Hands-on CompTIA Security+ SY0-601 Training

Prepare for the CompTIA Security+ SY0-601 exam and master the critical skills to defend against cyber threats and earn an industry-leading credential.

(SY0-601.AI1.E1) / ISBN : 978-1-64459-201-4
Lessons
Lab
TestPrep
AI Tutor (Hinzufügen Auf)
Instructor-Led (Hinzufügen Auf)
36 Rezension
Holen Sie sich eine kostenlose Testversion

Über diesen Kurs

Cybersecurity threats are not just more frequent; they are quite shockingly sophisticated and effective. In the indispensable first line of defense, security professionals must be exceptionally prepared & committed to continuous upskilling. 

Therefore, the immersive online course is especially designed to arm you for the CompTIA Security+ (SY0-601) exam. But, more importantly, it empowers you from within with the practical, real-world skills essential to protect your vital systems, sensitive data & intricate networks against the ever-evolving threat landscape. 

Dive deep into identifying & defending against a spectrum of attacks, securing applications & cloud environment, and implementing robust access controls, expertly managing risk & executing flawless incident response protocols.

Fähigkeiten, die Sie erwerben werden

  • Security Fundamentals: Discover the foundational principles of cybersecurity & understand how security integrates into much broader organizational goals. 
  • Risk Management: Identify & categorize multiple types of security threats. Learn how to develop & implement strategies to mitigate your tasks. 
  • Network Connectivity: Get familiar with the firewalls, intrusion detection/prevention systems, & other security tools. 
  • Secure Network Configuration: Implement & configure your secure communication protocols as well as apply the best practices to enhance the security of the network devices & infrastructure. 

Holen Sie sich die Unterstützung, die Sie brauchen. Melden Sie sich für unseren Kurs mit Lehrer an.

1

Introduction

2

Security fundamentals

  • Module A: Security concepts
  • Module B: Enterprise security strategy
  • Module C: Security program components
  • Summary
3

Risk management

  • Module A: Understanding threats
  • Module B: Risk management programs
  • Module C: Security assessments
  • Summary
4

Cryptography

  • Module A: Cryptography concepts
  • Module B: Public key infrastructure
  • Summary
5

Network connectivity

  • Module A: Network attacks
  • Module B: Packet flow
  • Summary
6

Network security technologies

  • Module A: Network security components
  • Module B: Monitoring tools
  • Summary
7

Secure network configuration

  • Module A: Secure network protocols
  • Module B: Hardening networks
  • Summary
8

Authentication

  • Module A: Authentication factors
  • Module B: Authentication protocols
  • Summary
9

Access control

  • Module A: Access control principles
  • Module B: Account management
  • Summary
10

Securing hosts and data

  • Module A: Malware
  • Module B: Securing data
  • Module C: Securing hosts
  • Summary
11

Securing specialized systems

  • Module A: Mobile security
  • Module B: Embedded and specialized systems
  • Summary
12

Application security

  • Module A: Application attacks
  • Module B: Securing applications
  • Summary
13

Cloud security

  • Module A: Virtual and cloud systems
  • Module B: Securing cloud services
  • Summary
14

Organizational security

  • Module A: Social engineering
  • Module B: Security policies
  • Module C: User roles and training
  • Module D: Physical security and safety
  • Summary
15

Disaster planning and recovery

  • Module A: Business continuity
  • Module B: Resilient systems
  • Module C: Incident response procedures
  • Summary

1

Introduction

  • Security+ sandbox
2

Risk management

  • Using Reconnaissance Tools
  • Gathering Site Information
  • Performing Session Hijacking Using Burp Suite
  • Footprinting a Website
  • Cracking a Linux Password Using John the Ripper
  • Using the hping Program
  • Using the theHarvester Tool to Gather Information about a Victim
  • Durchführen von Schwachstellenscans mit Nessus
3

Cryptography

  • Observing an MD5-Generated Hash Value
  • Observing an SHA-Generated Hash Value
  • Untersuchung der asymmetrischen Verschlüsselung
  • Symmetrische Verschlüsselung durchführen
  • Hiding Text Using Steganography
  • Examining PKI Certificates
4

Network connectivity

  • Simulation eines DoS-Angriffs
  • Verwenden von Rainbow Tables zum Knacken von Passwörtern
  • Durchführen von ARP-Spoofing
  • Defending against IP Spoofing
  • Simulating an Eavesdropping Attack
  • Cracking Passwords
  • Verwenden der Windows-Firewall
  • Configuring the Network-based Firewall
  • Konfigurieren eines BPDU Guard auf einem Switch-Port
  • Implementierung der Portsicherheit
  • Configuring a Standard ACL
  • Configuring Network Address Translation
  • Changing Firewall Rules and Setting Up IPS Rules
5

Network security technologies

  • Setting up a Honeypot on Kali Linux
  • Examining File Manipulation Commands
  • Making Syslog Entries Readable
  • Capturing the TCP Header with Wireshark
  • Verwenden der Ereignisanzeige
  • Viewing Linux event logs
6

Secure network configuration

  • Einrichten eines VPN-Servers mit Windows Server 2016
  • Erstellen einer PGP-Zertifizierung
  • Securing a Wi-Fi Hotspot
  • Durchführen eines intensiven Scans in Zenmap
  • Configuring VLANs
7

Authentication

  • Installing a RADIUS Server
  • Examining Kerberos Settings
8

Access control

  • Creating Active Directory Groups
  • Delegating Control in Active Directory
  • Creating a Domain User
  • Enforcing Password Policies
9

Securing hosts and data

  • Using an Anti-Spyware Tool
  • Verwalten von NTFS-Berechtigungen
  • Configuring Lockout Policies
  • Using the chmod Command
  • Creating a Security Template
10

Securing specialized systems

  • Setting Up a VPN in Android
11

Application security

  • Abwehr eines Pufferüberlaufangriffs
  • Attacking a Website Using XSS Injection
  • Exploiting a Website Using SQL Injection
12

Organizational security

  • Using Anti-phishing Tools
  • Using Social Engineering Techniques to Plan an Attack

Warum lieben Lernende diesen Kurs?

Haben Sie Fragen? Schauen Sie sich die FAQs an

  Want to Learn More?

Kontaktiere uns jetzt

The Security+ SY0-601 exam was especially designed for IT professionals with a security focus, especially those who are looking forward to starting or advancing in their careers in cybersecurity.

The Security+ SY0-601 does not officially have any prerequisites, but it is recommended to have at least two years of experience in IT administration with a security focus and CompTIA Network+ certification. 

The CompTIA Security+ SY0-601 course equips individuals with the foundational cybersecurity skills needed for multiple IT security roles, especially assessing & managing risk, incident response & enterprise network security. 

The security+ exam itself presents a moderate difficulty, which requires a good deal of preparation & study. 

Become a Cybersecurity Defender 

  Do not browse the internet anymore; secure it with CompTIA Security+ (SY0-601).

$279.99

Kaufe jetzt

Ähnliche Kurse

Alle Kurse
Scrolle nach oben