CompTIA Security+ SY0-401

Select currency

CompTIA Security+ SY0-401
299 USD 44.85 USD 85%
Test scorm

CompTIA's Security+ is a vendor-neutral certification that validates the competency of security professionals working in the IT industry. The Security Plus Certification confirms a technician's critical knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts.read more

Course Curriculum

  • Introduction
  • Course Overview

Domain 1.0 - Network Security

  • Network Devices
  • Test Questions
  • Secure Network Administration
  • Secure Network Design Elements
  • Secure and Insecure Network Protocols
  • Network Ports
  • Secure Wireless
  • Domain Review
  • 1.2 Test Prep Questions
  • 1.3 Test Prep Questions
  • 1.4 Test Prep Questions
  • 1.5 Test Prep Questions
  • 1.6 Test Prep Questions
  • Review Quiz

Domain 2.0 - Compliance and Operational Security

  • Risk Concepts
  • Risk Mitigation
  • Incident Response
  • Security Training
  • Business Continuity
  • Environmental Controls
  • Disaster Recovery
  • Confidentiality, Integrity and Availability (CIA)
  • Domain Review
  • Installing Virtual PC and Active Directory Domain Services
  • Windows Server Backup
  • 2.1 Test Prep Questions
  • 2.2 Test Prep Questions
  • 2.3 Test Prep Questions
  • 2.4 Test Prep Questions
  • 2.5 Test Prep Questions
  • 2.6 Test Prep Questions
  • 2.7 Test Prep Questions
  • 2.8 Test Prep Questions
  • Review Quiz

Domain 3.0 - Threats and Vulnerabilities

  • Malware Types
  • Attack Types
  • Social Engineering Attacks
  • Wireless Attacks
  • Application Attacks
  • Attack Mitigation and Deterrence
  • Attack Assessment Tools
  • Penetration Testing vs. Vulnerability Assessment
  • Domain Review
  • Threats and Vulnerability Exercises
  • Auditing
  • Browser Security
  • Personal Firewall
  • Windows Software Update Services
  • Password Crackers
  • WinPatrol
  • Deep Freeze
  • Exercises Review
  • Module Review
  • 3.1 Test Prep Questions
  • 3.2 Test Prep Questions
  • 3.3 Test Prep Questions
  • Review Quiz

Domain 4.0 - Application, Data and Host Security

  • Application Security
  • Host Security
  • Data Security
  • Domain Review
  • Vulnerabilities Exercises
  • Anti-Malware
  • Malicious Software Removal Tool
  • Identifying Vulnerabilities
  • Security Templates
  • Exercises Review
  • 4.1 Test Prep Questions
  • 4.2 Test Prep Questions
  • Review Quiz

Domain 5.0 - Access Control and Identity Management

  • Functions of Authentication Services
  • Authentication, Authorization, and Access Control
  • Account Management
  • Domain Review
  • Access Control and Identity Management Exercises
  • Creating a Workstation
  • Creating an OU and Delegating Control
  • Disabling an Account
  • Setting Workstation Restrictions
  • Exercises Review
  • 5.1 Test Prep Questions
  • 5.2 Test Prep Questions
  • 5.3 Test Prep Questions
  • Review Quiz

