CompTIA Security+ (Exam SYO-501) Certification Series!

$150.00Add to cart

Overview: This course will teach students about identifying security fundamentals and threats, analyzing risk, conducting security assessments, implementing network, operational , host, and software security, managing identity and access, implementing cryptography, addressing security issues, and ensuring business continuity. CompTIA Security+ is the certification globally trusted to validate foundational, vendor- neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career. Recommended experience for this certification includes CompTIA Network+ and two years of experience in IT administration with a security focus. No prerequisites required.

Series Taught By: Patrick Loner

Available CEUs for Course Series Completion: 20
Students can earn up to 20 CEUs for fully completing this course series. This information will be displayed on the certificate of completion.Learn More

Course Modules:

Module 01 – Identifying Security Fundamentals 

(Duration: 1h 21m)

  1. Workbook (Pdf)
  2. Topic A: Identify Information Security Concepts
  3. Information Security
  4. Goals of Information Security
  5. Risk
  6. Vulnerabilities
  7. Threats
  8. Attacks
  9. Controls
  10. Types of Controls
  11. The Security Management Process
  12. Demo – Identifying Information Security Basics
  13. Topic B: Identify Basic Security Controls
  14. The CIA Triad
  15. Non-repudiation
  16. Identification
  17. Authentication
  18. Authentication Factors
  19. Authorization
  20. Access Control
  21. Accounting and Auditing
  22. Principle of Least Privilege
  23. Privilege Management
  24. Demo – Identifying Basic Security Controls
  25. Topic C: Identify Basic Authentication and Authorization Concepts
  26. Passwords
  27. Tokens
  28. Biometrics
  29. Geolocation
  30. Keystroke Authentication
  31. Multi-factor Authentication
  32. Mutual Authentication
  33. Demo – Identifying Basic Authentication and Authorization Concepts
  34. Topic D: Identify Basic Cryptography Concepts
  35. Cryptography
  36. Encryption and Decryption
  37. Encryption and Security Goals
  38. Ciphers
  39. A Key
  40. Symmetric Encryption
  41. Asymmetric Encryption
  42. Hashing
  43. Steganography
  44. Demo – Identifying Basic Cryptography Concepts
  45. Chapter 01 Review
  46. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – Identifying Security Threats

(Duration: 2h 49m)

  1. Workbook (Pdf)
  2. Topic A: Identify Types of Attackers
  3. Hackers and Attackers
  4. Threat Actors
  5. Threat Actor Attributes
  6. Open-Source Intelligence
  7. Demo – Identifying Types of Attackers
  8. Topic B: Identify Social Engineering Attacks
  9. Social Engineering
  10. Effectiveness
  11. Impersonation
  12. Phishing and Related Attacks
  13. Hoaxes
  14. Physical Exploits
  15. Watering Hole Attacks
  16. Demo – Identifying Social Engineering Attacks
  17. Topic C: Identify Malware
  18. Malicious Code
  19. Viruses
  20. Worms
  21. Adware
  22. Spyware
  23. Trojan Horses
  24. Keyloggers
  25. Remote Access Trojans
  26. Logic Bombs
  27. Botnets
  28. Ransomware
  29. Advance Persistent Threats
  30. Demo – Identifying Types of Malware
  31. Topic D: Identify Software-Based Threats
  32. Software Attacks
  33. Password Attacks
  34. Types of Password Attacks
  35. Cryptographic Attacks
  36. Types of Cryptographic Attacks
  37. Backdoor Attacks
  38. Application Attacks
  39. Types of Application Attacks
  40. Driver Manipulation
  41. Privilege Escalation
  42. Demo – Identifying Password Attacks
  43. Topic E: Identify Network-Based Threats
  44. TCP/IP Basics
  45. Spoofing Attacks
  46. IP and MAC Address Spoofing
  47. ARP Poisoning
  48. DNS Poisoning
  49. Port Scanning Attacks
  50. Scan Types
  51. Eavesdropping Attacks
  52. Man-in-the-Middle Attacks
  53. Man-in-the-Browser Attacks
  54. Replay Attacks
  55. DoS Attacks
  56. DDoS Attacks
  57. Hijacking Attacks
  58. Amplification Attacks
  59. Pass the Hash Attacks
  60. Demo- Identifying Threats to DNS
  61. Demo- Identifying Port Scanning Threats
  62. Topic F: Identify Wireless Threats
  63. Rogue Access Points
  64. Evil Twins
  65. Jamming
  66. Bluejacking
  67. Bluesnarfing
  68. Near Field Communication Attacks
  69. RFID System Attacks
  70. War Driving, War Walking, and War Chalking
  71. Packet Sniffing
  72. IV Attacks
  73. Wireless Replay Attacks
  74. WEP and WPA Attacks
  75. WPS Attacks
  76. Wireless Disassociation
  77. Demo- Identifying Wireless Threats
  78. Topic G: Identify Physical Threats
  79. Physical Threats and Vulnerabilities
  80. Hardware Attacks
  81. Environmental Threats and Vulnerabilities
  82. Demo- Identifying Physical Threats
  83. Chapter 03 Review
  84. Review Quiz (Number of attempts allowed: Unlimited)

