CompTIA Security+ (SY0-601)

Excel hands-on experience with NetworkCerts CmopTIA Security+ course and live lab to successfully pass the CompTIA Security+ certification exam. Interactive lessons and hands-on labs comprehensively consists the SY0-601 exam-based objectives and provide skillful knowledge in areas such as operating systems, application systems, security concepts, and so on. The CompTIA Security+ study guide will assist you perceive complete understanding of the risks and factors a security professional may face.

Here’s what you will get

The globally recognized CompTIA Security+ SY0-601 certification verifies credibility of a candidate to determine an organization’s security risks and analyze and implement security solutions; secure and monitor hybrid environments, such as IoT, cloud, and mobile; and operates within applicable cyber-security laws and policies, such as risk, governance, and compliance.

 

 

Lessons

37+ Lessons | 379+ Quizzes | 34+ Exercises | 791+ Flashcards | 791+ Glossary of terms

TestPrep

104+ Pre Assessment Questions| 104+ Post Assessment Questions | 2+ Full Length Tests | 208+ Practice Test Questions

Hand on lab

64+ Live Lab | 64+ Video tutorials | 02:06+ Hours

Benefits

CompTIA Security+ is a widely recognized and respected certification in the field of cybersecurity. Earning the CompTIA Security+ certification offers several benefits for individuals pursuing a career in cybersecurity and information security:

Foundational Cybersecurity Knowledge: CompTIA Security+ provides a solid foundation of cybersecurity knowledge, covering a wide range of topics, including network security, threats, vulnerabilities, compliance, and access control.

Career Advancement: Holding a Security+ certification can open up new career opportunities and increase your earning potential in the field of cybersecurity. Many organizations require or prefer Security+ certification for security-related roles.

Global Recognition: CompTIA is a well-known and respected certification body, and Security+ is recognized by employers worldwide. This makes it valuable for international job opportunities.

Entry Point into Cybersecurity: Security+ is often seen as an entry-level certification in cybersecurity, making it suitable for those looking to start a career in the field. It serves as a stepping stone to more advanced certifications.

Broad Scope: The certification covers a broad range of cybersecurity domains, including network security, compliance and operational security, threats and vulnerabilities, identity management, and access control. This breadth of knowledge is valuable for various roles within the cybersecurity field.

Real-World Application: Security+ certification provides practical knowledge and skills that can be directly applied to real-world security challenges. It equips you with the ability to assess and mitigate security risks.

Access to CompTIA Resources: CompTIA offers resources and tools for certified professionals, including access to the CompTIA Learning Center, networking opportunities, and ongoing educational materials.

Preparation for Specialization: Security+ serves as a foundation for more specialized certifications in cybersecurity, such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA’s own advanced certifications.

Increased Marketability: Having Security+ on your resume can make you more attractive to employers seeking professionals with a solid understanding of cybersecurity principles and practices.

Compliance and Regulatory Knowledge: Security+ covers compliance requirements and regulations, which is important for organizations that need to adhere to industry standards and legal mandates.

Job Security: In an age of increasing cyber threats, organizations highly value professionals with security expertise. Earning Security+ certification can enhance job security in the cybersecurity field.

Continuous Learning: Cybersecurity is a dynamic field with evolving threats and technologies. Maintaining your Security+ certification requires ongoing learning and staying updated with the latest security trends and best practices.

 

 

Reviews

Just passed my security + exam today. Networkcerts materials were so helpful. Although the performance-based questions were different and tougher, skipping them was very helpful.
Olajide O.
Very well put together. The instructor demonstrates deep knowledge and a desire for learners to truly understand the concepts. Great Job!
biodun O.

Here's what you will learn

1
Course Outline

Lessons 1: Introduction

  • Goals and Methods
  • Who Should Read This Course?
  • CompTIA Security+ Exam Topics

Lessons 2: Comparing and Contrasting Different Types of Social Engineering Techniques

  • Social Engineering Fundamentals
  • User Security Awareness Education
  • Review Key Topics

Lessons 3: Analyzing Potential Indicators to Determine the Type of Attack

  • Malicious Software (Malware)
  • Password Attacks
  • Physical Attacks
  • Adversarial Artificial Intelligence
  • Supply-Chain Attacks
  • Cloud-based vs. On-premises Attacks
  • Cryptographic Attacks
  • Review Key Topics

Lessons 4: Analyzing Potential Indicators Associated with Application Attacks

  • Privilege Escalation
  • Cross-Site Scripting (XSS) Attacks
  • Injection Attacks
  • Pointer/Object Dereference
  • Directory Traversal
  • Buffer Overflows
  • Race Conditions
  • Error Handling
  • Improper Input Handling
  • Replay Attacks
  • Request Forgeries
  • Application Programming Interface (API) Attacks
  • Resource Exhaustion
  • Memory Leaks
  • Secure Socket Layer (SSL) Stripping
  • Driver Manipulation
  • Pass the Hash
  • Review Key Topics

