Key features

MONEY BACK GUARANTEE

How this works :

At Simplilearn, we greatly value the trust of our patrons. Our courses were designed to deliver an effective learning experience, and have helped over half a million find their professional calling. But if you feel your course is not to your liking, we offer a 7-day money-back guarantee. Just send us a refund request within 7 days of purchase, and we will refund 100% of your payment, no questions asked!

For Self Placed Learning :

Raise refund request within 7 days of purchase of course. Money back guarantee is void if the participant has accessed more than 25% content.

  • 30+ hours of self-paced videos
  • Covers 6 domains required to become an IT security professional
  • Includes 2 practice tests

Course description

  • What’s the focus of this course?

    Simplilearn’s training in CompTIA Security+ SYO-401 arms IT technicians with the necessary knowledge to secure a network and manage risk, access control, cryptography along with other relevant IT security concepts. Participants at the end of the training are validated of their skills in information security which is one of the fastest progressing verticals in IT.

  • Why is the certification most sought-after?

    CompTIA Security+ SYO-401 certification is widely in demand globally, as it accelerates professionals to leap high in the technology vertical. Apart from this, there are several reasons why one should go for this certification.
    According to a CompTIA study:
    • 86% of hiring managers said that IT certifications were of high priority while evaluating a candidate.
    • 53% of IT recruiters said the job of evaluating certified candidates were much easier as it saved them time and money.
    • Organizations that have a high number of certified help desk staff on board, can handle 11 % more phone calls and 28 % more field service calls than organizations with less number of certified staff.
    • CompTIA certifications are a stamp of approval of a candidate’s fundamental knowledge and skillset required for IT jobs. This eases the hiring process considerably as the credentials are linked to specific job roles.
    • Organizations understand the value of a CompTIA certified candidate.
    • CompTIA certifications are highly acclaimed in the IT industry and potential employers from Fortune 500 companies look for professionals with CompTIA credential.

  • What are the career benefits in-store for you?

    According to Indeed.com, CompTIA Security+ SYO-401 certified professionals earn an average of $55000 and have a wide scope to grow in their careers. They are most sought –after in top organizations like Hitachi Information Systems (Japan), Prestariang Systems Sdn. Bhd. (Malaysia) and U.S. government contractors such as CSC, General Dynamics and Northrop Grumman.

  • Who should take this course?

    The course is ideal for professionals in the role of a Security Engineer, Security Consultant, Network Administrator or an IA Technician or Manager.

