CompTIA Security+ SY0-501

Become Proficient in Hacking Prevention

Computer and network systems across the globe are systematically being attacked by rampant hacking. Hacking is now a wide spread practice, leaving companies at all levels vulnerable. In order to stop hackers from completing their goals, you must first think like a hacker. As the old moniker goes; you must think like a thief to catch a thief.

Cyber Security icon with dark background.

Job Outlook for Information Security Analysts

According the Bureau of Labor Statistics the employment of information security analysts is expected to grow 31% during the next few years, which equals 40,900 new jobs.

The BLS also states that the average salary for these analysts is just under $104,000 per year with top earners making more than $163,000.

Course Objectives

Identify the basic network theory concepts

Identify the major network communications methods

Describe network media and hardware components

Identify the major types of network implementations

Identify the components of a TCP/IP network implementation

Identify TCP/IP addressing and data delivery methods

Identify the major services deployed on TCP/IP networks

Identify the components of a LAN implementation

Identify the infrastructure of a WAN implementation

Identify the components of a remote network implementation

Identify the major issues and methods to secure systems on a network

Identify the major issues and technologies in network security

Identify network security threats and attacks

Identify the tools, methods, and techniques used in managing a network

Describe troubleshooting of issues on a network

Prerequisites and Requirements

There are no prerequisites for this course.

This course can be taken on either a PC or Mac.

Instructor

Brandon Smith

  • Module 1 - Threats, Attacks, and Vulnerabilities

    • 1.1 Introduction
    • 1.2 Types of Malware - Part 1
    • 1.3 Types of Malware - Part 2
    • 1.4 Types of Attacks - Part 1
    • 1.5 Types of Attacks - Part 2
    • 1.6 Types of Attacks - Part 3
    • 1.7 Types of Attacks - Part 4
    • 1.8 Types of Attacks - Part 5
    • 1.9 Threat Actors - Part 1
    • 1.10 Threat Actors - Part 2
    • 1.11 Penetration Testing and Vulnerability Scanning - Part 1
    • 1.12 Penetration Testing and Vulnerability Scanning - Part 2
    • 1.13 Impact of Vulnerabilities - Part 1
    • 1.14 Impact of Vulnerabilities - Part 2

    Module 2 - Technologies and Tools

    • 2.1 Networking Hardware and Software - Part 1
    • 2.2 Networking Hardware and Software - Part 2
    • 2.3 Networking Hardware and Software - Part 3
    • 2.4 Networking Hardware and Software - Part 4
    • 2.5 Networking Hardware and Software - Part 5
    • 2.6 Networking Hardware and Software - Part 6
    • 2.7 Security Assessment - Part 1
    • 2.8 Security Assessment - Part 2
    • 2.9 Troubleshooting Issues - Part 1
    • 2.10 Troubleshooting Issues - Part 2
    • 2.11 Securing Mobile Devices - Part 1
    • 2.12 Securing Mobile Devices - Part 2