Key features

MONEY BACK GUARANTEE

How this works :

At Simplilearn, we greatly value the trust of our patrons. Our courses were designed to deliver an effective learning experience, and have helped over half a million find their professional calling. But if you feel your course is not to your liking, we offer a 7-day money-back guarantee. Just send us a refund request within 7 days of purchase, and we will refund 100% of your payment, no questions asked!

For Instructor Led Training :

Raise refund request within 7 days of commencement of the first batch you are eligible to attend. Money back guarantee is void if the participant has accessed more than 25% content of an e-learning course or has attended Online Classrooms for more than 1 day.

  • 32 hours of instructor-led learning
  • Covers 6 domains required to become an IT security professional Includes
  • Hands-on based learning
  • Course Completion certificate
  • Exam Voucher included in US & ROW( Except Africa)

Course description

  • What is the focus of this course?

    The CompTIA Security+ course will enable learners to  gain knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities;operate with an awareness of applicable policies, laws, and regulations. Upon successfully validating their skills by passing the certification exam learners will be able to perform these tasks to support the principles of confidentiality, integrity, and availability.

    CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. Once you obtain your Security+ you automatically have the CE designation required in the DoD Directive 8570.01 manual and going forward must comply with the CE program requirement of completing 50 CEUs in three years to maintain the credential. Security+ is also compliant with government regulations under Federal Information Security Management Act (FISMA).

    According to the Bureau of Labor Statistics, Security Specialists, Administrators and Managers earn over $86,000 per year.

  • What are the course objectives?

    • Comprehend Risk identification and mitigation
    • Provide operational, information, application and infrastructure level security
    • Secure the network to maintain availability, integrity and confidentiality of critical information
    • Operate within a set of rules, policies and regulations wherever applicable

  • Who should take this course?

    The course is ideal for professionals in the role of a

    • Systems Administrator
    • Network Administrator
    • Security Administrator
    • Junior IT Auditor/Penetration Tester