Course preview

    • Lesson 00 - Course Overview 05:56
      • 0.1 Course Overview05:56
    • Lesson 1.1 - Implementing Security Configuration Parameters 41:41
      • 1 Implementing Security Configuration Parameters01:08
      • 2 OSI Model04:00
      • 3 Network Devices01:35
      • 4 Switches04:09
      • 5 Router05:05
      • 6 Firewalls07:55
      • 7 Load Balancer06:01
      • 8 Detection and Prevention Systems for a Network03:45
      • 9 Host-Based Intrusion Detection Systems07:15
      • 10 Quiz
      • 11 Summary00:48
    • Lesson 1.2 - Use Secure Network Administration Principles 30:02
      • 1 Use Secure Network Administration Principles01:35
      • 2 Access Control List and its Categories06:51
      • 3 Key Security Measures03:29
      • 4 VLAN Management05:05
      • 5 Access Control List in depth01:28
      • 6 Port Security02:59
      • 7 Standards for Wireless Security Network02:26
      • 8 Concepts of Implicit Deny, Network Separation, Log Analysis, and Unified Threat Management04:46
      • 9 Quiz
      • 10 Summary01:23
    • Lesson 1.3 - Network Design Elements and Components 29:27
      • 1 Network Design Elements and Components01:27
      • 2 Network Design and Components05:31
      • 3 Subnetting07:00
      • 4 Tunneling05:03
      • 5 Cloud Computing02:02
      • 6 Types of Cloud Services07:25
      • 7 Quiz
      • 8 Summary00:59
    • Lesson 1.4 - Implementing Common Protocols and Services 36:41
      • 1 Implement Common Protocols and Services01:18
      • 2 Basic Concepts of Protocols03:41
      • 3 Different Types of Protocols06:19
      • 4 Secure Socket Layer and Transport layer Security06:00
      • 5 Secure Copy Protocol06:55
      • 6 Transfer Protocol and its Different Types05:04
      • 7 Ports and thier Supported Protocols06:04
      • 8 Quiz
      • 9 Summary01:20
    • Lesson 1.5 - Troubleshoot security issues 22:32
      • 1 Given a scenario Troubleshoot Security Issues Related to Wireless Networking02:01
      • 2 Wireless Networking03:41
      • 3 Troubleshoot Security Issues Related to Wireless Networking04:16
      • 4 WPA Personal05:56
      • 5 Antenna Placement and Power control05:39
      • 6 Quiz
      • 7 Summary00:59
    • Lesson 2.1 - Introduction to importance of risk 36:48
      • 1 Introduction to Importance of Risk-Related Concepts01:17
      • 2 Control Types03:16
      • 3 Control Classes03:10
      • 4 Risk Management06:02
      • 5 Security Policy03:26
      • 6 Importance of Reducing Risk03:32
      • 7 Single Loss Expectancy04:26
      • 8 Impact of Risk06:04
      • 9 Risk Reducing Concepts04:15
      • 10 Quiz
      • 11 Summary01:20
    • Lesson 2.2 - Summarize the Security Implications 14:25
      • 1 Summarize the Security Implications of Integrating Systems and data with Third Parties01:07
      • 2 Threats from a Third Party04:25
      • 3 Interoperability Agreements03:48
      • 4 Third Party Threats04:02
      • 5 Quiz
      • 6 Summary01:03
    • Lesson 2.3 - Implementing Appropriate Risk Mitigation Strategies 09:55
      • 1 Implementing Appropriate Risk Mitigation Strategies01:09
      • 2 Risk Mitigation Strategies03:37
      • 3 Implementing Appropriate Risk Mitigation Strategies02:13
      • 4 Identify Policies and Procedures to Prevent data Loss and Theft02:04
      • 5 Quiz
      • 6 Summary00:52
    • Lesson 2.4 - Implement basics of forensic procedure 15:04
      • 1 How to Implement Basics of Forensic Procedure01:13
      • 2 Analyze the System Volatility02:30
      • 3 Collect Forensic Data06:22
      • 4 Analyze the Collected Data03:54
      • 5 Quiz
      • 6 Summary01:05
    • Lesson 2.5 - Summarizing incident response procedures 15:06
      • 1 Summarize Common Incident Response Procedures01:01