Domain 6.0 - Cryptography

  • Cryptography Concepts
  • Cryptography Tools, Products, and Algorithms
  • Public Key Infrastructure
  • Certificate Services, Servers and Requests
  • Use Steganography Software
  • Domain Review
  • 6.1 Test Prep Questions
  • 6.2 Test Prep Questions
  • 6.3 Test Prep Questions
  • Review Quiz
  • Course Close
  1. Module 1
7
Start
Host Security
8
Start
Additional Security Concepts
9
Start
Module Close
  1. Module 2
10
Start
Organizational Security
11
Start
What is a Security Program
12
Start
Operational Process
13
Start
Password Policies
14
Start
Demo - Password Policies
15
Start
Social Engineering
16
Start
Security Policies
17
Start
Concepts the Support Policies
18
Start
Human Resources Policies
19
Start
Module Close
  1. Module 3
20
Start
Privacy, Ethics and Legal issues
21
Start
Cybercrime
22
Start
Reactions to Cybercrime
22
Start
Reactions to Cybercrime
23
Start
Module Close
  1. Module 4
24
Start
Cryptography
25
Start
Cryptography Explained
26
Start
Ciphers
27
Start
Cryptographic Math and Hashing
28
Start
Algorithms and Encryption
28
Start
Algorithms and Encryption
28
Start
Algorithms and Encryption
29
Start
Symmetric and Asymmetric Working Together
30
Start
Digital Signatures
31
Start
Module Close
  1. Module 5
32
Start
Public Key Infrastructure
33
Start
Basics of Public Key Infrastructures
34
Start
Certificate Hierarchies
35
Start
Trust and Certificate Verification
36
Start
Types of Certificates and Extensions
37
Start
Certificate Revocation List
38
Start
Key Protection
39
Start
Key Recovery
40
Start
Trust Models
41
Start
Module Close
  1. Module 6
42
Start
Standards and Protocols
43
Start
Standards and Protocols Supporting PKI
44
Start
SSL and TLS
45
Start
S/MIME
46
Start
IPsec
47
Start
Common Criteria - CC
48
Start
Module Close
  1. Module 7
49
Start
Physical Security
50
Start
Physical Security Measures
51
Start
Access Controls and Monitoring
52
Start
Biometrics
53
Start
Module Close
  1. Module 8
54
Start
Infrastructure Security
55
Start
Infrastructure Security - Printers and Workstations
56
Start
Servers and Devices
57
Start
VLANs and Firewalls
58
Start
Securing Wireless Access Points
59
Start
VPN - Network Access Control
60
Start
Network Monitoring
61
Start
Handling Big Data and Physical Security
62
Start
Security Zones, VLANs and NAT
63
Start
Virtualization and Cloud Computing
64
Start
Module Close
  1. Module 9
65
Start
Authentication and Remote Access
66
Start
Remote Access and Kerberos
67
Start
Alternatives to Passwords
68
Start
Other Protocols
69
Start
Federated Authentication
70
Start
HOTP and TOTP
71
Start
Remote Access Protocols Authentication
72
Start
Module Close
  1. Module 10
73
Start
Wireless Security
74
Start
Wireless Networking
75
Start
Bluetooth
76
Start
Controlling the Radio Waves
77
Start
WPA Encryption
78
Start
Module Close
  1. Module 11
79
Start
Intrusion Detection Systems
80
Start
Intrusion Detection Systems - HIDs
81
Start
HIDs Advancements and Anti-Virus
82
Start
Demo - Windows Defender
83
Start
Network-Based IDSs
84
Start
Content-Based Signatures and Proxy Servers
85
Start
Protocol Analyzers
86
Start
Anti-Spam Techniques
87
Start
Module Close
  1. Module 12
88
Start
Security Baselines
89
Start
Overview of Baselines
90
Start
Operating System Hardening
91
Start
Demo - Windows Update
92
Start
Network Hardening
93
Start
Application Hardening and Patch Management
93
Start
Application Hardening and Patch Management
94
Start
Module Close
  1. Module 13
95
Start
Attacks and Malicious Software
96
Start
Avenues of Attack
97
Start
Minimizing Possible Avenues of Attack
98
Start
DDOS Mitigation
99
Start
Null Sessions and Privilege Escalation
100
Start
IP Address Spoofing
101
Start
Replay Attacks and TCP/IP Hijacking
102
Start
Password Attacks and Software Exploitation
103
Start
Viruses
104
Start
Other Malware
105
Start
Module Close
  1. Module 14
106
Start
E-mail and Instant Messaging
107
Start
End User Issues with Email
108
Start
Enterprise Mitigation Techniques
109
Start
Module Close
  1. Module 15
110
Start
Web Components
111
Start
Web Components and Concerns
112
Start
HTTP and HTTPS
113
Start
Code-Based Vulnerabilities
114
Start
Mitigations and Cookies
115
Start
Application-Based Weaknesses
116
Start
Module Close
  1. Module 16
117
Start
Disaster Recovery and Business Continuity
118
Start
Disaster Recovery
119
Start
Backups
120
Start
Storage Considerations
121
Start
Raid
122
Start
Module Close
  1. Module 17
123
Start
Risk Management
124
Start
Risk Management Key Terms
125
Start
Risk Management Process
126
Start
General Risk Management Model
127
Start
Software Engineering Institute Model
128
Start
Common Objective Approach
129
Start
Security Integration Issues with Third Parties
130
Start
Module Close
  1. Module 18
131
Start
Change Management
132
Start
Change Management Procedures
133
Start
Change Management Workflow
134
Start
Maintaining Code Integrity
135
Start
Module Close
  1. Module 19
136
Start
Privilege Management
137
Start
Privilege Management Details
138
Start
Centralized Management
139
Start
Access Control Models
140
Start
Module Close
  1. Module 20
141
Start
Computer Forensics
142
Start
Computer Forensics and Evidence
143
Start
The Investigative Process
144
Start
Module Close

