CompTIA Security+ SY0-401 Courseware

Exam code: SY0-401

$55.00$239.00

Clear
DEMO OUTLINEPRICE LIST


If you wish to buy printed courseware from gtslearning and are not in continental United States, please email sales@gtslearning.com with your requirements and shipping address, so that we can provide a price for delivery.

All about our CompTIA Security+ SY0-401 Courseware SY0-401

comptia-approvals

Our CompTIA CAQC-approved learning materials are tried and tested and have been used by training centers across the globe since the late 1990s.

  • CompTIA CAQC-approved courseware
  • 5-day course when used for classroom delivery to a training group
  • Also suitable for self-paced study
  • Prepares for the latest CompTIA Security+ SY0-401 exam
  • Printed wiro-bound manuals or Skillpipe eBook including:
    • 2 volumes: 520+94 printed pages (or equivalent for Skillpipe)
    • Lab manual with practical exercises for use in the classroom
    • Complete content geared towards CompTIA exam objectives
    • Online exam practice tests — you will be automatically registered on the tests when you buy online
    • Integrated training videos from Professor Messer, the leading CompTIA guru
    • Optional Trainer in a Box for instructors with everything a trainer needs to deliver the course
  • Suitable for individuals and training groups
  • Optional online Transcender Practice Exams for exam revision and access to performance-based test simulations
  • Optional Self-Study Online Labs for students to practice their new skills on real equipment using a web browser
  • Optional Classroom Online Labs – money and time-saving virtual labs for use in classroom courses

CompTIA Security+ is approved as an IA baseline certifications for the IA workforce as part of the IA Workforce Improvement Program (DoD 8570.01-M) and is included in the State Department Skills Incentive Program.

  • Download outline
  • Highlights

    How are the learning materials delivered?

    gtslearning’s CompTIA Security+ courseware is delivered as printed spiral-bound manuals or as a Skillpipe eBook.

    • USA and Canada: printed books provided in Letter page format
    • UK and rest of world: printed books supplied in A5 format
    • Skillpipe eReader gives browser or app-based access to the full content with full bookmarking and annotation features. Find out more about Skillpipe

    An activation key to your Skillpipe content is emailed on purchase.

    Content may be printed on a chapter-by-chapter basis for personal use only.

    For the trainer...

    The trainer edition includes margin notes and tips within the book/eBook as well as giving access to downloadable classroom resources including setup guides, PowerPoint slides, classroom timetables and more. A complete Trainer In A Box package is also available that includes our complete package of instructor and student resources for CompTIA Security+ Certification.

    When delivered as a standard classroom course, this title maps to a 5 day course. Full timetable for achieving course delivery is included with the trainer resources.


    What's included in the student edition?

    The student edition is provided as two books:

    • VOLUME 1: STUDY GUIDE – this includes the learning materials for the course (fully-indexed) and review questions as well as links by QR code and short link to Professor Messer’s famous training videos
    • VOLUME 2: LABS – the second volume includes exam objectives mapping, exam information, practical labs, answers to the review questions and a comprehensive glossary

    Free access to practice exams through our online learning portal is also included for all students, with full marking and links to explanations of the correct answers. You will be automatically registered on our online portal and enrolled on the tests when you buy online.


    Integrated Professor Messer training videos

    Professor Messer has long been a web hero for CompTIA students through his free YouTube video courses that cover the full exam objectives.

    Now, Professor Messer is an integral part of our CompTIA learning materials. Each topic in each course includes  a QR code or short link to the appropriate video for further explanation by Professor Messer. This method of learning helps reinforce retention and ensures that the subject is covered successfully by the instructor (if being used in the classroom), by a high-quality course book and by a video from Professor Messer. Perfect for helping classroom or self-study learning.

    Click on the ‘Sample Security+ video’ tab to see a typical video from Professor Messer.


    Optional Transcender Practice Exams

    Our CompTIA Security+ SY0-401 courseware is available with optional Transcender Practice Exams.

