CompTIA Security+ Virtual

CompTIA Security+ Virtual Live Course (Exam SY0-601)

CompTIA Security+ Attend from Anywhere Training utilising the latest in classroom learning

CompTIA Security+ (Security-Plus) Virtual Course for Exam SY0-601

Globally trusted certification to validate foundational, vendor-neutral IT security knowledge and skills - ANSI and ISO standard.

Winter Deals - Exceptional Offers - VIEW NOW!

Topics ADDED DAILY include: Agile | PRINCE2 | .NET / C# | SQL | Train the Trainer

  • FREE Accommodation for Key Training Events! BOOK NOW!

VIEW VIDEO: Security+ Course »

Security+ London Classroom Course »

Security+ Sheffield Classroom Course »

Security+ Online Live Course ('Attend from Anywhere') Schedule

Date (DMY) *1DurationLocationQA Fee*Fee - Discounts Available
22/03/2021 5 Days Virtual Live Classroom £3054 £1395
Offer: £995 View Offer! »
W/E 10/04/2021 2 Days
Part 1 of 2. Part 2 starting: 17/04/2021 (see below)
Virtual Live Classroom £3054 £1495
Offer: £1295 View Offer! »
W/E 17/04/2021 2 Days
Part 2 of 2. Part 1 starting: 10/04/2021 (see above)
Virtual Live Classroom N/A N/A
W/E 15/05/2021 2 Days
Part 1 of 2. Part 2 starting: 22/05/2021 (see below)
Virtual Live Classroom £3054 £1495
Offer: £1295 View Offer! »
W/E 22/05/2021 2 Days
Part 2 of 2. Part 1 starting: 15/05/2021 (see above)
Virtual Live Classroom N/A N/A
24/05/2021 5 Days Virtual Live Classroom £3054 £1395
Offer: £1195 View Offer! »
05/07/2021 5 Days Virtual Live Classroom £3054 £1395
W/E 10/07/2021 2 Days
Part 1 of 2. Part 2 starting: 17/07/2021 (see below)
Virtual Live Classroom £3054 £1495
W/E 17/07/2021 2 Days
Part 2 of 2. Part 1 starting: 10/07/2021 (see above)
Virtual Live Classroom N/A N/A
*1 Event Start 9:00 | End 17:00. Time Zone Information: UK Local Time unless Time Zone indicated for event. Part-time sessions typically 3 hours duration
Symbols: W/E = Weekend Course MORN = Morning Session AFT = Afternoon Session EVE = Evening Session

* QA pricing from their website 28/03/2020. QA class sizes up to 16 possibly mixed Virtual and In-Person attendees on the same event. Prices INCLUDE VAT.

Book now »

Subscribe for Security+ Online Course offers and updates

* indicates required

Virtual 'Attend from Anywhere' Security+ Course Introduction

Achieve your next career step by attaining this most sought after Cybersecurity certification!

TrainX's Security+ online course is CompTIA authorised and designed to achieve the learning objectives of the SY0-601 as efficiently as possible.

Our in-house trainer is a CompTIA Certified Technical Trainer (CTT+) which validates the trainer's skills in training delivery and has the relevant CompTIA technical certifications along with a broad experience with Microsoft and Cisco technologies.

The SY0-601 online course delivery includes discussions, presentations and a high level of hands-on in a comprehensive CompTIA authorised Security+ course delivery.

Security+ Certification and Related Examinations

To achieve Security+ certification, you'll need to pass the following exam:

  • CompTIA Security+ SY0-601 - foundation-level security skills and knowledge

Our live virtual Security+ course covers the examination syllabus and we provide additional preparation materials and guidance.

The CompTIA Security+ SY0-601

The certification meets ISO 17024 and is owned by CompTIA (Website): Security+ SY0-601

Our Live Virtual Security+ course covers the SY0-601 examination syllabus (NB SY0-501 courses still available until June 2021 - contact us) and we provide additional preparation materials, including the MeasureUP Practice Test for SY0-601 and examination succcess guidance.

Audience

The Security+ is recognised worldwide as the foundational certification for security experts. Here's a list of just some of the job roles that the Security+ is a foundation for:

  • Security Administrator
  • Systems Administrator
  • Helpdesk Manager / Analyst
  • Network / Cloud Engineer
  • Security Engineer / Analyst
  • DevOps / Software Developer
  • IT Auditors
  • IT Project Manager

Contact us for an informal chat about the value of the CompTIA Security+.

At Course Completion

After completing this course, students have covered the CompTIA Security+ exam syllabus (exam SY0-601) which is presented under the follow domains:

  • 1.0 Attacks, Threats, and Vulnerabilities
  • 2.0 Architecture and Design
  • 3.0 Implementation
  • 4.0 Operations and Incident Response
  • 5.0 Governance, Risk, and Compliance

CompTIA Security+ incorporates best practices in hands-on troubleshooting, ensuring candidates have practical security problem-solving skills required to:

  • Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
  • Identify, analyze, and respond to security events and incidents

Contact us to discuss the course objectives.

Prerequisites

The course is suitable for learners who have core IT skills and the following is recommended as a prerequisite:

Please contact us for further information.

Security+ Course Materials

The courseware adheres to CompTIA's strict quality standards and is CompTIA Approved Quality Content (CAQC).

The Security+ requires understanding of Server, PC and Networking technologies and we provide a very comprehensive CompTIA authorised set of virtualised 'labs' during the course and for six months after to ensure that you've relevant 'hands-on' experience.