Course preview

    • Lesson 00 - Course Overview 05:56
      • 0.1 Course Overview05:56
    • Lesson 1.1 - Implementing Security Configuration Parameters 41:41
      • 1 Implementing Security Configuration Parameters01:08
      • 2 OSI Model04:00
      • 3 Network Devices01:35
      • 4 Switches04:09
      • 5 Router05:05
      • 6 Firewalls07:55
      • 7 Load Balancer06:01
      • 8 Detection and Prevention Systems for a Network03:45
      • 9 Host-Based Intrusion Detection Systems07:15
      • 10 Quiz
      • 11 Summary00:48
    • Lesson 1.2 - Use Secure Network Administration Principles 30:02
      • 1 Use Secure Network Administration Principles01:35
      • 2 Access Control List and its Categories06:51
      • 3 Key Security Measures03:29
      • 4 VLAN Management05:05
      • 5 Access Control List in depth01:28
      • 6 Port Security02:59
      • 7 Standards for Wireless Security Network02:26
      • 8 Concepts of Implicit Deny, Network Separation, Log Analysis, and Unified Threat Management04:46
      • 9 Quiz
      • 10 Summary01:23
    • Lesson 1.3 - Network Design Elements and Components 29:27
      • 1 Network Design Elements and Components01:27
      • 2 Network Design and Components05:31
      • 3 Subnetting07:00
      • 4 Tunneling05:03
      • 5 Cloud Computing02:02
      • 6 Types of Cloud Services07:25
      • 7 Quiz
      • 8 Summary00:59
    • Lesson 1.4 - Implementing Common Protocols and Services 36:41
      • 1 Implement Common Protocols and Services01:18
      • 2 Basic Concepts of Protocols03:41
      • 3 Different Types of Protocols06:19
      • 4 Secure Socket Layer and Transport layer Security06:00
      • 5 Secure Copy Protocol06:55
      • 6 Transfer Protocol and its Different Types05:04
      • 7 Ports and thier Supported Protocols06:04
      • 8 Quiz
      • 9 Summary01:20
    • Lesson 1.5 - Troubleshoot security issues 22:32
      • 1 Given a scenario Troubleshoot Security Issues Related to Wireless Networking02:01
      • 2 Wireless Networking03:41
      • 3 Troubleshoot Security Issues Related to Wireless Networking04:16
      • 4 WPA Personal05:56
      • 5 Antenna Placement and Power control05:39
      • 6 Quiz
      • 7 Summary00:59
    • Lesson 2.1 - Introduction to importance of risk 36:48
      • 1 Introduction to Importance of Risk-Related Concepts01:17
      • 2 Control Types03:16
      • 3 Control Classes03:10
      • 4 Risk Management06:02
      • 5 Security Policy03:26
      • 6 Importance of Reducing Risk03:32
      • 7 Single Loss Expectancy04:26
      • 8 Impact of Risk06:04
      • 9 Risk Reducing Concepts04:15
      • 10 Quiz
      • 11 Summary01:20
    • Lesson 2.2 - Summarize the Security Implications 14:25
      • 1 Summarize the Security Implications of Integrating Systems and data with Third Parties01:07
      • 2 Threats from a Third Party04:25
      • 3 Interoperability Agreements03:48
      • 4 Third Party Threats04:02
      • 5 Quiz
      • 6 Summary01:03
    • Lesson 2.3 - Implementing Appropriate Risk Mitigation Strategies 09:55
      • 1 Implementing Appropriate Risk Mitigation Strategies01:09
      • 2 Risk Mitigation Strategies03:37
      • 3 Implementing Appropriate Risk Mitigation Strategies02:13
      • 4 Identify Policies and Procedures to Prevent data Loss and Theft02:04
      • 5 Quiz
      • 6 Summary00:52
    • Lesson 2.4 - Implement basics of forensic procedure 15:04
      • 1 How to Implement Basics of Forensic Procedure01:13
      • 2 Analyze the System Volatility02:30
      • 3 Collect Forensic Data06:22
      • 4 Analyze the Collected Data03:54
      • 5 Quiz
      • 6 Summary01:05
    • Lesson 2.5 - Summarizing incident response procedures 15:06
      • 1 Summarize Common Incident Response Procedures01:01
      • 2 Common Incident Response Procedures07:09
      • 3 Recovery and Reconstitution Procedures05:59
      • 4 Quiz
      • 5 Summary00:57
    • Lesson 2.6 - Importance of Security Related Awareness and Training 29:48
      • 1 Importance of Security Related Awareness and Training01:32
      • 2 Security Policy and Training Procedures04:40
      • 3 Role-Based Training04:22
      • 4 Classification Systems04:42
      • 5 Data Labeling03:57
      • 6 User Habits03:51
      • 7 New Threats, Security Trends and Alerts05:11
      • 8 Quiz
      • 9 Summary01:33
    • Lesson 2.7 - Compare and Contrast Physical Security and Environmental Controls 31:44
      • 1 Compare and Contrast Physical Security and Environmental Controls02:19
      • 2 Environmental Controls04:48
      • 3 Physical Security02:37
      • 4 Types of Physical Security Locks04:38
      • 5 Fencing04:00
      • 6 General Security Measures02:20
      • 7 Alarms04:16
      • 8 Different Control Types05:25
      • 9 Quiz
      • 10 Summary01:21
    • Lesson 2.8 - Summarizing Risk Management Best Practices 24:38
      • 1 Summarizing Risk-Management Best Practices02:01
      • 2 Business Continuity Concepts01:45
      • 3 Critical Systems and Components01:32