      • 2 Common Incident Response Procedures07:09
      • 3 Recovery and Reconstitution Procedures05:59
      • 4 Quiz
      • 5 Summary00:57
    • Lesson 2.6 - Importance of Security Related Awareness and Training 29:48
      • 1 Importance of Security Related Awareness and Training01:32
      • 2 Security Policy and Training Procedures04:40
      • 3 Role-Based Training04:22
      • 4 Classification Systems04:42
      • 5 Data Labeling03:57
      • 6 User Habits03:51
      • 7 New Threats, Security Trends and Alerts05:11
      • 8 Quiz
      • 9 Summary01:33
    • Lesson 2.7 - Compare and Contrast Physical Security and Environmental Controls 31:44
      • 1 Compare and Contrast Physical Security and Environmental Controls02:19
      • 2 Environmental Controls04:48
      • 3 Physical Security02:37
      • 4 Types of Physical Security Locks04:38
      • 5 Fencing04:00
      • 6 General Security Measures02:20
      • 7 Alarms04:16
      • 8 Different Control Types05:25
      • 9 Quiz
      • 10 Summary01:21
    • Lesson 2.8 - Summarizing Risk Management Best Practices 24:38
      • 1 Summarizing Risk-Management Best Practices02:01
      • 2 Business Continuity Concepts01:45
      • 3 Critical Systems and Components01:32
      • 4 Business Continuity Planning and Testing04:48
      • 5 IT Contingency Planning03:35
      • 6 Tabletop Exercises04:43
      • 7 Disaster Recovery Planning options03:24
      • 8 Alternate Sites01:39
      • 9 Quiz
      • 10 Summary01:11
    • Lesson 2.9 - Select the Appropriate Control 15:41
      • 1 Select the Appropriate Control to Meet Goals of Security01:07
      • 2 Overview02:56
      • 3 Techniques to Maintain Integrity of Data02:10
      • 4 Risk Management03:54
      • 5 Aspects of Security and Safety04:36
      • 6 Quiz
      • 7 Summary00:58
    • Lesson 3.1 - Explain types of Malware 20:25
      • 1 Explain types of Malware01:01
      • 2 Threats and Vulnerabilities00:59
      • 3 Malware and its Types06:00
      • 4 Trojan07:04
      • 5 Countermeasures to Avoid or Terminate Malware04:22
      • 6 Quiz
      • 7 Summary00:59
    • Lesson 3.2 - Summarize Various Types of Attacks 35:25
      • 1 Summarize various Types of Attacks01:39
      • 2 Attacks and its Common Types08:26
      • 3 Replay, Spoofing, Spam and Spim05:41
      • 4 Phishing and its Different Forms01:56
      • 5 Xmas Attack, Pharming, Privilege Escalation03:46
      • 6 Malicious Insider Threat, DNS and ARP Poisoning06:36
      • 7 Attack Types05:47
      • 8 Quiz
      • 9 Summary01:34
    • Lesson 3.3 - Summarize Social Engineering Attacks 15:14
      • 1 Summarize Social Engineering Attacks01:03
      • 2 Social Engineering and its Common Examples03:46
      • 3 Forms of Social Engineering Attacks04:13
      • 4 Principles Followed to Increase Power or Strength05:12
      • 5 Quiz
      • 6 Summary01:00
    • Lesson 3.4 - Explain types of Wireless Attacks 15:54
      • 1 Explain types of Wireless Attacks01:20
      • 2 Rogue Access Point, Jamming or Interference, and Evil Twin06:34
      • 3 War Driving, War Chalking, Bluejacking and Bluesnarfing03:13
      • 4 WEP/WPA Attacks, Initialization Vector Attack, and WPS Attacks02:54
      • 5 Near Field Communication00:52
      • 6 Quiz
      • 7 Summary01:01
    • Lesson 3.5 - Explain types of Application Attacks 19:12
      • 1 Explain types of application attacks01:38
      • 2 Cross-Site Scriting, SQL, LDAP, and XML Injection05:40
      • 3 Directory Traversal, Buffer Overflow, and Integer Overflow04:09
      • 4 Cookies and attachements, and Locally Shared Objects or Flash Cookies02:51
      • 5 Malicious add-ons, Hijack Header manipulation, Remote Code Execution03:44
      • 6 Quiz
      • 7 Summary01:10
