Key features

MONEY BACK GUARANTEE

How this works :

At Simplilearn, we greatly value the trust of our patrons. Our courses were designed to deliver an effective learning experience, and have helped over half a million find their professional calling. But if you feel your course is not to your liking, we offer a 7-day money-back guarantee. Just send us a refund request within 7 days of purchase, and we will refund 100% of your payment, no questions asked!

For Self Placed Learning :

Raise refund request within 7 days of purchase of course. Money back guarantee is void if the participant has accessed more than 25% content.

  • 30+ hours of self-paced videos
  • Covers 6 domains required to become an IT security professional
  • Includes 2 practice tests

Course description

  • What’s the focus of this course?

    Simplilearn’s training in CompTIA Security+ SYO-401 arms IT technicians with the necessary knowledge to secure a network and manage risk, access control, cryptography along with other relevant IT security concepts. Participants at the end of the training are validated of their skills in information security which is one of the fastest progressing verticals in IT.

  • Why is the certification most sought-after?

    CompTIA Security+ SYO-401 certification is widely in demand globally, as it accelerates professionals to leap high in the technology vertical. Apart from this, there are several reasons why one should go for this certification.
    According to a CompTIA study:
    • 86% of hiring managers said that IT certifications were of high priority while evaluating a candidate.
    • 53% of IT recruiters said the job of evaluating certified candidates were much easier as it saved them time and money.
    • Organizations that have a high number of certified help desk staff on board, can handle 11 % more phone calls and 28 % more field service calls than organizations with less number of certified staff.
    • CompTIA certifications are a stamp of approval of a candidate’s fundamental knowledge and skillset required for IT jobs. This eases the hiring process considerably as the credentials are linked to specific job roles.
    • Organizations understand the value of a CompTIA certified candidate.
    • CompTIA certifications are highly acclaimed in the IT industry and potential employers from Fortune 500 companies look for professionals with CompTIA credential.

  • What are the career benefits in-store for you?

    According to Indeed.com, CompTIA Security+ SYO-401 certified professionals earn an average of $55000 and have a wide scope to grow in their careers. They are most sought –after in top organizations like Hitachi Information Systems (Japan), Prestariang Systems Sdn. Bhd. (Malaysia) and U.S. government contractors such as CSC, General Dynamics and Northrop Grumman.

  • Who should take this course?

    The course is ideal for professionals in the role of a Security Engineer, Security Consultant, Network Administrator or an IA Technician or Manager.