      • 4 Business Continuity Planning and Testing04:48
      • 5 IT Contingency Planning03:35
      • 6 Tabletop Exercises04:43
      • 7 Disaster Recovery Planning options03:24
      • 8 Alternate Sites01:39
      • 9 Quiz
      • 10 Summary01:11
    • Lesson 2.9 - Select the Appropriate Control 15:41
      • 1 Select the Appropriate Control to Meet Goals of Security01:07
      • 2 Overview02:56
      • 3 Techniques to Maintain Integrity of Data02:10
      • 4 Risk Management03:54
      • 5 Aspects of Security and Safety04:36
      • 6 Quiz
      • 7 Summary00:58
    • Lesson 3.1 - Explain types of Malware 20:25
      • 1 Explain types of Malware01:01
      • 2 Threats and Vulnerabilities00:59
      • 3 Malware and its Types06:00
      • 4 Trojan07:04
      • 5 Countermeasures to Avoid or Terminate Malware04:22
      • 6 Quiz
      • 7 Summary00:59
    • Lesson 3.2 - Summarize Various Types of Attacks 35:25
      • 1 Summarize various Types of Attacks01:39
      • 2 Attacks and its Common Types08:26
      • 3 Replay, Spoofing, Spam and Spim05:41
      • 4 Phishing and its Different Forms01:56
      • 5 Xmas Attack, Pharming, Privilege Escalation03:46
      • 6 Malicious Insider Threat, DNS and ARP Poisoning06:36
      • 7 Attack Types05:47
      • 8 Quiz
      • 9 Summary01:34
    • Lesson 3.3 - Summarize Social Engineering Attacks 15:14
      • 1 Summarize Social Engineering Attacks01:03
      • 2 Social Engineering and its Common Examples03:46
      • 3 Forms of Social Engineering Attacks04:13
      • 4 Principles Followed to Increase Power or Strength05:12
      • 5 Quiz
      • 6 Summary01:00
    • Lesson 3.4 - Explain types of Wireless Attacks 15:54
      • 1 Explain types of Wireless Attacks01:20
      • 2 Rogue Access Point, Jamming or Interference, and Evil Twin06:34
      • 3 War Driving, War Chalking, Bluejacking and Bluesnarfing03:13
      • 4 WEP/WPA Attacks, Initialization Vector Attack, and WPS Attacks02:54
      • 5 Near Field Communication00:52
      • 6 Quiz
      • 7 Summary01:01
    • Lesson 3.5 - Explain types of Application Attacks 19:12
      • 1 Explain types of application attacks01:38
      • 2 Cross-Site Scriting, SQL, LDAP, and XML Injection05:40
      • 3 Directory Traversal, Buffer Overflow, and Integer Overflow04:09
      • 4 Cookies and attachements, and Locally Shared Objects or Flash Cookies02:51
      • 5 Malicious add-ons, Hijack Header manipulation, Remote Code Execution03:44
      • 6 Quiz
      • 7 Summary01:10
    • Lesson 3.6 - Appropriate Type of Mitigation 30:12
      • 1 AnalyZing a Scenario and selecting the Appropriate Type of Mitigation01:13
      • 2 Monitoring System Logs02:44
      • 3 Security of Operating Systems08:16
      • 4 Aspects and Techniques for Port Security04:36
      • 5 Methods to Maintain Security Posture05:54
      • 6 Audit Reports - Alarms, Alerts, and Trends03:16
      • 7 Detection Controls and Prevention Controls02:43
      • 8 Quiz
      • 9 Summary01:30
    • Lesson 3.7 - Tools and Techniques to Discover Security Threats and Vulnerabilities 34:14
      • 1 Tools and Techniques to Discover Security Threats and Vulnerabilities01:45
      • 2 Types of Security Assessment Tools02:15
      • 3 Types of Tools used in Exploring the Vulnerabilities and Threats08:14
      • 4 Working of Port Scanners07:43
      • 5 Types of Assessment06:12
      • 6 Different Assessment Techniques for Threats, Vulnerabilities, and Risk06:46
      • 7 Quiz
      • 8 Summary01:19
    • Lesson 3.8 - Explaining the Proper Use of Penetration Testing vs Vulnerability Scanning 24:39
      • 1 Explaining the Proper Use of Penetration Testing Versus Vulnerability Scanning01:48
      • 2 Penetration Testing and its Characteristics08:07
      • 3 Characteristics and Considerations of Vulnerability Scanning04:06
      • 4 Methods of Vulnerability Scanning03:17
      • 5 Types of Testing04:03
      • 6 Difference between Black, White, and Gray Box Testing02:07
      • 7 Quiz
      • 8 Summary01:11
    • Lesson 4.1 - Importance of Application Security Controls and Techniques 22:06
      • 1 Explaining the Importance of Application Security Controls and Techniques01:50
      • 2 Fuzzing as Application Security Technique03:02
      • 3 Secure Coding Concepts for Application Security03:48
      • 4 Cross-site Scripting Prevention for Application Security03:20
      • 5 Cross-site Request Forgery Prevention for Application Security01:51
      • 6 Configuration Baselining Hardening, Patching for Application Security02:59
      • 7 NoSQL Databases for Application Security03:59
      • 8 Quiz
      • 9 Summary01:17
    • Lesson 4.2 - Summarizing Mobile Security Concepts and Technologies 26:41
      • 1 Summarizing Mobile Security Concepts and Technologies01:22
      • 2 Techniques and Controls for Device Security05:19
      • 3 Storage Segmentation04:33
      • 4 Techniques and Controls to Implement for Application Security on Mobile Devices05:09
      • 5 Bring Your Own Device or BYOD08:50