    • Lesson 3.6 - Appropriate Type of Mitigation 30:12
      • 1 AnalyZing a Scenario and selecting the Appropriate Type of Mitigation01:13
      • 2 Monitoring System Logs02:44
      • 3 Security of Operating Systems08:16
      • 4 Aspects and Techniques for Port Security04:36
      • 5 Methods to Maintain Security Posture05:54
      • 6 Audit Reports - Alarms, Alerts, and Trends03:16
      • 7 Detection Controls and Prevention Controls02:43
      • 8 Quiz
      • 9 Summary01:30
    • Lesson 3.7 - Tools and Techniques to Discover Security Threats and Vulnerabilities 34:14
      • 1 Tools and Techniques to Discover Security Threats and Vulnerabilities01:45
      • 2 Types of Security Assessment Tools02:15
      • 3 Types of Tools used in Exploring the Vulnerabilities and Threats08:14
      • 4 Working of Port Scanners07:43
      • 5 Types of Assessment06:12
      • 6 Different Assessment Techniques for Threats, Vulnerabilities, and Risk06:46
      • 7 Quiz
      • 8 Summary01:19
    • Lesson 3.8 - Explaining the Proper Use of Penetration Testing vs Vulnerability Scanning 24:39
      • 1 Explaining the Proper Use of Penetration Testing Versus Vulnerability Scanning01:48
      • 2 Penetration Testing and its Characteristics08:07
      • 3 Characteristics and Considerations of Vulnerability Scanning04:06
      • 4 Methods of Vulnerability Scanning03:17
      • 5 Types of Testing04:03
      • 6 Difference between Black, White, and Gray Box Testing02:07
      • 7 Quiz
      • 8 Summary01:11
    • Lesson 4.1 - Importance of Application Security Controls and Techniques 22:06
      • 1 Explaining the Importance of Application Security Controls and Techniques01:50
      • 2 Fuzzing as Application Security Technique03:02
      • 3 Secure Coding Concepts for Application Security03:48
      • 4 Cross-site Scripting Prevention for Application Security03:20
      • 5 Cross-site Request Forgery Prevention for Application Security01:51
      • 6 Configuration Baselining Hardening, Patching for Application Security02:59
      • 7 NoSQL Databases for Application Security03:59
      • 8 Quiz
      • 9 Summary01:17
    • Lesson 4.2 - Summarizing Mobile Security Concepts and Technologies 26:41
      • 1 Summarizing Mobile Security Concepts and Technologies01:22
      • 2 Techniques and Controls for Device Security05:19
      • 3 Storage Segmentation04:33
      • 4 Techniques and Controls to Implement for Application Security on Mobile Devices05:09
      • 5 Bring Your Own Device or BYOD08:50
      • 6 Quiz
      • 7 Summary01:28
    • Lesson 4.3 - Select the Appropriate Solution 21:27
      • 1 Select the Appropriate Solution to Establish Host Security01:40
      • 2 Host Operating System Security04:17
      • 3 Anti-Malware as Host Security Solution05:15
      • 4 Whitelisting and Blacklisting Applications as Host Security Solution01:42
      • 5 Host Software Baselining as Host Security Solution01:42
      • 6 Hardware Security as Host Security Solution01:25
      • 7 Virtualization as Host Security Solution04:04
      • 8 Quiz
      • 9 Summary01:22
    • Lesson 4.4 - Alternative Methods to Mitigate Security Risks 26:39
      • 1 Compare and Contrast Alternative Methods to Mitigate Security Risks01:09
      • 2 Data Security and its Measures05:28
      • 3 Data Encryption and its Features03:28
      • 4 Individual Files06:30
      • 5 Elaborate Hardware based Encryption Devices06:04
      • 6 Summarize Data Policies and its Common Features03:00
      • 7 Quiz
      • 8 Summary01:00
    • Lesson 4.5 - Alternative Methods to Mitigate Security Risks in Static Environments 17:48
      • 1 Alternative Methods to Mitigate Security Risks in Static Environments01:23
      • 2 Static Environment and its Example04:09