    Transcender Practice Exams are available as add-ons with CompTIA learning products. Transcender is the best product on the market as uniquely they provide simulations of the performance-based questions included in the CompTIA exams.

    Students will get 12 months access to the practice exams with instant activation.


    Optional Self-Study Online Labs

    Our CompTIA Security+ SY0-401 courseware is available with optional Self-Study Online Labs.

    Accessed through a web browser with no complicated software to install, our Self-Study Online Labs are a great way to perfect the student’s understanding of practical concepts and tasks. Once logged in, students will get access to real, live equipment to try out their skills.

    Perfect for self-study students, our labs are a great way to prepare for the new performance-based exam questions in the CompTIA Security+ certification exam.

    Students will get 12 months access to the labs and instant activation.

    Find out more about our Self-Study Online Labs


    Optional Classroom Online Labs

    Our optional Classroom Online Labs are a cost and time-effective solution for training providers.

    No more classroom setup or expensive kit lists. Classroom Online Labs give your students access to real, live equipment through a web browser, enabling them to practice their new knowledge and practical skills without having to set up a classroom full of hardware and software.

    Classroom Online Labs have been specifically developed alongside gtslearning’s training materials and fully map to the CompTIA certification exam for CompTIA Security+ SY0-401.

    Classroom Online Labs are only available to education centers, please contact us for pricing information.

    Find out more about our Classroom Online Labs

    What’s included?

     Printed coursewareSkillpipe eBooks
    CompTIA CAQC-approved
    Study guide
    Lab manual
    Integrated Professor Messer videos
    End of section practice tests
    Complete practice exam

    INSTRUCTOR RESOURCES

    Pre- and post- course assessments
    Classroom setup guide
    Classroom lab setup files and disk images

    EASY UPGRADES

    Optional Transcender Practice Exams
    Optional Self-Study Online Labs**
    Optional Classroom Online Labs***
    Exceptional Customer Service
    COURSE OUTLINE

    Sample video

    Target Audience

    CompTIA Security+ is aimed at IT professionals with job roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator and network administrator.

    Course Prerequisites

    Students should meet the following criteria prior to taking the course:

    • Recommended that students have taken CompTIA Network+ certification course and exam, together with 24 months experience of networking support/IT administration
    • Know the function and basic features of PC components
    • Able to use Windows to create and manage files and use basic administrative features (Explorer, Control Panel and Management Consoles)
    • Know basic network terminology and functions (such as OSI Model, toplogy, Ethernet, TCP/IP, switches and routers)
    • Understand TCP/IP addressing, core protocols and troubleshooting tools

    Module 1 – Security Threats and Controls

    • Security Controls • Why is Security Important? • Security Policy • Security Controls • Identification • Authentication • Authorization • Basic Authorization Policies • Accounting
    • Threats and Attacks • Vulnerability, Threat, and Risk • Social Engineering • Phishing • Malware • Trojans and Spyware • Preventing Malware • Anti-Virus Software • Removing Malware
    • Network Attacks • Network Fundamentals • Sniffers and Protocol Analyzers • ARP Attacks • IP Spoofing and Hijacking • Network Mappers and Port Scanners • Denial of Service Attacks
    • Assessment Tools and Techniques • Vulnerability Assessments and Pentests • Security Assessment Techniques • Vulnerability Scanners • Honeypots and Honeynets

    Module 2 – Cryptography and Access Control

    • Cryptography Uses of Cryptography • Cryptographic Terminology and Ciphers • Encryption Technologies • Cryptographic Hash Functions • Symmetric Encryption • Asymmetric Encryption • Diffie-Hellman • ECC and Quantum Cryptography • Transport Encryption • Cryptographic Attacks • Steganography • Labs • Steganography
    • Public Key Infrastructure • PKI and Certificates • Certificate Authorities • Implementing PKI • Creating Keys • Key Recovery Agents • Key Status and Revocation • PKI Trust Models • Cryptographic Standards • PGP / GPG • Labs • Configuring Certificate Services
    • Password Authentication • LAN Manager / NTLM • Kerberos • PAP and CHAP • Password Protection • Password Attacks
    • Strong Authentication • Token-based Authentication • Biometric Authentication • Common Access Card • Extensible Authentication Protocol • RADIUS and TACACS+ • Federation and Trusts
    • Authorization and Account Management • Privilege Policies • Directory Services • Lightweight Directory Access Protocol • Windows Active Directory • Creating and Managing User Accounts • Managing Group Accounts • Account Policy Enforcement • User Rights, Permissions, and Access Reviews

