CompTIA Security+ (Exam SYO-501)
Learn about identifying security fundamentals and threats with this free online course.
Description
This course, CompTIA Security+ (Exam SYO-501), will provide you with an understanding of identifying security fundamentals. You will learn about basic security controls, identifying basic authentication, authorization concepts, and basic cryptography concepts. You will be able to explain the process of analyzing risk. You will also learn about performing a business impact analysis.
This course then explains conducting security assessments, identifying vulnerabilities, assessing vulnerabilities, and implementing penetration testing. You will learn about implementing host and software security. You will also learn about implementing network security, configuring network security techniques, and secure network design elements.
This course then wraps up discussing managing identity and access. You will learn to implement identity and access management, configure directory services, configure access services, and manage accounts. By taking this course you will learn to implement cryptography, identify advanced cryptography concepts, select cryptographic algorithms, configure a public key infrastructure, enroll certificates, back up and restore certificates and private keys, revoke certificates, troubleshoot common security issues, respond to security incidents, and implement forensic procedures. So why wait? Start learning the skills needed to become an expert in security and ensure business continuity today.
Start Course NowModules
Identifying Security Fundamentals
-
Topic A: Identify Information Security Concepts
-
Topic A - Demo 1 - Identifying Information Security Basics
-
Topic B: Identify Basic Security Controls
-
Topic B - Demo 1 - Identifying Basic Security Controls
-
Topic C: Identify Basic Authentication and Authorization Concepts
-
Topic C - Demo 1 - Identifying Basic Authentication and Authorization Concepts
-
Topic D: Identify Basic Cryptography Concepts
-
Topic D - Demo 1 - Identifying Basic Cryptography Concepts
-
Review Quiz
Analyzing Risk
-
Topic A: Analyze Organizational Risk
-
Topic A - Demo 1 - Analyzing Risks to the Organization
-
Topic B: Analyze the Business Impact of Risk
-
Topic B - Demo 1 - Performing a Business Impact Analysis
-
Review Quiz
Identifying Security Threats
-
Topic A: Identify Types of Attackers
-
Topic A - Demo 1 - Identifying Types of Attackers
-
Topic B: Identify Social Engineering Attacks
-
Topic B - Demo 1 - Identifying Social Engineering Attacks
-
Topic C: Identify Malware
-
Topic C - Demo 1 - Identifying Types of Malware
-
Topic D: Identify Software-Based Threats
-
Topic D - Demo 1 - Identifying Password Attacks
-
Topic E: Identify Network-Based Threats
-
Topic E - Demo 1 - Identifying Threats to DNS
-
Topic E - Demo 2 - Identifying Port Scanning Threats
-
Topic F: Identify Wireless Threats
-
Topic F - Demo 1 - Identifying Wireless Threats
-
Topic G: Identify Physical Threats
-
Topic G - Demo 1 - Identifying Physical Threats
-
Review Quiz
Conducting Security Assessments
-
Topic A: Identify Vulnerabilities
-
Topic A - Demo 1 - Identifying Vulnerabilities
-
Topic B: Assess Vulnerabilities
-
Topic B - Demo 1 - Capturing Network Data with Wireshark
-
Topic B - Demo 2 - Scanning for General Vulnerabilities
-
Topic C: Implement Penetration Testing
-
Topic C - Demo 1 - Implementing Penetration Testing
-
Review Quiz
Implementing Host and Software Security
-
Topic A: Implement Host Security
-
Topic A - Demo 1 - Implementing Auditing
-
Topic A - Demo 2 - Hardening a Server
-
Topic B: Implement Cloud and Virtualization Security
-
Topic B - Demo 1 - Securing Virtual Machine Networking
-
Topic C: Implement Mobile Device Security
-
Topic C - Demo 1 - Implementing Mobile Device Security
-
Topic D: Incorporate Security in the Software Development Lifecycle
-
Topic D - Demo 1 - Performing Static Code Analysis
-
Review Quiz
Implementing Network Security
-
Topic A: Configure Network Security Technologies
-
Topic A - Demo 1 - Configuring a Network IDS
-
Topic B: Secure Network Design Elements
-
Topic B - Demo 1 - Securing Network Design Elements
-
Topic C: Implement Secure Networking Protocols and Services
-
Topic C - Demo 1 - Installing an Internet Information Services Web Server
-
Topic C - Demo 2 - Securing Network Traffic Using IPSec