Lessons 5: Analyzing Potential Indicators Associated with Network Attacks

  • Wireless Attacks
  • On-Path Attacks
  • Layer 2 Attacks
  • Domain Name System (DNS) Attacks
  • Distributed Denial-of-Service (DDoS) Attacks
  • Malicious Code or Script Execution Attacks
  • Review Key Topics

Lessons 6: Understanding Different Threat Actors, Vectors, and Intelligence Sources

  • Actors and Threats
  • Attributes of Threat Actors
  • Attack Vectors
  • Threat Intelligence and Threat Intelligence Sources
  • Research Sources
  • Review Key Topics

Lessons 7: Understanding the Security Concerns Associated with Various Types of Vulnerabilities

  • Cloud-based vs. On-premises Vulnerabilities
  • Zero-day Vulnerabilities
  • Weak Configurations
  • Third-party Risks
  • Improper or Weak Patch Management
  • Legacy Platforms
  • The Impact of Cybersecurity Attacks and Breaches
  • Review Key Topics

Lessons 8: Summarizing the Techniques Used in Security Assessments

  • Threat Hunting
  • Vulnerability Scans
  • Logs and Security Information and Event Management (SIEM)
  • Security Orchestration, Automation, and Response (SOAR)
  • Review Key Topics

Lessons 9: Understanding the Techniques Used in Penetration Testing

  • Penetration Testing
  • Passive and Active Reconnaissance
  • Exercise Types
  • Review Key Topics

Lessons 10: Understanding the Importance of Security Concepts in an Enterprise Environment

  • Configuration Management
  • Data Sovereignty and Data Protection
  • Site Resiliency
  • Deception and Disruption
  • Review Key Topics

Lessons 11: Summarizing Virtualization and Cloud Computing Concepts

  • Cloud Models
  • Cloud Service Providers
  • Cloud Architecture Components
  • Virtual Machine (VM) Sprawl Avoidance and VM Escape Protection
  • Review Key Topics

Lessons 12: Summarizing Secure Application Development, Deployment, and Automation Concepts

  • Software Development Environments and Methodologies
  • Application Provisioning and Deprovisioning
  • Software Integrity Measurement
  • Secure Coding Techniques
  • Open Web Application Security Project (OWASP)
  • Software Diversity
  • Automation/Scripting
  • Elasticity and Scalability
  • Review Key Topics

Lessons 13: Summarizing Authentication and Authorization Design Concepts

  • Authentication Methods
  • Biometrics
  • Multifactor Authentication (MFA) Factors and Attributes
  • Authentication, Authorization, and Accounting (AAA)
  • Cloud vs. On-premises Requirements
  • Review Key Topics

Lessons 14: Implementing Cybersecurity Resilience

  • Redundancy
  • Replication
  • On-premises vs. Cloud
  • Backup Types
  • Non-persistence
  • High Availability
  • Restoration Order
  • Diversity
  • Review Key Topics

Lessons 15: Understanding the Security Implications of Embedded and Specialized Systems

  • Embedded Systems
  • Supervisory Control and Data Acquisition (SCADA)/Industrial Control Systems (ICS)
  • Internet of Things (IoT)
  • Specialized Systems
  • Voice over IP (VoIP)
  • Heating, Ventilation, and Air Conditioning (HVAC)
  • Drones
  • Multifunction Printers (MFP)
  • Real-Time Operating Systems (RTOS)
  • Surveillance Systems
  • System on a Chip (SoC)
  • Communication Considerations
  • Embedded System Constraints
  • Review Key Topics

Lessons 16: Understanding the Importance of Physical Security Controls

  • Bollards/Barricades
  • Access Control Vestibules
  • Badges
  • Alarms
  • Signage
  • Cameras
  • Closed-Circuit Television (CCTV)
  • Industrial Camouflage
  • Personnel
  • Locks
  • USB Data Blockers
  • Lighting
  • Fencing
  • Fire Suppression
  • Sensors
  • Drones
  • Visitor Logs
  • Faraday Cages
  • Air Gap
  • Screened Subnet (Previously Known as Demilitarized Zone [DMZ])
  • Protected Cable Distribution
  • Secure Areas
  • Secure Data Destruction
  • Review Key Topics

Lessons 17: Summarizing the Basics of Cryptographic Concepts

  • Digital Signatures
  • Key Length
  • Key Stretching
  • Salting
  • Hashing
  • Key Exchange
  • Elliptic-Curve Cryptography
  • Perfect Forward Secrecy
  • Quantum
  • Post-Quantum
  • Ephemeral
  • Modes of Operation
  • Blockchain
  • Cipher Suites
  • Symmetric vs. Asymmetric Encryption
  • Lightweight Cryptography
  • Steganography
  • Homomorphic Encryption
  • Common Use Cases
  • Limitations
  • Review Key Topics

