New members: get your first 7 days of ITTutorPro Premium for free! Join for free

CompTIA Security+ ( Plus ) Certification ( SY0-601 )...

Course Description

14.4 Hours

91 Videos

The CompTIA Security+ ( Plus ) SY0-601 training provides students with core security skills needed to function in a security role in Information Security.

Security Plus certification provided by CompTIA is a globally recognized certification for IT security professionals. It is the foundation needed to work in and grow your career in a rewarding cybersecurity role. The office exam id is SY0-601.

After taking this Security+ Plus Certification training, students are prepared to sit for exam SY0-601 required by CompTIA for certification. Following this course, students wanting to advance in a cybersecurity field should consider the more advanced CySA+ course.

As a Certified Security plus professional, you will have skills that exhibit the ability to work hands-on as a problem solver. Your job role will typically include securing company systems, software, and hardware. You will gain skills in risk assessment, incident response management, security controls, computer forensics, networks, and cloud operations.

Security+ Exam (SY0-601) Objectives

Per CompTIA, the following exam objectives have been established for the Security+ certification:

The CompTIA Security+ certification exam SY0-601 will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identity, analyze, and respond to security events and incidents.

Key Makeup of Exam SY0-601

Up to 85 test questions
A combination of multiple-choice and performance-based questions.
Exam time is 90 minutes
A passing score is 750 on a scale of 100-900
Testing and official certification are provided by CompTIA. Click here for testing options.

Key Learning Topics In This Course

Security Roles Control and Frameworks
Threat Actor Types, Attack Vectors, and Intelligence Sources
Organization Security
Indications of Malware Attacks
Network Design and Hardware
Network Protocols
Endpoint Security
Privacy and Data Protection
And More…(See course outline below)

Potential Career Titles

System Administrators
Help Desk Analysts
Network Engineers
Software Developers
IT Managers
Cloud & Network Engineers

Who This Course Is For

The CompTIA Security+ ( Plus ) certification is considered to be an entry-level certification for those wanting to enter the field of information security. It is recommended that student have a basic understanding of key IT technology terms. This training can also be combined with the CompTIA Network+ training to have a better comprehension of the learning topics.


Share on:

Course Syllabus

Module 1: Information Security Roles Security Control and Framework Types

  1. Introduction and Overview
  2. Compare and Contrast Information Security Roles
  3. Compare and Contrast Security Control and Framework Types
  4. Module Summary

Module 2: Explain Threat Actor Types, Attack Vectors, and Intelligence Sources

  1. Explain Threat Actor Types and Attack Vectors
  2. Explain Threat Intelligence Sources
  3. Module Summary

Module 3: Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing

  1. Assess Organizational Security with Network Reconnaissance Tools
  2. Packet Capture and Replay Demo
  3. Explain Security Concerns with General Vulnerability Types
  4. Summarize Vulnerability Scanning Techniques
  5. Explain Penetration Testing Concepts
  6. Module Summary

Module 4: Social Engineering, Indicators of Malware Attacks

  1. Compare and Contrast Social Engineering Techniques
  2. Analyze Indicators of Malware-based Attacks
  3. Fork Bomb Malware Demo
  4. Module Summary

Module 5: Cryptography

  1. Compare and Contrast Cryptographic Ciphers
  2. Summarize Cryptographic Modes of Operation
  3. Summarize Cryptographic Use Cases and Weaknesses
  4. Summarize Other Cryptographic Technologies
  5. Module Summary

Module 6: Certificates and PKI

  1. Implement Certificates and Certificate Authorities
  2. Implement PKI Management
  3. Implementing a PKI Demo
  4. Module Summary

Module 7: Authentication

  1. Summarize Authentication Design Concepts
  2. Implement Knowledge-based Authentication
  3. Password Cracker Demo
  4. Implement Authentication Technologies
  5. Summarize Biometrics Authentication Concepts
  6. Module Summary

Module 8: Identity and Accounts, Authorization, Personnel Polices

  1. Implement Identity and Account Types
  2. Implement Account Policies
  3. Account Types and Polices Demo
  4. Implement Authorization Solutions
  5. Explain the Importance of Personnel Policies
  6. Module Summary

Module 9: Network Design and Hardware (Part 1)

  1. Implement Secure Network Designs
  2. Implement Secure Switching and Routing
  3. Various Types of Network Attacks Demo
  4. Implement Secure Wireless Infrastructure
  5. Implement Load Balancers
  6. Module Summary

Module 10: Network Hardware (Part 2)

  1. Implement Firewalls and Proxy Servers
  2. Implement Network Security Monitoring
  3. Summarize the Use of SIEM
  4. Module Summary

Module 11: Network Protocols

  1. Implement Secure Network Operations Protocols
  2. Implement Secure Application Protocols
  3. Implement Secure Remote Access Protocols
  4. Module Summary

Module 12: Endpoint Security

  1. Implement Secure Firmware
  2. Implement Endpoint Security
  3. Endpoint Protection Demo
  4. Explain Embedded System Security Implications
  5. Module Summary

Module 13: Mobile Devices

  1. Implement Mobile Device Management
  2. Implement Secure Mobile Device Connections
  3. Module Summary

Module 14: Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment and Automation

