logo
  • Mail: info@skillplus.com.au
  • Brisbane | Sydney | Canberra | Adelaide
Logo
  • Home
  • About Us
  • Courses
    • AWS
    • IT Specialist
    • CompTIA
    • Digital Marketing
  • Contact Us
Call: +1234 456 789
Explore All Coureses
Default Avatar
  • Dashboard
  • My Profile
  • Enrolled Courses
  • Wishlist
  • My Quiz Attempts
  • Order History
  • Question & Answer
  • Settings
  • Logout
Site Logo

Get In Touch

Email info@tuition.com
Phone 1300 816 777

SY0-601 CompTIA Security+

Course description:  The CompTIA Security+ course focuses on an understanding of computer topics such as how to install operating systems and applications…

admin August 20, 2025

Skill Plus

Home Skill Plus

About Course

Course description:  

The CompTIA Security+ course focuses on an understanding of computer topics such as how to install operating systems and applications and networking topics such as how to configure IP addressing and what a VLAN is.  The CompTIA Security+ will help you prepare to succeed on the CompTIA Security+ SY0-701 exam by directly addressing the exams objectives as stated by CompTIA. Preparation hints and test-taking tips, helping you identify areas of weakness and improving both your conceptual knowledge and hands-on skills are shared.

Passing this exam fulfills your requirements for the CompTIA Security+ certification credential, proving that you have familiarity with computer security theory and hands-on knowledge.

Audience  

  • Designed for anyone who wants to start or advance a career in computer security.

Prerequisites  

  • Basic level of computer, networking, and organizational security knowledge.

Course objectives: Upon successful completion of this course, students should be able to:   

  • Describe general security concepts
  • Identify threats, vulnerabilities, and mitigations
  • Explain security architecture
  • Describe security operations
  • Discuss security program management and oversight
 
Show More

Course Content

Part I: General Security Concepts

  • Lesson 1: Comparing and Contrasting the Various Types of Controls
  • Lesson 2: Summarizing Fundamental Security Concepts
  • Lesson 3: Understanding Change Management’s Security impact
  • Lesson 4: Understanding the Importance of Using Appropriate Cryptographic Solutions
4 Topics

Part II: Threats, Vulnerabilities, and Mitigations

  • Lesson 5: Comparing and Contrasting Common Threat Actors and Motivations
  • Lesson 6: Understanding Common Threat Vectors and Attack Surfaces
  • Lesson 7: Understanding Various Types of Vulnerabilities
  • Lesson 8: Understanding Indicators of Malicious Activity
  • Lesson 9: Understanding the Purpose of Mitigation Techniques Used to Secure the Enterprise
5 Topics

Part IIII: Security Architecture

  • Lesson 10: Comparing and Contrasting Security Implications of Different Architecture Models
  • Lesson 11: Applying Security Principles to Secure Enterprise Infrastructure
  • Lesson 12: Comparing and Contrasting Concepts and Strategies to Protect Data
  • Lesson 13: Understanding the Importance of Resilience and Recovery in Security Architecture
4 Topics

Part IV: Security Operations

  • Lesson 14: Applying Common Security Techniques to Computing Resources
  • Lesson 15: Understanding the Security Implications of Hardware, Software, and Data Asset Management
  • Lesson 16: Understanding Various Activities Associated with Vulnerability Management
  • Lesson 17: Understanding Security Alerting and Monitoring Concepts and Tools
  • Lesson 18: Modifying Enterprise Capabilities to Enhance Security
  • Lesson 19: Implementing and Maintaining Identity and Access Management
  • Lesson 20: Understanding the Importance of Automation and Orchestration Related to Secure Operations
  • Lesson 21: Understanding Appropriate Incident Response Activities
  • Lesson 22: Using Data Sources to Support an Investigation
9 Topics

Part V: Security Program Management and Oversight

  • Lesson 23: Summarizing Elements of Effective Security Governance
  • Lesson 24: Understanding Elements of the Risk Management Process
  • Lesson 25: Understanding the Processes Associated with Third – Party Risk Assessment and Management
  • Lesson 26: Summarizing Elements of Effective Security Compliance
  • Lesson 27: Understanding Types and Purposes of Audits and Assessments
  • Lesson 28: Implementing Security Awareness Practices
6 Topics
Hi, Welcome back!
Forgot Password?

Related Course

No Related Course

Copyright © 2025, Skill Plus . All Rights Reserved. Developed By synex.com.au

  • Term & Condition
  • Privacy Policy