Course preview

    • Lesson 00 - Course Overview 05:56
      • 0.1 Course Overview 05:56
    • Lesson 1.1 - Implementing Security Configuration Parameters 41:41
      • 1 Implementing Security Configuration Parameters 01:08
      • 2 OSI Model 04:00
      • 3 Network Devices 01:35
      • 4 Switches 04:09
      • 5 Router 05:05
      • 6 Firewalls 07:55
      • 7 Load Balancer 06:01
      • 8 Detection and Prevention Systems for a Network 03:45
      • 9 Host-Based Intrusion Detection Systems 07:15
      • 10 Quiz
      • 11 Summary 00:48
    • Lesson 1.2 - Use Secure Network Administration Principles 30:02
      • 1 Use Secure Network Administration Principles 01:35
      • 2 Access Control List and its Categories 06:51
      • 3 Key Security Measures 03:29
      • 4 VLAN Management 05:05
      • 5 Access Control List in depth 01:28
      • 6 Port Security 02:59
      • 7 Standards for Wireless Security Network 02:26
      • 8 Concepts of Implicit Deny, Network Separation, Log Analysis, and Unified Threat Management 04:46
      • 9 Quiz
      • 10 Summary 01:23
    • Lesson 1.3 - Network Design Elements and Components 29:27
      • 1 Network Design Elements and Components 01:27
      • 2 Network Design and Components 05:31
      • 3 Subnetting 07:00
      • 4 Tunneling 05:03
      • 5 Cloud Computing 02:02
      • 6 Types of Cloud Services 07:25
      • 7 Quiz
      • 8 Summary 00:59
    • Lesson 1.4 - Implementing Common Protocols and Services 36:41
      • 1 Implement Common Protocols and Services 01:18
      • 2 Basic Concepts of Protocols 03:41
      • 3 Different Types of Protocols 06:19
      • 4 Secure Socket Layer and Transport layer Security 06:00
      • 5 Secure Copy Protocol 06:55
      • 6 Transfer Protocol and its Different Types 05:04
      • 7 Ports and thier Supported Protocols 06:04
      • 8 Quiz
      • 9 Summary 01:20
    • Lesson 1.5 - Troubleshoot security issues 22:32
      • 1 Given a scenario Troubleshoot Security Issues Related to Wireless Networking 02:01
      • 2 Wireless Networking 03:41
      • 3 Troubleshoot Security Issues Related to Wireless Networking 04:16
      • 4 WPA Personal 05:56
      • 5 Antenna Placement and Power control 05:39
      • 6 Quiz
      • 7 Summary 00:59
    • Lesson 2.1 - Introduction to importance of risk 36:48
      • 1 Introduction to Importance of Risk-Related Concepts 01:17
      • 2 Control Types 03:16
      • 3 Control Classes 03:10
      • 4 Risk Management 06:02
      • 5 Security Policy 03:26
      • 6 Importance of Reducing Risk 03:32
      • 7 Single Loss Expectancy 04:26
      • 8 Impact of Risk 06:04
      • 9 Risk Reducing Concepts 04:15
      • 10 Quiz
      • 11 Summary 01:20
    • Lesson 2.2 - Summarize the Security Implications 14:25
      • 1 Summarize the Security Implications of Integrating Systems and data with Third Parties 01:07
      • 2 Threats from a Third Party 04:25
      • 3 Interoperability Agreements 03:48
      • 4 Third Party Threats 04:02
      • 5 Quiz
      • 6 Summary 01:03
    • Lesson 2.3 - Implementing Appropriate Risk Mitigation Strategies 09:55
      • 1 Implementing Appropriate Risk Mitigation Strategies 01:09
      • 2 Risk Mitigation Strategies 03:37
      • 3 Implementing Appropriate Risk Mitigation Strategies 02:13
      • 4 Identify Policies and Procedures to Prevent data Loss and Theft 02:04
      • 5 Quiz
      • 6 Summary 00:52
    • Lesson 2.4 - Implement basics of forensic procedure 15:04
      • 1 How to Implement Basics of Forensic Procedure 01:13
      • 2 Analyze the System Volatility 02:30
      • 3 Collect Forensic Data 06:22
      • 4 Analyze the Collected Data 03:54
      • 5 Quiz
      • 6 Summary 01:05
    • Lesson 2.5 - Summarizing incident response procedures 15:06
      • 1 Summarize Common Incident Response Procedures 01:01
