CompTIA Security (SY0-601)
(SY0-601.AE1) / ISBN : 978-1-64459-242-7
About This Course
Gain hands-on experience to pass the CompTIA Security+ certification exam with the CompTIA Security+ (SY0-601) course and lab. Interactive chapters and hands-on labs comprehensively cover the SY0-601 exam objectives and provide knowledge in areas such as security concepts, operating systems, application systems, and many more. The CompTIA Security+ study guide will help you get a full understanding of the challenges you'll face as a security professional.
Skills You’ll Get
The CompTIA Security+ SY0-601 exam verifies that a candidate can assess an enterprise's security posture and recommend and implement appropriate security solutions; monitor and secure hybrid environments, such as cloud, mobile, and IoT; and operate with an understanding of applicable laws and policies, such as governance, risk, and compliance.
Get the support you need. Enroll in our Instructor-Led Course.
Interactive Lessons
18+ Interactive Lessons | 1+ Exercises | 340+ Quizzes | 215+ Flashcards | 170+ Glossary of terms
Gamified TestPrep
90+ Pre Assessment Questions | 2+ Full Length Tests | 90+ Post Assessment Questions | 180+ Practice Test Questions
Hands-On Labs
38+ LiveLab | 00+ Minutes
Introduction
- The Security+ Exam
- What Does This Course Cover?
- Exam SY0-601 Exam Objectives
- SY0-601 Certification Exam Objective Map
Today's Security Professional
- Cybersecurity Objectives
- Data Breach Risks
- Implementing Security Controls
- Data Protection
- Summary
- Exam Essentials
Cybersecurity Threat Landscape
- Exploring Cybersecurity Threats
- Threat Data and Intelligence
- Summary
- Exam Essentials
Malicious Code
- Malware
- Malicious Code
- Adversarial Artificial Intelligence
- Summary
- Exam Essentials
Social Engineering, Physical, and Password Attacks
- Social Engineering
- Password Attacks
- Physical Attacks
- Summary
- Exam Essentials
Security Assessment and Testing
- Vulnerability Management
- Security Vulnerabilities
- Penetration Testing
- Training and Exercises
- Summary
- Exam Essentials
Secure Coding
- Software Assurance Best Practices
- Designing and Coding for Security
- Software Security Testing
- Injection Vulnerabilities
- Exploiting Authentication Vulnerabilities
- Exploiting Authorization Vulnerabilities
- Exploiting Web Application Vulnerabilities
- Application Security Controls
- Secure Coding Practices
- Summary
- Exam Essentials
Cryptography and the Public Key Infrastructure
- An Overview of Cryptography
- Goals of Cryptography
- Cryptographic Concepts
- Modern Cryptography
- Symmetric Cryptography
- Asymmetric Cryptography
- Hash Functions
- Digital Signatures
- Public Key Infrastructure
- Asymmetric Key Management
- Cryptographic Attacks
- Emerging Issues in Cryptography
- Summary
- Exam Essentials
Identity and Access Management
- Identity
- Authentication and Authorization
- Authentication Methods
- Accounts
- Access Control Schemes
- Summary
- Exam Essentials
Resilience and Physical Security
- Building Cybersecurity Resilience
- Response and Recovery Controls
- Physical Security Controls
- Summary
- Exam Essentials
Cloud and Virtualization Security
- Exploring the Cloud
- Virtualization
- Cloud Infrastructure Components
- Cloud Security Issues
- Cloud Security Controls
- Summary
- Exam Essentials
Endpoint Security
- Protecting Endpoints
- Service Hardening
- Operating System Hardening
- Securing Embedded and Specialized Systems
- Summary
- Exam Essentials
Network Security
- Designing Secure Networks
- Secure Protocols
- Attacking and Assessing Networks
- Network Reconnaissance and Discovery Tools and Techniques
- Summary
- Exam Essentials
Wireless and Mobile Security
- Building Secure Wireless Networks
- Managing Secure Mobile Devices
- Summary
- Exam Essentials
Incident Response
- Incident Response
- Incident Response Data and Tools
- Mitigation and Recovery
- Summary
- Exam Essentials
Digital Forensics
- Digital Forensic Concepts
- Conducting Digital Forensics
- Reporting
- Digital Forensics and Intelligence
- Summary
- Exam Essentials
Security Policies, Standards, and Compliance
- Understanding Policy Documents
- Personnel Management
- Third-Party Risk Management
- Complying with Laws and Regulations
- Adopting Standard Frameworks
- Security Control Verification and Quality Control
- Summary
- Exam Essentials
Risk Management and Privacy
- Analyzing Risk
- Managing Risk
- Risk Analysis
- Disaster Recovery Planning
- Privacy
- Summary
- Exam Essentials
Malicious Code
- Identifying Virus Threats
- Detecting Rootkits
Social Engineering, Physical, and Password Attacks
- Using Social Engineering Techniques to Plan an Attack
- Cracking a Linux Password Using John the Ripper
Security Assessment and Testing
- Conducting Vulnerability Scanning Using Nessus
Secure Coding
- Exploiting a Website Using SQL Injection
- Conducting a Cross-Site Request Forgery Attack
- Attacking a Website Using XSS Injection
- Defending Against a Buffer Overflow Attack
Cryptography and the Public Key Infrastructure
- Performing Symmetric Encryption
- Examining Asymmetric Encryption
- Observing an SHA-Generated Hash Value
- Observing an MD5-Generated Hash Value
- Examining PKI Certificates
- Using Rainbow Tables to Crack Passwords
Identity and Access Management
- Examining Kerberos Settings
- Installing a RADIUS Server
Resilience and Physical Security
- Configuring RAID 5
Endpoint Security
- Using the chmod Command
- Examining File Manipulation Commands
Network Security
- Configuring a Standard ACL
- Implementing Port Security
- Configuring a BPDU Guard on a Switch Port
- Configuring VLANs
- Using Windows Firewall
- Performing ARP Poisoning
- Using the ifconfig Command
- Using the traceroute Command
- Capturing Packets Using Wireshark
- Performing Reconnaissance on a Network
- Using the theHarvester Tool to Gather Information about a Victim
- Using the hping Program
- Using Reconnaissance Tools
Incident Response
- Viewing Linux event logs
- Using Event Viewer
- Making Syslog Entries Readable
Digital Forensics
- Using FTK Imager
Security Policies, Standards, and Compliance
- Configuring a Password Policy
Any questions?Check out the FAQs
Still have unanswered questions and need to get in touch?
Contact Us NowCompTIA Network+ and two years of experience in IT administration with a focus on security.
USD 370
Multiple choice and performance-based questions
The exam contains 90 questions.
90 minutes
750
(on a scale of 100-900)
In the event that you fail your first attempt at passing the SY0-601 examination, CompTIA retake policy is:
- CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least fourteen calendar days from the date of your last attempt before you can retake the exam.
- If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
- A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
- Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
Three years