Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

CompTIA Security+ Certification Training (SY0-601)

CompTIA Security+ Certification Training (SY0-601)

CompTIA Security+ Certification Training (SY0-601):

CompTIA Security+ Certification Training (SY0-601) Hands-on (Online, Onsite, and Classroom Live!)

Prepare for the CompTIA Security+ SYO-601 certification while building your cybersecurity knowledge, skills, and abilities. Our CompTIA Security+ Certification Training (SY0-601) Workshop provides the basic knowledge needed to plan, implement, and maintain information security in a vendor-neutral format. This includes risk management, host and network security, authentication and access control systems, cryptography, and organizational security. This CompTIA Security+ Certification Training (SY0-601) Workshop course maps to the CompTIA Security+ certification exam (SY0-601). Our Classroom and Classroom Live courses utilize official CompTIA courseware and labs. Objective coverage is marked throughout the course.


The Security+ certification is considered to be the minimum level of certification for all IT security positions beyond entry-level. This CompTIA Security+ Certification Training (SY0-601) course delivers the core knowledge required to pass the exam and the skills necessary to advance to an intermediate-level security job.

Students will benefit most from this course if they intend to take the CompTIA Security+ SY0-601 exam. Read our white paper titled “New Topics on the New Security+ SY0-601 Exam.” This CompTIA Security+ Certification (SY0-601) course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

What’s Included:

  • 5 Days of CompTIA Security+ Training from an Authorized CompTIA Instructor
  • CompTIA approved CompTIA Security+ Training Courseware (Digital and Print)
  • CompTIA approved Security+ Practice Exams
  • CompTIA Security+ Certification (SYO-601) exam voucher
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee

Exam Information

  • Duration : 90 minutes
  • Number of questions : 90 questions per exam
  • Question format : Multiple choice and performance-based
  • Pass score : 750 (on a scale of 100-900)
  • This course prepares you for the Security+ certification exam based on the 2020 objectives (exam SY0-601).
  • The SY0-601 exam is included in the approved list of certifications that meet DoD Directive 8570.1 requirements.


Related Courses:

Customize It:

  • If you are familiar with some aspects of CompTIA Security+ Certification (SY0-601), we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the CompTIA Security+ Certification (SY0-601) course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the CompTIA Security+ Certification (SY0-601) course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this CompTIA Security+ Certification Training course is defined here:

  • Network Administrators
  • Cybersecurity Associates
  • IT personnel interested in pursuing a career in cybersecurity


This CompTIA Security+ Certification Training course assumes basic knowledge of using and maintaining individual workstations.

  • Attendees should be CompTIA A+ certified (or have equivalent experience) and CompTIA Network+ certified (or have equivalent experience) with 2-3 years networking experience.


Upon completing this CompTIA Security+ Certification Training course, learners will be able to meet these objectives:

  • Security threats and controls
  • Cryptography and access control
  • Network security
  • Host, data, and appliance security
  • Operational security

Course Syllabus:

Lesson 1: Comparing Security Roles and Controls

  • Topic 1A: Compare and Contrast Information Security Roles
  • Topic 1B: Compare and Contrast Security Control and Framework Types

Lesson 2: Explaining Threat Actors and Threat Intelligence

  • Topic 2A: Explain Threat Actor Types and Attack Vectors
  • Topic 2B: Explain Threat Intelligence Sources

Lesson 3: Performing Security Assessments

  • Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
  • Topic 3B: Explain Security Concerns with General Vulnerability Types
  • Topic 3C: Summarize Vulnerability Scanning Techniques
  • Topic 3D: Explain Penetration Testing Concepts

Lesson 4: Identifying Social Engineering and Malware

  • Topic 4A: Compare and Contrast Social Engineering Techniques
  • Topic 4B: Analyze Indicators of Malware-Based Attacks

Lesson 5: Summarizing Basic Cryptographic Concepts

  • Topic 5A: Compare and Contrast Cryptographic Ciphers
  • Topic 5B: Summarize Cryptographic Modes of Operation
  • Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
  • Topic 5D: Summarize Other Cryptographic Technologies

Lesson 6: Implementing Public Key Infrastructure

  • Topic 6A: Implement Certificates and Certificate Authorities
  • Topic 6B: Implement PKI Management

Lesson 7: Implementing Authentication Controls

  • Topic 7A: Summarize Authentication Design Concepts
  • Topic 7B: Implement Knowledge-Based Authentication
  • Topic 7C: Implement Authentication Technologies
  • Topic 7D: Summarize Biometrics Authentication Concepts

Lesson 8: Implementing Identity and Account Management Controls

  • Topic 8A: Implement Identity and Account Types
  • Topic 8B: Implement Account Policies
  • Topic 8C: Implement Authorization Solutions
  • Topic 8D: Explain the Importance of Personnel Policies

Lesson 9: Implementing Secure Network Designs

  • Topic 9A: Implement Secure Network Designs
  • Topic 9B: Implement Secure Switching and Routing
  • Topic 9C: Implement Secure Wireless Infrastructure
  • Topic 9D: Implement Load Balancers

Lesson 10: Implementing Network Security Appliances

  • Topic 10A: Implement Firewalls and Proxy Servers
  • Topic 10B: Implement Network Security Monitoring
  • Topic 10C: Summarize the Use of SIEM

Lesson 11: Implementing Secure Network Protocols

  • Topic 11A: Implement Secure Network Operations Protocols
  • Topic 11B: Implement Secure Application Protocols
  • Topic 11C: Implement Secure Remote Access Protocols

Lesson 12: Implementing Host Security Solutions

  • Topic 12A: Implement Secure Firmware
  • Topic 12B: Implement Endpoint Security
  • Topic 12C: Explain Embedded System Security Implications

Lesson 13: Implementing Secure Mobile Solutions

  • Topic 13A: Implement Mobile Device Management
  • Topic 13B: Implement Secure Mobile Device Connections

Lesson 14: Summarizing Secure Application Concepts

  • Topic 14A: Analyze Indicators of Application Attacks
  • Topic 14B: Analyze Indicators of Web Application Attacks
  • Topic 14C: Summarize Secure Coding Practices
  • Topic 14D: Implement Secure Script Environments
  • Topic 14E: Summarize Deployment and Automation Concepts

Lesson 15: Implementing Secure Cloud Solutions

  • Topic 15A: Summarize Secure Cloud and Virtualization Services
  • Topic 15B: Apply Cloud Security Solutions
  • Topic 15C: Summarize Infrastructure as Code Concepts

Lesson 16: Explaining Data Privacy and Protection Concepts

  • Topic 16A: Explain Privacy and Data Sensitivity Concepts
  • Topic 16B: Explain Privacy and Data Protection Controls

Lesson 17: Performing Incident Response

  • Topic 17A: Summarize Incident Response Procedures
  • Topic 17B: Utilize Appropriate Data Sources for Incident Response
  • Topic 17C: Apply Mitigation Controls

Lesson 18: Explaining Digital Forensics

  • Topic 18A: Explain Key Aspects of Digital Forensics Documentation
  • Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition

Lesson 19: Summarizing Risk Management Concepts

  • Topic 19A: Explain Risk Management Processes and Concepts
  • Topic 19B: Explain Business Impact Analysis Concepts

Lesson 20: Implementing Cybersecurity Resilience

  • Topic 20A: Implement Redundancy Strategies
  • Topic 20B: Implement Backup Strategies
  • Topic 20C: Implement Cybersecurity Resiliency Strategies

Lesson 21: Explaining Physical Security

  • Topic 21A: Explain the Importance of Physical Site Security Controls
  • Topic 21B: Explain the Importance of Physical Host Security Controls

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: