CompTIA Security+ (SY0-601) Training Course

  • Designed for results
  • World-class experts
  • Flexible online learning

Overview

Master the core knowledge required to earn in-demand cybersecurity jobs with this video-based, online, certification training course. With this self-paced course, you'll get in-depth video lessons taught by industry experts, hands-on labs to build real-world experience with security solutions, and enough practice exams to fully prepare for the CompTIA Security+ SY0-601 exam.

The experiential labs included in this course provide first-hand training to build the skills required to assess and manage security risk, and monitor and secure hybrid environments.

Who should take this course

Skill level | Beginner to intermediate

  • Anyone preparing to take the CompTIA Security+ SY0-601 exam  
  • IT professionals looking to expand their cybersecurity skills and knowledge
  • Anyone interested in learning security fundamentals

Course participants should have basic IT or cybersecurity experience. CompTIA recommends, but does not require, that candidates seeking Security+ certification have two years of experience in IT administration with a focus on security prior to taking the exam.

For an optimal course experience, we recommend using these browsers and devices.

Course includes

  • 23+ hours of training videos led by cybersecurity expert Sari Greene
  • In-depth lessons covering each objective on the CompTIA Security+ (SY0-601) exam
  • Hands-on labs that demonstrate completing tasks in real time to simulate real-world experience
  • Self-study tools, such as flashcards to master key terms, and quizzes to self-assess your progress
  • Four complete practice tests to ensure you're ready to take the CompTIA Security+ SY0-601 exam with confidence
  • 1 year of access*

What you'll learn

This Pearson IT Training Course covers the full range of topics found on the CompTIA Security+ SY0-601 exam, including but not limited to the following:

  • Identifying and assessing security threats, attacks, and vulnerabilities (e.g., malware, application and network attacks, and vectors)
  • Recognizing the importance of architecture and design (e.g., security concepts in an enterprise environment, virtualization, and cloud computing concepts)
  • Implementing security solutions based on real-world scenarios (e.g., secure protocols, host or application solutions, secure network design, wireless and mobile solutions)
  • Applying cybersecurity solutions to the cloud and utilizing Threat Intelligence Testing
  • Implementing identity and account management controls, authenticating and authorizing solutions, and public key infrastructure
  • Choosing appropriate operations and incident responses (e.g., policies, processes, procedures, and data sources to support investigations)
  • Applying mitigation techniques and understanding key aspects of digital forensics
  • Governance, risk, and compliance (e.g., risk management, privacy and sensitive data concepts)

*Retake guarantee

Retake guaranteeDidn't pass your certification exam on your first try? We'll give you six months of additional access at no cost.

About Pearson IT Training Courses

Pearson IT Training Courses are complete and affordable packages of expert-led, self-paced courses designed to help you stand out with in-demand skills that take your career to the next level.

From learning to hands-on practice and application, our comprehensive certification prep courses ensure you are ready for exam success.

Course expert

  • Sari Green - Cybersecurity practitioner, author, and entrepreneur

    “Sari

    Sari Greene is an information security practitioner, author, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies. She is a recognized leader in the field of cybersecurity. She holds multiple industry accreditations including CISSP-ISSMP, CRISC, CISM, CISA, MCSE, and NSA/IAM. Learn more at sarigreenegroup.com.

  • Martin M. Weiss - Cybersecurity and Cloud author and instructor

    Martin M. Weiss  has years of experience in information security, risk management, and compliance. Marty holds a bachelor of science degree in computer studies from the University of Maryland University College and an MBA from the Isenberg School of Management at the University of Massachusetts Amherst. He holds several certifications, including CISSP, CISA, and Security+. Marty has authored and co-authored more than a half dozen books on information technology. A Florida native, he now lives in New England, somewhere between Boston and New York City.