Lessons 18: Implementing Secure Protocols

  • Protocols
  • Use Cases
  • Review Key Topics

Lessons 19: Implementing Host or Application Security Solutions

  • Endpoint Protection
  • Antimalware
  • Next-Generation Firewall
  • Host-based Intrusion Prevention System
  • Host-based Intrusion Detection System
  • Host-based Firewall
  • Boot Integrity
  • Database
  • Application Security
  • Hardening
  • Self-Encrypting Drive/Full-Disk Encryption
  • Hardware Root of Trust
  • Trusted Platform Module
  • Sandboxing
  • Review Key Topics

Lessons 20: Implementing Secure Network Designs

  • Load Balancing
  • Network Segmentation
  • Virtual Private Network
  • DNS
  • Network Access Control
  • Out-of-Band Management
  • Port Security
  • Network Appliances
  • Access Control List
  • Route Security
  • Quality of Service
  • Implications of IPv6
  • Port Spanning/Port Mirroring
  • Monitoring Services
  • File Integrity Monitors
  • Review Key Topics

Lessons 21: Installing and Configuring Wireless Security Settings

  • Cryptographic Protocols
  • Authentication Protocols
  • Methods
  • Installation Considerations
  • Review Key Topics

Lessons 22: Implementing Secure Mobile Solutions

  • Connection Methods and Receivers
  • Mobile Device Management
  • Mobile Device Management Enforcement and Monitoring
  • Mobile Devices
  • Deployment Models
  • Review Key Topics

Lessons 23: Applying Cybersecurity Solutions to the Cloud

  • Cloud Security Controls
  • Solutions
  • Cloud Native Controls vs. Third-Party Solutions
  • Review Key Topics

Lessons 24: Implementing Identity and Account Management Controls

  • Identity
  • Account Types
  • Account Policies
  • Review Key Topics

Lessons 25: Implementing Authentication and Authorization Solutions

  • Authentication Management
  • Authentication/Authorization
  • Access Control Schemes
  • Review Key Topics

Lessons 26: Implementing Public Key Infrastructure

  • Public Key Infrastructure
  • Types of Certificates
  • Certificate Formats
  • PKI Concepts
  • Review Key Topics

Lessons 27: Using the Appropriate Tool to Assess Organizational Security

  • Network Reconnaissance and Discovery
  • File Manipulation
  • Shell and Script Environments
  • Packet Capture and Replay
  • Forensics
  • Exploitation Frameworks
  • Password Crackers
  • Data Sanitization
  • Review Key Topics

Lessons 28: Summarizing the Importance of Policies, Processes, and Procedures for Incident Response

  • Incident Response Plans
  • Incident Response Process
  • Exercises
  • Attack Frameworks
  • Stakeholder Management
  • Communication Plan
  • Disaster Recovery Plan
  • Business Continuity Plan
  • Continuity of Operations Planning (COOP)
  • Incident Response Team
  • Retention Policies
  • Review Key Topics

Lessons 29: Using Appropriate Data Sources to Support an Investigation

  • Vulnerability Scan Output
  • SIEM Dashboards
  • Log Files
  • syslog/rsyslog/syslog-ng
  • journalctl
  • NXLog
  • Bandwidth Monitors
  • Metadata
  • NetFlow/sFlow
  • Protocol Analyzer Output
  • Review Key Topics

Lessons 30: Applying Mitigation Techniques or Controls to Secure an Environment

  • Reconfigure Endpoint Security Solutions
  • Configuration Changes
  • Isolation
  • Containment
  • Segmentation
  • SOAR
  • Review Key Topics

Lessons 31: Understanding the Key Aspects of Digital Forensics

  • Documentation/Evidence
  • Acquisition
  • On-premises vs. Cloud
  • Integrity
  • Preservation
  • E-discovery
  • Data Recovery
  • Nonrepudiation
  • Strategic Intelligence/Counterintelligence
  • Review Key Topics

Lessons 32: Comparing and contrasting the Various Types of Controls

  • Control Category
  • Control Types
  • Review Key Topics

Lessons 33: Understanding the Importance of Applicable Regul...orks That Impact Organizational Security Posture

  • Regulations, Standards, and Legislation
  • Key Frameworks
  • Benchmarks and Secure Configuration Guides
  • Review Key Topics

Lessons 34: Understanding the Importance of Policies to Organizational Security

  • Personnel Policies
  • Diversity of Training Techniques
  • Third-Party Risk Management
  • Data Concepts
  • Credential Policies
  • Organizational Policies
  • Review Key Topics

