Sign In   |   View Cart   |     |   Help
 
Print Course information
E-mail to a friend
Return to Course Catalog

Course Catalog > Career Certifications > Information Technology > - Security

CompTIA™ Security+ Certification Training  

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills.

What you will learn

  • Perform network design security, risk calculations, penetration testing, and risk management
  • Implement device security, wireless security, static environment security, secure authentication methods and authorization models
  • Manage attack types, mitigating malware, discovery tools, and security administrative principles

How you will benefit

  • Prepare to successfully pass the CompTIA™ Security+ Exam SY0-501
  • Develop the necessary skills for a career as an IA technician, security consultant, information security analyst, or forensic analyst
  • Create an initial understanding of or build upon your existing IT knowledge by exploring computer and network security concepts

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac.
  • Mac users are encouraged to have access to a Windows environment on their device.

Software Requirements:

  • PC: Windows 7 or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Flash Player. Click here to download the Flash Player.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment and will be available online.


Gain the skills you need to be a security professional, and prepare to take the CompTIA™ Security+ certification SY0-501 exam, as you master the basics of system security, network infrastructure, access control, and organizational security. After you complete this course, you'll be proficient in installing and configuring systems to secure applications, networks, and devices. You'll also be comfortable performing threat analysis and responding with appropriate mitigation techniques, participating in risk mitigation activities, and operating with an awareness of applicable policies, laws, and regulations.

This course offers enrollment with or without a voucher. The voucher is prepaid access to sit for the certifying exam upon eligibility. After completing the course, you can set up your own exam dates and times at a nearby testing center.


