
SY0-601: CompTIA Security+ Certification Video Training Course
The complete solution to prepare for for your exam with SY0-601: CompTIA Security+ certification video training course. The SY0-601: CompTIA Security+ certification video training course contains a complete set of videos that will provide you with thorough knowledge to understand the key concepts. Top notch prep including CompTIA Security+ SY0-601 exam dumps, study guide & practice test questions and answers.
SY0-601: CompTIA Security+ Certification Video Training Course Exam Curriculum
Exam Info
-
1. SY0-501 vs. SY0-601
-
2. Exam Information
-
3. Building a lab
Security Basics
-
1. CIA Triade
-
2. IAAA
-
3. Basic security controls
1.1 Social engineering techniques
-
1. Phishing, Smishing, Vishing, Spear phishing, Whaling
-
2. Dumpster diving and Shoulder surfing
-
3. Eliciting information and the principles of social engineering
-
4. Pharming
-
5. Spam
-
6. Tailgating
-
7. Other types Social Engineer techniques
1.2 Potential indicators of attacks
-
1. Introduction to Malware
-
2. Ransomeware and Cryptomalware
-
3. Trojans and RAT's
-
4. Bot and Command and control
-
5. Fileless Virus, Logic bombs, spyware, rootkit, backdoor
-
6. Adversarial artificial intelligence (AI)
-
7. Malicious USB cables, drives and Card Cloning
-
8. Supply chain attacks
-
9. Keyloggers
-
10. How passwords are stored
-
11. Using hashcat to crack passwords
-
12. Using a brute force and rainbow tables to attack passwords
1.3 Analyze potential indicators associated with application attacks
-
1. Privilege escalation, (SSL) stripping, Pass the hash
-
2. Cross-site scripting (XSS) and Injections
-
3. Pointer Dereference, directory traversal, buffer overflows, and tocttou
-
4. Replay attacks
-
5. Request forgeries
-
6. API Attacks
-
7. Driver manipulation
-
8. Integer overflow, Resource exhaustion, Memory leak
1.4 Analyze potential indicators associated with network attacks.
-
1. Evil Twin and Rouge Access Point
-
2. Bluesnarfing and Bluejacking
-
3. Cracking WEP
-
4. Disassociation and Jamming
-
5. Man in the Middle, browser, and APR Poisoning
-
6. IV, RFID, NFC Attacks
-
7. MAC Flooding and Cloning
-
8. DDOS Attacks
-
9. Malicious Code
1.5 Different threat actors, vectors, and intelligence sources
-
1. Actors and threats
-
2. Threat intelligence sources
-
3. Research sources
1.6 Security concerns associated with various types of vulnerabilities
-
1. Cloud-based vs. on-premises, Zero Day
-
2. Weak configurations
-
3. Third-party risks, Improper or weak patch, legacy platforms
-
4. Impacts
1.7 Techniques used in security assessments.
-
1. Threat hunting
-
2. Vulnerability scans
-
3. SIEM and SOAR
1.8 Techniques used in penetration testing.
-
1. Penetration testing
-
2. Passive and active reconnaissance
-
3. Exercise types
2.1 Security concepts in an enterprise environment.
-
1. Configuration management
-
2. Data Sovereignty and Protection
-
3. Other Security Consideration
-
4. Site Resiliency, Hot, Warm, Cold
-
5. Deception and disruption
2.2 Virtualization and cloud computing concepts
-
1. IaaS
-
2. PaaS
-
3. SaaS, XaaS
-
4. Cloud Deployment
-
5. Cloud Application terms
-
6. IaC
-
7. Virtualization Issues
2.3 Secure application development, deployment, and automation concepts.
-
1. Software Development Environment
-
2. Secure Coding Techniques
-
3. DevOps and Automation
2.4 Authentication and authorization design concepts.
-
1. Authentication methods
-
2. Biometrics
-
3. MFA
-
4. Authentication, authorization, and accounting
2.5 Implement cybersecurity resilience.
-
1. Redundancy
-
2. Replication and storages
-
3. Backup Types
-
4. Non-persistence, high availability, diversity
-
5. RAID
2.6 Security implications of embedded and specialized systems.
-
1. Embedded Systems
-
2. Industrial control system
-
3. IoT
-
4. IoT Communication and considerations
2.7 Physical security controls
-
1. Physical Security Controls
-
2. Other physical security controls
-
3. Locks and Fencings
-
4. Fire Suppression
-
5. Secure data destruction
2.9 Basics of cryptographic concepts
-
1. Introduction to cryptography
-
2. Goals of cryptography
-
3. Algorithm and Keys
-
4. Block and stream ciphers
-
5. Symmetric Ciphers
-
6. Asymmetric Ciphers
-
7. Hashing
-
8. Hybrid cryptography
-
9. Digital signatures
-
10. Block Chain
-
11. Steganography
-
12. Key stretching
-
13. Salting
-
14. Quantum
-
15. Ephemeral, PFS, Homomorphic
-
16. Cipher Modes
-
17. Lightweight cryptography
-
18. Elliptic-curve cryptography
-
19. Cipher suites
-
20. Common use cases
-
21. Limitations of encryptions
3.1 Implement secure protocols.
-
1. DNSSEC
-
2. Email security with S/MIME and PMP
-
3. Installing Wireshark on Windows 10
-
4. Install and setup an FTP Server and Client
-
5. Using Wireshark to capture an FTP Password and securing FTP Server
-
6. Lightweight Directory Access Protocol Over SSL
-
7. SRPT, FTPS, SFTP, SNMP, IMAP
-
8. SSH
-
9. VPN and IPSEC
-
10. Use Cases for secure protocols
