CompTIA Security+ (SY0-701) Certification Course
Hands-on Security+ (SY0-701) prep: exam objectives, performance-based labs, and practice tests to help you pass and apply security best practices on the job.
Smart Next Generation Education is a leading EdTech. LEARN MORE NOW
Hands-on Security+ (SY0-701) prep: exam objectives, performance-based labs, and practice tests to help you pass and apply security best practices on the job.
Comprehensive instructor-led and hands-on CompTIA Security+ (SY0-701) certification course that prepares students for the SY0-701 exam. Covers threats, vulnerabilities, security architecture, identity and access management, cryptography, cloud and hybrid security, governance/risk/compliance, incident response, and real performance-based practice labs. Includes exam strategy, practice tests, and a final mock exam mapped to the official objectives.
- Topic 1A: Security Concepts
- Job Roles using Security+
- Summarize Fundamental Security Concepts
- Introduction: Security Concepts
- Information Security
- Cybersecurity Framework
- Gap Analysis
- Access Control
- Topic 1B Security Controls
- Security Control Categories
- Security Control Functional Types
- Information Security Roles and Responsibilities
- Information Security Competencies
- Information Security Business Units
- Lesson 1 Summary
- Mini-Project: Classifying Security Controls
- Lesson 1 (Review)
0:20:0- Topic 2A: Threat Actors
- Identifying Common Threat Actor and Motivations
- Introduction: Threat Actors
- Vulnerability, Threat, and Risk
- Attributes of Threat Actors
- Motivations of Threat Actors
- Hackers and Hacktivists
- Nation-State Actors
- Organized Crime and Competitors
- Internal Threat Actors
- Topic 2B Attack Surfaces
- Attack Surface and Threat Vectors
- Vulnerable Software Vectors
- Network Vectors
- Lure-Based Vectors
- Message-Based Vectors
- Supply Chain Attack Surface
- Topic 2C Social Engineering
- Use of Social Engineering Techniques
- Human Vectors
- Impersonation and Pretexting
- Phishing and Pharming
- Typosquatting
- Business Email Compromise
- Lesson 2 Summary
- Mini-Project: Threat Modeling a Target
- Lesson 2 (Review)
0:20:0- Topic 3A: Cryptographic Algorithms
- Cryptographic Algorithms
- Cryptographic Concepts
- Symmetric Encryption
- Identifying Symmetric Cryptographic Algorithms
- Key Length
- Asymmetric Encryption
- Hashing
- Digital Signatures
- Topic 3B Public Key Infrastructure
- Certificate Authorities
- Digital Certificates
- Root of Trust
- Certificate Signing Requests
- Subject Name Attributes
- Certificate Revocation
- Key Management
- Cryptoprocessors and Secure Enclaves
- Key Escrow
- Topic 3C Cryptographic Solutions
- Encryption Supporting Confidentiality
- Disk and File Encryption
- Database Encryption
- Transport Encryption and Key Exchange
- Perfect Forward Secrecy
- Salting and Key Stretching
- Blockchain
- Obfuscation
- Lesson 3 Summary
- Mini-Project: Securing a Digital Transaction
- Lesson 3 (Review)
0:20:0- Introduction
- Implementing IAM
- Topic 4A Authentication
- Authentication Design
- Password Concepts
- Password Managers
- Multifactor Authentication
- Biometric Authentication
- Hard Authentication Tokens
- Soft Authentication Tokens
- Passwordless Authentication
- Topic 4B Authorization
- Discretionary and Mandatory Access Control
- Role- and Attribute-Based Access Control
- Rule-Based Access Control
- Least Privilege Permission Assignments
- User Account Provisioning
- Account Attributes and Access Policies
- Account Restrictions
- Privileged Access Management
- Topic 4C Identity Management
- Local, Network, and Remote Authentication
- Directory Services
- Single Sign-on Authentication
- Federation
- Security Assertion Markup Language
- Open Authorization
- Lesson 4 Summary
- Mini-Project: Designing a Modern IAM Strategy
- Lesson 4 (Review)
0:20:0- Introduction & Objectives
- Topic 5A Enterprise Network Architecture
- Architecture and Infrastructure Concepts
- Network Infrastructure
- Switching Infrastructure Considerations
- Routing Infrastructure Considerations
- Security Zones
- Attack Surface
- Port Security
- Configuring EAP and AAA Authentication Technologies
- Physical Isolation
- Architecture Considerations
- Topic 5B Network Security Appliances
- Device Placement
- Device Attributes
- Firewalls
- Layer 4 and Layer 7 Firewalls
- Proxy Servers
- Intrusion Detection Systems
- Next-Generation Firewalls and Unified Threat Management
- Load Balancers
- Web Application Firewalls
- Topic 5C Secure Communications
- Remote Access Architecture
- Transport Layer Security Tunneling
- Internet Protocol Security Tunneling
- Internet Key Exchange
- Remote Desktop
- Secure Shell
- Secure Remote Administration Protocol
- Out-of-Band Management and Jump Servers
- Lesson 5 Summary
- Mini-Project: Designing a Secure Enterprise Network
- Lesson 5 (Review)
0:20:0- Introduction & Objectives
- Topic 6A Cloud Infrastructure
- Cloud Deployment Models
- Cloud Service Models