      • 6 Quiz
      • 7 Summary01:28
    • Lesson 4.3 - Select the Appropriate Solution 21:27
      • 1 Select the Appropriate Solution to Establish Host Security01:40
      • 2 Host Operating System Security04:17
      • 3 Anti-Malware as Host Security Solution05:15
      • 4 Whitelisting and Blacklisting Applications as Host Security Solution01:42
      • 5 Host Software Baselining as Host Security Solution01:42
      • 6 Hardware Security as Host Security Solution01:25
      • 7 Virtualization as Host Security Solution04:04
      • 8 Quiz
      • 9 Summary01:22
    • Lesson 4.4 - Alternative Methods to Mitigate Security Risks 26:39
      • 1 Compare and Contrast Alternative Methods to Mitigate Security Risks01:09
      • 2 Data Security and its Measures05:28
      • 3 Data Encryption and its Features03:28
      • 4 Individual Files06:30
      • 5 Elaborate Hardware based Encryption Devices06:04
      • 6 Summarize Data Policies and its Common Features03:00
      • 7 Quiz
      • 8 Summary01:00
    • Lesson 4.5 - Alternative Methods to Mitigate Security Risks in Static Environments 17:48
      • 1 Alternative Methods to Mitigate Security Risks in Static Environments01:23
      • 2 Static Environment and its Example04:09
      • 3 Weak Examples of Static Environment02:46
      • 4 Examples of Static Environment03:04
      • 5 Methods of Security Management05:19
      • 6 Quiz
      • 7 Summary01:07
    • Lesson 5.1 - Comparing and Contrasting the Function 26:28
      • 1 Compare and Contrast the Function and Purpose of Authentication Services01:42
      • 2 Different Authentication Services Available for Networks02:44
      • 3 RADIUS Authentication Service02:38
      • 4 TACACS PLUS and XTACACS Authentication Services05:15
      • 5 Kerberos Authentication Service03:32
      • 6 LDAP and Secure LDAP Authentication Services05:09
      • 7 SAML Authentication Service02:38
      • 8 Quiz
      • 9 Summary02:50
    • Lesson 5.2 - Selecting the AAA in a Scenario 1:02:36
      • 1 Selecting the Appropriate Authentication, Authorization or Access Control in a Given Scenario01:47
      • 2 Difference Between Identification, Authentication and Authorization Across Various Networks or Systems 06:16
      • 3 Identification Methods06:11
      • 4 Scenario03:44
      • 5 Authentication Factors and Mechanisms06:18
      • 6 Scenario04:19
      • 7 Scenario04:08
      • 8 Scenario05:00
      • 9 Scenario04:10
      • 10 Scenario06:04
      • 11 Scenario04:15
      • 12 Scenario03:24
      • 13 Authorization Security Principles or Best Practices04:28
      • 14 Quiz
      • 15 Summary02:32
    • Lesson 5.3 - Installing and Configuring Security Controls 28:49
      • 1 Installing and Configuring Security Controls when Performing Account Management03:10
      • 2 Mitigate Issues Associated with users with Multiple Accounts/Roles and/or Shared Accounts02:45
      • 3 Enforce Different Account Policy Settings for Securing the Systems03:59
      • 4 Password Complexity as the Best Practice06:24
      • 5 Account Disablement as the Best Practice04:33
      • 6 Best Practices for Monitoring Access Control for User Accounts06:18
      • 7 Quiz
      • 8 Summary01:40
    • Lesson 6.1 - Utilizing Cryptography 46:07
      • 1 Utilizing Cryptography In A Given Scenario02:24
      • 2 Historical Methods of Cryptography08:38
      • 3 Modern Concepts Of Symmetric And Asymmetric Cryptography07:40
      • 4 Non Repudiation09:17
      • 5 Mechanisms09:44
      • 6 New And Future Cryptography06:10
      • 7 Quiz
      • 8 Summary02:14
    • Lesson 6.2 - Using Appropriate Cryptographic Methods 1:13:42
      • 1 Using Appropriate Cryptographic Methods01:42
      • 2 Symmetric Algorithms03:29
      • 3 DES Modes07:52
      • 4 Blowfish Algorithm05:37
      • 5 Issues in RC4-based WEP09:04
      • 6 Asymmetric Algorithms06:00
      • 7 El Gamal Algorithm07:57
      • 8 Pretty Good Privacy08:29
      • 9 Comparing SHA Algorithms04:41
      • 10 Transport Encryption Protocols04:21
      • 11 Cipher Suites05:11
      • 12 IPSec for Virtual Private Networks07:06
      • 13 Quiz
      • 14 Summary02:13
    • Lesson 6.3 - Use appropriate PKI CM and AC 17:52
      • 1 Use appropriate PKI CM and AC00:54
      • 2 Public Key Infrastructure03:36
      • 3 Digital Certificate04:58
      • 4 Trust Models02:49
      • 5 Manage Certificate Status04:34
      • 6 Quiz
      • 7 Summary01:01
    • Performance Based Questions
      • Scenario 1
      • Scenario 2
      • Scenario 3
      • Scenario 4
      • Scenario 5
      • Scenario 6
      • Scenario 7
      • Scenario 8
      • Scenario 9
      • Scenario 10
      • Scenario 11
      • Scenario 12
      • Scenario 13
      • Scenario 14
      • Scenario 15
      • Scenario 16
      • Scenario 17
      • Scenario 18
      • Scenario 19
      • Scenario 20
    • {{childObj.title}}
      • {{childObj.childSection.chapter_name}}
        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

