50% found this document useful (2 votes)
2K views1 page

CompTIA Security+ (SY0 - 701)

Uploaded by

bravecalm142001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
2K views1 page

CompTIA Security+ (SY0 - 701)

Uploaded by

bravecalm142001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CompTIA Security+ (SY0 – 701)

Days: 5

Prerequisites: You will benefit most from this course if you intend to take a CompTIA Security+ SY0-701
exam. Knowledge equivalent to the CompTIA A+ and Network+ certifications is helpful but not necessary.
Audience: This course assumes that you have basic knowledge of using and configuring individual
workstations and simple networks.

Description: CompTIA Security+ Certification SY0-701 provides the basic knowledge needed to plan,
implement, and maintain information security in a vendor-neutral format; this includes risk management,
host and network security, authentication and access control systems, cryptography, and organizational
security. This course maps to the CompTIA Security+ certification exam. Objective coverage is marked
throughout the course.
OUTLINE:

CHAPTER 1: SECURITY FUNDAMENTALS CHAPTER 8: ACCESS CONTROL


Module A: Security concepts Module A: Access control principles
Module B: Understanding threats Module B: Account management
Module C: Enterprise security strategy
CHAPTER 9: ENTERPRISE ARCHITECTURE
CHAPTER 2: RISK MANAGEMENT
Module A: System vulnerabilities
Module A: Risk management programs Module B: System architecture
Module B: Security audits
Module C: Conducting security assessments CHAPTER 10: SECURE ASSETS

CHAPTER 3: ORGANIZATIONAL SECURITY Module A: Physical security and safety


Module B: Securing data
Module A: Social engineering
Module B: Security policies CHAPTER 11: SECURING SPECIALIZED
Module C: User roles and training SYSTEMS

CHAPTER 4: CRYPTOGRAPHY Module A: Securing hosts


Module B: Mobile security
Module A: Cryptography concepts
Module B: Public key infrastructure CHAPTER 12: SECURE APPLICATIONS

CHAPTER 5: NETWORK CONNECTIVITY Module A: Application attacks


Module B: Securing applications
Module A: Network attacks
Module B: Packet flow CHAPTER 13: DISASTER PLANNING AND
RECOVERY
CHAPTER 6: SECURE NETWORK
CONFIGURATION Module A: Secure operations
Module B: Resilience and recovery
Module A: Network security components
Module B: Secure network protocols
Module C: Hardening networks CHAPTER 14: THREAT DETECTION AND
RESPONSE
CHAPTER 7: AUTHENTICATION
Module A: Security monitoring
Module A: Authentication factors Module B: Incident response procedures
Module B: Authentication protocols

Baton Rouge | Lafayette | New Orleans


www.lantecctc.com

You might also like