CompTIA Security+ SY0-501

(Pearson-SY0-501-complete) / ISBN : 978-1-61691-994-8
This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
141 Reviews
Get A Free Trial

About This Course

We have a course on the latest Security+ exam, please check out the latest CompTIA Security+ course!

Gain the skills required to pass the CompTIA Security+ SY0-501 certification exam with the CompTIA Security+ SY0-501 course and lab. The lab is versatile and delivers hands-on experience, replacing expensive physical labs. CompTIA Security+ course and lab provide the skills and knowledge required to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security. 

Skills You’ll Get

CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals that include the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and much more. The CompTIA Network+ certification is recommended before taking the Security+ exam.

1

Introduction

  • Who Should Read This Book?
  • CompTIA Security+ Exam Topics
2

Introduction to Security

  • Security 101
  • Think Like a Hacker
  • Threat Actor Types and Attributes
  • Review Key Topics
3

Computer Systems Security Part I

  • Malicious Software Types
  • Delivery of Malware
  • Preventing and Troubleshooting Malware
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
4

Computer Systems Security Part II

  • Implementing Security Applications
  • Securing Computer Hardware and Peripherals
  • Securing Mobile Devices
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
5

OS Hardening and Virtualization

  • Hardening Operating Systems
  • Virtualization Technology
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
6

Application Security

  • Securing the Browser
  • Securing Other Applications
  • Secure Programming
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
7

Network Design Elements

  • Network Design
  • Cloud Security and Server Defense
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
8

Networking Protocols and Threats

  • Ports and Protocols
  • Malicious Attacks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
9

Network Perimeter Security

  • Firewalls and Network Security
  • NIDS Versus NIPS
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
10

Securing Network Media and Devices

  • Securing Wired Networks and Devices
  • Securing Wireless Networks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
11

Physical Security and Authentication Models

  • Physical Security
  • Authentication Models and Components
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
12

Access Control Methods and Models

  • Access Control Models Defined
  • Rights, Permissions, and Policies
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
13

Vulnerability and Risk Assessment

  • Conducting Risk Assessments
  • Assessing Vulnerability with Security Tools
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
14

Monitoring and Auditing

  • Monitoring Methodologies
  • Using Tools to Monitor Systems and Networks
  • Conducting Audits
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
15

Encryption and Hashing Concepts

  • Cryptography Concepts
  • Encryption Algorithms
  • Hashing Basics
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
16

PKI and Encryption Protocols

  • Public Key Infrastructure
  • Security Protocols
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
17

Redundancy and Disaster Recovery

  • Redundancy Planning
  • Disaster Recovery Planning and Procedures
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
18

Social Engineering, User Education, and Facilities Security

  • Social Engineering
  • User Education
  • Facilities Security
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
19

Policies and Procedures

  • Legislative and Organizational Policies
  • Incident Response Procedures
  • IT Security Frameworks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios

1

Introduction to Security

  • Using Windows Defender
2

Computer Systems Security Part I

  • Managing Windows Firewall
  • Encrypting Files with EFS
3

Computer Systems Security Part II

  • Configuring Windows Firewall
  • Using BitLocker in Windows 10
4

OS Hardening and Virtualization

  • Configuring Group Policy Settings
  • Managing Services with Group Policy
  • Configuring Audit Group Policy
  • Creating a Virtual Machine
  • Importing a Virtual Machine
  • Configuring Secondary Virtual Hard Disk
5

Network Design Elements

  • Installing the Web Server IIS Server Role
  • Installing and Configuring NLB
  • Creating a Virtual Switch
  • Configuring a Perimeter Firewall
  • Viewing Results of Live Hosts
  • Verifying Network Services
  • Enabling Intrusion Prevention and Detection
  • Spoofing MAC Address with SMAC
  • Clearing the DNS Cache
  • Performing for ARP Spoofing
  • Detecting a Phishing Site Using Netcraft
6

Networking Protocols and Threats

  • Preventing Zone Transfers
  • Simulating a DoS Attack
7

Network Perimeter Security

  • Implementing Data Execution Prevention
8

Securing Network Media and Devices

  • Securing Default Accounts
  • Resetting a Password
  • Creating a Fine-Grained Password Policy
  • Configuring Remote Access VPN
  • Configuring a Static TCP/IP Address
9

Physical Security and Authentication Models

  • Configuring Kerberos Policy Settings
  • Installing Remote Access Services
10

Access Control Methods and Models

  • Assigning Permissions to Folders
  • Restricting Local Accounts
  • Creating a User Account and Configuring Restrictions
  • Configuring Account Policies
  • Managing a User Account
11

Vulnerability and Risk Assessment

  • Running a Security Scan to Identify Vulnerabilities
  • Remediating Vulnerabilities on the Local Workstation
  • Remediating Vulnerabilities on the Network 
12

Monitoring and Auditing

  • Using Network Monitoring
  • Observing Traffic Patterns Using Wireshark
  • Analyzing Protocols with Wireshark
  • Working with Task Manager
  • Viewing Running Processes on a Linux-based Machine
  • Enabling Debug Logging on the DNS Server
  • Enabling Audit Policies
  • Enabling Object Access Auditing
13

Encryption and Hashing Concepts

  • Observing MD5 Hash
14

PKI and Encryption Protocols

  • Configuring SSL Connections
  • Configuring the SSL Port Setting
  • Using OpenSSL to Create a Public/Private Key Pair
  • Adding a Certificate to MMC
15

Redundancy and Disaster Recovery

  • Installing Windows Server Backup
  • Creating a Backup Schedule
  • Creating a Backup Once

Why Do Learners Love This Course?

The platform is complete and easy to use! everything needed to pass the test is on the course! It has everything I was looking for, more than a certificate, you learn true! Thanks for the opportunity!

Emanuel Sousa
Network and Security

I think getting certifications these days are beneficial in finding jobs and gaining more skills, especially in the computer science field. After using UCertify for CompTIA Security, I was impressed that how all the tools were setup for success, from the Pre Assessment that allows you to see where you stand in that course before you start, I think that is big step forward for online courses. Another thing that impressed me was how it did cover all the topics that are coming in the exam. In other words, it saves you much time in the progress of achieving the certification. It is like the best bundle I worked with. Having an example test makes users to experience what they are going to face in the test so they can plan for it and be prepared. All the tools are designed so you will feel confident about the exam. The course made me feel the user will have all the resources for success.

Sina Masoumzadeh
Sina Masoumzadeh
Research Assistance in Artificial Intelligence

The course gave a good amount of knowledge on CompTIA Security concepts and was crisp. I am happy to have invested my time on this course.

Jasper Lee
Jasper Lee
Instructor

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

CompTIA Network+ and two years of experience in IT administration with a focus on security.

USD 370

Multiple choice and performance-based questions

The exam contains 90 questions.

90 minutes

750

(on a scale of 100-900)

In the event that you fail your first attempt at passing the Security+ examination, CompTIA's retake policies are:

  • CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least fourteen calendar days from the date of your last attempt before you can retake the exam.
  • If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
  • A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.

The CompTIA Security+ SY0-501 certification exam is going to retire on July 31, 2021.

CompTIA Security+ SY0-501

$ 429.53

Buy Now

Related Courses

All Course
scroll to top