Details

The U.S. Department of Labor forecasts that information security analysts will be among the fastest-growing occupations through 2022. CompTIA's Security+ certificate is widely regarded as the entry-level certificate for this fast-growing field. Getting that certificate requires passing CompTIA's challenging SY0-501 exam.

This course covers the key terminology and concepts you need to know to ace the exam, all in a condensed format for rapid reading. The course provides helpful study tools including games and practice questions to aid with learning. All of the content is geared toward helping you pass the SY0-501 exam, so you can leave the test center with your Security+ certificate in hand, whether you are taking the exam for the first time, or using it as a refresher to renew your certification.

Enrollment Options:

Instructor-Led
6 Weeks Access Course Code: scp
Start Dates* Oct 13 | Nov 17 | Dec 15 | Jan 06
*Choose start date in cart

$NA

USD
Self-Paced
3 Months Access Course Code: T9224
No Instructor, Start Anytime

$NA

USD

Enroll before 30th September and get high quality lamination on your hardcopy certificate absolutely free! Use your certificate to your advantage by showing your certified credentials to prospective employers and recruiters. All certificates are shipped from our mailing center in California.

Syllabus

The Security+ Exam and Basic Network Security

Computer security and related computer-support specialties are among today's fastest-growing occupations. Getting a CompTIA Security+ credential is your first step to gaining entrance into this exciting, fast-paced field. By the time you finish this first lesson, you'll know what you need to do to achieve a Security+ credential. You'll also understand the basic goals, tools, and techniques of computer security.

Network Security Administration

This lesson reviews the tasks and actions a secure network administrator performs, including setting up security rules and ensuring secure device configurations. You will also learn what you need to consider in the design of a secure network, including definitions, structures, and methods that combine to create a secure network environment.

Network Security Protocols

Lesson 3 explores the common network security protocols and ports in use on secure networks and focuses on which ones are most likely to show up on the Security+ exam. You'll learn the purpose and function of each of the protocols and features in this lesson. This knowledge will help you not only pass the exam, but also work as a successful secure network administrator.

Compliance and Operational Security: Part 1

If you work as a secure network administrator, you'll spend most of your days focusing on risk. Risk comes in many forms, and identifying, mitigating, and reducing risk is what network security is all about. In this lesson, you'll get a broad overview of how you can deal with risks. Explore security policies, risk analysis, risk control methods, and the duties of risk administration.

Incident Response

Despite your best efforts, there are times when a security incident will occur. In this lesson, you'll learn how to respond to an incident. Explore the forensic processes you can use to gather evidence after an incident and go over the procedures used to report and record the outcome of your investigation. With thorough incident response, you'll be able to minimize the damage from an incident and find out how you can prevent similar incidents from happening in the future.

Compliance and Operational Security: Part 2

This lesson explores some topics important to keeping your network secure and performing at its best, starting with user awareness. When it comes to preventing security incidents, how can you make an organization's employees your allies instead of your enemies? You will learn some compliance procedures, how to classify information according to its sensitivity, and then how to apply security protections accordingly. Next, you will learn some physical and logical security options. Finally, learn how to secure the network's environment from hazards such as weather, fire, and high heat or humidity. There's a lot to think about when securing a network, but you'll get a good grasp on the ins and outs in this lesson.

Threat Awareness, User Behaviors, and Business Continuity

Many of the threats that face a secure network come from sources you might not expect. Network users can be unknowingly creating vulnerabilities every day. The Web provides avenues to attackers who wish to infect networks with viruses, phishing attacks, and other types of exploits. The expansion of social networking and even simple peer-to-peer file sharing across a network can also add new types of threats to your network. While these threats can affect the network, they can also interrupt the continuity of your business operations. This lesson investigates each potential threat and how you can keep threats at bay.

Redundancy, Fault Tolerance, and Resiliency

Even the best security designs and implementations are only in effect if an entire system is up and running. If part of a system or network fails, its security measures could also fail simply because they aren't running. This lesson looks at the various methods and technologies that help to ensure that a system or network remains up and running. Explore redundancy and fault tolerance; how RAID can help you achieve them; and high availability, clustering, load balancing, failover, and network resiliency. By the end of this lesson, you'll have a good understanding of how these technologies help prevent network downtime.

Malware, Network, and Social Engineering Attacks

This is the first of three lessons in which focusing on threats and vulnerabilities. Lesson 9 covers the various types of malware, the different types of attacks that threaten your network, and the variety of social engineering attacks that seek to gain information about you, your users, your organization, and your network. Once you know your enemy, you'll be better prepared to protect your network.