      • 2 Common Incident Response Procedures 07:09
      • 3 Recovery and Reconstitution Procedures 05:59
      • 4 Quiz
      • 5 Summary 00:57
    • Lesson 2.6 - Importance of Security Related Awareness and Training 29:48
      • 1 Importance of Security Related Awareness and Training 01:32
      • 2 Security Policy and Training Procedures 04:40
      • 3 Role-Based Training 04:22
      • 4 Classification Systems 04:42
      • 5 Data Labeling 03:57
      • 6 User Habits 03:51
      • 7 New Threats, Security Trends and Alerts 05:11
      • 8 Quiz
      • 9 Summary 01:33
    • Lesson 2.7 - Compare and Contrast Physical Security and Environmental Controls 31:44
      • 1 Compare and Contrast Physical Security and Environmental Controls 02:19
      • 2 Environmental Controls 04:48
      • 3 Physical Security 02:37
      • 4 Types of Physical Security Locks 04:38
      • 5 Fencing 04:00
      • 6 General Security Measures 02:20
      • 7 Alarms 04:16
      • 8 Different Control Types 05:25
      • 9 Quiz
      • 10 Summary 01:21
    • Lesson 2.8 - Summarizing Risk Management Best Practices 24:38
      • 1 Summarizing Risk-Management Best Practices 02:01
      • 2 Business Continuity Concepts 01:45
      • 3 Critical Systems and Components 01:32
      • 4 Business Continuity Planning and Testing 04:48
      • 5 IT Contingency Planning 03:35
      • 6 Tabletop Exercises 04:43
      • 7 Disaster Recovery Planning options 03:24
      • 8 Alternate Sites 01:39
      • 9 Quiz
      • 10 Summary 01:11
    • Lesson 2.9 - Select the Appropriate Control 15:41
      • 1 Select the Appropriate Control to Meet Goals of Security 01:07
      • 2 Overview 02:56
      • 3 Techniques to Maintain Integrity of Data 02:10
      • 4 Risk Management 03:54
      • 5 Aspects of Security and Safety 04:36
      • 6 Quiz
      • 7 Summary 00:58
    • Lesson 3.1 - Explain types of Malware 20:25
      • 1 Explain types of Malware 01:01
      • 2 Threats and Vulnerabilities 00:59
      • 3 Malware and its Types 06:00
      • 4 Trojan 07:04
      • 5 Countermeasures to Avoid or Terminate Malware 04:22
      • 6 Quiz
      • 7 Summary 00:59
    • Lesson 3.2 - Summarize Various Types of Attacks 35:25
      • 1 Summarize various Types of Attacks 01:39
      • 2 Attacks and its Common Types 08:26
      • 3 Replay, Spoofing, Spam and Spim 05:41
      • 4 Phishing and its Different Forms 01:56
      • 5 Xmas Attack, Pharming, Privilege Escalation 03:46
      • 6 Malicious Insider Threat, DNS and ARP Poisoning 06:36
      • 7 Attack Types 05:47
      • 8 Quiz
      • 9 Summary 01:34
    • Lesson 3.3 - Summarize Social Engineering Attacks 15:14
      • 1 Summarize Social Engineering Attacks 01:03
      • 2 Social Engineering and its Common Examples 03:46
      • 3 Forms of Social Engineering Attacks 04:13
      • 4 Principles Followed to Increase Power or Strength 05:12
      • 5 Quiz
      • 6 Summary 01:00
    • Lesson 3.4 - Explain types of Wireless Attacks 15:54
      • 1 Explain types of Wireless Attacks 01:20
      • 2 Rogue Access Point, Jamming or Interference, and Evil Twin 06:34
      • 3 War Driving, War Chalking, Bluejacking and Bluesnarfing 03:13
      • 4 WEP/WPA Attacks, Initialization Vector Attack, and WPS Attacks 02:54
      • 5 Packet Sniffing, and Near Field Communication 00:52
      • 6 Quiz
      • 7 Summary 01:01
    • Lesson 3.5 - Explain types of Application Attacks 19:12
      • 1 Explain types of application attacks 01:38
      • 2 Cross-Site Scriting, SQL, LDAP, and XML Injection 05:40
      • 3 Directory Traversal, Buffer Overflow, and Integer Overflow 04:09
      • 4 Cookies and attachements, and Locally Shared Objects or Flash Cookies 02:51
      • 5 Malicious add-ons, Hijack Header manipulation, Remote Code Execution 03:44
      • 6 Quiz
