CertifyIT Academy
Home
About Us
Books
Courses
Certified Information Systems Security Professional (CISSP)
COMPTIA SECURITYX
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Cloud+
CompTIA Security+
COMPTIA NETWORK+
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (C|CISO)
Careers
Profile
X
Menu
Home
About Us
Books
Courses
Certified Information Systems Security Professional (CISSP)
COMPTIA SECURITYX
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Cloud+
CompTIA Security+
COMPTIA NETWORK+
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (C|CISO)
Careers
Profile
Contact
Contact
Home
About Us
Books
Courses
Certified Information Systems Security Professional (CISSP)
COMPTIA SECURITYX
CompTIA Cybersecurity Analyst (CySA+)
CompTIA Cloud+
CompTIA Security+
COMPTIA NETWORK+
CERTIFIED CHIEF INFORMATION SECURITY OFFICER (C|CISO)
Careers
Profile
X
Contact
Home
All Courses
CertifyIT Academy
CompTIA Security+ (SY0-701)
CompTIA Security+ (SY0-701)
Curriculum
24 Sections
80 Lessons
Lifetime
Expand all sections
Collapse all sections
Welcome to CompTIA Security+
1
1.1
Welcome to CompTIA Security+
How to Pass the CompTIA Security+ Exam
3
2.1
How to Pass the CompTIA Security+ Exam
2.2
Current CompTIA Security+ Exam Content
2.3
CompTIA Security+ Exam Objectives
Chapter 1: Security fundamentals
4
3.1
Module A: Security concepts
3.2
Module B: Understanding threats
3.3
Module C: Enterprise security strategy
3.4
Lesson 1 Quiz: Comparing Security Roles and Security Controls
10 Questions
Chapter 2: Risk management
4
4.1
Module A: Risk management programs
4.2
Module B: Security audits
4.3
Module C: Conducting security assessments
4.4
Lesson 2 Quiz: Explaining Threat Actors and Threat Intelligence
10 Questions
Chapter 3: Organizational security
6
5.1
Module A: Social engineering
5.2
Module B: Security policies
5.3
Module C: User roles and training
5.4
Topic 3D: Explaining Pen Testing Concepts
5.5
Lesson 3 summary
5.6
Lesson 3 Quiz: Performing Security Assessments
10 Questions
Chapter 4: Cryptography
4
6.1
Module A: Cryptography concepts
6.2
Module B: Public key infrastructure
6.3
Lesson 4 summary
6.4
Lesson 4 Quiz: Identifying Social Engineering and Malware
10 Questions
Chapter 5: Network connectivity
6
7.1
Module A: Network attacks
7.2
Module B: Packet flow
7.3
Topic 5C: Summarizing Cryptographic Use Cases and Weaknesses
7.4
Topic 5D: Summarizing Other Cryptographic Technologies
7.5
Lesson 5 summary
7.6
Lesson 5 Quiz: Summarizing Basic Cryptographic Concepts
10 Questions
Chapter 6: Secure network configuration
4
8.1
Module A: Network security components
8.2
Module B: Secure network protocols
8.3
Module C: Hardening networks
8.4
Lesson 6 Quiz: Implementing Public Key Infrastructure
10 Questions
Chapter 7: Authentication
6
9.1
Module A: Authentication factors
9.2
Module B: Authentication protocols
9.3
Topic 7C: Implementing Authentication Technologies
9.4
Topic 7D: Summarizing Biometrics Authentication Concepts
9.5
Lesson 7 Summary
9.6
Lesson 7 Quiz: Implementing Authentication Controls
10 Questions
Chapter 8: Access control
3
10.1
Module A: Access control principles
10.2
Module B: Account management
10.3
Lesson 8 Quiz: Implementing Identity and Account Management Controls
10 Questions
Chapter 9: Enterprise architecture
6
11.1
Module A: System vulnerabilities
11.2
Module B: System architecture
11.3
Topic 9C: Implementing Secure Wireless Infrastructure for Lesson
11.4
Topic 9D: Implementing Load Balancers for Lesson 9