What learning resources are included?

Expert-led Video Courses

Our courses are video-based, expert instructor-led E-Learning, set in an advanced self-study format with enhanced user controls which offer a much better learning experience compared to traditional classroom training.

Unlike classroom-based training, you can play, pause, forward, rewind and repeat courses and learn at your own pace – anytime, anywhere.

Also included in the videos are demonstrations and visual presentations that allow students to develop their skills, based on real-world scenarios.

Our courses combine proven learning methodologies with the latest technology, ensuring that you have the tools you need to succeed and that you get the most value from your IT training investment.

Quizzes

Each course includes quizzes that measure your skills growth as you progress through your course as well as assess your readiness before you take the official certification exam. This allows you to gain confidence in preparation for the exam and helps ensure that you pass the exam the first time around.

*Please note that quizzes are available for almost all of our courses – only a handful of courses do not include quizzes.

Navigation & Controls

Our self-paced training programs are designed in a modular fashion that allows you the flexibility to work with expert level instruction anytime, anywhere. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training.

Discussion Board

Each course contains a discussion-board section where students can engage with one another. Ask questions, get advice and join in-group conversations as it relates to the particular course.

For how long will I be able to access the course?

The standard subscription period is one year. This can sometimes be longer, depending on if you have purchased courses on a promotion that specifically provides a longer access period.

If the access period is longer than one year, it will be indicated in the promotion.

Who presents the courses?

We only use the industry’s finest instructors. They have a minimum of 15 years’ experience, are subject matter experts in their fields and hold all the qualifications that are relevant to the particular certification.

Our instructors not only prepare you for your exams but also provides practical examples and scenarios based on real-world experience.

For how long will I be able to access the course?

The standard subscription period is one year. This can sometimes be longer, depending on if you have purchased courses on a promotion that specifically provides a longer access period.

If the access period is longer than one year, it will be indicated in the promotion.

What Are The Requirements?

Academic

All our courses require an acumen for information technology, basic knowledge of computers, and experience in working with Microsoft Windows and internet browsers. All courses are presented in English and a good knowledge and understanding of English is essential.

In addition, each individual certification program has its own academic requirements. The prerequisite knowledge and experience required for each certification is available on the website of the respective certification vendor (CompTIA, Microsoft, Cisco etc.). It is of paramount importance that you ensure that you meet all the requirements (as set-out on the certification vendor’s website) before you enroll in a course.

Technical

  • A laptop or desktop computer with Microsoft Windows
  • An internet browser (Google Chrome, Internet Explorer, Firefox) that is up to date
  • High-speed/broadband internet access
  • Speakers or earphones

Can I view a course before I buy?

Yes. Under the “Curriculum” section of this course, you will see the list of modules included in the course. You can try the first few modules of the course before buying it.

What if I am not happy with the course I have purchased?

If for any reason you are not satisfied with your purchase, we will give you your money back – no hassle and no questions asked. Our refund policy is valid for 10 days from the date of your purchase and applies to all course purchases. To request a refund, simply contact us and we will process your refund within 24 hours.