CompTIA Security+ Course Outline

The public course has a number of delivery formats including a standard 5 day event and a two-weekend event. See the schedule for details. Onsite and single-company custom course formats are available.

The course design is based on five knowledge and skill areas known as domains (listed below) and provides in-depth concepts and hands-on skill development for each.

  • 1.0 Attacks, Threats, and Vulnerabilities
  • 2.0 Architecture and Design
  • 3.0 Implementation
  • 4.0 Operations and Incident Response
  • 5.0 Governance, Risk, and Compliance

Lesson 1: Comparing Security Roles and Security Controls

  • Topic 1A: Compare and Contrast Information Security Roles
  • Topic 1B: Compare and Contrast Security Control and Framework Types

Lesson 2: Explaining Threat Actors and Threat Intelligence

  • Topic 2A: Explain Threat Actor Types and Attack Vectors
  • Topic 2B: Explain Threat Intelligence Sources

Lesson 3: Performing Security Assessments

  • Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
  • Topic 3B: Explain Security Concerns with General Vulnerability Types
  • Topic 3C: Summarize Vulnerability Scanning Techniques
  • Topic 3D: Explain Penetration Testing Concepts

Lesson 4: Identifying Social Engineering and Malware

  • Topic 4A: Compare and Contrast Social Engineering Techniques
  • Topic 4B: Analyze Indicators of Malware-Based Attacks

Lesson 5: Summarizing Basic Cryptographic Concepts

  • Topic 5A: Compare and Contrast Cryptographic Ciphers
  • Topic 5B: Summarize Cryptographic Modes of Operation
  • Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
  • Topic 5D: Summarize Other Cryptographic Technologies

Lesson 6: Implementing Public Key Infrastructure

  • Topic 6A: Implement Certificates and Certificate Authorities
  • Topic 6B: Implement PKI Management

Lesson 7: Implementing Authentication Controls

  • Topic 7A: Summarize Authentication Design Concepts
  • Topic 7B: Implement Knowledge-Based Authentication
  • Topic 7C: Implement Authentication Technologies
  • Topic 7D: Summarize Biometrics Authentication Concepts

Lesson 8: Implementing Identity and Account Management Controls

  • Topic 8A: Implement Identity and Account Types
  • Topic 8B: Implement Account Policies
  • Topic 8C: Implement Authorization Solutions
  • Topic 8D: Explain the Importance of Personnel Policies

Lesson 9: Implementing Secure Network Designs

  • Topic 9A: Implement Secure Network Designs
  • Topic 9B: Implement Secure Switching and Routing
  • Topic 9C: Implement Secure Wireless Infrastructure
  • Topic 9D: Implement Load Balancers

Lesson 10: Implementing Network Security Appliances

  • Topic 10A: Implement Firewalls and Proxy Servers
  • Topic 10B: Implement Network Security Monitoring
  • Topic 10C: Summarize the Use of SIEM

Lesson 11: Implementing Secure Network Protocols

  • Topic 11A: Implement Secure Network Operations Protocols
  • Topic 11B: Implement Secure Application Protocols
  • Topic 11C: Implement Secure Remote Access Protocols

Lesson 12: Implementing Host Security Solutions

  • Topic 12A: Implement Secure Firmware
  • Topic 12B: Implement Endpoint Security
  • Topic 12C: Explain Embedded System Security Implications

Lesson 13: Implementing Secure Mobile Solutions

  • Topic 13A: Implement Mobile Device Management
  • Topic 13B: Implement Secure Mobile Device Connections

Lesson 14: Summarizing Secure Application Concepts

  • Topic 14A: Analyze Indicators of Application Attacks
  • Topic 14B: Analyze Indicators of Web Application Attacks
  • Topic 14C: Summarize Secure Coding Practices
  • Topic 14D: Implement Secure Script Environments
  • Topic 14E: Summarize Deployment and Automation Concepts

Lesson 15: Implementing Secure Cloud Solutions

  • Topic 15A: Summarize Secure Cloud and Virtualization Services
  • Topic 15B: Apply Cloud Security Solutions
  • Topic 15C: Summarize Infrastructure as Code Concepts

Lesson 16: Explaining Data Privacy and Protection Concepts

  • Topic 16A: Explain Privacy and Data Sensitivity Concepts
  • Topic 16B: Explain Privacy and Data Protection Controls

Lesson 17: Performing Incident Response

  • Topic 17A: Summarize Incident Response Procedures
  • Topic 17B: Utilize Appropriate Data Sources for Incident Response
  • Topic 17C: Apply Mitigation Controls

Lesson 18: Explaining Digital Forensics

  • Topic 18A: Explain Key Aspects of Digital Forensics Documentation
  • Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition

Lesson 19: Summarizing Risk Management Concepts

  • Topic 19A: Explain Risk Management Processes and Concepts
  • Topic 19B: Explain Business Impact Analysis Concepts

Lesson 20: Implementing Cybersecurity Resilience

  • Topic 20A: Implement Redundancy Strategies
  • Topic 20B: Implement Backup Strategies
  • Topic 20C: Implement Cybersecurity Resiliency Strategies

Lesson 21: Explaining Physical Security

  • Topic 21A: Explain the Importance of Physical Site Security Controls
  • Topic 21B: Explain the Importance of Physical Host Security Controls

Appendix A: Mapping Course Content to CompTIA Security+ (Exam SY0-601)


© 2021 TrainX Limited | Privacy Policy | Attend Anywhere Security+ Online | Virtual Security Plus Course