Module 05 – Implementing Host and Software Security

(Duration: 1h 56m)

  1. Workbook (Pdf)
  2. Topic A: Implement Host Security
  3. Hardening
  4. Operating System Security
  5. Operating System Hardening Techniques
  6. Trusted Computing Base
  7. Hardware and Firmware Security
  8. Security Baselines
  9. Software Updates
  10. Application Blacklisting and Whitelisting
  11. Logging
  12. Auditing
  13. Anti-malware Software
  14. Types of Anti-malware Software
  15. Hardware Peripheral Security
  16. Embedded Systems
  17. Security Implications for Embedded Systems
  18. Guidelines for Securing Hosts
  19. Demo- Implementing Auditing
  20. Demo- Hardening a Server
  21. Topic B: Implement Cloud and Virtualization Security
  22. Virtualization
  23. Hypervisors
  24. Virtual Desktop Infrastructure
  25. Virtualization Security
  26. Cloud Computing
  27. Cloud Deployment Models
  28. Cloud Service Types
  29. Guidelines for Securing Virtualized and Cloud-Based Resources
  30. Demo- Securing Virtual Machine Networking
  31. Topic C: Implement Mobile Device Security
  32. Mobile Device Connection Methods
  33. Mobile Device Management
  34. Mobile Device Security Controls
  35. Mobile Device Monitoring and Enforcement
  36. Mobile Deployment Models
  37. BYOD Security Controls
  38. Guidelines for Implementing Mobile Device Security
  39. Demo – Implementing Mobile Device Security
  40. Topic D: Incorporate Security in the Software Development Lifecycle
  41. Software Development Lifecycle
  42. Software Development Models
  43. DevOps
  44. Versioning
  45. Secure Coding Techniques
  46. Code Testing Methods
  47. Guidelines for Incorporating Security in the Software Development Lifecycle
  48. Demo – Performing Static Code Analysis
  49. Chapter 05 Review
  50. Review Quiz (Number of attempts allowed: Unlimited)

Module 07 – Managing Identity and Access

(Duration: 1h 42m)

  1. Workbook (Pdf)
  2. Topic A: Implement Identity and Access Management
  3. Identity and Access Management
  4. Access Control Models
  5. Physical Access Control Devices
  6. Biometric Devices
  7. Certificate-Based Authentication
  8. File System and Database Access
  9. Guidelines for Implementing IAM
  10. Demo – Implementing DAC for a File Share
  11. Topic B: Configure Directory Services
  12. Directory Services
  13. Lightweight Directory Access Protocol
  14. Secure LDAP
  15. Common Directory Services
  16. Demo- Backing Up Active Directory
  17. Topic C: Configure Access Services
  18. Remote Access Methods
  19. Tunneling
  20. Remote Access Protocols
  21. HMAC-Based One-Time Password
  22. Time-Based OTP
  23. Password Authentication Protocol
  24. Challenge-Handshake Authentication Protocol
  25. NT LAN Manager
  26. Authentication, Authorization, and Accounting
  27. Remote Authentication Dial
  28. -In User Service
  29. Terminal Access Controller Access-Control System
  30. Kerberos
  31. Demo- Configuring a Remote Access Server
  32. Demo- Setting Up Remote Access Authentication
  33. Topic D: Manage Accounts
  34. Account Management
  35. Account Privileges
  36. Account Types
  37. Account Policy
  38. Password Policy
  39. Multiple Accounts
  40. Shared Accounts
  41. Account Management Security Controls
  42. Credential Management
  43. Group Policy
  44. Identity Federation
  45. Identity Federation Methods
  46. Guidelines for Managing Accounts
  47. Demo- Managing Accounts
  48. Chapter 07 Review
  49. Review Quiz (Number of attempts allowed: Unlimited)

