0% found this document useful (0 votes)
566 views

CompTIA Security SY0 601

This document outlines the topics and time allotments for an online CompTIA Security+ training course. The course is divided into 5 weeks covering topics such as social engineering, cyber attack techniques, network attacks, vulnerabilities and risk assessment, security concepts for enterprises, and specialized systems like cloud computing and embedded systems. Each week includes modules ranging from 1 to 14 minutes in length on subtopics like phishing, password attacks, wireless vulnerabilities, and container security. Quizzes are included at the end of each section to review the material.

Uploaded by

Ruben
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
566 views

CompTIA Security SY0 601

This document outlines the topics and time allotments for an online CompTIA Security+ training course. The course is divided into 5 weeks covering topics such as social engineering, cyber attack techniques, network attacks, vulnerabilities and risk assessment, security concepts for enterprises, and specialized systems like cloud computing and embedded systems. Each week includes modules ranging from 1 to 14 minutes in length on subtopics like phishing, password attacks, wireless vulnerabilities, and container security. Quizzes are included at the end of each section to review the material.

Uploaded by

Ruben
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

WEEK 1 Social Engineering Techniques 45 min.

Introduction to Social Engineering 2 min.


Phishing and Related Attacks 5 min.
Low Tech Attacks 5 min.
Security+ Online Why Social Engineering Works 4 min.
The Top Social Engineering Tool 7 min.
Training Identifying a Phishing Email 10 min.
Social Engineering Toolkit 7 min.
(SY0-601) Review Quiz 5 min.

This foundational CompTIA Security+ training prepares Cyber Attack Techniques 47 min.
learners to take the SY0-601 exam, which is the one Introduction to Cyber Attack Techniques 1 min.
required exam to earn the Security+ certification. Malware 8 min.
Password Attacks 6 min.
CBT Nuggets course material Password Attack Example 10 min.
Cyber Physical Components 5 min.
Adversarial AI 4 min.
Supply Chain Security 2 min.
Cryptographic Attacks 4 min.
Review Quiz 7 min.

Application Attacks 47 min.


Introduction to Application Attacks 1 min.
Injection Attacks 3 min.
Cross Site Scripting 2 min.
Poorly Written Apps 5 min.
Overflow Attack Demo 8 min.
Poorly Written App Attack 4 min.
Impersonation 3 min.
Error Handling Attack 7 min.
Additional Application Attacks 4 min.
Password Recovery Fail 4 min.
STUDY PLAN Review Quiz 6 min.
WEEK 2 Network Attacks 44 min. Network Scan Demonstration 8 min.
Introduction to Network Attacks 1 min. Positive and Negative Scan Results 3 min.
Wireless Attacks 6 min. CVE and CVSS 5 min.
In-line / On-path Attacks 6 min. Security information and event management (SIEM) 5 min.
Layer 2 attacks 7 min. Threat hunting 2 min.
Domain name system (DNS) 5 min. Security orchestration, automation, and response (SOAR) 2 min.
Distributed denial-of-service (DDoS) 4 min. Security Assessment Review Quiz 11 min.
Malicious code or script execution 2 min.
Remediation Options 5 min. Penetration Testing Techniques 51 min.
Review Quiz 8 min. Introduction to Penetration Testing 1 min.
Pen Testing Overview 10 min.
Threat Actors and Intelligence Sources 45 min. OSSTMM 3 min.
Introduction to Actors, Vectors, and Intelligence Sources 1 min. Resources from NIST 4 min.
Threat Actors 6 min. Penetration Testing Execution Standard 4 min.
Attack Vectors 7 min. Pen Testing Demo 14 min.
Threat Intelligence Sources 9 min. OWASP 4 min.
Threat Maps 12 min. Security Team Exercises 2 min.
Additional Sources for Research 4 min. Pen Testing Review Quiz 9 min.
Review / Quiz 6 min.
Security Concepts for the Enterprise 42 min.
Vulnerabilities and Security Risks 43 min. Introduction to Security Concepts for the Enterprise 1 min.
Introduction to Vulnerabilities and Security Risks 1 min. Configuration management 5 min.
Cloud vs. On-prem Vulnerabilities 2 min. Data protection 5 min.
Zero-day Attacks 3 min. Hashing 10 min.
Weak Configurations 9 min. Deception and Disruption 6 min.
Telnet with IPsec Demonstration 9 min. SSL/TLS Inspection 4 min.
Third-Party Risks 2 min. Site Resiliency 3 min.
Patch Management 4 min. API Considerations 4 min.
Vulnerabilities Review Quiz 13 min. Quiz and Review 4 min.

