SY0-601 CompTIA Security+

Information and Technology

Register:
Anytime

Duration:
33 Hours

Price:
R2,070.00

This course will provide you with the necessary platform to gain hands on skills in fundamental computer technologies.

Description

Welcome to CompTIA Security+ (SY0-601) Practice Lab. The Security+ certification is a core qualification aimed at IT professionals seeking entry into the cybersecurity profession. The Security+ lab’s main focus is on the practical application of the CompTIA certification exam outcomes and where required, some objectives are covered in theory. After completing this title, you will have gained hands-on experience in penetration testing and implementing preventative measures to secure a corporate network against possible cybersecurity attacks. In addition, further knowledge will be gained on how to handle a cybersecurity incident.

Certification

Once you feel confident to take the CompTIA certification exam, you will need to follow the process below to register and pay for your exam. Online testing offers you the ease and convenience to test for your certification from any quiet, distraction-free and secure location at anytime.

  • Choose online testing if you want:
    • A secure and easy way to test from home, a closed-door office or any place that has a private area available to you
    • The flexibility to schedule your exam at any hour convenient to you
    • Technical support if something goes wrong during your exam session
  • For online testing, you’ll need a:
    • Quiet, enclosed, private location
    • Reliable device that meets system requirements and has a webcam
    • Strong, consistent internet connection with a minimum speed of 1 Mbps down/up
  • Exams are taken through PearsonVue, you will need to perform a systems test prior to writing your exam
  • Link the links to Create an account
  • Buy an exam voucher online and book your exam
  • Read the exam policies

Structure

  • MODULE 1 | Identifying Different Cyber Attacks
  • MODULE 2 | Social Engineering Techniques and Exploits
  • MODULE 3 | Identifying Indicators of a Network Attack
  • MODULE 4 | Network Security Assessment Tools
  • MODULE 5 | Implementing Secure Network Solutions
  • MODULE 6 | Enterprise Network Security Configuration Concepts
  • MODULE 7 | Physical Security Control Mechanisms
  • MODULE 8 | Gathering Intelligence on Threat Actors and Vectors
  • MODULE 9 | Determining Security Vulnerabilities
  • MODULE 10 | Security Assessment Techniques
  • MODULE 11 | Penetration Testing Techniques
  • MODULE 12 | Authentication and Authorization Implementation Techniques
  • MODULE 13 | Authentication and Authorization Solutions
  • MODULE 14 | Implementing a Public Key Infrastructure
  • MODULE 15 | Implementation of Secure Protocols
  • MODULE 16 | Securing an Environment using Mitigating Techniques
  • MODULE 17 | Cybersecurity Backup and Restore Strategies
  • MODULE 18 | Identity and Account Management Mechanisms
  • MODULE 19 | Identifying Different Application Exploits
  • MODULE 20 | Application Hardening Deployment Techniques
  • MODULE 21 | Application and Host Hardening Techniques
  • MODULE 22 | Cyber Security Vulnerabilities of Embedded Systems
  • MODULE 23 | Cloud and Virtualization Concepts
  • MODULE 24 | Securing a Cloud Infrastructure
  • MODULE 25 | Incident Response Policies and Procedures
  • MODULE 26 | Incident Response Tools
  • MODULE 27 | Implementing Wireless Security Configurations
  • MODULE 28 | Mobile Security Solutions
  • MODULE 29 | Cryptographic Basic Concepts
  • MODULE 30 | Digital Data Forensic Techniques
  • MODULE 31 | Control Mechanisms, Standards and Frameworks
  • MODULE 32 | Organizational Risk Management and Policies
  • MODULE 33 | Data Protection Implementation


Payment options available to you

Need more information about this course?

Complete the fields below to receive the course information pack.






    By providing us with your contact details, you agree to the use of your data as described in our terms and conditions to receive communications. You may opt out of receiving communications at any time.