CompTIA Security+ SY0-601


CompTIA Security+

What is it?

CompTIA Security+ is a global certification that validates the baseline skills you need to perform core security functions and pursue an IT security career.

Why is it different?

• More choose Security+ – chosen by more corporations and defense organizations than any other
certification on the market to validate core security skills and for fulfilling DoD 8570 compliance.

• Security+ proves hands-on skills – the only baseline cybersecurity certification emphasizing
vendor-neutral, hands-on practical skills, ensuring the security professional is better prepared
to problem solve a wider variety of today’s complex issues.

• More job roles turn to Security+ to supplement skills – baseline cybersecurity skills are applicable
across more of today’s job roles to secure systems, software and hardware.

• Security+ is aligned to the latest trends and techniques – covering the most core technical
skills in risk assessment and management, incident response, forensics, enterprise networks,
hybrid/cloud operations, and security controls, ensuring high-performance on the job.

About the exam

CompTIA Security+ is the first security certification a candidate should earn. It establishes the core
knowledge required of any cybersecurity role and provides a springboard to intermediate-level
cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting, ensuring
candidates have practical security problem-solving skills required to:

• Assess the security posture of an enterprise environment and recommend and implement
appropriate security solutions

• Monitor and secure hybrid environments, including cloud, mobile, and IoT

• Operate with an awareness of applicable laws and policies, including principles of governance,
risk, and compliance

• Identify, analyze, and respond to security events and incidents
Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive
8140/8570.01-M requirements.

Our Instructors

All of our instructors are certified and experienced in the certifications they teach.

We hold a view that anyone who instructs others should have at least once walked in their shoes.


James Horne

CEH | CHFI | CFR | Cybersafe | CySA | Pentest+ | Network + | Security+ | A+ |

Course Content

Topic 1A: Compare and Contrast Information Security Roles
Topic 1B: Compare and Contrast Security Control and Framework Types
Topic 1C: Compare and Contrast Social Engineering Attack Types
Topic 1D: Determine Malware Types

Topic 2A: Explain Threat Actor Types and Attack Vectors
Topic 2B: Explain Threat Intelligence Sources

Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
Topic 3B: Explain Security Concerns with General Vulnerability Types
Topic 3C: Summarize Vulnerability Scanning Techniques
Topic 3D: Explain Penetration Testing Concepts

Topic 4A: Compare and Contrast Social EngineeringTechniques
Topic 4B: Analyze Indicators of Malware-Based Attacks

Topic 5A: Compare and Contrast Cryptographic Ciphers
Topic 5B: Summarize Cryptographic Modes of Operation
Topic 5C: Summarize Cryptographic Use Cases and Weak-nesses
Topic 5D: Summarize Other Cryptographic Technologies

Topic 6A: Implement Certificates and Certificate Authorities
Topic 6B: Implement PKI Management

Topic 7A: Summarize Authentication Design Concepts
Topic 7B: Implement Knowledge-Based Authentication
Topic 7C: Implement Authentication Technologies
Topic 7D: Summarize Biometrics Authentication Concepts

Topic 8A: Implement Identity and Account Types
Topic 8B: Implement Account Policies
Topic 8C: Implement Authorization Solutions
Topic 8D: Explain the Importance of Personnel Policies

Topic 9A: Implement Secure Network Designs
Topic 9B: Implement Secure Switching and Routing
Topic 9C: Implement Secure Wireless Infrastructure
Topic 9D: Implement Load Balancer

Topic 10A: Implement Firewalls and Proxy Servers
Topic 10B: Implement Network Security Monitoring
Topic 10C: Summarize the Use of SIEM

Topic 11A: Implement Secure Network Operations Protocols
Topic 11B: Implement Secure Application Protocols
Topic 11C: Implement Secure Remote Access Protocols

Topic 12A: Implement Secure Firmware
Topic 12B: Implement Endpoint Security

Topic 13A: Implement Mobile Device Management
Topic 13B: Implement Secure Mobile Device Connections

Topic 14A: Analyze Indicators of Application Attacks
Topic 14B: Analyze Indicators of Web Application Attacks
Topic 14C: Summarize Secure Coding Practices
Topic 14D: Implement Secure Script Environments
Topic 14E: Summarize Deployment and Automation Concepts

Topic 15A: Summarize Secure Cloud and Virtualization Services
Topic 15B: Apply Cloud Security Solutions
Topic 15C: Summarize Infrastructure as Code Concepts

Topic 16A: Explain Privacy and Data Sensitivity Concepts
Topic 16B: Explain Privacy and Data Protection Controls

Topic 17A: Summarize Incident Response Procedures
Topic 17B: Utilize Appropriate Data Sources for Incident Response
Topic 17C: Apply Mitigation Controls

Topic 18A: Explain Key Aspects of Digital Forensics Documentation
Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition

Topic 19A: Explain Risk Management Processes and Concepts
Topic 19B: Explain Business Impact Analysis Concepts

Topic 20A: Implement Redundancy Strategies
Topic 20B: Implement Backup Strategies
Topic 20C: Implement Cybersecurity Resiliency Strategies

Topic 21A: Explain the Importance of Physical Site Security Controls
Topic 21B: Explain the Importance of Physical Host Security Controls

Heard enough? check our

Upcoming Dates

Virtual Classroom

  • 09:00 am - 12:00 pm
  • Live instruction virtual class
  • Courseware + Exam included

Self Paced E-Learning

With Lab Access
£ 599
  • Learn at your own pace
  • Includes Certmaster + Virtual labs
  • Courseware + Exam included

Self Paced E-Learning

No Lab Access
£ 499
  • Learn at your own pace
  • Certmaster Access (no Labs)
  • Courseware + Exam included
multiple users?

Contact us for a personalised and discounted quote for your organisation.