CompTIA Security+ Certification Training - SY0-601

Access Duration - 365 Days
4.5( 2 REVIEWS )
110 STUDENTS
£.00
 

What Will I Learn?

Identify vulnerabilities and threats that can cause harm to your network
Learn to identify corrective measures for incident response
Learn to implement cryptographic standards
Understand the fundamentals of organisational security
Learn to implement secure network architecture concepts

Overview

If you wish to have a career in organisational security, the CompTIA Security+ Certification – SY0-601 Training is designed to teach individuals the core fundamentals of cyber-security. There are existential threats that exist in the modern world, and networks and systems are often targeted through malicious attacks. This makes organisations vulnerable and susceptible to harm. This course will provide a wealth of information on how to ensure organisations are safeguarded from such threats.

The CompTIA Security+ Certification Training will offer hands-on training in intrusion detection, troubleshooting networks, threat management, and risk mitigation. You will be able to prepare fully for a role in cyber-security and apply essential skills and knowledge in real-life scenarios.

The CompTIA Security+ Certification Training is a step by step guide on becoming familiar with organisational security, determining the type of attacks, explaining different threats and understanding security concerns. Once you’ve mastered these concepts, you will be able to compare and contrast social engineering techniques successfully. Qualifying in this course will set you in the right direction, giving you the opportunity to open the door to new and exciting job roles in security development.

Why You Should Consider Taking this Course at Global Edulink?

Global Edulink is a leading online provider for several accrediting bodies, and provides learners the opportunity to take this exclusive course awarded by CPD. At Global Edulink, we give our fullest attention to our learners’ needs and ensure they have the necessary information required to proceed with the Course.  Learners who register will be given excellent support, discounts for future purchases and be eligible for a TOTUM Discount card and Student ID card with amazing offers and access to retail stores, the library, cinemas, gym memberships and their favourite restaurants.

  • Access Duration
  • Who is this Course for?
  • Entry Requirement
  • Method of Assessment
  • Certification
  • Awarding Body
  • Career Path & Progression
The course will be directly delivered to you, and you have 12 months access to the online learning platform from the date you joined the course.  The course is self-paced and you can complete it in stages, revisiting the lessons at any time.
This course is recommended for,
  • Systems Administrators
  • Security Consultants
  • Network Administrators
  • Security Engineers
  • Security Specialists
  • Learners should be over the age of 16, and have a basic understanding of English, ICT and numeracy.
  • A sound educational background is recommended
  • Understanding of Linux OS is recommended
In order to qualify in the course ‘CompTIA Security+ Certification Training’ successfully, learners will take an online test with each module being rounded off with multiple-choice questions. This online test is marked automatically, so you will receive an instant grade and know whether you have passed the course.
Upon the successful completion of the course, you will be awarded the CompTIA Security+ Certification Training - SY0-601 by CPD
CPD is a leading awarding body in the United Kingdom that meets an excellent standard of high quality education. CPD is committed towards the enhancement of proficiency and personal skills in order to develop learners’ skills and abilities. CPD ensures that both practical and academic qualifications assist individuals to re-skill or up-skill and maintain a competitive advantage in their chosen industry.
The CompTIA Security+ Certification Training will improve your candidature for a number of jobs in security development.  You can study further courses in the same field and enhance your academic expertise in organisational security, and add this as a valuable skillset on your resume. Your skills will be recognised by leading organisations that give you the opportunity to land a well-paying job as a leading security engineer. Given below are job titles you can compete for, along with the average UK salary per annum according to https://www.glassdoor.com.
  • Systems Administrator - £51,000 (Approximately)
  • Network Administrator - £43,000 (Approximately)
  • Security Consultant - 71,000 (Approximately)

Key Features

Gain an Accredited UK Qualification
Access to Excellent Quality Study Materials
Personalised Learning Experience
Support by Phone, Live Chat, and Email
Eligible for TOTUM Discount Card
UK Register of Learning Providers Reg No : 10053842