Module 09 – Implementing Operational Security

(Duration: 1h 25m)

  1. Workbook (Pdf)
  2. Topic A: Evaluate Security Frameworks and Guidelines
  3. Security Frameworks
  4. Security Framework Examples
  5. Security Configuration Guides
  6. Compliance
  7. Layered Security
  8. Defense in Depth
  9. Demo- Evaluating Security Frameworks and Guidelines
  10. Topic B: Incorporate Documentation in Operational Security
  11. Security Policies
  12. Common Security Policy Types
  13. Personnel Management
  14. Separation of Duties
  15. Job Rotation
  16. Mandatory Vacation
  17. Additional Personnel Management Tasks
  18. Training and Awareness
  19. Business Agreements
  20. Guidelines for Incorporating Documentation in Operational Security
  21. Demo- Incorporating Documentation in Operational Security
  22. Topic C: Implement Security Strategies
  23. Security Automation
  24. Scalability
  25. Elasticity
  26. Redundancy
  27. Fault Tolerance
  28. Redundant Array of Independent Disks
  29. Non-persistence
  30. High Availability
  31. Deployment Environments
  32. Guidelines for Implementing Security Strategies
  33. Demo- Implementing Virtual Machine Snapshots
  34. Topic D: Manage Data Security Processes
  35. Data Security
  36. Data Security Vulnerabilities
  37. Data Storage Methods
  38. Data Encryption Methods
  39. Data Sensitivity
  40. Data Management Roles
  41. Data Retention
  42. Data Disposal
  43. Guidelines for Managing Data Security
  44. Demo- Destroying Data Securely
  45. Demo- Encrypting a Storage Device
  46. Topic E: Implement Physical Controls
  47. Physical Security Controls
  48. Physical Security Control Types
  49. Environmental Exposures
  50. Environmental Controls
  51. Environmental Monitoring
  52. Safety
  53. Guidelines for Implementing Physical Controls
  54. Demo- Implementing Physical Controls
  55. Chapter 09 Review
  56. Review Quiz (Number of attempts allowed: Unlimited)

Module 11 – Ensuring Business Continuity

(Duration: 33m)

  1. Workbook (Pdf)
  2. Topic A: Select Business Continuity and Disaster Recovery Processes
  3. Business Continuity and Disaster Recovery
  4. The Disaster Recovery Process
  5. Recovery Team
  6. Order of Restoration
  7. Recovery Sites
  8. Secure Recovery
  9. Backup Types (Full)
  10. Backup Types (Differential vs. Incremental)
  11. Secure Backups
  12. Geographic Considerations
  13. Guidelines for Selecting Business Continuity and Disaster Recovery Processes
  14. Demo – Selecting Business Continuity and Disaster Recovery Processes
  15. Topic B: Develop a Business Continuity Plan
  16. Business Continuity Plans
  17. Disaster Recovery Plans
  18. IT Contingency Plans
  19. Succession Plans
  20. Failover
  21. Alternate Business Practices
  22. Testing Exercises
  23. After-Action Reports
  24. Guidelines for Developing a BCP
  25. Demo – Developing a BCP
  26. Chapter 11 Review
  27. Course Closure
  28. Review Quiz (Number of attempts allowed: Unlimited)

Module 02 – Analyzing Risk

(Duration: 46m)