- Responsibility Matrix
- Centralized and Decentralized Computing
- Resilient Architecture Concepts
- Application Virtualization and Container Virtualization
- Cloud Architecture
- Cloud Automation Technologies
- Software Defined Networking
- Cloud Architecture Features
- Cloud Security Considerations
- Topic 6B Embedded Systems and Zero Trust Architecture
- Embedded Systems
- Industrial Control Systems
- Internet of Things
- Deperimeterization and Zero Trust
- Zero Trust Security Concepts
- Lesson 6 Summary
- Mini-Project: Designing a Secure, Zero Trust Cloud Architecture
- Lesson 6 (Review)
0:20:0- Introduction & Objectives
- Topic 7A Asset Management
- Applying Elements of Asset Management
- Asset Tracking
- Asset Protection Concepts
- Data Backups
- Advanced Data Protection
- Secure Data Destruction
- Topic 7B Redundancy Strategies
- Continuity of Operations
- Capacity Planning Risks
- High Availability
- Clustering
- Power Redundancy
- Diversity and Defense in Depth
- Deception Technologies
- Detect Malicious Network Traffic with Honeypot
- Testing Resiliency
- Topic 7C Physical Security
- Physical Security Controls
- Site Layout, Fencing, and Lighting
- Gateways and Locks
- Security Guards and Cameras
- Alarm Systems and Sensors
- Lesson 7 Summary
- Mini-Project: Designing a Secure and Resilient Data Center
- Lesson 7 (Review)
0:20:0- Introduction & Objectives
- Topic 8A Device and OS Vulnerabilities
- Operating System Vulnerabilities
- Vulnerability Types
- Zero-Day Vulnerabilities
- Misconfiguration Vulnerabilities
- Cryptographic Vulnerabilities
- Sideloading, Rooting, and Jailbreaking
- Topic 8B Application and Cloud Vulnerabilities
- Understand Various Types of Vulnerabilities
- Application Vulnerabilities
- Evaluation
- Web Application Attacks
- Cloud-based Application Attacks
- Supply Chain
- Topic 8C Vulnerability Identification Methods
- Vulnerability Scanning
- Threat Feeds
- Deep and Dark Web
- Other Vulnerability Assessment Methods
- Topic 8D Vulnerability Analysis and Remediation
- Common Vulnerabilities and Exposures
- False Positives, False Negatives, and Log Review
- Vulnerability Analysis
- Vulnerability Response and Remediation
- Lesson 8: Summary
- Mini-Project: The Vulnerability Management Cycle
- Lesson 8 (Review)
0:20:0- Introduction & Objectives
- Topic 9A Network Security Baselines
- Benchmarks and Secure Configuration Guides
- Wireless Network Installation Considerations
- Wireless Encryption
- Wi-Fi Authentication Methods
- Network Access Control
- Topic 9B Network Security Capability Enhancement
- Access Control Lists
- Intrusion Detection and Prevention Systems
- IDS and IPS Detection Methods
- Web Filtering
- Lesson 9 Summary
- Mini-Project: Auditing a Network Against a Security Baseline
- Lesson 9 (Review)
0:20:0- Introduction & Objectives
- Topic 10A Implement Endpoint Security
- Endpoint Hardening
- Hardening an Operating System
- Endpoint Protection
- Advanced Endpoint Protection
- Endpoint Configuration
- Configuring Application Control Software
- Hardening Techniques
- Removing Unnecessary Services
- Hardening Specialized Devices
- Topic 10B Mobile Device Hardening
- Mobile Hardening Techniques
- Full Device Encryption and External Media
- Location Services
- Cellular and GPS Connection Methods
- Wi-Fi and Tethering Connection Methods
- Bluetooth Connection Methods
- Near-Field Communications and Mobile Payment Services
- Lesson 10 Summary
- Mini-Project: The Endpoint Hardening Checklist
- Lesson 10 (Review)
0:20:0Basic computer literacy and familiarity with operating systems (Windows/Linux).
Access to a computer with internet.
Willingness to complete practice tests and mini-projects mapped to SY0-701 objectives.
Assess and improve an organization’s security posture using industry best practices (risk assessment, mitigation planning).
Identify and respond to threats and incidents, perform basic forensic triage, and implement appropriate incident responses.
Implement identity and access management solutions and secure authentication methods in hybrid/cloud environments.
Configure and secure network and host systems, apply cryptography basics for data protection, and protect cloud workloads.
Understand governance, risk, and compliance principles and apply recommendations to support security policies and procedures.
0.0
SmartNextGenEd is an innovative educational platform that offers cutting-edge training across multiple disciplines. Leveraging the latest technology and AI, the platform empowers learners with personalized, flexible, and future-ready education experiences.
View DetailsLast Updated
Oct 01, 2025Students
99+language
EnglishDuration
10h++Level
beginnerExpiry period
LifetimeCertificate
YesGet exclusive tech courses updates and special offers directly to your inbox.
Complete tech career guide with roadmaps, resources, and insider tips.
This website uses cookies to personalize content and analyse traffic in order to offer you a better experience. Cookie Policy