CompTIA Security (SY0-701)

(SY0-701.AE2)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Introduction

  • The Security+ Exam
  • What Does This Course Cover?
  • Exam SY0-701 Exam Objectives
  • SY0-701 Certification Exam Objective Map
2

Today's Security Professional

  • Cybersecurity Objectives
  • Data Breach Risks
  • Implementing Security Controls
  • Data Protection
  • Summary
  • Exam Essentials
3

Cybersecurity Threat Landscape

  • Exploring Cybersecurity Threats
  • Threat Data and Intelligence
  • Summary
  • Exam Essentials
4

Malicious Code

  • Malware
  • Summary
  • Exam Essentials
5

Social Engineering and Password Attacks

  • Social Engineering and Human Vectors
  • Password Attacks
  • Summary
  • Exam Essentials
6

Security Assessment and Testing

  • Vulnerability Management
  • Vulnerability Classification
  • Penetration Testing
  • Audits and Assessments
  • Vulnerability Life Cycle
  • Summary
  • Exam Essentials
7

Application Security

  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Injection Vulnerabilities
  • Exploiting Authentication Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Application Security Controls
  • Secure Coding Practices
  • Automation and Orchestration
  • Summary
  • Exam Essentials
8

Cryptography and the PKI

  • An Overview of Cryptography
  • Goals of Cryptography
  • Cryptographic Concepts
  • Modern Cryptography
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Cryptographic Attacks
  • Emerging Issues in Cryptography
  • Summary
  • Exam Essentials
9

Identity and Access Management

  • Identity
  • Authentication and Authorization
  • Authentication Methods
  • Accounts
  • Access Control Schemes
  • Summary
  • Exam Essentials
10

Resilience and Physical Security

  • Resilience and Recovery in Security Architectures
  • Response and Recovery Controls
  • Physical Security Controls
  • Summary
  • Exam Essentials
11

Cloud and Virtualization Security

  • Exploring the Cloud
  • Virtualization
  • Cloud Infrastructure Components
  • Cloud Security Issues
  • Hardening Cloud Infrastructure
  • Summary
  • Exam Essentials
12

Endpoint Security

  • Operating System Vulnerabilities
  • Hardware Vulnerabilities
  • Protecting Endpoints
  • Hardening Techniques
  • Operating System Hardening
  • Securing Embedded and Specialized Systems
  • Asset Management
  • Summary
  • Exam Essentials
13

Network Security

  • Designing Secure Networks
  • Secure Protocols
  • Network Attacks
  • Summary
  • Exam Essentials
14

Wireless and Mobile Security

  • Building Secure Wireless Networks
  • Managing Secure Mobile Devices
  • Summary
  • Exam Essentials
15

Monitoring and Incident Response

  • Incident Response
  • Incident Response Data and Tools
  • Mitigation and Recovery
  • Summary
  • Exam Essentials
16

Digital Forensics

  • Digital Forensic Concepts
  • Conducting Digital Forensics
  • Reporting
  • Digital Forensics and Intelligence
  • Summary
  • Exam Essentials
17

Security Governance and Compliance

  • Security Governance
  • Understanding Policy Documents
  • Change Management
  • Personnel Management
  • Third-Party Risk Management
  • Complying with Laws and Regulations
  • Adopting Standard Frameworks
  • Security Awareness and Training
  • Summary
  • Exam Essentials
18

Risk Management and Privacy

  • Analyzing Risk
  • Managing Risk
  • Risk Tracking
  • Disaster Recovery Planning
  • Privacy
  • Summary
  • Exam Essentials

1

Malicious Code

  • Examining Spyware
  • Analyzing Malware Using VirusTotal
2

Social Engineering and Password Attacks

  • Using Social Engineering Techniques to Plan an Attack
  • Cracking a Linux Password Using John the Ripper
  • Cracking Passwords
3

Security Assessment and Testing

  • Scan for Vulnerabilities Using Nikto
  • Conducting Vulnerability Scanning Using Nessus
  • Consulting a Vulnerability Database
  • Gathering Site Information
4

Application Security

  • Fuzzing Using OWASP ZAP
  • Performing SQL Injection in DVWA
  • Exploiting LFI and RFI Vulnerabilities
  • Conducting a Cross-Site Request Forgery Attack
  • Performing an XSS Attack in DVWA
  • Examining Application Vulnerabilities
  • Exploiting an Overflow Vulnerability
  • Exploiting a TOCTOU Vulnerability
5

Cryptography and the PKI

  • Using Symmetric Encryption
  • Creating Asymmetric Key Pairs
  • Creating File Hashes
  • Examining PKI Certificates
6

Identity and Access Management

  • Installing a RADIUS Server
  • Examining Kerberos Settings
  • Enforcing Password Policies
  • Using the chmod Command
  • Creating Linux Users and Groups
7

Cloud and Virtualization Security

  • Detecting Virtualization
8

Network Security

  • Capturing Credentials On-path
  • Launching a DoS Attack
9

Wireless and Mobile Security

  • Securing a Wi-Fi Hotspot
10

Monitoring and Incident Response

  • Examining MITRE ATT&CK
  • Viewing Linux Event Logs
  • Viewing Windows Event Logs
11

Digital Forensics

  • Completing the Chain of Custody
  • Using FTK Imager
  • Analyzing Forensic Case with Autopsy

Related Courses

All Courses
scroll to top