SY0-601

CompTIA Security+ Training

CompTIA Security+ (SY0-601) is today's most popular cybersecurity certification! This course teaches attendees how to configure, manage, and troubleshoot common wired and wireless networks to teach you everything you need to know to pass the exams.
Course Details

Duration

57 hours

Target Audience

This course is designed for secure administrators, systems administrators, help desk managers and analysts, security engineers and analysts, IT auditors, IT project managers, DevOps/Software Developers, network or cloud engineers, or anyone who is trying to get a better understanding of the concepts involved in cybersecurity and its associated toolsets.

Skills Gained

  • Assess the security posture of an enterprise environment and recommend/implement appropriate security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
  • Identify, analyze, and respond to security events and incidents
Dion Training is partnering with WebAge to provide training for CompTIA certifications. All Dion Training students benefit from a 100% Pass Guarantee. We are confident that you are going to learn everything you need to know to pass your CompTIA certification upon completion of our courses. Therefore, if you take the exam within 60 days of registering for and completing our course and do not pass, simply send us your test score and your course completion letter and we will pay for your exam retake.
Course Outline
  • Introduction
  • Overview of Security
  • Malware
  • Malware Infections
  • Security Applications and Devices
  • Mobile Device Security
  • Hardening
  • Supply Chain Management
  • Virtualization
  • Application Security
  • Secure Software Development
  • Network Design
  • Perimeter Security
  • Cloud Security
  • Automation
  • Network Attacks
  • Securing Networks
  • Physical Security
  • Facilities Security
  • Authentication
  • Access Control
  • Risk Assessments
  • Vulnerability Management
  • Monitoring and Auditing
  • Cryptography
  • Hashing
  • Public Key Infrastructure
  • Security Protocols
  • Planning for the Worst
  • Social Engineering
  • Policies and Procedures
  • Incident Response and Forensics
  • Conclusion
  • Practice Test