Menu
Menu
  • No products in the basket.

CT Security+ Online Course : Exam SY0 501

0( 0 REVIEWS )
97 STUDENTS
ACCREDITED BY

Overview:

As IT security has become vital to businesses and organisations, it has changed how everyday business is conducted. With high volumes of data being stores and transmitted on networks, it becomes imperative that these networks around the world are kept safe. The CT Security+ SY0-501 course is perfect for individuals who want to detect hackers and learn how to secure a network.

The CT Security+ SY0-501 course is a globally recognised qualification that covers the fundamentals of network security and risk management. It is the benchmark for IT security and will be an important stepping stone for you to gain recognition in an IT security career. You will learn how to identify benefits and drawbacks of existing networks, create resilient networks and implement network security, protocols and standards.

The CT Security+ SY0-501 is a comprehensive course that will validate your skills and knowledge on the latest trends and techniques in threat management, risk management, risk mitigation and intrusion detection. The course is internationally recognised and accredited to a training organisation and you will be issued an internationally recognised qualification following full completion of CT Security+ SY0-501 course.

Why consider 1Training?

As improvements and advancements are made in technology, online courses are no longer just conventional means of studying at affordable costs. In many aspects online training offers superiority to traditional learning. There is an effectiveness and convenience that traditional learning cannot provide. The overall convenience and flexibility makes it a superior learning method.

1Training offers the most convenient path to gain an internationally recognised qualification that will give you the opportunity to put into practice your skill and expertise in an enterprise or corporate environment. You can study at your own pace at 1Training and you will be provided with all the necessary material, tutorials, qualified course instructor and multiple free resources which include Free CV writing pack, TOTUM extra Discount Card, Free career support and course demo to make your learning experience enriching and more rewarding.

Learning Outcomes

  • Learn how to identify cyber adversaries and develop strategies and countermeasures to defend them.
  • Learn how to install and configure networks based on security technologies.
  • Learn how wireless and remote security access is enforced.
  • Identify strategies for fault tolerance, continuity and disaster recovery.
  • Gain an understanding in Cryptography and Public Key infrastructure.

Course Titles

  • Module 01: Identifying Security Fundamentals
  • Module 02: Analyzing Risk
  • Module 03: Identifying Security Threats
  • Module 04: Conducting Security Assessments
  • Module 05: Implementing Host and Software Security
  • Module 06: Implementing Network Security
  • Module 07: Managing Identity and Access
  • Module 08: Implementing Cryptography

Access Duration

The course will be directly delivered to you, and you have 12 months access to the online learning platform from the date you joined the course.  The course is self-paced and you can complete it in stages, revisiting the lectures at anytime.

Who is this Course aimed at?

The CT Security+ SY0-501 course is aimed at individuals who have experience in system and network administration. And for those who are Security Administrators and IT Auditors.

Entry Requirements

  • You must be over the age of 16 and have a basic understanding of Maths, English and ICT
  • The course is suitable for system and network administrators.

Method of Assessment

This is a multiple choice, performance-based exam comprising of 90 questions to be completed in 90 minutes.

As it is an official exam, learners will have to purchase it separately on the relevant website.

Certification

Those who successfully complete the exam will be awarded the certificate in CT Security+ SY0-501.

Awarding Body

The certificate will be awarded by CompTIA. This internationally recognised qualification will make your CV standout and encourage employers to see your motivation at expanding your skills and knowledge in the IT enterprise.

Progression and Career Path

Once you successfully complete CT Security+ SY0-501 you will be qualified to work in the following positions. The CT Security+ SY0-501 qualification will also put you in line to demand a higher salary or job promotion. The average UK salary per annum according to https://www.payscale.com is given below.

