KEMBAR78
Codar Security+ | PDF | Computer Network | Cryptography
0% found this document useful (0 votes)
15 views23 pages

Codar Security+

This document outlines a comprehensive course for the CompTIA Security+ certification (SY0-601), designed to equip learners with the skills and knowledge necessary to pass the exam and excel in IT security roles. It covers various topics including risk management, cryptography, identity management, and securing networks and systems, along with practical labs and quizzes for hands-on learning. The course aims to prepare individuals for careers in IT security and enhance their professional advancement opportunities.

Uploaded by

taylorpa76
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views23 pages

Codar Security+

This document outlines a comprehensive course for the CompTIA Security+ certification (SY0-601), designed to equip learners with the skills and knowledge necessary to pass the exam and excel in IT security roles. It covers various topics including risk management, cryptography, identity management, and securing networks and systems, along with practical labs and quizzes for hands-on learning. The course aims to prepare individuals for careers in IT security and enhance their professional advancement opportunities.

Uploaded by

taylorpa76
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Codar

Security+
This is a complete and comprehensive
CompTIA Security+ Certification
(SY0-601) course. It is designed to
prepare you to take and pass the
CompTIA exam
Motive && Objective

❖ Your new skills and the CompTIA Security+ Cert will help you land a great IT
security tech job or, get that raise or advancement you are after.

❖ You will have the knowledge and confidence to pass the CompTIA exam and
the skills to be a great IT security tech

❖ This course is ideal as both a study tool and an on-the-job reference for IT
Security tasks.
Introduction && Risk Management

❖ Introduction to compTIA Security+ SY0-601


❖ About the compTIA Security+ SY0-601 Exam
❖ Defining Risk
❖ Threat and Vulnerabilities
❖ Threat Intelligence
❖ Risk Management Concepts
❖ Security Controls
❖ Risk Assessments and Treatments
❖ Quantitative Risk Assessments
❖ Qualitative Risk Assessments
❖ Business Impact Analysis
Introduction && Risk Management

❖ Data Types and Roles


❖ Security and the Information Life Cycle
❖ Data Destruction
❖ Personnel Risk and Policies
❖ Third-Party Risk Management
❖ Agreement Types
❖ Chapter 1 Exam Question Review
❖ Wiping Disks with the dd Command Lab
❖ Chapter 1 Ask Me Anything (AMA)
❖ Chapter 1 Quiz

Cryptography

❖ Cryptography Basics
❖ Data Protection
❖ Cryptographic Methods
❖ Symmetric Cryptosystems
❖ Symmetric Block Modes
❖ Asymmetric Cryptosystems
❖ Diffie-Hellman
❖ Hashing
❖ Understanding Digital Certificates
❖ Trust Models
❖ Public Key Infrastructure
Cryptography

❖ Certificate Types
❖ Touring Certificates
❖ Cryptographic Attacks
❖ Password Cracking
❖ Password Cracking Demo
❖ Chapter 2 Exam Question Review
❖ SSH Public Key Authentication Lab
❖ Chapter 2 Ask Me Anything (AMA)
❖ Chapter 2 Quiz
Identity && Account Management

❖ Identification, Authentication, and Authorization


❖ Enabling Multifactor Authentication
❖ Authorization
❖ Accounting
❖ Authentication Methods
❖ Access Control Schemes
❖ Account Management
❖ Network Authentication
❖ Identity Management Systems
❖ Chapter 3 Exam Question Review
❖ Creating LInux Users and Groups Lab
Identity && Account Management

❖ Chapter 3 Ask Me Anything (AMA)


❖ Chapter 3 Quiz


Tools Of The Trade

❖ Touring the CLI


❖ Shells
❖ The Windows Command Line
❖ Microsoft PowerShell
❖ Linux Shells
❖ Python Scripts
❖ Windows Command-Line Tools
❖ Linux Command-Line Tools
❖ Network Scanners
❖ Network Scanning with Nmap
❖ Network Protocol Analyzers
Tools Of The Trade

❖ Using Wireshark to Analyze Network Traffic


❖ Using tcpdump to Analyze Network Traffic
❖ Log Files
❖ Centralized Logging
❖ Configuring Linux Log Forwarding
❖ Chapter 4 Exam Question Review
❖ Linux Shell Script Lab
❖ Nmap Lab
❖ Chapter 4 Ask Me Anything (AMA)
❖ Chapter 4 Quiz
Securing Individual Systems

