- Home
- IT TRAINING
- CERTPREP ONLINE TRAINING
- COURSE LIST & DATES
- COURSES AVAILABLE
- EXAM RESULTS 2023
- Microsoft Office 365 courses
- ENVIRONMENTAL REPORT
- WESTON COLLEGE BUSINESS AWARDS
- SOMERSET EDUCATION BUSINESS PARTNERSHIP AWARD
- TRAINING SERVICES
- ADOBE EXAMS
- MICROSOFT EXAM REPLAY OFFER
- MICROSOFT OFFICE SPECIALIST TRAINING
- MICROSOFT PRACTICE TESTS
- AWS PRACTICE TESTS
- CISCO PRACTICE TESTS
- EXAMS
- Free & Discounted Exams
- HOW TO GET CERTIFIED
- EXAM BOOKING IN PROCESS
- DISABILITY SUPPORT
- MOST POPULAR EXAMS
- BOOK MICROSOFT OFFICE SPECIALIST EXAM
- NCFE EXAMS
- CERTIFICATION BUNDLES
- CISCO CCNA EXAM BUNDLE
- COMPTIA A+ EXAM BUNDLE
- COMPTIA SECURITY+ BUNDLE
- COMPTIA NETWORK+ BUNDLE
- GETTING STARTED IN IT
Number of Exams Delivered:
2024 | 827 |
---|---|
2014-24 |
9,291 |
Exam Centre Status: |
---|
Number of Students Trained:
2014-24 |
1,543 |
CompTIA Security+ SY0-601 Course Details:
Instructional lessons are combined with videos, practice questions, and performance-based questions to provide hours of engaging and interactive content aligned with the CompTIA exam objectives. A Learning Plan helps learners stay on track with their studies, while robust analytics bring awareness of strengths and weaknesses.
- Lessons cover all exam objectives with integrated videos
- Hundreds of practice questions test your knowledge
- Performance-based questions apply what you’ve learned in a scenario
- Flashcards ensure you know the terminology and acronyms required for the exam
- The Learning Plan keeps you on track with your studies
Topics Covered:
- Lesson 1: Comparing Security Roles and Security Controls
- Lesson 2: Explaining Threat Actors and Threat Intelligence
- Lesson 3: Performing Security Assessments
- Lesson 4: Identifying Social Engineering and Malware
- Lesson 5: Summarizing Basic Cryptographic Concepts
- Lesson 6: Implementing Public Key Infrastructure
- Lesson 7: Implementing Authentication Controls
- Lesson 8: Implementing Identity and Account Management Controls
- Lesson 9: Implementing Secure Network Designs
- Lesson 10: Implementing Network Security Appliances
- Lesson 11: Implementing Secure Network Protocols
- Lesson 12: Implementing Host Security Solutions
- Lesson 13: Implementing Secure Mobile Solutions
- Lesson 14: Summarizing Secure Application Concepts
- Lesson 15: Implementing Secure Cloud Solutions
- Lesson 16: Explaining Data Privacy and Protection Concepts
- Lesson 17: Performing Incident Response
- Lesson 18: Explaining Digital Forensics
- Lesson 19: Summarizing Risk Management Concepts
- Lesson 20: Implementing Cybersecurity Resilience
- Lesson 21: Explaining Physical Security