CompTIA Security+ SY0-601 Exam Prep Course

Learn how to identify threats, secure networks, and respond to incidents as you prepare for the globally recognized CompTIA Security+ certification.

(SY0-601.AE1) / ISBN : 978-1-64459-242-7
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Instructor-Led (Add-on)
39 Reviews
Get A Free Trial

About This Course

Enroll in our CompTIA (SY0-601) exam prep course to build a strong foundation in cybersecurity. 

In this course, get hands-on with threat detection, incident response, risk management, secure architecture, and identity access controls. Work with tools like Wireshark, Nessus, and John the Ripper through performance-based labs. 

Discover how to install and configure your security systems to secure the networks, applications & devices with integrity, confidentiality & availability.

By the end of this course, you’ll be exam-ready and job-ready with practical experience that managers value.

Skills You’ll Get

  • Security controls: Analyzing & understanding multiple categories & the types of controls, including technical, administrative as well and physical measures. 
  • Fundamentals of Security Principles: Master the core concepts of the CIA triad, non-repudiation, AAA, zero trust, as well as the importance of physical security. 
  • Cryptographic Solutions: Understanding PKI & multiple encryption methods, key management, hashing, digital signatures, & how they are being utilized to secure your data seamlessly. 
  • Threat Landscapes: Recognizing common threats, their motives, & several threat vectors, which include message-based, file-based & human-planned attacks. 

Get the support you need. Enroll in our Instructor-Led Course.

1

Introduction

  • The Security+ Exam
  • What Does This Course Cover?
  • Exam SY0-601 Exam Objectives
  • SY0-601 Certification Exam Objective Map
2

Today's Security Professional

  • Cybersecurity Objectives
  • Data Breach Risks
  • Implementing Security Controls
  • Data Protection
  • Summary
  • Exam Essentials
3

Cybersecurity Threat Landscape

  • Exploring Cybersecurity Threats
  • Threat Data and Intelligence
  • Summary
  • Exam Essentials
4

Malicious Code

  • Malware
  • Malicious Code
  • Adversarial Artificial Intelligence
  • Summary
  • Exam Essentials
5

Social Engineering, Physical, and Password Attacks

  • Social Engineering
  • Password Attacks
  • Physical Attacks
  • Summary
  • Exam Essentials
6

Security Assessment and Testing

  • Vulnerability Management
  • Security Vulnerabilities
  • Penetration Testing
  • Training and Exercises
  • Summary
  • Exam Essentials
7

Secure Coding

  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Injection Vulnerabilities
  • Exploiting Authentication Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Application Security Controls
  • Secure Coding Practices
  • Summary
  • Exam Essentials
8

Cryptography and the Public Key Infrastructure

  • An Overview of Cryptography
  • Goals of Cryptography
  • Cryptographic Concepts
  • Modern Cryptography
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Cryptographic Attacks
  • Emerging Issues in Cryptography
  • Summary
  • Exam Essentials
9

Identity and Access Management

  • Identity
  • Authentication and Authorization
  • Authentication Methods
  • Accounts
  • Access Control Schemes
  • Summary
  • Exam Essentials
10

Resilience and Physical Security

  • Building Cybersecurity Resilience
  • Response and Recovery Controls
  • Physical Security Controls
  • Summary
  • Exam Essentials
11

Cloud and Virtualization Security

  • Exploring the Cloud
  • Virtualization
  • Cloud Infrastructure Components
  • Cloud Security Issues
  • Cloud Security Controls
  • Summary
  • Exam Essentials
12

Endpoint Security

  • Protecting Endpoints
  • Service Hardening
  • Operating System Hardening
  • Securing Embedded and Specialized Systems
  • Summary
  • Exam Essentials
13

Network Security

  • Designing Secure Networks
  • Secure Protocols
  • Attacking and Assessing Networks
  • Network Reconnaissance and Discovery Tools and Techniques
  • Summary
  • Exam Essentials
14

Wireless and Mobile Security

  • Building Secure Wireless Networks
  • Managing Secure Mobile Devices
  • Summary
  • Exam Essentials
15

Incident Response

  • Incident Response
  • Incident Response Data and Tools
  • Mitigation and Recovery
  • Summary
  • Exam Essentials
16

Digital Forensics

  • Digital Forensic Concepts
  • Conducting Digital Forensics
  • Reporting
  • Digital Forensics and Intelligence
  • Summary
  • Exam Essentials
17

Security Policies, Standards, and Compliance

  • Understanding Policy Documents
  • Personnel Management
  • Third-Party Risk Management
  • Complying with Laws and Regulations
  • Adopting Standard Frameworks
  • Security Control Verification and Quality Control
  • Summary
  • Exam Essentials
18

Risk Management and Privacy

  • Analyzing Risk
  • Managing Risk
  • Risk Analysis
  • Disaster Recovery Planning
  • Privacy
  • Summary
  • Exam Essentials

1

Malicious Code

  • Identifying Virus Threats
  • Detecting Rootkits
2

Social Engineering, Physical, and Password Attacks

  • Using Social Engineering Techniques to Plan an Attack
  • Cracking a Linux Password Using John the Ripper
3

Security Assessment and Testing

  • Conducting Vulnerability Scanning Using Nessus
4

Secure Coding

  • Exploiting a Website Using SQL Injection
  • Conducting a Cross-Site Request Forgery Attack
  • Attacking a Website Using XSS Injection
  • Defending Against a Buffer Overflow Attack
5

Cryptography and the Public Key Infrastructure

  • Performing Symmetric Encryption
  • Examining Asymmetric Encryption
  • Observing an SHA-Generated Hash Value
  • Observing an MD5-Generated Hash Value
  • Examining PKI Certificates
  • Using Rainbow Tables to Crack Passwords
6

Identity and Access Management

  • Examining Kerberos Settings
  • Installing a RADIUS Server
7

Resilience and Physical Security

  • Configuring RAID 5
8

Endpoint Security

  • Using the chmod Command
  • Examining File Manipulation Commands
9

Network Security

  • Configuring a Standard ACL
  • Implementing Port Security
  • Configuring a BPDU Guard on a Switch Port
  • Configuring VLANs
  • Using Windows Firewall
  • Performing ARP Poisoning
  • Using the ifconfig Command
  • Using the traceroute Command
  • Capturing Packets Using Wireshark
  • Performing Reconnaissance on a Network
  • Using the theHarvester Tool to Gather Information about a Victim
  • Using the hping Program
  • Using Reconnaissance Tools
10

Incident Response

  • Viewing Linux event logs
  • Using Event Viewer
  • Making Syslog Entries Readable
11

Digital Forensics

  • Using FTK Imager
12

Security Policies, Standards, and Compliance

  • Configuring a Password Policy

Any questions?
Check out the FAQs

  Want to Learn More?

Contact Us Now

If you're starting now, take the 701, as it's the latest Security+ exam version and reflects current industry standards. The 601 is being phased out and will retire in July 2024.

Yes, the CompTIA Security+ certification is considered for people seeking to enter or advance in the cybersecurity field. 

The CompTIA Security+ certification evaluates a range of cybersecurity skills, which includes general security concepts, threats & vulnerabilities management, security architecture & operations, and program management. 

A CompTIA Security+ certification is valuable for a wide range of IT & cybersecurity roles, which include security analyst, network administrator, system administrator, and IT auditor. 

Related Courses

All Course
scroll to top