CompTIA Security+

Price: $2,795.00
Duration: 5 days
Exam: Exam SY0-701

CompTIA Security+ is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic and your organization as a whole including the physical security elements and operational security measures. It is also the main course you will take to prepare for the CompTIA Security+ Certification examination. In this course, you will build on your knowledge and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.

 

This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-701) Certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related professional role.

 

The included integrated learning platform includes:

  • 21 Performance-Based Questions
  • 32 Labs (assisted and applied)
  • 305 Practice Questions
  • 87 question, 90 min Assessment
  • Flashcards/Game Center

Upcoming Class Dates and Times

All Sunset Learning courses are guaranteed to run

Course Outline and Details

CompTIA A+ and Network+ certifications, or equivalent knowledge / experience.
  • Security Specialist 
  • Security Administrator 
  • Systems Administrator
  • Prerequisite Courses / Knowledge
  • Help Desk Analyst 
  • Security Analyst 
  • Security Engineer
  • Prepare for the CompTIA Security+ Certification examination
  • Build on your knowledge and professional experience with security fundamentals, networks, and organizational security
  • Implement basic security services on any type of computer network

Lesson 1: Summarize Fundamental Security Concepts

  • Lesson Topics
    • 1A: Security Concepts
    • 1B: Security Controls
  • Training Activities
    • CML Lesson 1: Study Materials
    • Assisted Lab: Exploring the Lab Environment
    • Assisted Lab: Perform System Configuration Gap Analysis

Lesson 2: Compare Threat Types

  • Lesson Topics
    • 2A: Threat Actors
    • 2B: Attack Surfaces
    • 2C: Social Engineering
  • Training Activities
    • CML Lesson 2: Study Materials
    • CML Lesson 2: PBQ – Compare and Contrast Social Engineering Techniques
    • Assisted Lab: Finding Open Service Ports
    • Skills Quiz Lessons 1 & 2

Lesson 3: Explain Cryptotographic Solutions

  • Lesson Topics
    • 3A: Cryptographic Algorithms
    • 3B: Public Key Infrastructure
    • 3C: Cryptographic Solutions
  • Training Activities
    • CML Lesson 3: Study Materials
    • CML Lesson 3: PBQ -Implement Certificates and Certificate Authorities

Lesson 4: Implement Identity and Access Management

  • Lesson Topics
    • 4A: Authentication
    • 4B: Authorization
    • 4C: Identity Management
  • Training Activities
    • CML Lesson 4: Study Materials
    • Assisted Lab: Managing Permissions
    • Skills Quiz Lessons 3 & 4

Lesson 5: Secure Enterprise Network Architecture

  • Lesson Topics
    • 5A: Enterprise Network Architecture
    • 5B: Network Security Appliances
    • 5C: Secure Communications
  • Training Activities
    • CML Lesson 5: Study Materials
    • Assisted Lab: Setting up Remote Access

Lesson 6: Secure Cloud Network Architecture

  • Lesson Topics
    • 6A: Cloud Infrastructure
    • 6B: Embedded Systems and Zero Trust Architecture
  • Training Activities
    • CML Lesson 6: Study Materials
    • CML Lesson 6: PBQ – Analyze Infrastructure Types and Functions
    • Assisted Lab: Using Containers
    • Assisted Lab: Using Virtualization
    • Skills Quiz Lessons 5 & 6

Lesson 7: Explain Resiliency and Site Security Concepts

  • Lesson Topics
    • 7A: Asset Management
    • 7B: Redundancy Strategies
    • 7C: Physical Security
  • Training Activities
    • CML Lesson 7: Study Materials
    • CML Lesson 7: PBQ – Incorporate Redundancy Strategies
    • Applied Lab: Implement Backups
    • Skills Quiz Lesson 7

Lesson 8: Explain Vulnerability Management

  • Lesson Topics
    • 8A: Device and OS Vulnerabilities
    • 8B: Application and Cloud Vulnerabilities
    • 8C: Vulnerability Identification Methods
    • 8D: Vulnerability Analysis and Remediation
  • Training Activities
    • CML Lesson 8: Study Materials
    • CML Lesson 8: PBQ – Identify Types of Vulnerabilities
    • Assisted Lab: Working with Threat Feeds
    • Assisted Lab: Performing Vulnerability Scans
    • Skills Quiz Lesson 8

Lesson 9: Evaluate Network Security Capabilities

  • Lesson Topics
    • 9A: Network Security Baselines
    • 9B: Network Security Capability Enhancement
  • Training Activities
    • CML Lesson 9: Study Materials
    • Assisted Lab: Understanding Security Baselines

Lesson 10: Assess Endpoint Security Capabilities

  • Lesson Topics
    • 10A: Implement Endpoint Security
    • 10B: Mobile Device Hardening
  • Training Activities
    • CML Lesson 10: Study Materials
    • CML Lesson 10: PBQ -Implement Mobile Device Management

Lesson 11: Enhance Application Security Capabilities

  • Lesson Topics
    • 11A: Application Protocol Security Baselines
    • 11B: Cloud and Web Application Security Concepts
  • Training Activities
    • CML Lesson 11: Study Materials
    • CML Lesson 11: PBQ – Modify Enterprise Capabilities to Enhance Security
    • Assisted Lab: Configuring System Monitoring
    • Skills Quiz Lessons 9, 10, & 11

Lesson 12: Explain Incident Response and Monitoring Concepts

  • Lesson Topics
    • 12A: Incident Response
    • 12B: Digital Forensics
    • 12C: Data Sources
    • 12D: Alerting and Monitoring Tools
  • Training Activities
    • CML Lesson 12: Study Materials
    • Applied Lab: Using Network Sniffers
    • Assisted Lab: Performing Root Cause Analysis
    • Skills Quiz Lesson 12

Lesson 13: Analyze Indicators of Malicious Activity

  • Lesson Topics
    • 13A: Malware Attack Indicators
    • 13B: Physical and Network Attack Indicators
    • 3C: Application Attack Indicators
  • Training Activities
    • CML Lesson 13: Study Materials
    • Assisted Lab: Detecting and Responding to Malware
    • Skills Quiz Lesson 13

Lesson 14: Summarize Security Governance Concepts

  • Lesson Topics
    • 14A: Policies, Standards, and Procedures
    • 14B: Change Management
    • 14C: Automation and Orchestration
  • Training Activities
    • CML Lesson 14: Study Materials
    • CML Lesson 14: PBQ – Apply Appropriate Polices and Regulations
    • Adaptive Lab: Using a Playbook- Skills Quiz Lesson 14

Lesson 15: Explain Risk Management Processes

  • Lesson Topics
    • 15A: Risk Management Processes and Concepts
    • 15B: Vendor Management Concepts
    • 15C: Audits and Assessments
  • Training Activities
    • CML Lesson 15: Study Materials
    • Assisted Lab: Performing Penetration Testing
    • Assisted Lab: Performing Reconnaissance

Lesson 16: Summarize Data Protection and Compliance Concepts

  • Lesson Topics
    • 16A: Data Classification and Compliance
    • 16B: Personnel Policies
  • Training Activities
    • CML Lesson 16: Study Materials
    • CML Lesson 16: PBQ – Apply Appropriate Techniques to Secure Data
    • Assisted Lab: Training and Awareness through Simulation
    • Skills Quiz Lessons 15 & 16


Course Delivery Options

Train face-to-face with the live instructor.
Access to on-demand training content anytime, anywhere.
Attend the live class from the comfort of your home or office.
Interact with a live, remote instructor from a specialized, HD-equipped classroom near you. An SLI sales rep will confirm location availability prior to registration confirmation.