Course Overview

Training Options

Corporate Training

Customized to your team's needs

  • Blended learning delivery model (self-paced e-learning and/or instructor-led options)
  • Course, category, and all-access pricing
  • Enterprise-class learning management system (LMS)
  • Enhanced reporting for individuals and teams
  • 24x7 teaching assistance and support

Course Curriculum

Course Content

  • CAS - CompTIA Security+ 601

    Preview
    • Lesson 01: Course Introduction

      09:07Preview
      • 1.01 Course Introduction
        09:07
    • Lesson 02: Attacks, Threats, and Vulnerabilities

      02:23:03Preview
      • 2.01 Compare and Contrast Information Security Roles
        08:39
      • 2.02 Compare and Contrast Security Control and Framework Types
        17:22
      • 2.03 Type of Threat Actors and Attack vectors
        21:41
      • 2.04 Threat Intelligent Sources
        14:58
      • 2.05 Assess Organizational Security with Network Reconnaissance Tools
        06:13
      • 2.06 Security Concerns with General Vulnerability Types
        16:44
      • 2.07 Vulnerability Scanning Techniques
        17:11
      • 2.08 Penetration Testing Concepts
        10:55
      • 2.09 Classify Contrast Social Engineering Techniques
        19:07
      • 2.10 Indicators of Malware - Based Attacks
        10:13
    • Lesson 03: Architecture and Design

      02:02:53Preview
      • 3.01 Compare and Contrast Cryptographic Ciphers
        20:20
      • 3.02 Cryptographic Modes of Operation
        07:07
      • 3.03 Cryptographic Use Cases and Weaknesses
        07:00
      • 3.04 Manage Certificates and Certificate Authorities
        10:52
      • 3.05 Implement PKI Management
        14:37
      • 3.06 Summarize Authentication Design Concepts
        07:58
      • 3.07 Implement Knowledge-Based Authentication
        07:24
      • 3.08 Implement Authentication Technologies
        07:18
      • 3.09 Summarize Biometrics Authentication Concepts
        06:35
      • 3.10 Identify Management Controls
        10:48
      • 3.11 Implement Account Policies
        08:16
      • 3.12 Implement Authorization Solutions
        05:16
      • 3.13 Importance of Personnel Policies
        09:22
    • Lesson 04: Implementation

      03:08:51Preview
      • 4.01 Implement Secure Network Designs
        17:56
      • 4.02 Implement Secure Switching and Routing
        14:36
      • 4.03 Implement Secure Wireless Infrastructure
        20:17
      • 4.04 Implement Load Balancers
        19:36
      • 4.05 Implement Firewalls and Proxy Servers
        16:00
      • 4.06 Implement Network Security Monitoring
        13:19
      • 4.07 Summarize the Use of SIEM
        15:36
      • 4.08 Implement Secure Network Operations Protocols
        08:04
      • 4.09 Implement Secure Application Protocols
        09:59
      • 4.10 Implement Secure Remote Access Protocols
        13:18
      • 4.11 Implement Secure Firmware
        06:02
      • 4.12 Implement Endpoint Security
        07:31
      • 4.13 Embedded System Security Implications
        05:42
      • 4.14 Implement Mobile Devic Management
        11:04
      • 4.15 Implement Secure Mobile Device Connections
        09:51
    • Lesson 05: Operations and Incident Response

      02:19:48Preview
      • 5.01 Analyze Indicators of Application Attacks
        07:43
      • 5.02 Outline Indicators of Web Application Attacks
        13:29
      • 5.03 Illustrate Secure Coding Practices
        13:46
      • 5.04 Implement Secure Script Environments
        06:27
      • 5.05 Analyze Deployment and Automation Concepts
        07:36
      • 5.06 Secure Cloud Solutions
        15:19
      • 5.07 Cloud Security Solutions
        09:34
      • 5.08 Infrastructure as Code Concepts
        08:20
      • 5.09 Privacy and Data Sensitivity Concepts
        10:36
      • 5.10 Privacy and Data Protection Controls
        09:52
      • 5.11 Incident Response Procedures
        07:58
      • 5.12 Appropriate Data Sources for Incident Response
        08:47
      • 5.13 Mitigation Controls
        08:33
      • 5.14 Digital Forensics Documentation
        05:33
      • 5.15 Digital Forensics EvidenceAcquisition
        06:15
    • Lesson 06: Governance Risk and Compliance

      55:49Preview
      • 6.01 Risk Management Processes and Concepts
        12:40
      • 6.02 Business Impact Analysis Concepts
        09:44
      • 6.03 Redundancy Strategies
        05:21
      • 6.04 Backup Strategies
        07:15
      • 6.05 Cybersecurity Resiliency Strategies
        10:29
      • 6.06 Importance of Physical Site Security Controls
        04:53
      • 6.07 Importance of Physical Host Security Controls
        05:27

Why Online Bootcamp

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.