Skip to content

CompTIA Security+ Online Course

Study materials to prepare you for the SY0-701 exam


Study247

Summary

Price
£99 inc VAT
Or £33.00/mo. for 3 months...
Study method
Online
Course format What's this?
Video
Duration
21 hours · Self-paced
Access to content
12 months
Certification
CompTIA Security+
Professional certification What's this?
Certificates
  • Certificate of completion - Free
Additional info
  • Exam(s) / assessment(s) not included in price, and must be purchased separately
  • TOTUM card available but not included in price What's this?

Add to basket or enquire

Overview

The CompTIA Security+ course provides in-depth knowledge of cybersecurity principles and practices. It covers a wide range of topics, including threat management, cryptography, risk management, and network security. This course is designed to prepare you for the CompTIA Security+ certification exam, which validates your skills in securing networks and managing security risks.

Certification

CompTIA Security+

Awarded by CompTIA

Certificates

Certificate of completion

Digital certificate - Included

Download and print your certificate upon successful completion. Please note, this certificate is issued by us and not by CompTIA.

Description

This CompTIA Security+ course offers invaluable preparation for the latest CompTIA security Exam SY0-701.

Students will learn how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while understanding the role of architecture and design. From everyday tasks like identity and access management to complex topics like risk management and cryptography, this course helps you consolidate your knowledge base in preparation for the Security+ exam.

We use real life examples to illustrate how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application.

This CompTIA security+ course covers security concerns from both a professional setting and on a personal level. Topics are covered from a ground up perspective to ensure inexperienced students have a clear understanding of the course content. We expand beyond the scope of the CompTIA certification exam SY0-701 objectives to allow for real life application.

This course has been designed to align with the latest version of the CompTIA security exam.

  • Master essential security technologies, tools, and tasks
  • Understand how Security+ concepts are applied in the real world
  • Test your knowledge along the way with practice questions

To an employer, the CompTIA Security+ certification proves that you have the knowledge base and skill set to secure applications, devices, and networks; analyse and respond to threats; participate in risk mitigation, and so much more. As data threats loom larger every day, the demand for qualified security professionals will only continue to grow. If you're ready to take the first step toward a rewarding IT security career, this CompTIA Security+ course is ideal for a thorough exam preparation.

This CompTIA Security+ Course is organised into the following modules:

Module 1 - SY0-701 General Security Concepts

  • 1.0 Introduction to the Course
  • 1.1 Fundamental Security Concepts
  • 1.2 Zero Trust
  • 1.3 Deception and Disruption
  • 1.3.1 ACTIVITY - Testing a Honeypot
  • 1.4 Security Controls
  • 1.5 Change Management and Security
  • 1.6 Cryptography Basics
  • 1.6.1 ACTIVITY - Examining Symmetric Encryption
  • 1.7 Asymmetric Encryption
  • 1.7.1 ACTIVITY - Exploring Asymmetric Encryption
  • 1.8 Hashing
  • 1.8.1 ACTIVITY - Verifying Integrity with Hashing
  • 1.9 Digital Certificates
  • 1.10 Public Key Infrastructure
  • 1.11 Data and Keys
  • 1.12 Crypto Implementations
  • 1.13 Blockchain
  • 1.14 Non-Cryptographic Data Protection

Module 2 - SY0-701 Threats, Vulnerabilities, and Mitigation

  • 2.1 Threat Actors and Motivations
  • 2.2 Threat Vectors
  • 2.2.1 ACTIVITY - O.MG Cable Baiting
  • 2.3 Social Engineering
  • 2.4 Operating System Vulnerabilities and Attacks
  • 2.5 Application Vulnerabilities and Attacks
  • 2.5.1 ACTIVITY - Performing a Buffer Overflow
  • 2.6 Web-based Vulnerabilities and Attacks
  • 2.6.1 ACTIVITY - Abusing Unsanitized Input
  • 2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection
  • 2.6.3 ACTIVITY - Swiping a Token with XSS
  • 2.7 Other Vulnerabilities
  • 2.8 Common Malicious Activity Indicators
  • 2.9 Insider Threat Indicators
  • 2.10 Social Engineering Indicators
  • 2.10.1 ACTIVITY - Capturing Credentials through Social Engineering
  • 2.11 Malware Activity Indicators
  • 2.12 Operating System Attack Indicators
  • 2.13 Application Attack Indicators
  • 2.13.1 ACTIVITY - Recognizing Directory Traversal
  • 2.14 Physical Attack Indicators
  • 2.14.1 ACTIVITY - Quickly Cloning an RFID Badge
  • 2.15 Network Attack Indicators
  • 2.15.1 ACTIVITY - Crashing a Target with DoS
  • 2.16 Cryptographic Attack Indicators
  • 2.17 Password Attack Indicators
  • 2.17.1 ACTIVITY - Password Cracking
  • 2.18 Network Segmentation
  • 2.19 Access Control
  • 2.20 Enterprise Device Hardening