      • 7 Summary 01:10
    • Lesson 3.6 - Appropriate Type of Mitigation 30:12
      • 1 AnalyZing a Scenario and selecting the Appropriate Type of Mitigation 01:13
      • 2 Monitoring System Logs 02:44
      • 3 Security of Operating Systems 08:16
      • 4 Aspects and Techniques for Port Security 04:36
      • 5 Methods to Maintain Security Posture 05:54
      • 6 Audit Reports - Alarms, Alerts, and Trends 03:16
      • 7 Detection Controls and Prevention Controls 02:43
      • 8 Quiz
      • 9 Summary 01:30
    • Lesson 3.7 - Tools and Techniques to Discover Security Threats and Vulnerabilities 34:14
      • 1 Tools and Techniques to Discover Security Threats and Vulnerabilities 01:45
      • 2 Types of Security Assessment Tools 02:15
      • 3 Types of Tools used in Exploring the Vulnerabilities and Threats 08:14
      • 4 Working of Port Scanners 07:43
      • 5 Types of Assessment 06:12
      • 6 Different Assessment Techniques for Threats, Vulnerabilities, and Risk 06:46
      • 7 Quiz
      • 8 Summary 01:19
    • Lesson 3.8 - Explaining the Proper Use of Penetration Testing vs Vulnerability Scanning 24:39
      • 1 Explaining the Proper Use of Penetration Testing Versus Vulnerability Scanning 01:48
      • 2 Penetration Testing and its Characteristics 08:07
      • 3 Characteristics and Considerations of Vulnerability Scanning 04:06
      • 4 Methods of Vulnerability Scanning 03:17
      • 5 Types of Testing 04:03
      • 6 Difference between Black, White, and Gray Box Testing 02:07
      • 7 Quiz
      • 8 Summary 01:11
    • Lesson 4.1 - Importance of Application Security Controls and Techniques 22:06
      • 1 Explaining the Importance of Application Security Controls and Techniques 01:50
      • 2 Fuzzing as Application Security Technique 03:02
      • 3 Secure Coding Concepts for Application Security 03:48
      • 4 Cross-site Scripting Prevention for Application Security 03:20
      • 5 Cross-site Request Forgery Prevention for Application Security 01:51
      • 6 Configuration Baselining Hardening, Patching for Application Security 02:59
      • 7 NoSQL Databases for Application Security 03:59
      • 8 Quiz
      • 9 Summary 01:17
    • Lesson 4.2 - Summarizing Mobile Security Concepts and Technologies 26:41
      • 1 Summarizing Mobile Security Concepts and Technologies 01:22
      • 2 Techniques and Controls for Device Security 05:19
      • 3 Storage Segmentation 04:33
      • 4 Techniques and Controls to Implement for Application Security on Mobile Devices 05:09
      • 5 Bring Your Own Device or BYOD 08:50
      • 6 Quiz
      • 7 Summary 01:28
    • Lesson 4.3 - Select the Appropriate Solution 21:27
      • 1 Select the Appropriate Solution to Establish Host Security 01:40
      • 2 Host Operating System Security 04:17
      • 3 Anti-Malware as Host Security Solution 05:15
      • 4 Whitelisting and Blacklisting Applications as Host Security Solution 01:42
      • 5 Host Software Baselining as Host Security Solution 01:42
      • 6 Hardware Security as Host Security Solution 01:25
      • 7 Virtualization as Host Security Solution 04:04
      • 8 Quiz
      • 9 Summary 01:22
    • Lesson 4.4 - Alternative Methods to Mitigate Security Risks 26:39
      • 1 Compare and Contrast Alternative Methods to Mitigate Security Risks 01:09
      • 2 Data Security and its Measures 05:28
      • 3 Data Encryption and its Features 03:28
      • 4 Individual Files 06:30
      • 5 Elaborate Hardware based Encryption Devices 06:04
      • 6 Summarize Data Policies and its Common Features 03:00
      • 7 Quiz
      • 8 Summary 01:00
    • Lesson 4.5 - Alternative Methods to Mitigate Security Risks in Static Environments 17:48
      • 1 Alternative Methods to Mitigate Security Risks in Static Environments 01:23
      • 2 Static Environment and its Example 04:09