Course Curriculum

1: Threats, Attacks, and Vulnerabilities
Security Policy
Threat Actors
Social Engineering 
Phishing & Types of Malware 
Trojans and Spyware 
Security Control Types 
Defence in Depth 
Frameworks and Compliance 
Vulnerability Scanning and Pen Tests 
Security Assessment Techniques 
Pen Testing Concepts
Vulnerability Scanning Concepts 
Exploitation Frameworks
2: Security Posture & Incident Response
Topology & Service Discovery
Packet Capture Tools 
Remote Access Trojans
Honeypots and Honeynets
Incident Response Procedures 
Preparation Phase 
Identification Phase 
Containment Phase 
Eradication and Recovery Phases
3: Cryptography & PKI
Cryptographic Terminology and Ciphers 
Cryptographic Products 
Hashing Algorithms 
Symmetric Algorithms
Asymmetric Algorithms 
Diffie-Hellman and Elliptic Curve 
Transport Encryption 
Cryptographic Attacks
PKI Standards 
Digital Certificates 
Certificate Authorities 
Types of Certificate 
Implementing PKI 
Storing and Distributing Keys 
Key Status and Revocation 
PKI Trust Models 
PGP / GPG
4: Identity and Access Management
Access Control Systems 
Identification & Authentication 
LAN Manager / NTLM 
Kerberos 
PAP, CHAP, and MS-CHAP
Password Attacks
Token-based & Biometric Authentication 
Common Access Card 
Authorization 
Directory Services 
RADIUS and TACACS+ 
Federation and Trusts 
Federated Identity Protocols
Formal Access Control Models 
Account Types 
Windows Active Directory 
Creating and Managing Accounts 
Account Policy Enforcement 
Credential Management Policies 
Account Restrictions 
Accounting and Auditing 
5: Secure Network Architecture and Design
Network Zones and Segments 
Subnetting 
Switching Infrastructure 
Switching Attacks and Hardening 
Endpoint Security 
Network Access Control 
Routing Infrastructure 
Network Address Translation 
Software Defined Networking
Basic & Stateful Firewalls 
Implementing a Firewall or Gateway 
Web Application Firewalls 
Proxies and Gateways 
Denial of Service Attacks
Load Balancers
6: Secure Wireless Access & System Design
Wireless LANs 
WEP and WPA 
Wi-Fi Authentication 
Extensible Authentication Protocol 
Wi-Fi Site Security 
Personal Area Networks 
Trusted Computing 
Hardware / Firmware Security 
Peripheral Device Security 
Secure Configurations 
OS Hardening 
Patch Management 
Embedded Systems 
Security for Embedded System
7: Secure Protocols and Services
DHCP Security 
DNS Security 
Network Management Protocols 
HTTP and Web Servers 
SSL / TLS and HTTPS 
Web Security Gateways 
Email Services 
S/MIME 
File Transfer 
Voice and Video Services 
Voice over IP (VoIP)
Remote Access Architecture 
Virtual Private Networks 
IPsec and IKE 
Remote Access Servers 
Remote Administration Tools 
Hardening Remote Access Infrastructure
8: Mobile & Cloud Security
Mobile Device Deployments
Mobile Connection Methods 
Mobile Access Control Systems 
Enforcement and Monitoring
Virtualization Technologies 
Virtualization Security Best Practices 
Cloud Computing 
Cloud Security Best Practices
Site Layout and Access 
Gateways and Locks
Alarm Systems 
Surveillance 
Hardware Security 
Environmental Controls
9: Risk Management & Secure Application Development
Business Impact Analysis 
Identification of Critical Systems 
Risk Assessment 
Risk Mitigation 
Application Vulnerabilities 
Application Exploits 
Web Browser Exploits 
Secure Application Design 
Secure Coding Concepts 
Auditing Applications 
Secure DevOps
10: Organisational Security & Digital Forensics
Continuity of Operations Planning 
Disaster Recovery Planning 
Resiliency Strategies 
Recovery Sites 
Backup Plans and Policies 
Resiliency and Automation Strategies
Corporate Security Policy 
Personnel Management Policies 
Interoperability Agreements 
Data Roles 
Data Sensitivity Labeling and Handling 
Data Wiping and Disposal 
Privacy and Employee Conduct Policies 
Security Policy Training
Forensic Procedures 
Collecting Evidence 
Capturing System Images 
Handling and Analyzing Evidence

Students feedback

4.5

Average rating (2)
4.5
5 Star
4 Star
3 Star
2 Star
1 Star
    G H

    Gene Hudson

    January 13, 2021
    Excellent course

    This course was excellent and completely focused on network security and risk management.

    R G

    Rory Gardner

    December 30, 2020
    Great service

    Thank you for the good customer support provided to me. It was very helpful.

£.00
WhatsApp chat