Module 3 - SY0-701 Security Architecture

  • 3.1 Network Segmentation
  • 3.1.1 ACTIVITY - Segementing a Network
  • 3.2 High Availability
  • 3.3 Virtualization
  • 3.3.1 ACTIVITY - Deploying Docker Containers
  • 3.4 Cloud
  • 3.5 Serverless Computing
  • 3.6 IoT
  • 3.7 ICS SCADA
  • 3.7.1 ACTIVITY - Operating a SCADA System
  • 3.8 RTOS and Embedded Systems
  • 3.9 Reducing the Attack Surface
  • 3.10 Firewalls
  • 3.11 IDS IPS.mp4
  • 3.12 Secure Communications - Access
  • 3.13 Port Security
  • 3.14 SD-WAN and SASE
  • 3.15 Data Classifications
  • 3.16 Protecting Data Types
  • 3.17 Data Considerations
  • 3.18 Redundancy
  • 3.19 Alternate Sites
  • 3.20 Multiple Platforms
  • 3.21 Business Continuity

Module 4 - SY0-701 Security Operations

  • 4.1 Secure Baselines
  • 4.2 Attack Surface Reduction
  • 4.3 Wireless Installation
  • 4.4 Wireless Security Settings
  • 4.5 Mobile Solutions
  • 4.5.1 ACTIVITY - Pwning a Mobile Device
  • 4.6 Application Security Management
  • 4.7 Asset Management
  • 4.8 Vulnerability Management
  • 4.9 Monitoring Activities
  • 4.10 Monitoring Tools
  • 4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities
  • 4.11 Firewall Configuration
  • 4.11.1 ACTIVITY - Configuring Firewall Rules
  • 4.12 Intrusion Detection Configuration
  • 4.13 Web Traffic Filtering
  • 4.14 Operating System Policy
  • 4.14.1 ACTIVITY - Examining Windows Group Policy
  • 4.15 Network Service Security
  • 4.16 Data Loss Protection
  • 4.16.1 ACTIVITY - Checking File Integrity
  • 4.17 Network Access Control
  • 4.17.1 ACTIVITY - Require Multifactor Authentication
  • 4.18 Identity Management
  • 4.19 Access Management
  • 4.19.1 ACTIVITY - Implementing Access Control
  • 4.20 Security Automation
  • 4.21 Incident Response
  • 4.22 Digital Forensics

Module 5 - SY0-701 Security Program Management and Oversight

  • 5.1 Elements of Effective Security Governance
  • 5.2 Elements of the Risk Management Process
  • 5.3 Third Party Risk Assessment and Management
  • 5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure
  • 5.4 Effective Security Compliance
  • 5.5 Audits and Assessments
  • 5.5.1 ACTIVITY - Conducting OSINT
  • 5.5.2 ACTIVITY - Performing Active Reconnaissance
  • 5.6 Security Awareness Practices
  • 5.7 Course Outro

Adding these qualifications to your CV will greatly broaden your career prospects and significantly improve your earning potential with current or future employers.

Course Assessment Process

To earn your official Security+ certification from CompTIA, you will need to study the CompTIA Security+ training course and pass the compulsory CompTIA Security+ exam.

To help you prepare for your exam, we provide a mock exam at the end of your course with over 100 multiple choice questions to ensure you’re fully prepared for the real thing. Once you’ve passed with at least 90%, you’ll be ready to book your exam as a private candidate. To make life easier, we can help you find an appropriate exam centre and give you all the information you need to secure your place.

Please note that the exam fees aren’t included in the course price.

Benefits of studying with Study247:

  • Ability to study at your own pace 24/7.
  • You can pause and rewind the material at any time.
  • Studying is broken down into easily manageable sections.
  • Access to study material for 12 months.
  • Our students are eligible to apply for a TOTUM Pro Card.

Who is this course for?

This course is ideal for IT professionals looking to specialise in cybersecurity, individuals seeking to enhance their knowledge of security practices, and those preparing for the CompTIA Security+ certification exam SY0-701.

Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player.

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.