Lessons 35: Summarizing Risk Management Processes and Concepts

  • Risk Types
  • Risk Management Strategies
  • Risk Analysis
  • Disaster Analysis
  • Business Impact Analysis
  • Review Key Topics

Lessons 36: Understanding Privacy and Sensitive Data Concepts in Relation to Security

  • Organizational Consequences of Privacy and Data Breaches
  • Notifications of Breaches
  • Data Types and Asset Classification
  • PII
  • PHI
  • Privacy Enhancing Technologies
  • Roles and Responsibilities
  • Information Lifecycle
  • Impact Assessment
  • Terms of Agreement
  • Privacy Notice
  • Review Key Topics

Lessons 37: Final Preparation

  • Hands-on Activities
  • Suggested Plan for Final Review and Study
  • Summary
2
Hands-on LAB Activities

Comparing and Contrasting Different Types of Social Engineering Techniques

  • Using SET
  • Performing Website Reconnaissance

Analyzing Potential Indicators to Determine the Type of Attack

  • Cracking a Linux Password Using the John the Ripper Tool
  • Simulating a DoS Attack
  • Using Rainbow Tables
  • Detecting Rootkits
  • Creating a Remote Access Trojan (RAT)
  • Using NetBus in Windows 10

Analyzing Potential Indicators Associated with Application Attacks

  • Defending Against a Buffer Overflow Attack
  • Performing Session Hijacking Using Burp Suite
  • Exploiting a Website Using SQL Injection

Analyzing Potential Indicators Associated with Network Attacks

  • Performing ARP Spoofing

Understanding the Techniques Used in Penetration Testing

  • Identifying Search Options in Metasploit
  • Using OWASP ZAP

Understanding the Importance of Security Concepts in an Enterprise Environment

  • Setting Up a Honeypot

Implementing Cybersecurity Resilience

  • Configuring RAID 5
  • Taking an Incremental Backup
  • Taking a Full Backup

Summarizing the Basics of Cryptographic Concepts

  • Observing an MD5-Generated Hash Value
  • Performing Symmetric Encryption
  • Examining Asymmetric Encryption
  • Hiding Text Using Steganography

Implementing Secure Protocols

  • Configuring an SSH Server
  • Configuring DNSSEC on an Active Directory Integrated Zone
  • Configuring IPSec

Implementing Host or Application Security Solutions

  • Configuring Inbound Rules for a Firewall
  • Using Windows Firewall

Implementing Secure Network Designs

  • Configuring a Tunnel Group for Clientless SSL VPN
  • Configuring Clientless SSL VPNs on ASA
  • Configuring Site-to-Site IPsec VPN Topology
  • Performing IDS Configuration with Snort
  • Using Performance Monitor
  • Creating a VLAN and Viewing its Assignment to Port Mapping
  • Creating a DMZ Zone
  • Setting Up a VPN Server with Windows Server 2016
  • Implementing Port Security
  • Configuring a BPDU Guard on a Switch Port
  • Configuring NetFlow and NetFlow Data Export

Implementing Secure Mobile Solutions

  • Turning on Airplane Mode of an iPhone
  • Setting Up a VPN in Android

Applying Cybersecurity Solutions to the Cloud

  • Performing a MITM Attack

Implementing Identity and Account Management Controls

  • Stopping Permissions Inheritance
  • Managing NTFS Permissions
  • Creating a User Account in the Active Directory

Implementing Authentication and Authorization Solutions

  • Creating a Network Policy for 802.1X

Implementing Public Key Infrastructure

  • Revoking and Exporting a Certificate
  • Examining PKI Certificates

Using the Appropriate Tool to Assess Organizational Security

  • Performing Memory Analysis with Volatility
  • Using Wireshark
  • Manipulating a File in Linux
  • Conducting Vulnerability Scanning using Nessus
  • Using theHarvester Tool
  • Creating Reverse and Bind Shells Using Netcat
  • Using the netstat Command
  • Using the hping Program
  • Using pathping and ping Commands
  • Scanning Live Systems Using Nmap
  • Using dig and nslookup Commands
  • Tracing a Route Using Tracert
  • Using the ifconfig Command

Using Appropriate Data Sources to Support an Investigation

  • Viewing the System Logs
  • Using Windows Event Viewer

Understanding the Key Aspects of Digital Forensics

  • Completing the Chain of Custody
  • Analyzing Forensics with Autopsy

Be the first to add a review.

Please, login to leave a review
Get course
Enrolled: 0 students
Lectures: 2
Level: Intermediate

Office Hours

Monday 9:00 am - 6.00 pm
Tuesday 9:00 am - 6.00 pm
Wednesday 9:00 am - 6.00 pm
Thursday 9:00 am - 6.00 pm
Friday 9:00 am - 6.00 pm
Saturday 10:00 am - 6.00 pm
Sunday 10:00 am - 6.00 pm