11.5
Lesson 9 Summary
11.6
Lesson 9 Quiz: Implementing Secure Network Designs
10 Questions
Chapter 10: Secure assets
5
12.1
Module A: Physical security and safety
12.2
Module B: Securing data
12.3
Topic 10C: Summarizing the Use of SIEM
12.4
Lesson 10 Summary
12.5
Quiz 10: Implementing Network Security Appliances
10 Questions
Chapter 11: Securing specialized systems
4
13.1
Module A: Securing hosts
13.2
Module B: Mobile security
13.3
Topic 11C: Implement Secure Remote Access Protocols
13.4
Quiz 11: Implementing Secure Network Protocols
10 Questions
Chapter 12: Secure applications
5
14.1
Module A: Application attacks
14.2
Module B: Securing applications
14.3
Topic 12C: Implement Embedded System Security
14.4
Lesson 12 Summary
14.5
Quiz 12: Implementing Host Security Solutions
10 Questions
Chapter 13: Disaster planning and recovery
4
15.1
Module A: Secure operations
15.2
Module B: Resilience and recovery
15.3
Lesson 13 Summary
15.4
Quiz 13: Implementing Secure Mobile Solutions
10 Questions
Chapter 14: Threat detection and response
4
16.1
Module A: Security monitoring
16.2
Module B: Incident response procedures
16.3
Topic 14D: Implement Secure Script Environments
16.4
Lesson 14 Summary
Lesson 15: Implementing Secure Cloud Solutions
4
17.1
Lesson 15: Implementing Secure Cloud Solutions – Topic A – Summarize Secure Cloud and Virtualization
17.2
Topic 15B: Apply Cloud Security Solutions
17.3
Topic 15C: Summarize Infrastructure as Code Concepts
17.4
Lesson 15 summary
Lesson 16: Explaining Data Privacy and Protection Concepts
2
18.1
Lesson 16: Explaining Data Privacy and Protection Concepts – Topic A – Explain Privacy and Data Sensitivity Concepts
18.2
Topic 16B: Explain Privacy and Data Protection Controls
Lesson 17: Performing Incident Response
4
19.1
Lesson 17: Performing Incident Response – Topic A – Summarize Incident Response Procedures
19.2
Topic 17B: Utilize Appropriate Data Sources for Incident Response
19.3
Topic 17C: Apply Mitigation Controls
19.4
Lesson 17 summary
Lesson 18: Explaining Digital Forensics
3
20.1
Lesson 18: Explaining Digital Forensics – Topic A – Explain Key Aspects of Digital Forensics Documentation
20.2
Topic 18B: Explain Key Aspects of Digital Forensics Evidence
20.3
Lesson 18 Summary
Lesson 19: Summarizing Risk Management Concepts
4
21.1
Lesson 19: Summarizing Risk Management Concepts – Topic A – Explain Risk Management Processes and Concepts
21.2
Topic 19B: Explain Business Impact Analysis Concepts
21.3
Lesson 19 Summary: Guidelines for Risk Management
21.4
Lesson 19 Quiz: Summarizing Risk Management Concepts
10 Questions
Lesson 20: Implementing Cybersecurity Resilience
5
22.1
Lesson 20: Implementing Cybersecurity Resilience – Topic A – Implement Redundancy Strategies
22.2
Lesson 20B: Implement Backup StrategiesVideo
22.3
Topic 20C: Implement Cybersecurity Resiliency Strategies
22.4
Lesson 20 summary
22.5
Lesson 20 Quiz: Implementing Cybersecurity Resilience
9 Questions
Lesson 21 – Explaining Physical Security
4
23.1
Lesson 21 – Explaining Physical Security – Topic A – Explain the Importance of Physical Site Security Controls
23.2
Topic 21B – Explaining the Importance of Physical Host Security
23.3
Lesson 21 Summary: Guidelines for Physical Security Controls
23.4
Lesson 21 Quiz: Physical Security Controls
10 Questions
Conclusion
3
24.1
Conclusion
24.2
Practice Quiz 1
90 Questions
24.3
90-question Security+ Practice Quiz 2
90 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content