  1. Workbook (Pdf)
  2. Topic A: Analyze Organizational Risk
  3. Risk Management
  4. Components of Risk Analysis
  5. Phases of Risk Analysis
  6. Categories of Threat Types
  7. Risk Analysis Methods
  8. Risk Calculation
  9. Risk Response Techniques
  10. Risk Mitigation and Control Types
  11. Change Management
  12. Guidelines for Analyzing Risk
  13. Demo – Analyzing Risks to the Organization
  14. Topic B: Analyze the Business Impact of Risk
  15. BIA
  16. Impact Scenarios
  17. Privacy Assessments
  18. Critical Systems and Functions
  19. Maximum Tolerable Downtime
  20. Recovery Point Objective
  21. Recovery Time Objective
  22. Mean Time to Failure
  23. Mean Time to Repair
  24. Mean Time Between Failures
  25. Guidelines for Performing a Business Impact Analysis
  26. Demo – Performing a Business Impact Analysis
  27. Chapter 02 Review
  28. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 -Conducting Security Assessments

(Duration: 1h 3m)

  1. Workbook (Pdf)
  2. Topic A: Identify Vulnerabilities
  3. Host Vulnerabilities
  4. Software Vulnerabilities
  5. Encryption Vulnerabilities
  6. Network Architecture Vulnerabilities
  7. Account Vulnerabilities
  8. Operations Vulnerabilities
  9. Demo- Identifying Vulnerabilities
  10. Topic B: Assess Vulnerabilities
  11. Security Assessment
  12. Security Assessment Techniques
  13. Vulnerability Assessment Tools
  14. Types of Vulnerability Scans
  15. False Positives
  16. Guidelines for Assessing Vulnerabilities
  17. Demo- Capturing Network Data with Wireshark
  18. Demo- Scanning for General Vulnerabilities
  19. Topic C: Implement Penetration Testing
  20. Penetration Testing
  21. Penetration Testing Techniques
  22. Box Testing Methods
  23. Penetration Testing Tools
  24. Guidelines for Implementing Penetration Testing
  25. Demo- Implementing Penetration Testing
  26. Chapter 04 Review
  27. Review Quiz (Number of attempts allowed: Unlimited)

Module 06 -Implementing Network Security 

(Duration: 2h 15m)

  1. Workbook (Pdf)
  2. Topic A: Configure Network Security Technologies
  3. Network Components
  4. Network Devices
  5. Routers
  6. Switches
  7. Proxies
  8. Firewalls
  9. Load Balancer
  10. Network Scanners and Analysis Tools
  11. Intrusion Detection Systems
  12. Network IDS
  13. Intrusion Prevention Systems
  14. Network IPS
  15. Types of Network Monitoring Systems
  16. Security Information and Event Management
  17. Data Loss/Leak Prevention
  18. Virtual Private Networks
  19. VPN Concentrators
  20. Security Gateways
  21. Unified Threat Management
  22. Guidelines for Configuring Network Security Technologies
  23. Demo – Configuring a Network IDS
  24. Topic B: Secure Network Design Elements
  25. Network Access Control
  26. Demilitarized Zones
  27. Network Isolation
  28. Virtual Local Area Networks
  29. Network Security Device Placement
  30. Network Address Translation
  31. Software-Defined Networking
  32. Guidelines for Securing Network Design Elements
  33. Demo – Securing Network Design Elements
  34. Topic C: Implement Secure Networking Protocols and Services
  35. The Open Systems Interconnection Model
  36. OSI Model and Security
  37. Internet Protocol Suite
  38. Domain Name System
  39. Hypertext Transfer Protocol
  40. Secure Sockets Layer/Transport Layer Security
  41. HTTP Secure
  42. Secure Shell
  43. Simple Network Management Protocol
  44. Real-Time Transport Protocol
  45. Internet Control Message Protocol
  46. Internet Protocol Security
  47. Network Basic Input/Output System
  48. File Transfer Protocols
  49. Email Protocols
  50. Additional Networking Protocols and Services
  51. Ports and Port Ranges
  52. Demo – Installing an Internet Information Services Web Server with Basic Security
  53. Demo – Securing Network Traffic Using IPSec
  54. Topic D: Secure Wireless Traffic
  55. Wireless Networks
  56. Wireless Antenna Types
  57. 802.11 Protocols
  58. Wireless Cryptographic Protocols
  59. Wireless Authentication Protocols
  60. VPNs and Open Wireless
  61. Wireless Client Authentication Methods
  62. Wireless Access Point Security
  63. Captive Portals
  64. Site Surveys
  65. Guidelines for Securing Wireless Traffic
  66. Demo – Securing Wireless Traffic
  67. Chapter 06 Review
  68. Review Quiz (Number of attempts allowed: Unlimited)

