0% found this document useful (0 votes)
6 views1 page

Security+ - SY0-601 Syllabus

Uploaded by

umarmuzammil7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views1 page

Security+ - SY0-601 Syllabus

Uploaded by

umarmuzammil7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

Comptia Security+ (SY0-601) Syllabus

5 Week Course, Exam SY0-601, 90 mins w 90 question max. 750/900 Pass


Eric Jensen: Course Instructor [email protected]
Week 1 Threat Intelligence + Security Assessment
Security Roles, Controls and Frame works (5.1, 5.2) Reading: 1A, 1B w Review Activity
Threat Actor Types, Attack Vectors. Threat Intelligence Sources (1.5) 2A, 2B Tues
Assess Organization Security w Network Recon Tools (4.1) 3A____________
Understand Security concerns assoc w types of Vulnerabilities (1.6) 3B Thurs
Summary of Vulnerability Scanning Methods, PEN-Testing (1.7, 1.8) 3C, 3D
Social Engineering Techniques (1.1) 4A
Indicators of Malware-based Attacks (1.2, 4.1) 4B
Video’s: Messer 1-59 (Domain 1.x), CertmasterLabs Lab1 -6
Week 2 Cryptography and IAM
Compare Basic Cryptographic Ciphers (2.1, 2.8) Reading: 5A w Review Activity
Asymmetrical Ciphers, Use Cases and Weaknesses (1.2, 2.8) 5B. 5C
Other Cryptographic technology (2.8) 5D Tues
Certificates and CA’s, PKI Management (3.9, 4.1) 6A, 6B_________
Authentication Design Concepts (2.4) 7A Thurs
Knowledge-Based Authentication (1.2, 3.8, 4.1) 7B
Authentication Technologies, Biometric Authentication (2.4, 3.3, 3.8) 7C, 7D
Identity and Account Types Account Policies (3.7, 5.3) 8A, 8B
Authorizations Solutions (2.4, 3.8, 4.1) 8C
Personnel Policies Importance (5.3) 8D
Video’s:Messer 60-100 (Domain 2.x) CertmasterLabs 7 -14
Week 3 Protecting & Hardening Network Infrastructure
Secure Network Designs (3.3) Reading: 9A w Review Activity
Secure Switching,Routing, Wireless & Load Balancers (1.4, 3.1, 3.3, 3.4) 9B, 9C, 9D
Firewall, Proxy Server, NAT and vFirewalls (3.3) 10A
Network Security Monitoring/IPS/TAPS/Mirroring/WAF (3.3) 10B Tues
SIEM (Security info & Event Mgnt) (1.7, 3.3, 4.1) 10C____________
Secure Network Ops DHCP,DNS, LDAP, NTP, SNMP (1.4, 3.1) 11A Thurs
Secure Application Protocol (2.1, 3.1) 11B
Secure Remote Access (3.1, 3.3, 4.1) 11C
Host-Secure Firmware. Endpoint Security (1.2, 3.2, 5.3) 12A, 12B
Embedded System Security/IoT (2.6) 12C
Video’s:Messer 101-142 (Domain 3.x) CertmasterLabs 15-22
Week 4 Protecting Applications and Cloud Service
Mobile Device Management MDM (3.5) Reading: 13A w Review Activity
Secure Mobile Device Connections (1.4, 3.5) 13B
Indicators of Application Attacks, Web Application Attacks (1.3) 14A, 14B
Secure Coding Practices (2.3, 3.2) 14C
Secure Script Environments (1.4, 3.2, 4.1) 14D Tues
Deployment and Automation Concepts (2.3) 14E_______________
Secure Cloud, Virtualization Service & Security Sol’s (1.2, 2.2, 3.6) 15A. 15B Thurs
Infrastructure as Code IoC (2.2) 15C
Data Privacy and Data Protection Control DLP (2.1, 3.2, 5.3, 5.5) 16A. 16B
Video’s:Messer 143-161 (Domain 4.x) CertmasterLabs 23-27
Week 5 Incident Response and Risk Management
Incident Response Procedures (4.2) Reading: 17A w Review Activity
Utilize Appropriate Data Source for Incident Response (4.3) 17B
Apply Mitigation Controls (1.2, 4.4) 17C
Digital Forensics and Evidence Acquisition (4.1, 4.5) 18A, 18B Tues
Risk Mgn’t Processes & Concepts, Business Impact Analysis (5.4) 19A, 19B_________
Redundancy and Backup Strategies (2.5) 20A, 20B Thurs
Cybersecurity Resiliency Strategies (2.1, 2.5, 5.3) 20C
Physical Site Security, Host Security Controls (1.2, 2.7, 4.1) 21A, 21B
Video’s:Messer 162-177 (Domain 5.x) CertmasterLabs 28-32

You might also like