Security (SY0-601)

You might also like

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

======================================================

== THESE OUTLINES FOR COMPTIA SECURITY+ (SY0-601) ====


== PROVIDED BY COMPTIA, TEACHED BY: AHMED SULTAN ====
== visit https://netriders.academy for more courses ==
======================================================

=========
Modules
=========
Module 1: Attacks, Threats, and Vulnerabilities
Module 2: Architecture and Design
Module 3: Implementation
Module 4: Operations and Incident Response
Module 5: Governance, Risk, and Compliance

=========
Topics
=========
Lesson 0: Security+ (SY0-601) Course Introduction - [Theory - Demo Lab]
Lesson 1: Comparing Security Roles and Security Controls - [Theory - No Lab]
Lesson 2: Explaining Threat Actors and Threat Intelligence - [Theory - No Lab]
Lesson 3: Performing Security Assessments - [Theory - Labs 1,2,3 and 4]
Lesson 4: Identifying Social Engineering and Malware - [Theory - Lab 5]
Lesson 5: Summarizing Basic Cryptographic Concepts - [Theory - No Lab]
Lesson 6: Implementing Public Key Infrastructure - [Theory - Labs 6 and 7]
Lesson 7: Implementing Authentication Controls - [Theory - Labs 8 and 9]
Lesson 8: Implementing Identity and Account Management Controls - [Theory - Labs
10,11 and 12]
Lesson 9: Implementing Secure Network Designs - [Theory - Lab 13]
Lesson 10: Implementing Network Security Appliances - [Theory - Labs 14 and 15]
Lesson 11: Implementing Secure Network Protocols - [Theory - Labs 16, 17 and 18]
Lesson 12: Implementing Host Security Solutions - [Theory - Lab 19]
Lesson 13: Implementing Secure Mobile Solutions - [Theory - No Lab]
Lesson 14: Summarizing Secure Application Concepts - [Theory - Labs 20,21,22 and
23]
Lesson 15: Implementing Secure Cloud Solutions - [Theory - No Lab]
Lesson 16: Explaining Data Privacy and Protection Concepts - [Theory - No Lab]
Lesson 17: Performing Incident Response - [Theory - Labs 24 and 25]
Lesson 18: Explaining Digital Forensics - [Theory - Lab 26]
Lesson 19: Summarizing Risk Management Concepts - [Theory - No Lab]
Lesson 20: Implementing Cybersecurity Resilience - [Theory - Lab 27]
Lesson 21: Explaining Physical Security - [Theory - No Lab]

======
Labs
======
Lab 1: Exploring the Lab Environment
Lab 2: Scanning and Identifying Network Nodes
Lab 3: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools
Lab 4: Analyzing the Results of a Credentialed Vulnerability Scan
Lab 5: Installing, Using, and Blocking a Malware-based Backdoor
Lab 6: Managing the Lifecycle of a Certificate
Lab 7: Managing Certificates with OpenSSL
Lab 8: Auditing Passwords with a Password Cracking Utility
Lab 9: Managing Centralized Authentication
Lab 10: Managing Access Controls in Windows Server
Lab 11: Configuring a System for Auditing Policies
Lab 12: Managing Access Controls in Linux
Lab 13: Implementing a Secure Network Design
Lab 14: Configuring a Firewall
Lab 15: Configuring an Intrusion Detection System
Lab 16: Implementing Secure Network Addressing Services
Lab 17: Implementing a Virtual Private Network
Lab 18: Implementing a Secure SSH Server
Lab 19: Implementing Endpoint Protection
Lab 20: Identifying Application Attack Indicators
Lab 21: Identifying a Browser Attack
Lab 22: Implementing PowerShell Security
Lab 23: Identifying Malicious Code
Lab 24: Managing Data Sources for Incident Response
Lab 25: Configuring Mitigation Controls
Lab 26: Acquiring Digital Forensics Evidence
Lab 27: Backing Up and Restoring Data in Windows and Linux

You might also like