0% found this document useful (0 votes)
226 views2 pages

Security (SY0-601)

This document outlines the modules, topics, and labs for the CompTIA Security+ (SY0-601) certification course provided by CompTIA and taught by Ahmed Sultan. The course covers 5 modules: attacks and threats, architecture and design, implementation, operations and incident response, and governance, risk, and compliance. It includes 21 lessons and 27 hands-on labs covering topics such as security roles, assessments, cryptography, authentication, and incident response. Students can access more courses on netriders.academy.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
226 views2 pages

Security (SY0-601)

This document outlines the modules, topics, and labs for the CompTIA Security+ (SY0-601) certification course provided by CompTIA and taught by Ahmed Sultan. The course covers 5 modules: attacks and threats, architecture and design, implementation, operations and incident response, and governance, risk, and compliance. It includes 21 lessons and 27 hands-on labs covering topics such as security roles, assessments, cryptography, authentication, and incident response. Students can access more courses on netriders.academy.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

======================================================

== THESE OUTLINES FOR COMPTIA SECURITY+ (SY0-601) ====


== PROVIDED BY COMPTIA, TEACHED BY: AHMED SULTAN ====
== visit https://netriders.academy for more courses ==
======================================================

=========
Modules
=========
Module 1: Attacks, Threats, and Vulnerabilities
Module 2: Architecture and Design
Module 3: Implementation
Module 4: Operations and Incident Response
Module 5: Governance, Risk, and Compliance

=========
Topics
=========
Lesson 0: Security+ (SY0-601) Course Introduction - [Theory - Demo Lab]
Lesson 1: Comparing Security Roles and Security Controls - [Theory - No Lab]
Lesson 2: Explaining Threat Actors and Threat Intelligence - [Theory - No Lab]
Lesson 3: Performing Security Assessments - [Theory - Labs 1,2,3 and 4]
Lesson 4: Identifying Social Engineering and Malware - [Theory - Lab 5]
Lesson 5: Summarizing Basic Cryptographic Concepts - [Theory - No Lab]
Lesson 6: Implementing Public Key Infrastructure - [Theory - Labs 6 and 7]
Lesson 7: Implementing Authentication Controls - [Theory - Labs 8 and 9]
Lesson 8: Implementing Identity and Account Management Controls - [Theory - Labs
10,11 and 12]
Lesson 9: Implementing Secure Network Designs - [Theory - Lab 13]
Lesson 10: Implementing Network Security Appliances - [Theory - Labs 14 and 15]
Lesson 11: Implementing Secure Network Protocols - [Theory - Labs 16, 17 and 18]
Lesson 12: Implementing Host Security Solutions - [Theory - Lab 19]
Lesson 13: Implementing Secure Mobile Solutions - [Theory - No Lab]
Lesson 14: Summarizing Secure Application Concepts - [Theory - Labs 20,21,22 and
23]
Lesson 15: Implementing Secure Cloud Solutions - [Theory - No Lab]
Lesson 16: Explaining Data Privacy and Protection Concepts - [Theory - No Lab]
Lesson 17: Performing Incident Response - [Theory - Labs 24 and 25]
Lesson 18: Explaining Digital Forensics - [Theory - Lab 26]
Lesson 19: Summarizing Risk Management Concepts - [Theory - No Lab]
Lesson 20: Implementing Cybersecurity Resilience - [Theory - Lab 27]
Lesson 21: Explaining Physical Security - [Theory - No Lab]

======
Labs
======
Lab 1: Exploring the Lab Environment
Lab 2: Scanning and Identifying Network Nodes
Lab 3: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools
Lab 4: Analyzing the Results of a Credentialed Vulnerability Scan
Lab 5: Installing, Using, and Blocking a Malware-based Backdoor
Lab 6: Managing the Lifecycle of a Certificate
Lab 7: Managing Certificates with OpenSSL
Lab 8: Auditing Passwords with a Password Cracking Utility
Lab 9: Managing Centralized Authentication
Lab 10: Managing Access Controls in Windows Server
Lab 11: Configuring a System for Auditing Policies
Lab 12: Managing Access Controls in Linux
Lab 13: Implementing a Secure Network Design
Lab 14: Configuring a Firewall
Lab 15: Configuring an Intrusion Detection System
Lab 16: Implementing Secure Network Addressing Services
Lab 17: Implementing a Virtual Private Network
Lab 18: Implementing a Secure SSH Server
Lab 19: Implementing Endpoint Protection
Lab 20: Identifying Application Attack Indicators
Lab 21: Identifying a Browser Attack
Lab 22: Implementing PowerShell Security
Lab 23: Identifying Malicious Code
Lab 24: Managing Data Sources for Incident Response
Lab 25: Configuring Mitigation Controls
Lab 26: Acquiring Digital Forensics Evidence
Lab 27: Backing Up and Restoring Data in Windows and Linux

You might also like