  1. Security Attacks and Cryptography
    1. Section A
      1. Notes: Introduction to Security
      2. Textbook Reading: Chapter 1
      3. Study Aid: Unit 1 Section A: Flash Cards
      4. Unit 1: Section A Videos
      5. Watch Unit 1: Section A Videos Here
      6. PowerPoint: Introduction to Security
      7. Study Aid: Unit 1 Section A: Matching Game
      8. Answer Key: End of Chapter 1 Textbook Questions
      9. Study Aid: Unit 1 Section A: Learning Game
      10. Quiz 1
    2. Section B
      1. Notes: Malware and Social Engineering Attacks
      2. Textbook Reading: Chapter 2
      3. Study Aid: Unit 1 Section B: Flash Cards
      4. Unit 1: Section B Videos
      5. Watch Unit 1: Section B Videos Here
      6. PowerPoint: Malware and Social Engineering Attacks
      7. Study Aid: Unit 1 Section B: Matching Game
      8. Answer Key: End of Chapter 2 Textbook Questions
      9. Study Aid: Unit 1 Section B: Learning Game
      10. Quiz 2
      11. Lab: Social Engineering Reconnaissance
    3. Section C
      1. Notes: Basic Cryptography
      2. Textbook Reading: Chapter 3
      3. Study Aid: Unit 1 Section C: Flash Cards
      4. Unit 1: Section C Videos
      5. Watch Unit 1: Section C Videos Here
      6. PowerPoint: Basic Cryptography
      7. Study Aid: Unit 1 Section C: Matching Game
      8. Answer Key: End of Chapter 3 Textbook Questions
      9. Study Aid: Unit 1 Section C: Learning Game
      10. Quiz 3
    4. Completion
      1. Study Aid: Unit 1: Flash Cards
      2. Study Aid: Unit 1: Matching Game
      3. Study Aid: Unit 1: Learning Game
      4. Exam 1
  2. Security and Networking
    1. Section A
      1. Notes: Advanced Cryptography and PKI
      2. Textbook Reading: Chapter 4
      3. Study Aid: Unit 2 Section A: Flash Cards
      4. Unit 2: Section A Videos
      5. Watch Unit 2: Section A Videos Here
      6. PowerPoint: Advanced Cryptography and PKI
      7. Study Aid: Unit 2 Section A: Matching Game
      8. Answer Key: End of Chapter 4 Textbook Questions
      9. Study Aid: Unit 2 Section A: Learning Game
      10. Quiz 4
      11. Lab: Understanding PKI Concepts
    2. Section B
      1. Notes: Application and Networking-Based Attacks
      2. Textbook Reading: Chapter 5
      3. Study Aid: Unit 2 Section B: Flash Cards
      4. Unit 2: Section B Videos
      5. Watch Unit 2: Section B Videos Here
      6. PowerPoint: Networking and Server Attacks
      7. Study Aid: Unit 2 Section B: Matching Game
      8. Answer Key: End of Chapter 5 Textbook Questions
      9. Study Aid: Unit 2 Section B: Learning Game
      10. Quiz 5
      11. Lab: Implementing DNSSEC
      12. Lab: Protocols and Services - SNMP
    3. Section C
      1. Notes: Network Security Devices, Design, and Technology
      2. Textbook Reading: Chapter 6
      3. Study Aid: Unit 2 Section C: Flash Cards
      4. Unit 2: Section C Videos
      5. Watch Unit 2: Section C Videos Here
      6. PowerPoint: Network Security Devices, Design, and Technology
      7. Study Aid: Unit 2 Section C: Matching Game
      8. Answer Key: End of Chapter 6 Textbook Questions
      9. Study Aid: Unit 2 Section C: Learning Game
      10. Quiz 6
      11. Lab: Firewall Rule Based Management
      12. Lab: Firewalls and Evasion
      13. Lab: NAT and OpenSSH
      14. Lab: Install and Configure Network Load Balancing
    4. Completion
      1. Study Aid: Unit 2: Flash Cards
      2. Study Aid: Unit 2: Matching Game
      3. Study Aid: Unit 2: Learning Game
      4. Exam 2
  3. Securing Networks and Clients
    1. Section A
      1. Notes: Administering a Secure Network
      2. Textbook Reading: Chapter 7
      3. Study Aid: Unit 3 Section A: Flash Cards
      4. Unit 3: Section A Videos
      5. Watch Unit 3: Section A Videos Here
      6. PowerPoint: Administering a Secure Network
      7. Study Aid: Unit 3 Section A: Matching Game
      8. Answer Key: End of Chapter 7 Textbook Questions
      9. Study Aid: Unit 3 Section A: Learning Game
      10. Quiz 7
      11. Lab: Application Data - Establish Host Security
      12. Lab: Implementing a Network Policy Server
    2. Section B
      1. Notes: Wireless Network Security
      2. Textbook Reading: Chapter 8
      3. Study Aid: Unit 3 Section B: Flash Cards
      4. Unit 3: Section B Videos
      5. Watch Unit 3: Section B Videos Here
      6. PowerPoint: Wireless Network Security
      7. Study Aid: Unit 3 Section B: Matching Game
      8. Answer Key: End of Chapter 8 Textbook Questions
      9. Study Aid: Unit 3 Section B: Learning Game
      10. Quiz 8
      11. Lab: Network Vulnerabilities Part 1
      12. Lab: Network Vulnerabilities Part 2
      13. Lab: Password Cracking Tools
    3. Section C
      1. Notes: Client and Application Security
      2. Textbook Reading: Chapter 9
      3. Study Aid: Unit 3 Section C: Flash Cards
      4. Unit 3: Section C Videos
      5. Watch Unit 3: Section C Videos Here
      6. PowerPoint: Client and Application Security