  • Network Administrator – £20,338 per annum
  • Systems Administrator – £25,422 per annum
  • IT Specialist – £32,479 per annum
  • Systems Engineer – £29,154 per annum

Other Benefits

  • Written and designed by the industry’s finest expert instructors with over 15 years of experience
  • Repeat and rewind all your lectures and enjoy a personalised learning experience
  • Gain access to quality video tutorials
  • Unlimited 12 months access from anywhere, anytime
  • Save time and money on travel
  • Learn at your convenience and leisure
  • Quizzes, tests mock exams, practice exams to ensure you are 100% ready
  • The benefit of applying for TOTUM extra Discount Card.
  • Free Career Support Service
  • 25% Discount on personal Statement and covering letter writing service
  • Free Access to Over 150 courses for 2 days (48 hours)
  • Free access to course before you purchase (For selected courses only)

Key Features

Gain an accredited UK qualification

Access to excellent quality study materials

Learners will be eligible for TOTUM Discount Card

Personalized learning experience

One year’s access to the course

Support by phone, live chat, and email

Course Curriculum Total Units : 357
➤ Module 01 - Identifying Security Fundamentals
1.0 Topic A: Identify Information Security Concepts
1.1 Information Security
1.2 Goals of Information Security
1.3 Risk
1.4 Vulnerabilities
1.5 Threats
1.6 Attacks
1.7 Controls
1.8 Types of Controls
1.9 The Security Management Process
1.10 Demo – Identifying Information Security Basics
2.0 Topic B: Identify Basic Security Controls
2.1 The CIA Triad
2.2 Non-repudiation
2.3 Identification
2.4 Authentication
2.5 Authentication Factors
2.6 Authorization
2.7 Access Control
2.8 Accounting and Auditing
2.9 Principle of Least Privilege
2.10 Privilege Management
2.11 Demo – Identifying Basic Security Controls
3.0 Topic C: Identify Basic Authentication And Authorization Concepts
3.1 Passwords
3.2 Tokens
3.3 Biometrics
3.4 Geolocation
3.5 Keystroke Authentication
3.6 Multi-factor Authentication
3.7 Mutual Authentication
3.8 Demo – Identifying Basic Authentication and Authorization Concepts
4.0 Topic D: Identify Basic Cryptography Concepts
4.1 Cryptography
4.2 Encryption and Decryption
4.3 Encryption and Security Goals
4.4 Ciphers
4.5 A Key
4.6 Symmetric Encryption
4.7 Asymmetric Encryption
4.8 Hashing
4.9 Steganography
4.10 Demo – Identifying Basic Cryptography Concepts
4.11 Chapter 01 Review
➤ Module 02 - Analyzing Risk
1.0 Topic A: Analyze Organizational Risk
1.1 Risk Management
1.2 Components of Risk Analysis
1.3 Phases of Risk Analysis
1.4 Categories of Threat Types
1.5 Risk Analysis Methods
1.6 Risk Calculation
1.7 Risk Response Techniques
1.8 Risk Mitigation and Control Types
1.9 Change Management
1.10 Guidelines for Analyzing Risk
1.11 Demo – Analyzing Risks to the Organization
2.0 Topic B: Analyze The Business Impact Of Risk
2.1 BIA
2.2 Impact Scenarios
2.3 Privacy Assessments
2.4 Critical Systems and Functions
2.5 Maximum Tolerable Downtime
2.6 Recovery Point Objective
2.7 Recovery Time Objective
2.8 Mean Time to Failure
2.9 Mean Time to Repair
2.10 Mean Time Between Failures
2.11 Guidelines for Performing a Business Impact Analysis
2.12 Demo – Performing a Business Impact Analysis
2.13 Chapter 02 Review
➤ Module 03 - Identifying Security Threats
1.0 Topic A: Identify Types Of Attackers
1.1 Hackers and Attackers
