CompTIA Security Plus SY0-701 Cybersecurity Course
CompTIA Security Plus SY0-701 Cybersecurity Course, Our cybersecurity CompTIA Security Plus course will teach you what you need to pass the Security+ SY0-701 Official Exam.
Course Description
Enroll in our course today to learn the details you need to get certified!
Our comprehensive cybersecurity CompTIA Security Plus SY0-701 course is taught by Jay Cotrone. Jay has held a cybersecurity professional position for 10 years and has been a technical instructor for over 24 years. Jay has used the knowledge he has gained teaching cyber security to incorporate into this course, proven benefits for official exam success.
Your knowledge of terms, study facts, acronyms and understanding processes will give you an advantage when taking official exams.
In addition to videos, included in each section of the course are Section Reviews and Section Acronym Lists. Terms and study facts are covered in the video lectures and summarized in the Section Reviews. The Acronym Lists can help you remember important acronyms.
There is a Section Quiz at the end of each section to test your retention of the section information.
This course includes multiple modalities utilizing visual and audible learning methods,
including topic details on screen, synchronized with lecture audio to improve retention.
This course also includes on-screen animations that enhance your understanding of processes.
Our complete training course covers the exam objectives and details, essential for passing the official exam.
This course is divided into 12 Sections: Here are a few topics covered in each section.
· Security Fundamentals
o Fundamental security concepts
o CIA Triad
o Fundamental security terms
o Identification, Authentication, Authorization & Accounting
· Asset Management
Asset Management
Asset Types
Asset Acquisition & Procurement
Asset Inventory & Classification
Asset Lifecycle
Change Management
· Identity & Access Management
o Identity & Access Management
o IAM Auditing & Logging
o Federated Authentication
o 802.1x Authentication
o IAM Processes & Protocols
o Multifactor Authentication
o Password Policies & Managers
o Passwordless Authentication
· Risk Management
o Risk Types
o Risk Identification
o Risk Assessment
o Risk Analysis
o Risk Prioritization
o Privacy Compliance
o Risk Monitoring
o Third-Party Risk Assessment
· Incident Response, Business Continuity & Disaster Recovery
o Incident Response Plans
o Incident Response Process
o Digital Forensics
o Business Continuity Planning
o Incident Response Training
o Disaster Recovery
· Attacks, Threats & Vulnerabilities
o Malware Attacks
o Network Attacks
o Application Attacks
o Threat Actor Types, Attributes & Motivations
o Threat Vectors
o Threat Intelligence
o Vulnerability Management
o Software & Hardware Vulnerabilities
· Enterprise Security
o Wireless Security
o Software Defined Networking
o Infrastructure as Code
o Serverless Architecture
o Internet of Things Devices
o ICS & SCADA Systems
o Secure Network Strategies
o Zero Trust
o Control Types
· Security Governance & Security Training
o Security Policies
o Security Audits & Assessments
o Regulatory Compliance
o Security Awareness Training
o Phishing Identification Training
o Phishing Victim Behavior
· Cryptography & PKI
o Cryptography Fundamentals
o Public Key Infrastructure
o Certificate Authorities
o Digital Certificates
o Symmetric & Asymmetric Encryption
o Hashing
o Physical Key Security
· Application & Data Security
o Application Security
o Application Vulnerabilities
o Application Security Analysis
o Data Management
o Data Location Planning
o Data Loss Prevention
o Data Privacy Technologies
o Data Roles & Responsibilities
o Data Lifecycle
· Endpoint Security
o Mobile Device Application Vulnerabilities
o Securing Mobile Devices
o Mobile Device Deployment Models
o Mobile Device Connection Methods
o Securing Hosts
o Endpoint Detection & Response
o Securing Workstations
o Securing Servers
· Physical Security
o Physical Security
o Secure Entry
o Video Surveillance
o Sensors & Alarms
o HVAC Security
o Power Redundancy
The above is just a summary of section topics. This is a very comprehensive corse and there are many more topics covered throughout the course. To see the extent of topics covered, please refer to the course video list.
We know that this cyber security course will give the knowledge of the official exam objectives and details you need to pass the Security+ SY0-701 exam.