      7. Study Aid: Unit 3 Section C: Matching Game
      8. Answer Key: End of Chapter 9 Textbook Questions
      9. Study Aid: Unit 3 Section C: Learning Game
      10. Quiz 9
      11. Lab: Data Encryption
    4. Completion
      1. Study Aid: Unit 3: Flash Cards
      2. Study Aid: Unit 3: Matching Game
      3. Study Aid: Unit 3: Learning Game
      4. Exam 3
  4. Mobile Security and Access Management
    1. Section A
      1. Notes: Mobile and Embedded Device Security
      2. Textbook Reading: Chapter 10
      3. Study Aid: Unit 4 Section A: Flash Cards
      4. Unit 4: Section A Videos
      5. Watch Unit 4: Section A Videos Here
      6. PowerPoint: Mobile and Embedded Device Security
      7. Study Aid: Unit 4 Section A: Matching Game
      8. Answer Key: End of Chapter 10 Textbook Questions
      9. Study Aid: Unit 4 Section A: Learning Game
      10. Quiz 10
    2. Section B
      1. Notes: Authentication and Account Management
      2. Textbook Reading: Chapter 11
      3. Study Aid: Unit 4 Section B: Flash Cards
      4. Unit 4: Section B Videos
      5. Watch Unit 4: Section B Videos Here
      6. PowerPoint: Authentication and Account Management
      7. Study Aid: Unit 4 Section B: Matching Game
      8. Answer Key: End of Chapter 11 Textbook Questions
      9. Study Aid: Unit 4 Section B: Learning Game
      10. Quiz 11
      11. Lab: Implementing AD Federation Services
      12. Lab: Configuring RADIUS
    3. Section C
      1. Notes: Access Management
      2. Textbook Reading: Chapter 12
      3. Study Aid: Unit 4 Section C: Flash Cards
      4. Unit 4: Section C Videos
      5. Watch Unit 4: Section C Videos Here
      6. PowerPoint: Access Management
      7. Study Aid: Unit 4 Section C: Matching Game
      8. Answer Key: End of Chapter 12 Textbook Questions
      9. Study Aid: Unit 4 Section C: Learning Game
      10. Quiz 12
      11. Lab: Implement Patching using WSUS
    4. Completion
      1. Study Aid: Unit 4: Flash Cards
      2. Study Aid: Unit 4: Matching Game
      3. Study Aid: Unit 4: Learning Game
      4. Exam 4
  5. Business Continuity and Risk Mitigation
    1. Section A
      1. Notes: Vulnerability Assessment and Data Security
      2. Textbook Reading: Chapter 13
      3. Study Aid: Unit 5 Section A: Flash Cards
      4. Unit 5: Section A Videos
      5. Watch Unit 5: Section A Videos Here
      6. PowerPoint: Vulnerability Assessment and Data Security
      7. Study Aid: Unit 5 Section A: Matching Game
      8. Answer Key: End of Chapter 13 Textbook Questions
      9. Study Aid: Unit 5 Section A: Learning Game
      10. Quiz 13
      11. Lab: Scanning and Remediating Vulnerabilities with OpenVAS
    2. Section B
      1. Objective 5.6: Explain disaster recovery and continuity of operation concepts.
      2. Notes: Business Continuity
      3. Textbook Reading: Chapter 14
      4. Study Aid: Unit 5 Section B: Flash Cards
      5. Unit 5: Section B Videos
      6. Watch Unit 5: Section B Videos Here
      7. PowerPoint: Business Continuity
      8. Study Aid: Unit 5 Section B: Matching Game
      9. Answer Key: End of Chapter 14 Textbook Questions
      10. Study Aid: Unit 5 Section B: Learning Game
      11. Quiz 14
      12. Lab: Configuring IDS and Honeypots
      13. Lab: Backup and Recovery
      14. Lab: Managing Local Storage and Virtual Hard Disks
      15. Lab: Introduction to Digital Forensics
    3. Section C
      1. Notes: Risk Mitigation
      2. Textbook Reading: Chapter 15
      3. Study Aid: Unit 5 Section C: Flash Cards
      4. Unit 5: Section C Videos
      5. Watch Unit 5: Section C Videos Here
      6. PowerPoint: Risk Mitigation
      7. Study Aid: Unit 5 Section C: Matching Game
      8. Answer Key: End of Chapter 15 Textbook Questions
      9. Study Aid: Unit 5 Section C: Learning Game
      10. Quiz 15
      11. Lab: Managing Certificates
      12. Lab: Implementing Software RAID
    4. Completion
      1. Study Aid: Unit 5: Flash Cards
      2. Study Aid: Unit 5: Matching Game
      3. Study Aid: Unit 5: Learning Game
      4. Exam 5
  6. Final Exam and Completion Steps
    1. Course Completion
      1. Textbook Reading: Review
      2. Study Aid: Final Review: Flash Cards
      3. Practice Final Exam Quiz
      4. Study Aid: Final Review: Matching Game
      5. Course Completion Survey Feedback
      6. Study Aid: Final Review: Learning Game
      7. Final Exam


David Grimes has more than 10 years of management and leadership experience in the private and non-profit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in Technology Education.

 

CompTIA™ Security+ Certification Training
Item: 202003CTP20090  
Class Dates: 7/1/2020 - 9/30/2020                                              Fee: $1,495.00
This is an on-demand Career Training Program Course offered by Ed2Go.  Class begins upon registration and completion of Student Enrollment Agreement in Ed2Go. Click on Course Title for complete course description.