1.2 Threat Actors
1.3 Threat Actor Attributes
1.4 Open-Source Intelligence
1.5 Demo – Identifying Types of Attackers
2.0 Topic B: Identify Social Engineering Attacks
2.1 Social Engineering
2.2 Effectiveness
2.3 Impersonation
2.4 Phishing and Related Attacks
2.5 Hoaxes
2.6 Physical Exploits
2.7 Watering Hole Attacks
2.8 Demo – Identifying Social Engineering Attacks
3.0 Topic C: Identify Malware
3.1 Malicious Code
3.2 Viruses
3.3 Worms
3.4 Adware
3.5 Spyware
3.6 Trojan Horses
3.7 Keyloggers
3.8 Remote Access Trojans
3.9 Logic Bombs
3.10 Botnets
3.11 Ransomware
3.12 Advance Persistent Threats
3.13 Demo – Identifying Types of Malware
4.0 Topic D: Identify Software-based Threats
4.1 Software Attacks
4.2 Password Attacks
4.3 Types of Password Attacks
4.4 Cryptographic Attacks
4.5 Types of Cryptographic Attacks
4.6 Backdoor Attacks
4.7 Application Attacks
4.8 Types of Application Attacks
4.9 Driver Manipulation
4.10 Privilege Escalation
4.11 Demo – Identifying Password Attacks
5.0 Topic E: Identify Network-based Threats
5.1 TCP/IP Basics
5.2 Spoofing Attacks
5.3 IP and MAC Address Spoofing
5.4 ARP Poisoning
5.5 DNS Poisoning
5.6 Port Scanning Attacks
5.7 Scan Types
5.8 Eavesdropping Attacks
5.9 Man-in-the-Middle Attacks
5.10 Man-in-the-Browser Attacks
5.11 Replay Attacks
5.12 DoS Attacks
5.13 DDoS Attacks
5.14 Hijacking Attacks
5.15 Amplification Attacks
5.16 Pass the Hash Attacks
5.17 Demo – Identifying Threats to DNS
5.18 Demo – Identifying Port Scanning Threats
6.0 Topic F: Identify Wireless Threats
6.1 Rogue Access Points
6.2 Evil Twins
6.3 Jamming
6.4 Bluejacking
6.5 Bluesnarfing
6.6 Near Field Communication Attacks
6.7 RFID System Attacks
6.8 War Driving, War Walking, and War Chalking
6.9 Packet Sniffing
6.10 IV Attacks
6.11 Wireless Replay Attacks
6.12 WEP and WPA Attacks
6.13 WPS Attacks
6.14 Wireless Disassociation
6.15 Demo – Identifying Wireless Threats
7.0 Topic G: Identify Physical Threats
7.1 Physical Threats and Vulnerabilities
7.2 Hardware Attacks
7.3 Environmental Threats and Vulnerabilities
7.4 Demo – Identifying Physical Threats
7.5 Chapter 03 Review
➤ Module 04 - Conducting Security Assessments
1.0 Topic A: Identify Vulnerabilities
1.1 Host Vulnerabilities
1.2 Software Vulnerabilities
1.3 Encryption Vulnerabilities
1.4 Network Architecture Vulnerabilities
1.5 Account Vulnerabilities
1.6 Operations Vulnerabilities
1.7 Demo – Identifying Vulnerabilities
2.0 Topic B: Assess Vulnerabilities
2.1 Security Assessment
2.2 Security Assessment Techniques
2.3 Vulnerability Assessment Tools
2.4 Types of Vulnerability Scans
2.5 False Positives
2.6 Guidelines for Assessing Vulnerabilities
2.7 Demo – Capturing Network Data with Wireshark
2.8 Demo – Scanning for General Vulnerabilities
3.0 Topic C: Implement Penetration Testing
3.1 Penetration Testing
3.2 Penetration Testing Techniques
3.3 Box Testing Methods
3.4 Penetration Testing Tools
3.5 Guidelines for Implementing Penetration Testing
3.6 Demo – Implementing Penetration Testing
3.7 Chapter 04 Review
➤ Module 05 - Implementing Host And Software Security
1.0 Topic A: Implement Host Security
1.1 Hardening
1.2 Operating System Security
1.3 Operating System Hardening Techniques
1.4 Trusted Computing Base
1.5 Hardware and Firmware Security
1.6 Security Baselines
1.7 Software Updates
1.8 Application Blacklisting and Whitelisting
1.9 Logging
1.10 Auditing
1.11 Anti-malware Software
1.12 Types of Anti-malware Software
