CompTIA Security+ Certification Course (SY0-601)


SY0-601 Security+ is a beneficial cybersecurity-specific certification for IT job candidates to hold, often being the first instance where candidates learn to identify and handle InfoSec threats. 

What you'll learn

Instructor Gordon Shenkle has over 30 years of IT experience with 15 of those years specializing in IT security. Students will learn the best real-world troubleshooting practices for identifying and handling cybersecurity incidents. It is recommended that students complete CompTIA A+ and Network+ before beginning this course.
Learn how to explain threat actors and threat intelligence, about comparing security roles and security controls, and perform security assessments in order to identify social engineering attacks or malware. Gain knowledge on basic cryptographic concepts, authentication controls, data privacy, account management, network security protocols, and many other topics.
Modules in this course will cover:
  • Information Security Roles Security Control and Framework Types
  • Threat Actor Types, Attack Vectors, and Intelligence Sources
  • Organizational Security, Network Reconnaissance, General Vulnerability Types, Penetration Testing
  • Social Engineering, Indicators of Malware Attacks
  • Cryptography
  • Certificates and PKI
  • Authentication
  • Identity and Accounts, Authorization, Personnel Policies
  • Network Design and Hardware – Two Parts
  • Network Protocols
  • Endpoint Security
  • Mobile Devices
  • Indicators of Attacks, Intro to Secure Coding, Scripting, Deployment, and Automation
  • Secure Coding, Scripting, Deployment, Cloud, and Virtualization
  • Privacy and Data Protection
  • Incident Response
  • Data Forensics
  • Risk Management, Business Impact Analysis
  • Redundancy and Backup Strategies
  • Physical Security
  • Security+ SY0-601 Exam Prep
Course Details

Achieve More

High Quality
Self-Paced Learning.

Learn anywhere, anytime, & on any device. 

Develop skills for real career growth

The curriculum is designed in guidance with industry expertise so that you can develop job-ready skills.

Learn from experts active in the industry

Learn from experts in their field who bring years of best practices and case studies in their teaching.

Take advantage of the bonuses & resources

Key Skills Academy offers bonus resources, reading material, & extra projects to help you turn learning into action.

Security+ SY0-601

Course Outline

  •  Introduction and Overview
  •  Compare and Contrast Information Security Roles
  •  Compare and Contrast Security Control and Framework Types
  •  Module Summary
  •  Explain Threat Actor Types and Attack Vectors
  •  Explain Threat Intelligence Sources
  •  Module Summary
  •  Assess Organizational Security with Network Reconnaissance Tools
  •  Packet Capture and Replay Demo
  •  Explain Security Concerns with General Vulnerability Types
  •  Summarize Vulnerability Scanning Techniques
  •  Explain Penetration Testing Concepts
  •  Module Summary
  •  Compare and Contrast Social Engineering Techniques
  •  Analyze Indicators of Malware-based Attacks
  •  Fork Bomb Malware Demo
  •  Module Summary
  •  Compare and Contrast Cryptographic Ciphers
  •  Summarize Cryptographic Modes of Operation
  •  Summarize Cryptographic Use Cases and Weaknesses
  •  Summarize Other Cryptographic Technologies
  •  Module Summary
  •  Implement Certificates and Certificate Authorities
  •  Implement PKI Management
  •  Implementing a PKI Demo
  •  Module Summary
  •  Summarize Authentication Design Concepts
  •  Implement Knowledge-based Authentication
  •  Password Cracker Demo
  •  Implement Authentication Technologies
  •  Summarize Biometrics Authentication Concepts
  •  Module Summary


  •  Implement Identity and Account Types
  •  Implement Account Policies
  •  Account Types and Polices Demo
  •  Implement Authorization Solutions
  •  Explain the Importance of Personnel Policies
  •  Module Summary
  •  Implement Secure Network Designs
  •  Implement Secure Switching and Routing
  •  Various Types of Network Attacks Demo
  •  Implement Secure Wireless Infrastructure
  •  Implement Load Balancers
  •  Module Summary
  •  Implement Firewalls and Proxy Servers
  •  Implement Network Security Monitoring
  •  Summarize the Use of SIEM
  •  Module Summary
  •  Implement Secure Network Operations Protocols
  •  Implement Secure Application Protocols
  •  Implement Secure Remote Access Protocols
  •  Module Summary
  •  Implement Secure Firmware
  •  Implement Endpoint Security
  •  Endpoint Protection Demo
  •  Explain Embedded System Security Implications
  •  Module Summary
  •  Implement Mobile Device Management
  •  Implement Secure Mobile Device Connections
  •  Module Summary
  •  Analyze Indicators of Application Attack
  •  Analyze Indicators of Web Application Attacks
  •  Summarize Secure Coding Practices
  •  Implement Secure Script Environments
  •  Summarize Deployment and Automation Concepts
  •  Module Summary
  •  Summarize Secure Cloud and Virtualization Services
  •  Apply Cloud Security Solutions
  •  Summarize Infrastructure as Code Concepts
  •  Module Summary
  •  Explain Privacy and Data Sensitivity Concepts
  •  Explain Privacy and Data Protection Controls
  •  Module Summary
  •  Summarize Incident Response Procedures
  •  Utilize Appropriate Data Sources for Incident Response
  •  Apply Mitigation Controls
  •  Module Summary
  •  Explain Key Aspects of Digital Forensics Documentation
  •  Explain Key Aspects of Digital Forensics Evidence Acquisition
  •  Module Summary
  •  Explain Risk Management Processes and Concepts
  •  Explain Business Impact Analysis Concepts
  •  Module Summary
  •  Implement Redundancy Strategies
  •  Implement Backup Strategies
  •  Implement Cybersecurity Resiliency Strategies
  •  Module Summary
  •  Explain the Importance of Physical Site Controls
  •  Explain the Importance of Physical Host Security Controls
  •  Module Summary

 Conclusion and General Exam Tips

Frequently ask questions

What would you like to know?

Check out the questions asked most frequently by our customers. If these still don't answer your question, e-mail us:

As soon as you purchase the course you should receive a voucher code in your email prompting you to create your account and redeem your voucher code for your course. If you have not received your code within two hours e-mail:

Yes, we have a 100% money back guarantee of 7 days. Within 7 days if you’re not satisfied we will refund you the entire amount of the course. 

You have one year from the date you purchase. 

After successfully completing the on-demand course, you will receive a Key Skills Academy certificate of achievement. Your customer success agent will also help you sign up for any relevant 3rd party official examinations. 

Most Popular

Bought Together

Check out these additional courses to help you on your cyber security journey.


Limited Time Offer

Book 1 Free
Training Session