Wireless Threats and Vulnerabilities

So far, you have learned about many threats that affect wired networks. But wireless networks have their own unique set of threats and vulnerabilities. This lesson teaches you about wireless threats and vulnerabilities. You'll find out the strategies behind many wireless attacks, including client-to-client attacks, war jacking, interception attacks, and more. Finally, you'll see how to design a wireless network for maximum security and mitigation of these threats.

Application and Injection Attacks

This lesson continues exploring the many types of threats and vulnerabilities that can hurt a network with a look at application and injection attacks. You will also learn about the actions of attackers, the types of attacks they can launch, and the mitigation methods used to determine the nature and damage of an attack. By the end of this lesson, you'll not only be well-informed about the types of attacks you can expect to see while working in network security, but you'll also know what methods you can use to prevent and minimize damage from attacks.

Protective Measures

In the final lesson of the course, you will explore a few methods and security measures that you can apply to a network to reduce its vulnerabilities. First, understand the hardening process, which includes tasks such as securing accounts, removing unnecessary accounts, and applying port security. Then look at different types of intrusion detection and prevention systems. The lesson wraps up with the tools and processes some of these systems use. You will learn how you can put some of the concepts you've been learning throughout this course into practice on a network.

Requirements

Hardware Requirements:

  • This course can be taken on either a PC or Mac.

Software Requirements:

  • PC: Windows 8 or newer.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.

Other:

  • Email capabilities and access to a personal email account.

Prerequisites

There are no prerequisites to take this course.

Instructor

Ron Gilster is a best-selling author with more than 40 titles in print. He writes on topics including information technology (IT) certifications, real estate, and business. Ron has held a variety of IT-related positions, ranging from computer operator to senior manager. He has worked in consulting, manufacturing, software development, telecommunications, and higher education. He has an MBA and holds A+, Network+, i-Net+, CCNA, and AAGG certifications. He has developed and facilitated numerous courses and has taught in A+, Network+, and CCNA boot camps. His books include CompTIA Cloud+ CV0-001 In Depth,CCNA For Dummies, A+ Certification for Dummies, Server+ For Dummies, Network+ For Dummies, i-Net+ For Dummies, Cisco Networking For Dummies, MCSA For Dummies, CCDA For Dummies, Microsoft Office SharePoint Server 2007: A Beginner's Guide, CEA-CompTIA DHTI+ Digital Home Technology Integrator All-In-One Exam Guide, and PC Hardware: A Beginner's Guide.

Reviews

The median annual pay for computer security technicians was $55,510 in May 2021.


According to the U.S. Bureau of Labor Statistics (www.bls.gov), the median annual pay for computer security technicians was $55,510 in May 2021. As computer security technician, you can be part of an IT support team for all types of organizations, providing technical support and ensuring the company functions smoothly. CompTIA is the industry standard for establishing a career in IT and is the preferred certification for technical support and IT operational roles. The employment of CompTIA certified professionals is projected to grow 8 percent from 2019 to 2029, much faster than the average for all professions. Join the ranks of hundreds of individuals who have successfully completed the CompTIA Certifications through us and go on to work as a IT support specialist, IT field service technician, desktop support analyst, and much more.

About ExpertRating

ExpertRating is an ISO 9001:2015 certified company offering online certification and training services to individuals and companies globally. Over 25 million people have benefited from ExpertRating Online Certifications and assessments. ExpertRating is the winner of the Google SME Hero's award for showing outstanding use of technology in delivering trusted services to thousands of people on a daily basis. Our affordable certifications are an excellent way of demonstrating your knowledge and skills to prospective employers as well as vastly boosting your chances of moving ahead in your business or career.

Company Timeline

Since 2001

Decades of excellence

800+ Skill Tests

World’s largest test inventory

2500+ Companies

Thousands depend on use

25 Million People Tested

10 tests every minute

35 Countries Serviced

Over 1500 clients in the US

86% Reorder Rate

Satisfied clients

We deliver over 3 million online certification tests and online courses annually.

Awards

ExpertRating is a winner of the Google SME Heroes award. This award has been instituted by Google to honor IT companies that have excelled in their domain and have leveraged the internet to grow and expand their businesses in innovative ways.


ExpertRating is an ISO 9001:2015 certified company, which reflects that our courses and tests conform to the highest international quality standards. Our training material is prepared by thorough professionals with years of experience, and goes through several rounds of analysis by expert teams to help develop well-balanced, comprehensive and meaningful content.


By the end of the course, you will be ready to take the certification exams to qualify as an IT security technician, and you will do it all online at your own pace with a facilitator who will provide one-on-one interaction by answering questions and providing feedback on your performance. ExpertRating offers everything you need to succeed. ExpertRating gives you the flexibility to move ahead at your own pace, whether you have a full-time job, you are currently home, or you are looking to get back to work, you can enroll at any time. So, start preparing to be a certified IT security technician today.