1.13 Hardware Peripheral Security
1.14 Embedded Systems
1.15 Security Implications for Embedded Systems
1.16 Guidelines for Securing Hosts
1.17 Demo – Implementing Auditing
1.18 Demo – Hardening a Server
2.0 Topic B: Implement Cloud And Virtualization Security
2.1 Virtualization
2.2 Hypervisors
2.3 Virtual Desktop Infrastructure
2.4 Virtualization Security
2.5 Cloud Computing
2.6 Cloud Deployment Models
2.7 Cloud Service Types
2.8 Guidelines for Securing Virtualized and Cloud-Based Resources
2.9 Demo – Securing Virtual Machine Networking
3.0 Topic C: Implement Mobile Device Security
3.1 Mobile Device Connection Methods
3.2 Mobile Device Management
3.3 Mobile Device Security Controls
3.4 Mobile Device Monitoring and Enforcement
3.5 Mobile Deployment Models
3.6 BYOD Security Controls
3.7 Guidelines for Implementing Mobile Device Security
3.8 Demo – Implementing Mobile Device Security
4.0 Topic D: Incorporate Security In The Software Development Lifecycle
4.1 Software Development Lifecycle
4.2 Software Development Models
4.3 DevOps
4.4 Versioning
4.5 Secure Coding Techniques
4.6 Code Testing Methods
4.7 Guidelines for Incorporating Security in the Software Development Lifecycle
4.8 Demo – Performing Static Code Analysis
4.9 Chapter 05 Review
➤ Module 06 - Implementing Network Security
1.0 Topic A: Configure Network Security Technologies
1.1 Network Components
1.2 Network Devices
1.3 Routers
1.4 Switches
1.5 Proxies
1.6 Firewalls
1.7 Load Balancer
1.8 Network Scanners and Analysis Tools
1.9 Intrusion Detection Systems
1.10 Network IDS
1.11 Intrusion Prevention Systems
1.12 Network IPS
1.13 Types of Network Monitoring Systems
1.14 Security Information and Event Management
1.15 Data Loss/Leak Prevention
1.16 Virtual Private Networks
1.17 VPN Concentrators
1.18 Security Gateways
1.19 Unified Threat Management
1.20 Guidelines for Configuring Network Security Technologies
1.21 Demo – Configuring a Network IDS
2.0 Topic B: Secure Network Design Elements
2.1 Network Access Control
2.2 Demilitarized Zones
2.3 Network Isolation
2.4 Virtual Local Area Networks
2.5 Network Security Device Placement
2.6 Network Address Translation
2.7 Software-Defined Networking
2.8 Guidelines for Securing Network Design Elements
2.9 Demo – Securing Network Design Elements
3.0 Topic C: Implement Secure Networking Protocols And Services
3.1 The Open Systems Interconnection Model
3.2 OSI Model and Security
3.3 Internet Protocol Suite
3.4 Domain Name System
3.5 Hypertext Transfer Protocol
3.6 Secure Sockets Layer/Transport Layer Security
3.7 HTTP Secure
3.8 Secure Shell
3.9 Simple Network Management Protocol
3.10 Real-Time Transport Protocol
3.11 Internet Control Message Protocol
3.12 Internet Protocol Security
3.13 Network Basic Input/Output System
3.14 File Transfer Protocols
3.15 Email Protocols
3.16 Additional Networking Protocols and Services
3.17 Ports and Port Ranges
3.18 Demo – Installing an Internet Information Services Web Server with Basic Security
3.19 Demo – Securing Network Traffic Using IPSec
4.0 Topic D: Secure Wireless Traffic
4.1 Wireless Networks
4.2 Wireless Antenna Types
4.3 802.11 Protocols
4.4 Wireless Cryptographic Protocols
4.5 Wireless Authentication Protocols
4.6 VPNs and Open Wireless
4.7 Wireless Client Authentication Methods
4.8 Wireless Access Point Security
4.9 Captive Portals
4.10 Site Surveys
4.11 Guidelines for Securing Wireless Traffic