  1. Analyze Indicators of Application Attack
  2. Analyze Indicators of Web Application Attacks
  3. Summarize Secure Coding Practices
  4. Implement Secure Script Environments
  5. Summarize Deployment and Automation Concepts
  6. Module Summary

Module 15: Secure Coding, Scripting, Deployment, Cloud and Virtualization

  1. Summarize Secure Cloud and Virtualization Services
  2. Apply Cloud Security Solutions
  3. Summarize Infrastructure as Code Concepts
  4. Module Summary

Module 16: Privacy and Data Protection

  1. Explain Privacy and Data Sensitivity Concepts
  2. Explain Privacy and Data Protection Controls
  3. Module Summary

Module 17: Incident Response

  1. Summarize Incident Response Procedures
  2. Utilize Appropriate Data Sources for Incident Response
  3. Apply Mitigation Controls
  4. Module Summary

Module 18: Forensics

  1. Explain Key Aspects of Digital Forensics Documentation
  2. Explain Key Aspects of Digital Forensics Evidence Acquisition
  3. Module Summary

Module 19: Risk Management and Business Impact Analysis

  1. Explain Risk Management Processes and Concepts
  2. Explain Business Impact Analysis Concepts
  3. Module Summary

Module 20: Redundancy and Backup Strategies

  1. Implement Redundancy Strategies
  2. Implement Backup Strategies
  3. Implement Cybersecurity Resiliency Strategies
  4. Module Summary

Module 21: Physical Security

  1. Explain the Importance of Physical Site Controls
  2. Explain the Importance of Physical Host Security Controls
  3. Module Summary

From: $14.99 / month

  • Vast selection of courses and labs Access
  • Unlimited access from all devices
  • Learn from industry expert instructors
  • Assessment quizzes and monitor progress
  • Vast selection of courses and labs Access
  • Blended Learning with Virtual Classes
  • Access to new courses every quarter
  • 100% satisfaction guarantee

You Will Get Certification After Completetion This Course.

Instructor Led Lectures
All IT Tutor Pro Formerly It Nuggets Courses replicate a live class experience with an instructor on screen delivering the course’s theories and concepts.These lectures are pre-recorded and available to the user 24/7. They can be repeated, rewound, fast forwarded.
Visual Demonstrations, Educational Games & Flashcards
IT Tutor Pro Formerly It Nuggets recognizes that all students do not learn alike and different delivery mediums are needed in order to achieve success for a large student base. With that in mind, we delivery our content in a variety of different ways to ensure that students stay engaged and productive throughout their courses.
Mobile Optimization & Progress Tracking
Our courses are optimized for all mobile devices allowing students to learn on the go whenever they have free time. Students can access their courses from anywhere and their progress is completely tracked and recorded.
Practice Quizzes And Exams
IT Tutor Pro Formerly It Nuggets Online’s custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. Students will have practice quizzes after each module to ensure you are confident on the topic you are learning.
World Class Learning Management System
IT Tutor Pro Formerly It Nuggets provides the next generation learning management system (LMS). An experience that combines the feature set of traditional Learning Management Systems with advanced functionality designed to make learning management easy and online learning engaging from the user’s perspective.

Frequently Asked Questions

How does online education work on a day-to-day basis?
Instructional methods, course requirements, and learning technologies can vary significantly from one online program to the next, but the vast bulk of them use a learning management system (LMS) to deliver lectures and materials, monitor student progress, assess comprehension, and accept student work. LMS providers design these platforms to accommodate a multitude of instructor needs and preferences.
Is online education as effective as face-to-face instruction?
Online education may seem relatively new, but years of research suggests it can be just as effective as traditional coursework, and often more so. According to a U.S. Department of Education analysis of more than 1,000 learning studies, online students tend to outperform classroom-based students across most disciplines and demographics. Another major review published the same year found that online students had the advantage 70 percent of the time, a gap authors projected would only widen as programs and technologies evolve.
Do employers accept online degrees?
All new learning innovations are met with some degree of scrutiny, but skepticism subsides as methods become more mainstream. Such is the case for online learning. Studies indicate employers who are familiar with online degrees tend to view them more favorably, and more employers are acquainted with them than ever before. The majority of colleges now offer online degrees, including most public, not-for-profit, and Ivy League universities. Online learning is also increasingly prevalent in the workplace as more companies invest in web-based employee training and development programs.
Is online education more conducive to cheating?
The concern that online students cheat more than traditional students is perhaps misplaced. When researchers at Marshall University conducted a study to measure the prevalence of cheating in online and classroom-based courses, they concluded, “Somewhat surprisingly, the results showed higher rates of academic dishonesty in live courses.” The authors suggest the social familiarity of students in a classroom setting may lessen their sense of moral obligation.
How do I know if online education is right for me?
Choosing the right course takes time and careful research no matter how one intends to study. Learning styles, goals, and programs always vary, but students considering online courses must consider technical skills, ability to self-motivate, and other factors specific to the medium. Online course demos and trials can also be helpful.
What technical skills do online students need?
Our platform typically designed to be as user-friendly as possible: intuitive controls, clear instructions, and tutorials guide students through new tasks. However, students still need basic computer skills to access and navigate these programs. These skills include: using a keyboard and a mouse; running computer programs; using the Internet; sending and receiving email; using word processing programs; and using forums and other collaborative tools. Most online programs publish such requirements on their websites. If not, an admissions adviser can help.