3.2 Implement host or application security solutions.
-
1. Endpoint Protection
-
2. Boot integrity
-
3. Databases
-
4. Application Security
-
5. Hardening systems
-
6. Drive Encryption and sandboxing
3.3 Implement secure network designs.
-
1. Load Balancing
-
2. Network segmentation
-
3. How to download and install packet tracer
-
4. VLAN's and Port Security
-
5. Firewalls
-
6. Configuring firewall rules
-
7. Jump and Proxy servers
-
8. IDS and IPS
-
9. Other network secure concepts
3.4 Install and configure wireless security settings
-
1. Wireless Security
-
2. Wireless Installation Considerations
3.5 Implement secure mobile solutions. Given
-
1. Mobile Connection methods and receivers
-
2. Mobile device management (MDM)
-
3. UEM and MAM
-
4. Enforcement and monitoring of mobile devices
-
5. Mobile Deployment Models
3.6 Apply cybersecurity solutions to the cloud.
-
1. Cloud Solutions controls
-
2. Cloud Network and computing
-
3. Cloud Security terms
3.7 Implement identity and account management controls.
-
1. Identity and account types
-
2. Account policies
3.8 Implement authentication and authorization solutions.
-
1. Authentication management
-
2. Authentication Protocols
-
3. Access control schemes
3.9 Implement public key infrastructure.
-
1. Introduction to PKI
-
2. Process of getting a certificate
-
3. PKI Setup
-
4. Fields on a certificate
-
5. Certificate formats
-
6. Certificate types
4.1 Tool to assess organizational security.
-
1. Introductions to commands
-
2. ARP and Route
-
3. hping
-
4. Curl
-
5. IP scanner
-
6. ipconfig, ping, tracert
-
7. Linux file manipulation, head, tail, cat
-
8. Log
-
9. Cuckoo
-
10. thehavester
-
11. Nslookup and Dig
-
12. tcpdump
-
13. NetCat
-
14. Sniper
-
15. scanless
-
16. nmap
-
17. Managing Linux Permissions
-
18. Shell and script environments
-
19. Exploitation frameworks
-
20. Forensics tools
4.2 Policies, processes, and procedures for incident response
-
1. Incident response process
-
2. Attack Frameworks
-
3. Incidents plans and exercises
4.3 support an investigation
-
1. Log Files
-
2. Capture log files
4.4 Apply mitigation techniques or controls to secure an environment.
-
1. Incident mitigation techniques
4.5 Key aspects of digital forensics.
-
1. Documentation and evidence
5.1 Various types of controls.
-
1. Control Types and category
5.2 Regulations, standards, or frameworks that impact security
-
1. Regulations, standards, and legislation
-
2. Key frameworks
-
3. Secure configuration guides
5.3 Policies to organizational security
-
1. Personnel Controls
-
2. Third-party risk management
-
3. Credential and organizations policies
5.4 Risk management processes and concepts
-
1. Risk types, terms, and Process
-
2. Risk management strategies
-
3. Risk Assessments
-
4. Business impact analysis
5.5 Privacy and sensitive data concepts in relation to security
-
1. Privacy breaches
-
2. Data types
-
3. Privacy technologies and roles
Performance Based Questions
-
1. Performance Based Questions Introduction
-
2. PBQ - Attack Types and Response
-
3. PBQ - Incident Response
-
4. PBQ - Social Engineering
-
5. PBQ - Firewalls
About SY0-601: CompTIA Security+ Certification Video Training Course
SY0-601: CompTIA Security+ certification video training course by prepaway along with practice test questions and answers, study guide and exam dumps provides the ultimate training package to help you pass.
Prepaway's SY0-601: CompTIA Security+ video training course for passing certification exams is the only solution which you need.
Free SY0-601 Exam Questions & CompTIA SY0-601 Dumps | ||
---|---|---|
Comptia.test-inside.sy0-601.v2024-08-08.by.heidi.215q.ete |
Views: 673
Downloads: 3394
|
Size: 1.9 MB
|
Comptia.passguide.sy0-601.v2021-12-10.by.millie.140q.ete |
Views: 380
Downloads: 1907
|
Size: 1.37 MB
|
Comptia.pass4sureexam.sy0-601.v2021-12-10.by.martha.140q.ete |
Views: 131
Downloads: 1633
|
Size: 1.37 MB
|
Comptia.selftestengine.sy0-601.v2021-08-27.by.jayden.107q.ete |
Views: 1516
Downloads: 2276
|
Size: 834.06 KB
|
Comptia.examlabs.sy0-601.v2021-04-16.by.austin.104q.ete |
Views: 5144
Downloads: 3858
|
Size: 495.25 KB
|
Comptia.testking.sy0-601.v2021-02-19.by.zachary.97q.ete |
Views: 892
Downloads: 2435
|
Size: 507.91 KB
|
Comptia.prep4sure.sy0-601.v2021-01-28.by.gracie.92q.ete |
Views: 684
Downloads: 2319
|
Size: 507.61 KB
|
Comptia.braindumps.sy0-601.v2020-11-24.by.albert.42q.ete |
Views: 995
Downloads: 2601
|
Size: 430.4 KB
|
Student Feedback
Can View Online Video Courses
Please fill out your email address below in order to view Online Courses.
Registration is Free and Easy, You Simply need to provide an email address.
- Trusted By 1.2M IT Certification Candidates Every Month
- Hundreds Hours of Videos
- Instant download After Registration
A confirmation link will be sent to this email address to verify your login.
Please Log In to view Online Course
Registration is free and easy - just provide your E-mail address.
Click Here to Register