4.12 Demo – Securing Wireless Traffic
4.13 Chapter 06 Review
➤ Module 07 - Managing Identity And Access
1.0 Topic A: Implement Identity And Access Management
1.1 Identity and Access Management
1.2 Access Control Models
1.3 Physical Access Control Devices
1.4 Biometric Devices
1.5 Certificate-Based Authentication
1.6 File System and Database Access
1.7 Guidelines for Implementing IAM
1.8 Demo – Implementing DAC for a File Share
2.0 Topic B: Configure Directory Services
2.1 Directory Services
2.2 Lightweight Directory Access Protocol
2.3 Secure LDAP
2.4 Common Directory Services
2.5 Demo – Backing Up Active Directory
3.0 Topic C: Configure Access Services
3.1 Remote Access Methods
3.2 Tunneling
3.3 Remote Access Protocols
3.4 HMAC-Based One-Time Password
3.5 Time-Based OTP
3.6 Password Authentication Protocol
3.7 Challenge-Handshake Authentication Protocol
3.8 NT LAN Manager
3.9 Authentication, Authorization, and Accounting
3.10 Remote Authentication Dial-In User Service
3.11 Terminal Access Controller Access-Control System
3.12 Kerberos
3.13 Demo – Configuring a Remote Access Server
3.14 Demo – Setting Up Remote Access Authentication
4.0 Topic D: Manage Accounts
4.1 Account Management
4.2 Account Privileges
4.3 Account Types
4.4 Account Policy
4.5 Password Policy
4.6 Multiple Accounts
4.7 Shared Accounts
4.8 Account Management Security Controls
4.9 Credential Management
4.10 Group Policy
4.11 Identity Federation
4.12 Identity Federation Methods
4.13 Guidelines for Managing Accounts
4.14 Demo – Managing Accounts
4.15 Chapter 07 Review
➤ Module 08 - Implementing Cryptography
1.0 Topic A: Identify Advanced Cryptography Concepts
1.1 Cryptography Elements
1.2 Hashing Concepts
1.3 Data States
1.4 Key Exchange
1.5 Digital Signatures
1.6 Cipher Suites
1.7 Session Keys
1.8 Key Stretching
1.9 Special Considerations for Cryptography
1.10 Demo – Identifying Advanced Cryptographic Concepts
2.0 Topic B: Select Cryptographic Algorithms
2.1 Types of Ciphers
2.2 Types of Hashing Algorithms
2.3 Types of Symmetric Encryption Algorithms
2.4 Types of Asymmetric Encryption Techniques
2.5 Types of Key Stretching Algorithms
2.6 Substitution Ciphers
2.7 Exclusive Or
2.8 Cryptographic Modules
2.9 Demo – Selecting Cryptographic Algorithms
3.0 Topic C: Configure A Public Key Infrastructure
3.1 Public Key Infrastructure
3.2 PKI Components
3.3 CA Hierarchies
3.4 The Root CA
3.5 Subordinate CAs
3.6 Offline Root CAs
3.7 Types of Certificates
3.8 X.509
3.9 Certificate File Formats
3.10 CA Hierarchy Design Options
3.11 Demo – Installing a CA
3.12 Demo – Securing a Windows Server 2016 CA
4.0 Topic D: Enroll Certificates
4.1 The Certificate Enrollment Process
4.2 The Certificate Lifecycle
4.3 Certificate Lifecycle Management
4.4 The SSL/TLS Connection Process
4.5 Demo – Enrolling Certificates
4.6 Demo – Securing Network Traffic with Certificates
5.0 Topic E: Back Up And Restore Certificates And Private Keys
5.1 Private Key Protection Methods
5.2 Key Escrow
5.3 Private Key Restoration Methods
5.4 Private Key Replacement
5.5 Demo – Backing Up a Certificate and Private Key
5.6 Demo – Restoring a Certificate and Private Key
6.0 Topic F: Revoke Certificates
6.1 Certificate Revocation
6.2 Certificate Revocation List
6.3 Online Certificate Status Protocol
6.4 Demo – Revoking Certificates
6.5 Chapter 08 Review
WhatsApp chat
Offer Extended – Up to 95% OFF !!
Use code SAVE95 | SAVE90 or SAVE80 at checkout
x