      • 3 Weak Examples of Static Environment02:46
      • 4 Examples of Static Environment03:04
      • 5 Methods of Security Management05:19
      • 6 Quiz
      • 7 Summary01:07
    • Lesson 5.1 - Comparing and Contrasting the Function 26:28
      • 1 Compare and Contrast the Function and Purpose of Authentication Services01:42
      • 2 Different Authentication Services Available for Networks02:44
      • 3 RADIUS Authentication Service02:38
      • 4 TACACS PLUS and XTACACS Authentication Services05:15
      • 5 Kerberos Authentication Service03:32
      • 6 LDAP and Secure LDAP Authentication Services05:09
      • 7 SAML Authentication Service02:38
      • 8 Quiz
      • 9 Summary02:50
    • Lesson 5.2 - Selecting the AAA in a Scenario 1:02:36
      • 1 Selecting the Appropriate Authentication, Authorization or Access Control in a Given Scenario01:47
      • 2 Difference Between Identification, Authentication and Authorization Across Various Networks or Systems 06:16
      • 3 Identification Methods06:11
      • 4 Scenario03:44
      • 5 Authentication Factors and Mechanisms06:18
      • 6 Scenario04:19
      • 7 Scenario04:08
      • 8 Scenario05:00
      • 9 Scenario04:10
      • 10 Scenario06:04
      • 11 Scenario04:15
      • 12 Scenario03:24
      • 13 Authorization Security Principles or Best Practices04:28
      • 14 Quiz
      • 15 Summary02:32
    • Lesson 5.3 - Installing and Configuring Security Controls 28:49
      • 1 Installing and Configuring Security Controls when Performing Account Management03:10
      • 2 Mitigate Issues Associated with users with Multiple Accounts/Roles and/or Shared Accounts02:45
      • 3 Enforce Different Account Policy Settings for Securing the Systems03:59
      • 4 Password Complexity as the Best Practice06:24
      • 5 Account Disablement as the Best Practice04:33
      • 6 Best Practices for Monitoring Access Control for User Accounts06:18
      • 7 Quiz
      • 8 Summary01:40
    • Lesson 6.1 - Utilizing Cryptography 46:07
      • 1 Utilizing Cryptography In A Given Scenario02:24
      • 2 Historical Methods of Cryptography08:38
      • 3 Modern Concepts Of Symmetric And Asymmetric Cryptography07:40
      • 4 Non Repudiation09:17
      • 5 Mechanisms09:44
      • 6 New And Future Cryptography06:10
      • 7 Quiz
      • 8 Summary02:14
    • Lesson 6.2 - Using Appropriate Cryptographic Methods 1:13:42
      • 1 Using Appropriate Cryptographic Methods01:42
      • 2 Symmetric Algorithms03:29
      • 3 DES Modes07:52
      • 4 Blowfish Algorithm05:37
      • 5 Issues in RC4-based WEP09:04
      • 6 Asymmetric Algorithms06:00
      • 7 El Gamal Algorithm07:57
      • 8 Pretty Good Privacy08:29
      • 9 Comparing SHA Algorithms04:41
      • 10 Transport Encryption Protocols04:21
      • 11 Cipher Suites05:11
      • 12 IPSec for Virtual Private Networks07:06
      • 13 Quiz
      • 14 Summary02:13
    • Lesson 6.3 - Use appropriate PKI CM and AC 17:52
      • 1 Use appropriate PKI CM and AC00:54
      • 2 Public Key Infrastructure03:36
      • 3 Digital Certificate04:58
      • 4 Trust Models02:49
      • 5 Manage Certificate Status04:34
      • 6 Quiz
      • 7 Summary01:01
    • Performance Based Questions
      • Scenario 1
      • Scenario 2
      • Scenario 3
      • Scenario 4
      • Scenario 5
      • Scenario 6
      • Scenario 7
      • Scenario 8
      • Scenario 9
      • Scenario 10
      • Scenario 11
      • Scenario 12
      • Scenario 13
      • Scenario 14
      • Scenario 15
      • Scenario 16
      • Scenario 17
      • Scenario 18
      • Scenario 19
      • Scenario 20
    • {{childObj.title}}
      • {{childObj.childSection.chapter_name}}
        • {{lesson.title}}
      • {{lesson.title}}