Course outline

  • Introduction
  • Introduction to Module 1
  • Lesson 1: Compare and Contrast Different Types of Social Engineering Techniques
    • Learning Objectives
    • 1.1 Social Engineering Principles
    • 1.2 Social Engineering Attack Vectors
    • 1.3 Influence Campaigns
    • Closer Look Lab: Phone and Text Spoofing
  • Lesson 2: Given a Scenario, Analyze Indicators of Compromise and Determine the Malware
    • Learning Objectives
    • 2.1 Malware Primer
    • 2.2 Malware Families
    • 2.3 Password Attacks
    • 2.4 Physical Attacks
    • 2.5 Adversarial Artificial Intelligence
    • 2.6 Indicators of Compromise
    • Closer Look Lab: Malware Analysis
  • Lesson 3: Given a Scenario, Analyze Potential Indicators Associated with Application Attacks
    • Learning Objectives
    • 3.1 Input and Output Validation
    • 3.2 Injection, XSS and Forgery Attacks
    • 3.3 System Attacks
    • Closer Look Lab: Constructing Error Messages
  • Lesson 4: Given a Scenario, Analyze Potential Indicators Associated with Network Attacks
    • Learning Objectives
    • 4.1 Digital Infrastructure Attacks
    • 4.2 Wireless Attacks
    • 4.3 Code or Script Execution
    • Closer Look Lab: Powershell
  • Lesson 5: Explain Different Threat Actors, Vectors and Intelligence Sources
    • Learning Objectives
    • 5.1 Threat Actors and Attributes
    • 5.2 Threat Modeling
    • 5.3 Threat Intelligence
    • Closer Look Lab: Threat Intelligence Workflow
  • Lesson 6: Explain the Security Concerns Associated with Various Types of Vulnerabilities
    • Learning Objectives
    • 6.1 Operational Vulnerabilities
    • 6.2 Third-party Risks
    • Closer Look Lab: Zero Day Vulnerability
  • Lesson 7: Summarize the Techniques Used in Security Assessments
    • Learning Objectives
    • 7.1 Threat Hunting and Vulnerability Identification
    • 7.2 Syslog, SIEM, and SOAR
    • Closer Look Lab: Common Vulnerabilities and Exposures
  • Lesson 8: Explain the Techniques Used in Penetration Testing
    • Learning Objectives
    • 8.1 Penetration Testing Concepts
    • 8.2 Penetration Testing Techniques
    • Closer Look Lab: Passive Reconnaissance
  • Module 1 Review
  • Introduction to Module 2
  • Lesson 9: Explain the Importance of Security Concepts in an Enterprise Environment
    • Learning Objectives
    • 9.1 Configuration Management
    • 9.2 Data Protection
    • 9.3 Deception and Disruption
    • Closer Look Lab: Honeypots
  • Lesson 10: Summarize Virtualization and Cloud Computing Concepts
    • Learning Objectives
    • 10.1 Cloud Computing
    • 10.2 Virtualization
    • Closer Look Lab: Virtualization
  • Lesson 11: Summarize Secure Application Development, Deployment, and Automation Concepts
    • Learning Objectives
    • 11.1 Secure Staging
    • 11.2 Secure Coding Techniques
    • 11.3 Automation
    • Closer Look Lab: Open Web Application Security Project (OWASP)
  • Lesson 12: Summarize Authentication and Authorization Design Concepts
    • Learning Objectives
    • 12.1 Identity Management
    • 12.2 Authentication Factors
    • 12.3 Biometrics
    • Closer Look Lab: Pwned Passwords
  • Lesson 13: Given a Scenario, Implement Cybersecurity Resilience
    • Learning Objectives
    • 13.1 Resiliency and Redundancy
    • 13.2 Backup and Recovery
    • Closer Look Lab: RAID
  • Lesson 14: Explain the Security Implications of Embedded and Specialized Systems
    • Learning Objectives
    • 14.1 Embedded Systems
    • 14.2 Internet of Things
    • Closer Look Lab: Raspberry Pi
  • Lesson 15: Explain the Importance of Physical Security Controls
    • Learning Objectives
    • 15.1 Site and Building Security
    • 15.2 Environmental Controls
    • 15.3 Secure Data Destruction
    • Closer Look Lab: Disk Wiping
  • Lesson 16: Summarize the Basics of Cryptographic Concepts
    • Learning Objectives
    • 16.1 Cryptography Primer
    • 16.2 Steganography
    • 16.3 Symmetric Encryption
    • 16.4 Asymmetric Encryption
    • 16.5 Hashing
    • 16.6 Digital Signatures
    • 16.7 Emerging Cryptography
    • Closer Look Lab: Hashing
  • Module 2 Review
  • Introduction to Module 3
  • Lesson 17: Given a Scenario, Implement Secure Protocols
    • Learning Objectives
    • 17.1 Secure Communications Protocols
    • 17.2 Secure Network Protocols
    • Closer Look Lab: SSL/TLS Packets
  • Lesson 18: Given a Scenario, Implement Host or Application Security Solutions
    • Learning Objectives
    • 18.1 Trusted Computing Base
    • 18.2 Endpoint Security
    • 18.3 Database and Application Security
    • Closer Look Lab: Endpoint Firewall
  • Lesson 19: Given a Scenario, Implement Secure Network Designs
    • Learning Objectives
