

Risk Management
Policies, Plans And Procedures
Impact Business Analysis
Risk Management Processes And Concepts
Incident Response Procedures
Basic Concepts Of Forensics
Disaster Recovery And Business Continuity
Disaster Recovery And Business Continuity Part 2
Data Security And Privacy
Public Key Infrastructure Part 2

Cryptography And Pki
Basic Concepts Of Cryptography
Basic Concepts Of Cryptography Part 2
Cryptography Algorithms Basics
Cryptography Algorithms Basics Part 2
Cryptography Algorithms Basics Part 3
Wireless Security
Public Key Infrastructure
Public Key Infrastructure Part 3
Public Key Infrastructure Part 4

 

Details about this course
Over 28 hours of learning
Includes video, presentations, workbooks, quizzes, flashcards & games
Receive a Certificate of Excellence on successful completion
Presented by highly qualified, industry leading experts
12 Months access (Unless indicated otherwise)