Exam & certification

  • How do I get certified in CompTIA Security+ 501?

    Candidates who want to be CompTIA Security+ SYO-501 certified must pass the SY0-501 exam. The exam consists of: Maximum of 90 questions Duration of the exam is 90 minutes The minimum passing score is 750 with differential pricing as per your region.

    Please click the following link for more details regarding certification exam https://certification.comptia.org/certifications/security

  • What are the prerequisites for the certification?

    There are no specific prerequisites to take up this certification but it is recommended that individuals take the Network+ certification before taking the Security+ SYO-501 training and certification exam. 

  • What do I need to do to unlock my certificate?

    Online Classroom:

    Attend one complete online classroom of the course.

FAQs

  • What payment options are available?

    You can enroll for the training online. Payments can be made using any of the following options and receipt of the same will be issued to the candidate automatically via email.

    • Visa debit/credit card
    • American express and Diners club card
    • Master Card, or
    • Through PayPal

  • Can I cancel my enrollment? Will I get a refund?

    Yes, you can cancel your enrollment. We provide you complete refund after deducting the administration fee. To know more please go through our Refund Policy.

  • How will I get my course completion certificate from Simplilearn?

    We offer course completion certificate after you successfully complete the training program.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please raise a request via our Help and Support portal to have your issue resolved.

    • Disclaimer
    • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.