      • 3 Weak Examples of Static Environment 02:46
      • 4 Examples of Static Environment 03:04
      • 5 Methods of Security Management 05:19
      • 6 Quiz
      • 7 Summary 01:07
    • Lesson 5.1 - Comparing and Contrasting the Function 26:28
      • 1 Compare and Contrast the Function and Purpose of Authentication Services 01:42
      • 2 Different Authentication Services Available for Networks 02:44
      • 3 RADIUS Authentication Service 02:38
      • 4 TACACS PLUS and XTACACS Authentication Services 05:15
      • 5 Kerberos Authentication Service 03:32
      • 6 LDAP and Secure LDAP Authentication Services 05:09
      • 7 SAML Authentication Service 02:38
      • 8 Quiz
      • 9 Summary 02:50
    • Lesson 5.2 - Selecting the AAA in a Scenario 1:02:36
      • 1 Selecting the Appropriate Authentication, Authorization or Access Control in a Given Scenario 01:47
      • 2 Difference Between Identification, Authentication and Authorization Across Various Networks or Systems 06:16
      • 3 Identification Methods 06:11
      • 4 Scenario 03:44
      • 5 Authentication Factors and Mechanisms 06:18
      • 6 Scenario 04:19
      • 7 Scenario 04:08
      • 8 Scenario 05:00
      • 9 Scenario 04:10
      • 10 Scenario 06:04
      • 11 Scenario 04:15
      • 12 Scenario 03:24
      • 13 Authorization Security Principles or Best Practices 04:28
      • 14 Quiz
      • 15 Summary 02:32
    • Lesson 5.3 - Installing and Configuring Security Controls 28:49
      • 1 Installing and Configuring Security Controls when Performing Account Management 03:10
      • 2 Mitigate Issues Associated with users with Multiple Accounts/Roles and/or Shared Accounts 02:45
      • 3 Enforce Different Account Policy Settings for Securing the Systems 03:59
      • 4 Password Complexity as the Best Practice 06:24
      • 5 Account Disablement as the Best Practice 04:33
      • 6 Best Practices for Monitoring Access Control for User Accounts 06:18
      • 7 Quiz
      • 8 Summary 01:40
    • Lesson 6.1 - Utilizing Cryptography 46:07
      • 1 Utilizing Cryptography In A Given Scenario 02:24
      • 2 Historical Methods of Cryptography 08:38
      • 3 Modern Concepts Of Symmetric And Asymmetric Cryptography 07:40
      • 4 Non Repudiation 09:17
      • 5 Mechanisms 09:44
      • 6 New And Future Cryptography 06:10
      • 7 Quiz
      • 8 Summary 02:14
    • Lesson 6.2 - Using Appropriate Cryptographic Methods 1:13:42
      • 1 Using Appropriate Cryptographic Methods 01:42
      • 2 Symmetric Algorithms 03:29
      • 3 DES Modes 07:52
      • 4 Blowfish Algorithm 05:37
      • 5 Issues in RC4-based WEP 09:04
      • 6 Asymmetric Algorithms 06:00
      • 7 El Gamal Algorithm 07:57
      • 8 Pretty Good Privacy 08:29
      • 9 Comparing SHA Algorithms 04:41
      • 10 Transport Encryption Protocols 04:21
      • 11 Cipher Suites 05:11
      • 12 IPSec for Virtual Private Networks 07:06
      • 13 Quiz
      • 14 Summary 02:13
    • Lesson 6.3 - Use appropriate PKI CM and AC 17:52
      • 1 Use appropriate PKI CM and AC 00:54
      • 2 Public Key Infrastructure 03:36
      • 3 Digital Certificate 04:58
      • 4 Trust Models 02:49
      • 5 Manage Certificate Status 04:34
      • 6 Quiz
      • 7 Summary 01:01
    • Performance Based Questions
      • Scenario 1
      • Scenario 2
      • Scenario 3
      • Scenario 4
      • Scenario 5
      • Scenario 6
      • Scenario 7
      • Scenario 8
      • Scenario 9
      • Scenario 10
      • Scenario 11
      • Scenario 12
      • Scenario 13
      • Scenario 14
      • Scenario 15
      • Scenario 16
      • Scenario 17
      • Scenario 18
      • Scenario 19
      • Scenario 20
    • {{childObj.title}}
      • {{childObj.childSection.chapter_name}}
        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