    View More

    View Less

Exam & certification

  • What are the prerequisites for the certification?

    There are no specific prerequisites to take up this certification but it is recommended that individuals take the Network+ certification before taking the Security+ SYO-401 exam.

  • How do I become a CompTIA Security+ SYO-401 certified?

    Candidates who want to be CompTIA Security+ SYO-401 certified must pass the SY0-401 exam. The exam consists of: Maximum of 90 questions Duration of the exam is 90 minutes The minimum passing score is 750

  • What do I need to do to unlock my certificate?

    OSL:
    1. Complete 85% of the course.
    2. Complete 1 simulation test with a minimum score of 60%.

Reviews

Very good presentation. Clear and concise.

Simplilearn’s training has a carefully planned material. It helped me overcome the exam fears and gave me the confidence to clear the exam.

Read more Read less

The course gave a good amount of knowledge on CompTIA Security concepts and was crisp. I am happy to have invested my time on this course.

I vouch for Simplilearn’s training for its detailed and high quality course content. Thank you for your awesome training and I have already recommended it to my colleagues.

Read more Read less

Thanks. I cleared my Security+ Exam with the help of this course.

FAQs

  • What does the course cover?

    The course provides a broad overview on network security; compliance & operational security; threats and vulnerabilities; application, data and host security; access control and identity management; cryptography.

  • What kind of job roles would an IT technician hold after completing the certification?

    Ideal roles for CompTIA Security+ certified professionals would be security engineer, security consultant, network administrator and other relevant IT security job profiles.

  • What are the trending topics on which the certification focuses upon?

    Participants get to learn about security issues associated with BYOD, cloud computing and SCADA. These are the latest concerns threatening the security of the IT industry.

  • Tell me more about CompTIA. How well is it recognized?

    The Computing Technology Industry Association (CompTIA) is a not- for- profit association which offers a wide range of professional certifications for the IT industry. The organization s motto is “Advancing the global IT industry’ and they strive to give the best. Therefore their certifications are highly acclaimed in the IT industry and potential employers from Fortune 500 companies look for professionals with CompTIA credential.

  • What payment options are available?

    You can enroll for the training online. Payments can be made using any of the following options and receipt of the same will be issued to the candidate automatically via email.
    1. Visa debit/credit card
    2. American express and Diners club card
    3. Master Card, or
    4. Through PayPal

  • What will I get along with this training?

    You will have access to the online e-learning and practice tests along with the training.

  • Can I cancel my enrollment? Will I get a refund?

    Yes, you can cancel your enrollment. We provide you complete refund after deducting the administration fee. To know more please go through our Refund Policy.

  • How will I get my course completion certificate from Simplilearn?

    We offer course completion certificate after you successfully complete the training program.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please raise a request via our Help and Support portal to have your issue resolved.

  • Do you provide money back guarantee for the training programs?

    Yes. We do offer a money-back guarantee for many of our training programs. You can refer to the Refund Policy and raise refund requests via our Help and Support portal.

  • What is Simplilearn’s Exam pass guarantee?

    We guarantee you will pass your certification exams provided you use Simplilearn’s online training materials the way they are intended to be used. One has to satisfy certain parameters in order for the guarantee to be validated.

  • What does the course cover?

    The course provides a broad overview on network security; compliance & operational security; threats and vulnerabilities; application, data and host security; access control and identity management; cryptography.

  • What kind of job roles would an IT technician hold after completing the certification?

    Ideal roles for CompTIA Security+ certified professionals would be security engineer, security consultant, network administrator and other relevant IT security job profiles.

  • What are the trending topics on which the certification focuses upon?

    Participants get to learn about security issues associated with BYOD, cloud computing and SCADA. These are the latest concerns threatening the security of the IT industry.

  • Tell me more about CompTIA. How well is it recognized?

    The Computing Technology Industry Association (CompTIA) is a not- for- profit association which offers a wide range of professional certifications for the IT industry. The organization s motto is “Advancing the global IT industry’ and they strive to give the best. Therefore their certifications are highly acclaimed in the IT industry and potential employers from Fortune 500 companies look for professionals with CompTIA credential.

  • Can I cancel my enrollment? Will I get a refund?

    Yes, you can cancel your enrollment. We provide you complete refund after deducting the administration fee. To know more please go through our Refund Policy.

  • Where and how can I access the e-learning content? Are there any limitations?

    Once you register with us for a course by paying the course fee, you can have 24/7 access to the e-learning content on our website. An automated course purchase confirmation mail from our side will guide you through the process.

  • I am not able to access the online course. Whom should I contact for a solution?

    Please raise a request via our Help and Support portal to have your issue resolved.

  • I’d like to learn more about this training program. Who should I contact?

    Contact us using the form on the right of any page on the Simplilearn website, or select the Live Chat link. Our customer service representatives will be able to give you more details.

  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.