    • 19.1 Zones and Segments
    • 19.2 Network Appliances
    • 19.3 Firewalls
    • 19.4 Virtual Private Networks
    • 19.5 TCP/IP
    • Closer Look Lab: IPv6 Addressing
  • Lesson 20: Given a Scenario, Install and Configure Wireless Security Settings
    • Learning Objectives
    • 20.1 Wireless Configuration
    • 20.2 Wireless Design
    • Closer Look Lab: Wireless Heat Map
  • Lesson 21: Given a Scenario, Implement Secure Mobile Solutions
    • Learning Objectives
    • 21.1 Mobile Connectivity
    • 21.2 Mobile Device Management
    • Closer Look Lab: Mobile Device Ownership and Deployment Options
  • Lesson 22: Given a Scenario, Apply Cybersecurity Solutions to the Cloud
    • Learning Objectives
    • 22.1 Cloud Infrastructure
    • 22.2 Virtual Private Clouds
    • 22.3 Cloud Security Controls
    • Closer Look Lab: CSA Cloud Controls Matrix
  • Lesson 23: Given a Scenario, Implement Identity and Account Management Controls
    • Learning Objectives
    • 23.1 Identity and Access Management
    • Closer Look Lab: Sign-in Risk Triggers
  • Lesson 24: Given a Scenario, Implement Authentication and Authorization Solutions
    • Learning Objectives
    • 24.1 Authentication Protocols
    • 24.2 Federated Identity
    • 24.3 Authorization and Access Control
    • Closer Look Lab: OAuth 2.0 in Action
  • Lesson 25: Given a Scenario, Implement Public Key Infrastructure
    • Learning Objectives
    • 25.1 PKI Cryptographic Review
    • 25.2 Digital Certificates
    • 25.3 Digital Certificate Lifecycle
    • 25.4 Key Management
    • Closer Look Lab: Digital Certificates
  • Module 3 Review
  • Introduction to Module 4
  • Lesson 26: Given a Scenario, Use the Appropriate Tool to Assess Organizational Security
    • Learning Objectives
    • 26.1 Reconnaissance and Discovery
    • 26.2 Packet Capture and NetFlows
    • 26.3 Linux Commands
    • Closer Look Lab: ZenMap
  • Lesson 27: Summarize the Importance of Policies, Processes, and Procedures for Incident Response
    • Learning Objectives
    • 27.1 Incident Response Plans
    • 27.2 Incident Handling Process
    • Closer Look Lab: Mitre ATT&CK Framework
  • Lesson 28: Given an Incident, Utilize Appropriate Data Sources to Support an Investigation
    • Learning Objectives
    • 28.1 Data Sources
    • Closer Look Lab: Log Files
  • Lesson 29: Given an Incident, Apply Mitigation Techniques or Controls to Secure an Environment
    • Learning Objectives
    • 29.1 Incident Mitigation
    • Closer Look Lab: SOAR
  • Lesson 30: Explain the Key Aspects of Digital Forensics
    • Learning Objectives
    • 30.1 Forensic Evidence
    • 30.2 Forensic Examination
    • 30.3 Disclosure and Notification
    • Closer Look Lab: RAM Capture
  • Module 4 Review
  • Introduction to Module 5
  • Lesson 31: Compare and Contrast Various Types of Controls
    • Learning Objectives
    • 31.1 Controls and Countermeasures
    • Closer Look Lab: Overlapping Control Categories
  • Lesson 32: Explain the Importance of Applicable Regulations Standards or Frameworks That Impact Organizational Security Posture
    • Learning Objectives
    • 32.1 Compliance and Regulations
    • 32.2 Frameworks and Guidance
    • 32.3 Benchmarks and Audit Standards
    • Closer Look Lab: CIS Benchmarks
  • Lesson 33: Explain the Importance of Policies to Organizational Security
    • Learning Objectives
    • 33.1 Governance and Policies
    • 33.2 Personnel Policies
    • 33.3 Personnel Practices
    • 33.4 Organizational Policies
    • 33.5 Third-party Risk Management
    • Closer Look Lab: Policy & Standards
  • Lesson 34: Summarize Risk Management Processes and Concepts
    • Learning Objectives
    • 34.1 Risk Management
    • 34.2 Risk Assessment
    • 34.3 Business Continuity
    • Closer Look Lab: Quantitative Risk Assessment
  • Lesson 35: Explain Privacy and Sensitive Data Concepts in Relation to Security
    • Learning Objectives
    • 35.1 Privacy Principles
    • 35.2 Privacy Management
    • Closer Look Lab: Privacy Walkthrough
  • Lesson 36: Preparing for the Exam
    • Learning Objectives
    • 36.1 Understanding the Security+ Exam Structure
    • 36.2 Study Strategies
    • 36.3 Test Taking Strategies
    • 36.4 Testing Options
    • 36.5 Attaining and Maintaining Your Security+ Certification
  • Module 5 Review
  • CompTIA Security+ SY0-601: Summary
Add to cart form
$250

Everything you need

  • Video-based lessons (23+ hours)
  • Interactive lab exercises
  • Self-study quizzes
  • Practice tests
  • 1-year access

Course experts

  • Sari Greene

    Best-selling cybersecurity author and expert trainer (CISSP-ISSMP, CRISC, CISM, CISA, MCSE, and NSA/IAM)

    Sari Greene

Recommended for you