Exam & certification

  • What are the prerequisites for the certification?

    There are no specific prerequisites to take up this certification but it is recommended that individuals take the Network+ certification before taking the Security+ SYO-401 exam.

  • How do I become a CompTIA Security+ SYO-401 certified?

    Candidates who want to be CompTIA Security+ SYO-401 certified must pass the SY0-401 exam. The exam consists of: Maximum of 90 questions Duration of the exam is 90 minutes The minimum passing score is 750

  • What do I need to do to unlock my certificate?

    OSL:
    1. Complete 85% of the course.
    2. Complete 1 simulation test with a minimum score of 60%.

Reviews

Very good presentation. Clear and concise.

Simplilearn’s training has a carefully planned material. It helped me overcome the exam fears and gave me the confidence to clear the exam.

Read more Read less

The course gave a good amount of knowledge on CompTIA Security concepts and was crisp. I am happy to have invested my time on this course.

I vouch for Simplilearn’s training for its detailed and high quality course content. Thank you for your awesome training and I have already recommended it to my colleagues.

Read more Read less

Thanks. I cleared my Security+ Exam with the help of this course.

FAQs

  • What does the course cover?

    The course provides a broad overview on network security; compliance & operational security; threats and vulnerabilities; application, data and host security; access control and identity management; cryptography.

  • What kind of job roles would an IT technician hold after completing the certification?

    Ideal roles for CompTIA Security+ certified professionals would be security engineer, security consultant, network administrator and other relevant IT security job profiles.

  • What are the trending topics on which the certification focuses upon?

    Participants get to learn about security issues associated with BYOD, cloud computing and SCADA. These are the latest concerns threatening the security of the IT industry.

  • Tell me more about CompTIA. How well is it recognized?

    The Computing Technology Industry Association (CompTIA) is a not- for- profit association which offers a wide range of professional certifications for the IT industry. The organization s motto is “Advancing the global IT industry’ and they strive to give the best. Therefore their certifications are highly acclaimed in the IT industry and potential employers from Fortune 500 companies look for professionals with CompTIA credential.

  • What payment options are available?

    You can enroll for the training online. Payments can be made using any of the following options and receipt of the same will be issued to the candidate automatically via email.
    1. Visa debit/credit card
    2. American express and Diners club card
    3. Master Card, or
    4. Through PayPal

  • What will I get along with this training?

    You will have access to the online e-learning and practice tests along with the training.

  • Can I cancel my enrollment? Will I get a refund?

    Yes, you can cancel your enrollment. We provide you complete refund after deducting the administration fee. To know more please go through our Refund Policy.

  • How will I get my course completion certificate from Simplilearn?

    We offer course completion certificate after you successfully complete the training program.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please raise a request via our Help and Support portal to have your issue resolved.

  • Do you provide money back guarantee for the training programs?

    Yes. We do offer a money-back guarantee for many of our training programs. You can refer to the Refund Policy and raise refund requests via our Help and Support portal.

  • What is Simplilearn’s Exam pass guarantee?

    We guarantee you will pass your certification exams provided you use Simplilearn’s online training materials the way they are intended to be used. One has to satisfy certain parameters in order for the guarantee to be validated.

  • What does the course cover?

    The course provides a broad overview on network security; compliance & operational security; threats and vulnerabilities; application, data and host security; access control and identity management; cryptography.

  • What kind of job roles would an IT technician hold after completing the certification?

    Ideal roles for CompTIA Security+ certified professionals would be security engineer, security consultant, network administrator and other relevant IT security job profiles.

  • What are the trending topics on which the certification focuses upon?

    Participants get to learn about security issues associated with BYOD, cloud computing and SCADA. These are the latest concerns threatening the security of the IT industry.

  • Tell me more about CompTIA. How well is it recognized?

    The Computing Technology Industry Association (CompTIA) is a not- for- profit association which offers a wide range of professional certifications for the IT industry. The organization s motto is “Advancing the global IT industry’ and they strive to give the best. Therefore their certifications are highly acclaimed in the IT industry and potential employers from Fortune 500 companies look for professionals with CompTIA credential.

  • Can I cancel my enrollment? Will I get a refund?

    Yes, you can cancel your enrollment. We provide you complete refund after deducting the administration fee. To know more please go through our Refund Policy.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please raise a request via our Help and Support portal to have your issue resolved.

  • I’d like to learn more about this training program. Who should I contact?

    Contact us using the form on the right of any page on the Simplilearn website, or select the Live Chat link. Our customer service representatives will be able to give you more details.

Contact Us

+1-844-532-7688

(Toll Free)

  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.
/index/hidden/ - Never remove this line