WEEK 3 Techniques Used in Security Assessments 43 min. Cloud Computing and Virtualization 47 min.
Introduction to Security Assessments 1 min. Introduction to Cloud Computing and Virtualization 1 min.
Vulnerability Scan Overview 6 min. Virtualization Overview 6 min.
Cloud Models 4 min. Snapshots 4 min.
MSPs and MSSPs 4 min. Redundancy 4 min.
Desktop Virtualization 5 min. RAID 8 min.
Deploy a VM 7 min. High Availability 5 min.
Modifying a VM 8 min. Non-Persistence 3 min.
Containers and Microservices 3 min. Diversity 4 min.
Infrastructure as Code and SDN 4 min. Review Quiz 9 min.
Quiz and Review 5 min.
WEEK 5 Security for Embedded and Specialized Systems 45 min.
WEEK 4 Summarize App Development, Deployment, and 43 min. Intro to Security for Embedded & Specialized Systems 1 min.
Automation Embedded Systems 3 min.
Intro to App Development, Deployment, and Automation 1 min. SCADA and ICS 5 min.
Development Environments 8 min. Internet of Things (IoT) 9 min.
Separation of Duties 5 min. IoT Security Risks 6 min.
Secure Coding Techniques 9 min. Critical Systems 9 min.
OWASP BWA 8 min. System on a Chip (SoC) 2 min.
Automation and Scripting 4 min. Embedded System Considerations 7 min.
Improving Integrity 3 min. Quiz and Review 3 min.
Review Quiz 5 min.
Physical Security Controls 46 min.
Authentication and Authorization Design 42 min. Intro to Physical Security Controls 1 min.
Concepts Perimeter Physical Security 5 min.
Intro to Authentication and Authorization Concepts 1 min. Internal Physical Security 6 min.
AAA Overview 5 min. Equipment Physical Security 2 min.
Authentication Methods 14 min. Infrastructure Controls 5 min.
Biometrics 4 min. Bonus Chat on Physical Security 14 min.
Multifactor Authentication (MFA) 7 min. Fire suppression 3 min.
Quiz Review 11 min. Secure Data Destruction 5 min.
Quiz / Review 5 min.
Cybersecurity Resilience 50 min.
Intro to Cybersecurity Resilience 1 min. Cryptography Fundamentals 48 min.
Backups Overview 6 min. Intro to Cryptography Fundamentals 1 min.
Classic Backup Types 6 min. Cryptography Overview 8 min.
Symmetric Encryption 4 min. Network Segmentation 11 min.
Asymmetric Encryption 7 min. Network Firewalls 8 min.
Hashing 4 min. ACL Case Study 12 min.
Key Exchange 5 min. Load Balancing 7 min.
Digital Signatures 5 min. Virtual private network (VPN) 6 min.
Hiding Data with Steganography 4 min. Layer 2 Security 8 min.
Crypto Considerations 3 min. Network-based IDS/IPS 7 min.
Quiz & Review 7 min. Quiz and Review 9 min.

WEEK 6 Secure Protocols 74 min. Wireless Security 60 min.