-
Topic D: Secure Wireless Traffic
-
Topic D - Demo 1 - Securing Wireless Traffic
-
Review Quiz
Managing Identity and Access
-
Topic A: Implement Identity and Access Management
-
Topic A - Demo 1 - Implementing DAC for a File Share
-
Topic B: Configure Directory Services
-
Topic B - Demo 1 - Backing Up Active Directory
-
Topic C: Configure Access Services
-
Topic C - Demo 1 - Configuring a Remote Access Server
-
Topic C - Demo 2 - Setting Up Remote Access Authentication
-
Topic D: Manage Accounts
-
Topic D - Demo 1 - Managing Accounts
-
Review Quiz
Implementing Cryptography
-
Topic A: Identify Advanced Cryptography Concepts
-
Topic A - Demo 1 - Identifying Advanced Cryptographic Concepts
-
Topic B: Select Cryptographic Algorithms
-
Topic B - Demo 1 - Selecting Cryptographic Algorithms
-
Topic C: Configure a Public Key Infrastructure
-
Topic C - Demo 1 - Installing a CA
-
Topic C - Demo 2 - Securing a Windows Server 2016 CA
-
Topic D: Enroll Certificates
-
Topic D - Demo 1 - Enrolling Certificates
-
Topic D - Demo 2 - Securing Network Traffic with Certificates
-
Topic E: Back Up and Restore Certificates and Private Keys
-
Topic E - Demo 1 - Backing Up a Certificate and Private Key
-
Topic E - Demo 2 - Restoring a Certificate and Private Key
-
Topic F: Revoke Certificates
-
Topic F - Demo 1 - Revoking Certificates
-
Review Quiz
Implementing Operational Security
-
Topic A: Evaluate Security Frameworks and Guidelines
-
Topic A - Demo 1 - Evaluating Security Frameworks and Guidelines
-
Topic B: Incorporate Documentation in Operational Security
-
Topic B - Demo 1 - Incorporating Documentation in Operational Security
-
Topic C: Implement Security Strategies
-
Topic C - Demo 1 - Implementing Virtual Machine Snapshots
-
Topic D: Manage Data Security Processes
-
Topic D - Demo 1 - Destroying Data Securely
-
Topic D - Demo 2 - Encrypting a Storage Device
-
Topic E: Implement Physical Controls
-
Topic E - Demo 1 - Implementing Physical Controls
-
Review Quiz
Addressing Security Issues
-
Topic A: Troubleshoot Common Security Issues
-
Topic A - Demo 1 - Identifying Event Log Anomalies
-
Topic B: Respond to Security Incidents
-
Topic B - Demo 1 - Responding to a Security Incident
-
Topic C: Investigate Security Incidents
-
Topic C - Demo 1 - Implementing Forensic Procedures
-
Review Quiz
Ensuring Business Continuity
-
Topic A: Select Business Continuity and Disaster Recovery Processes
-
Topic A - Demo 1 - Selecting Business Continuity and Disaster Recovery Process
-
Topic B: Develop a Business Continuity Plan
-
Topic B - Demo 1 - Developing a BCP
-
Review Quiz
Course assessment
Learning Outcomes
Having completed this course, you will be able to:
- Describe the process for analyzing risk
- Discuss identifying security threats
- Explain implementing host and software security
- Indicate managing identity and access
- Outline implementing cryptography
Certification
All Alison courses are free to enrol, study and complete. To successfully complete this Certificate course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this Certificate course, you have the option to acquire an official Certificate, which is a great way to share your achievement with the world. Your Alison Certificate is:
Ideal for sharing with potential employers - include it in your CV, professional social media profiles and job applications
An indication of your commitment to continuously learn, upskill and achieve high results
An incentive for you to continue empowering yourself through lifelong learning
Alison offers 3 types of Certificates for completed Certificate courses:
Digital Certificate - a downloadable Certificate in PDF format, immediately available to you when you complete your purchase
Certificate - a physical version of your officially branded and security-marked Certificate, posted to you with FREE shipping
Framed Certificate - a physical version of your officially branded and security-marked Certificate in a stylish frame, posted to you with FREE shipping
All Certificates are available to purchase through the Alison Shop. For more information on purchasing Alison Certificates, please visit our FAQs. If you decide not to purchase your Alison Certificate, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Dashboard. For more details on our Certificate pricing, please visit our Pricing Page.