❖ Malware
❖ Weak Configurations
❖ Common Attacks
❖ Driver and Overflow Attacks
❖ Password Attacks
❖ Bots and Botnets
❖ Disk RAID Levels
❖ Securing Hardware
❖ Securing Endpoints
❖ Chapter 5 Exam Question Review
❖ Linux Software RAID Lab
Securing Individual Systems

❖ Chapter 5 Ask Me Anything (AMA)


❖ Chapter 5 Quiz
The Basic LAN

❖ The OSI Model


❖ ARP Cache Poisoning
❖ Other Layer 2 Attacks
❖ Network Planning
❖ Load Balancing
❖ Securing Network Access
❖ Honeypots
❖ Firewalls
❖ Proxy Servers
❖ Network and Port Address Translation
❖ IP Security (IPsec)
The Basic LAN

❖ Virtual Private Networks (VPNs)


❖ Intrusion Detection and Prevention Systems (IDS/IPS)
❖ Chapter 6 Exam Question Review
❖ Linux Snort IDS Lab
❖ Chapter 6 Ask Me Anything (AMA)
❖ Chapter 6 Quiz
Securing Wireless LANS

❖ Wi-Fi Encryption Standards


❖ RFID, NFC, and Bluetooth
❖ Wi-Fi Coverage and Performance
❖ Wi-Fi Discovery and Attacks
❖ Cracking WPA2
❖ Wi-Fi Hardening
❖ Chapter 7 Exam Question Review
❖ WPA2 Cracking Lab
❖ Chapter 7 Ask Me Anything (AMA)
❖ Chapter 7 Quiz
Securing Public Servers
❖ Defining a Public Server
❖ Common Attacks and Mitigations
❖ Containers and Software-Defined Networking
❖ Hypervisors and Virtual Machines
❖ Cloud Deployment Models
❖ Cloud Service Models
❖ Securing the Cloud
❖ Chapter 8 Exam Question Review
❖ Docker Container Lab
❖ Chapter 8 Ask Me Anything (AMA)
❖ Chapter 8 Quiz
Securing Dedicated Systems

❖ Embedded Systems
❖ Industrial Control System (ICS)
❖ Internet of Things (IoT) Devices
❖ Connecting to Dedicated and Mobile Systems
❖ Security Constraints for Dedicated Systems
❖ Mobile Device Deployment and Hardening
❖ Chapter 9 Exam Question Review
❖ Smartphone Hardening Lab
❖ Chapter 9 Ask Me Anything (AMA)
❖ Chapter 9 Quiz
Physical Security

❖ Physical Security Overview


❖ Physical Security
❖ Keylogger Demo
❖ Environmental Controls
❖ Chapter 10 Exam Question Review
❖ Physical Security Lab
❖ Chapter 10 Ask Me Anything (AMA)
❖ Chapter 10 Quiz
Secure Protocols and Applications

❖ DNS Security
❖ FTP Packet Capture
❖ Secure Web and E-mail
❖ Request Forgery Attacks
❖ Cross-Site Scripting Attacks
❖ Web Application Security
❖ Web App Vulnerability Scanning
❖ Chapter 11 Exam Question Review
❖ OWASP ZAP Web App Scan Lab
❖ Chapter 11 Ask Me Anything (AMA)
❖ Chpater 11 Quiz
Testing Infrastrures

❖ Testing Infrastructure Overview


❖ Social Engineering
❖ Social Engineering Attacks
❖ Vulnerability Assessments
❖ Penetration Testing
❖ Security Assessment Tools
❖ The Metasploit Framework
❖ Chapter 12 Exam Question Review
❖ hping3 Forged Packet Lab
❖ Chapter 12 Ask Me Anything (AMA)
❖ Chapter 12 Quiz
Dealing With Incidence

❖ Incident Response Overview


❖ Incident Response Plans (IRPs)
❖ Threat Analysis and Mitigating Actions
❖ Digital Forensics
❖ Gathering Digital Evidence
❖ Business Continuity and Alternate Sites
❖ Data Backup
❖ Chapter 13 Exam Question Review
❖ Autopsy Forensic Browser Lab
❖ Chapter 13 Ask Me Anything (AMA)
❖ Chapter 13 Quiz
❖ Exams
❖ Abbreviations
Thank you!

You might also like