Intro to Secure Protocols 1 min. Intro to Wireless Security 1 min.
IPsec and VPNs 7 min. Wi-Fi Overview 14 min.
Secure Shell (SSH) 9 min. Installation Considerations 13 min.
Domain Name System (DNS) 12 min. Wi-Fi Cryptography and Vocabulary 9 min.
HTTPS 10 min. Authentication 16 min.
Weak Protocols 8 min. Quiz and Review 7 min.
IP Addressing and Routing 5 min.
Email Protocols 3 min. Mobile Device Security 51 min.
LDAP 2 min. Intro to Mobile Device Security 1 min.
SNMP, NTP, & SRTP 4 min. Mobile Connectivity 12 min.
Quiz and Review 13 min. Mobile Device Management (MDM) Overview 12 min.
Enforcement and Monitoring 12 min.
Host and Application Security 48 min. Deployment Models 8 min.
Intro to Host and App Security 1 min. Review and Quiz 6 min.
Device Hardening 8 min.
Boot integrity 4 min. WEEK 8 Plan for Cybersecurity in the Cloud 89 min.
Local Endpoint Protection 7 min. Plan for Cloud Cybersecurity 1 min.
Network Based Protection 8 min. Security Patterns and Controls 20 min.
Secure Applications 6 min. Cloud Storage Security 18 min.
Quiz and Review 14 min. Cloud Network Security 12 min.
Cloud Compute Security 18 min.
WEEK 7 Secure Network Design 69 min. Cloud Security Solutions 20 min.
Intro to Secure Network Design 1 min.
Account Management Controls 81 min. Public and Private Key Review 3 min.
Intro to Account Mgmt. Controls 1 min. Certificate Types and Uses 11 min.
Shared Accounts 15 min. Certificate Attributes 11 min.
User Accounts 12 min. CA Options 11 min.
Guest Accounts 7 min. CSRs and Certificate Encoding 17 min.
Service Accounts 8 min. Bad Certificates 11 min.
Verifying Identity 8 min. Quiz and Review 7 min.
SSH Authorized Keys 7 min.
Password Policies 7 min. Assessing an Organizations Security 46 min.
Conditional Access 10 min. Network Assessment Tools Pt.1 11 min.
Quiz and Review 6 min. Network Assessment Tools Pt.2 10 min.
Basic NMAP Commands 4 min.
WEEK 9 Authentication and Authorization Solutions 68 min. File Manipulation and Shell Tools 15 min.
Intro to Authentication and Authorization 1 min. Forensic Tools and Data Sanitization 6 min.
Access Control Overview 12 min.
Mandatory Access Control (MAC) 7 min. WEEK 11 Incident Readiness and Frameworks 45 min.
Discretionary Access Control (DAC) 9 min. Exploit Frameworks 6 min.
Authentication Management 10 min. Credential Attacks Pt.1 7 min.
Authentication & Authorization 13 min. Credential Attacks Pt.2 9 min.
Single Sign On (SSO) 9 min. Incident Response Process 9 min.
Quiz and Review 7 min. Attack Frameworks 8 min.
Additional Plans and Considerations 6 min.
Certificates and the PKI 61 min.
Intro to Digital Certificates and the PKI 1 min. Incident Response and Forensic Data Collection 50 min.
Symmetrical vs Asymmetrical Encryption 17 min. Identifying an Incident 16 min.
Digital Certificates Overview 6 min. Containing and Mitigating an Outbreak 10 min.
Digital Signatures 13 min. Forensic Data Collection 11 min.
Creating an HTTPS Session Key 9 min. Forensics In the Cloud 7 min.
Public Key Infrastructure 10 min. Forensic Evidence Management 6 min.
Quiz and Review 5 min.
Standards, Regulations, & Controls 61 min.
WEEK 10 Implement PKI 72 min. Intro to Standards, Regulations, & Controls 1 min.
Intro to Implementing PKI 1 min. Control Types 10 min.
Control Functions 11 min. Quiz and Review 6 min.
Regulations, Standards, and Legislation 12 min.
Key frameworks 8 min.
Benchmarks and Guides for Secure Configuration 12 min.
Quiz and Review 7 min.

WEEK 12 Policies for Security 68 min.


Intro to Policies for Security 1 min.
Policies About Personnel 15 min.
Policies and Culture for Learning 9 min.
Diversity and Security 11 min.
End of Life Policies 7 min.
Data Policies 6 min.
Credential Policies 6 min.
Policies about Change 6 min.
Quiz and Review 7 min.

Risk Management 61 min.


Intro to Risk Management 1 min.
Risk Vocabulary 8 min.
Threat Agents and Types of Risk 7 min.
Risk Management Strategies 13 min.
Risk Assessments & Analysis 15 min.
BIA and Recovery 12 min.
Quiz and Review 5 min.

WEEK 13 Data Privacy 48 min.


Intro to Data Privacy 1 min.
Roles and Responsibilities 4 min.
Consequences of a Breach 14 min.
Data Types 9 min.
Improving Privacy 6 min.
Planning Data Security 8 min.

Last updated 09.19.2022

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy