====================================================== == THESE OUTLINES FOR COMPTIA SECURITY+ (SY0-601) ==== == PROVIDED BY COMPTIA, TEACHED BY: AHMED SULTAN ==== == visit https://netriders.academy for more courses == ====================================================== ========= Modules ========= Module 1: Attacks, Threats, and Vulnerabilities Module 2: Architecture and Design Module 3: Implementation Module 4: Operations and Incident Response Module 5: Governance, Risk, and Compliance ========= Topics ========= Lesson 0: Security+ (SY0-601) Course Introduction - [Theory - Demo Lab] Lesson 1: Comparing Security Roles and Security Controls - [Theory - No Lab] Lesson 2: Explaining Threat Actors and Threat Intelligence - [Theory - No Lab] Lesson 3: Performing Security Assessments - [Theory - Labs 1,2,3 and 4] Lesson 4: Identifying Social Engineering and Malware - [Theory - Lab 5] Lesson 5: Summarizing Basic Cryptographic Concepts - [Theory - No Lab] Lesson 6: Implementing Public Key Infrastructure - [Theory - Labs 6 and 7] Lesson 7: Implementing Authentication Controls - [Theory - Labs 8 and 9] Lesson 8: Implementing Identity and Account Management Controls - [Theory - Labs 10,11 and 12] Lesson 9: Implementing Secure Network Designs - [Theory - Lab 13] Lesson 10: Implementing Network Security Appliances - [Theory - Labs 14 and 15] Lesson 11: Implementing Secure Network Protocols - [Theory - Labs 16, 17 and 18] Lesson 12: Implementing Host Security Solutions - [Theory - Lab 19] Lesson 13: Implementing Secure Mobile Solutions - [Theory - No Lab] Lesson 14: Summarizing Secure Application Concepts - [Theory - Labs 20,21,22 and 23] Lesson 15: Implementing Secure Cloud Solutions - [Theory - No Lab] Lesson 16: Explaining Data Privacy and Protection Concepts - [Theory - No Lab] Lesson 17: Performing Incident Response - [Theory - Labs 24 and 25] Lesson 18: Explaining Digital Forensics - [Theory - Lab 26] Lesson 19: Summarizing Risk Management Concepts - [Theory - No Lab] Lesson 20: Implementing Cybersecurity Resilience - [Theory - Lab 27] Lesson 21: Explaining Physical Security - [Theory - No Lab] ====== Labs ====== Lab 1: Exploring the Lab Environment Lab 2: Scanning and Identifying Network Nodes Lab 3: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools Lab 4: Analyzing the Results of a Credentialed Vulnerability Scan Lab 5: Installing, Using, and Blocking a Malware-based Backdoor Lab 6: Managing the Lifecycle of a Certificate Lab 7: Managing Certificates with OpenSSL Lab 8: Auditing Passwords with a Password Cracking Utility Lab 9: Managing Centralized Authentication Lab 10: Managing Access Controls in Windows Server Lab 11: Configuring a System for Auditing Policies Lab 12: Managing Access Controls in Linux Lab 13: Implementing a Secure Network Design Lab 14: Configuring a Firewall Lab 15: Configuring an Intrusion Detection System Lab 16: Implementing Secure Network Addressing Services Lab 17: Implementing a Virtual Private Network Lab 18: Implementing a Secure SSH Server Lab 19: Implementing Endpoint Protection Lab 20: Identifying Application Attack Indicators Lab 21: Identifying a Browser Attack Lab 22: Implementing PowerShell Security Lab 23: Identifying Malicious Code Lab 24: Managing Data Sources for Incident Response Lab 25: Configuring Mitigation Controls Lab 26: Acquiring Digital Forensics Evidence Lab 27: Backing Up and Restoring Data in Windows and Linux