    Module 3 – Network Security

    • Secure Network Design • Secure Network Topologies • Demilitarized Zones • Other Security Zones • Network Device Exploitation • Switches and VLANs • Switch Vulnerabilities and Exploits • Routers • Network Address Translation
      Security Appliances and Applications • Basic Firewalls • Stateful Firewalls • Proxies and Gateways • Implementing a Firewall or Gateway • Web and Email Security Gateways • Intrusion Detection Systems • IDS Analysis Engines • Monitoring System Logs
    • Wireless Network Security • Wireless LANs • WEP and WPA • Wi-Fi Authentication • Additional Wi-Fi Security Settings • Wi-Fi Site Security
    • VPN and Remote Access Security • Remote Access • Virtual Private Networks • IPSec • Remote Access Servers • Remote Administration Tools • Hardening Remote Access Infrastructure
    • Network Application Security • Application Layer Security • DHCP Security • DNS Security • SNMP Security • Storage Area Network Security • IPv4 versus IPv6 • Telephony

    Module 4 – Host, Data, and Application Security

    • Host Security • Computer Hardening • Host Security Management Plan • OS Hardening • Patch Management • Endpoint Security • Network Access Control • Labs • Network Access Protection
    • Data Security • Data Handling • Data Encryption • Data Loss Prevention • Backup Plans and Policies • Backup Execution and Frequency • Restoring Data and Verifying Backups • Data Wiping and Disposal
    • Web Services Security • HyperText Transport Protocol • SSL / TLS • Web Servers • Load Balancers • File Transfer
      Web Application Security • Web Application Technologies • Web Application Databases • Web Application Exploits • Web Application Browser Exploits • Secure Web Application Design • Auditing Web Applications • Web Browser Security
    • Virtualization and Cloud Security • Virtualization Technologies • Virtual Platform Applications • Virtualization Best Practices • Cloud Computing • Risks of Cloud Computing

    Module 5 – Operational Security

    • Site Security • Site Layout and Access • Gateways and Locks • Alarm Systems • Surveillance • Hardware Security • Environmental Controls • Hot and Cold Aisles • RFI / EMI • Fire Prevention and Suppression
    • Mobile and Embedded Device Security • Static Environments • Mitigating Risk in Static Environments • Mobile Device Security • Mobile Device Management • BYOD Concerns • Mobile Application Security • Bluetooth and NFC
    • Risk Management • Business Continuity Concepts • Risk Calculation • Risk Mitigation • Integration with Third Parties • Service Level Agreements • Change and Configuration Management
    • Disaster Recovery • Disaster Recovery Planning • IT Contingency Planning • Clusters and Sites
    • Incident Response and Forensics • Incident Response Procedures • Preparation • Detection, and Analysis • Containment • Eradication, and Recovery • Forensic Procedures • Collection of Evidence • Handling and Analyzing Evidence
    • Security Policies and Training • Corporate Security Policy • Operational Policies • Privacy and Employee Policies • Standards and Best Practice • Security Policy Training and User Habits

     Download sample courseware

    Complete all form fields to get a free download sample of this gtslearning course title.

    You will be redirected to a new page to access your links.

    First name

    Last name

    What is your role?

    Your organization or company:

    Country

    Telephone:

    email address:

    Make sure you have completed all fields. Please check box if you don't want to receive regular updates from gtslearning:






    Your e-mail address will only be used for the purposes of this initial contact or for subsequent mailings. Your details won't be passed to any third-parties and, in accordance, with current regulations, you may request that your details are removed from our database by contacting sales@gtslearning.com.

    Save 10% on CompTIA exams