Module 08 -Implementing Cryptography

(Duration: 1h 41m)

  1. Workbook (Pdf)
  2. Topic A: Identify Advanced Cryptography Concepts
  3. Cryptography Elements
  4. Hashing Concepts
  5. Data States
  6. Key Exchange
  7. Digital Signatures
  8. Cipher Suites
  9. Session Keys
  10. Key Stretching
  11. Special Considerations for Cryptography
  12. Demo – Identifying Advanced Cryptographic Concepts
  13. Topic B: Select Cryptographic Algorithms
  14. Types of Ciphers
  15. Types of Hashing Algorithms
  16. Types of Symmetric Encryption Algorithms
  17. Types of Asymmetric Encryption Techniques
  18. Types of Key Stretching Algorithms
  19. Substitution Ciphers
  20. Exclusive Or
  21. Cryptographic Modules
  22. Demo – Selecting Cryptographic Algorithms
  23. Topic C: Configure a Public Key Infrastructure
  24. Public Key Infrastructure
  25. PKI Components
  26. CA Hierarchies
  27. The Root CA
  28. Subordinate CAs
  29. Offline Root CAs
  30. Types of Certificates
  31. X.509
  32. Certificate File Formats
  33. CA Hierarchy Design Options
  34. Demo – Installing a CA
  35. Demo – Securing a Windows Server 2016 CA
  36. Topic D: Enroll Certificates
  37. The Certificate Enrollment Process
  38. The Certificate Lifecycle
  39. Certificate Lifecycle Management
  40. The SSL/TLS Connection Process
  41. Demo – Enrolling Certificates
  42. Demo – Securing Network Traffic with Certificates
  43. Topic E: Back Up and Restore Certificates and Private Keys
  44. Private Key Protection Methods
  45. Key Escrow
  46. Private Key Restoration Methods
  47. Private Key Replacement
  48. Demo – Backing Up a Certificate and Private Key
  49. Demo – Restoring a Certificate and Private Key
  50. Topic F: Revoke Certificates
  51. Certificate Revocation
  52. Certificate Revocation List
  53. Online Certificate Status Protocol
  54. Demo – Revoking Certificates
  55. Chapter 08 Review
  56. Review Quiz (Number of attempts allowed: Unlimited)

Module 10 -Addressing Security Issues

(Duration: 45m)

  1. Workbook (Pdf)
  2. Topic A: Troubleshoot Common Security Issues
  3. Access Control Issues Encryption Issues
  4. Data Exfiltration
  5. Anomalies in Event Logs
  6. Security Configuration Issues
  7. Baseline Deviations
  8. Software Issues
  9. Personnel Issues
  10. Asset Management Issues
  11. Demo- Identifying Event Log Anomalies
  12. Topic B: Respond to Security Incidents Incident Response
  13. Incident Preparation
  14. Incident Detection and Analysis
  15. Incident Containment
  16. Incident Eradication
  17. Incident Recovery
  18. Lessons Learned
  19. Incident Response Plans
  20. First Responders
  21. An Incident Report
  22. Guidelines for Responding to Security Incidents
  23. Demo- Responding to a Security Incident
  24. Topic C: Investigate Security Incidents
  25. Computer Forensics
  26. The Basic Forensic Process
  27. Preservation of Forensic Data
  28. Basic Forensic Response Procedures
  29. Order of Volatility
  30. Chain of Custody
  31. Guidelines for Investigating Security Incidents
  32. Demo- Implementing Forensic Procedures
  33. Chapter 10 Review
  34. Review Quiz (Number of attempts allowed: Unlimited)
This course includes
  • about 16.19 hours on-demand video
  • 11 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

$150.00Add to cart

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!