What else do I need to know?

  • This is an online course - classroom training is not included.
  • You will only receive a qualification – from the relevant vendor - once you have passed the official international certification exam(s).
  • For detailed information on specific exam requirements, prerequisites, costs and other information, please visit the respective certification vendor’s website (CompTIA, Microsoft, Cisco etc.).
  • International certification centres – Prometric, VUE, CertiPort and others - depending on the particular vendor and certification, administer the official exams.
  • The cost of exams are not included in the course fees.
  • This course does not include Live Labs. Live Labs are available as stand-alone programs and in our CertKit’s where courses and labs are combined as bundles.

Why get certified?

Get a Job

Certification holds significant benefits for organizations – increasing your chances to gain employment and securing a career towards success.

  • Teams are trained to consistent skills levels.
  • Certification provides a recognised benchmark of skills that can be aligned to organisational skills frameworks.
  • Certificated people are typically more productive and work to consistent standards. A recent survey by Novell found that certification can reduce downtime, because staff members have the skills needed to cope with issues as they arise - and that certified people made more use of a product's advanced features and could deploy new products with greater ease.
  • More reliable project completion: a Microsoft survey showed that when 60% of a team is Microsoft-certified, 80% of projects are delivered on time and within budget, compared to just 40% when only 25% of the team is certified.
  • Gaining certifications can be aligned to performance-related pay.
  • Certification ensures that knowledge has been retained.
  • Greater customer satisfaction (internal and external customers).
  • Lower staff turnover.

Get Recognized

A professional certification sets a person apart as someone who is exceptional, who really knows his/her job. Gaining a professional certification is not easy - but then again, it is not meant to be. Sixty four per cent of IT recruiters rate certifications as having extremely high or high value in validating the skills and expertise of job candidates. (CompTIA, Employer Perceptions of IT Training and Certification, January 2011). Some of the benefits to individuals include:

  • Certified people are more employable: according to an IDC white paper, "Sixty-three percent of hiring managers believe certified individuals are more productive than their non-certified counterparts."
  • You could earn more: a survey of MCPs by IDC found that 43% got a pay rise after gaining their certification.
  • Some certifications make you part of a professional network, for example, Microsoft Certified Professionals belong to a community that only they can access.

Get Ahead

Professional certifications (whether IT or not) have been with us more than two decades - and, during that time, there has been considerable research undertaken to assess the benefits of certification.

Key findings from 'Measuring the pulse of the IT industry' - research undertaken by CompTIA:

  • 56% of managers consider CompTIA certification to be an important factor when hiring people and 34% go as far as to require it.
  • 53% of managers would offer a higher salary to a job candidate with CompTIA certification.
  • 74% of managers say that CompTIA certification is an important factor in considering a person for promotion.
  • 78% of managers believe that CompTIA certification is an important step in validating an employee's skills.
  • 53% of managers feel that having CompTIA-certified employees makes the organisation more attractive to business partners and clients.
  • A help desk with certified professionals can handle 11% more phone calls and 28% more field service calls, with a lower staff turnover rate (16% versus 24%).
  • Fewer certified staff are required to manage a network, resulting in lower salary costs.

Key findings from 'Financial Benefits to Supporters of Microsoft Professional Certification', a report by market research company IDC:

  • Companies with Microsoft Certified Professionals experienced shorter server downtimes and greater productivity in the help-desk function, which more than paid for the direct and indirect costs associated with certification.
  • The cost of certification in an average organisation is recouped in about four months. Its supporting survey showed that Microsoft Certified Professionals are more productive than non-certified support staff.

Key findings from an IDC study, 'Benefits and Productivity Gains Realised through IT Certification':

  • Certified professionals handled 40% more support calls per person, per day, than non-certified staff.
  • Companies that advocated for certification reported 49% less downtime than companies that did not.
  • For the majority of companies, the savings from increased effectiveness paid the costs of certification in fewer than 9 months.

No reviews for this course !

Add New Discussion

How do you rate this product?