Livelab CompTIA Security+ (SY0-601)

Details
CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. Security+ is aligned to the latest trends and techniques – covering the most core technical skills in risk assessment and management, incident response, forensics, enterprise networks, hybrid/cloud operations, and security controls, ensuring high-performance on the job.
This Livelab offers you hands-on experience. This Livelab
simulate real-world workplace scenarios. This allows you to develop
the practical skills that employers are looking for. With this
Practicelab you develop your lateral thinking and problem-solving
skills.
You will get started with the following topics:
- Identifying different cyber attacks.
- Penetration testing techniques.
- Determining security vulnerabilities.
- Authentication and authorization solutions.
- Digital data forensic techniques.
- Organizational risk management and policies.
And much more...
The Livelab, in combination with the training, prepares you optimally for the CompTIA Security + (SY0-601) exam. This exam replaces the SY0-501.
Result
After completing this Livelab, users will have gained hands-on experience in penetration testing and implementing preventative measures to secure a corporate network against possible cybersecurity attacks. In addition, further knowledge will be gained on how to handle a cybersecurity incident.
Finally, with this Livelab you will gain the practical
experience required for the CompTIA Security + (SY0-601)
exam.
Prerequisites
We recommend that you first complete the training CompTIA CompTIA Security + (SY0-601). In addition, it is important to have the correct prior knowledge. It is advisable to first familiarize yourself with the CompTIA A+ and the CompTIA Network+.
Target audience
Network Administrator, Security Specialist
Content
Livelab CompTIA Security+ (SY0-601)
Control Mechanisms, Standards and Frameworks
- Introduction
- Lab Topology
- Exercise 1 - Privacy and Sensitive Data Concepts
- Review
Mobile Security Solutions
- Introduction
- Lab Topology
- Exercise 1 - Connection Methods and Receivers
- Exercise 2 - Mobile Device Management (MDM)
- Exercise 3 - Mobile Devices
- Exercise 4 - Enforcement and Monitoring
- Exercise 5 - Deployment Models
- Review
Incident Response Tools
- Introduction
- Lab Topology
- Exercise 1 - Configuring System Logging
- Exercise 2 - Using Tcpdump and Logging
- Exercise 3 - Capturing Packets with Wireshark
- Exercise 4 - Work with Logs in Windows
- Review
Authentication and Authorization Solutions
- Introduction
- Lab Topology
- Exercise 1 - Authentication Management
- Exercise 2 - Authentication
- Exercise 3 - Access Control Schemes
- Exercise 4 - Manage File Permissions and Ownership on a Linux System
- Review
Digital Data Forensic Techniques
- Introduction
- Lab Topology
- Exercise 1 - Data Forensic Techniques
- Review
Implementation of Secure Protocols
- Introduction
- Lab Topology
- Exercise 1 - Working with Domain Name System Security Extensions (DNSSEc)
- Exercise 2 - Configuring IPSec
- Exercise 3 - Knowing the Security Protocols
- Review
Physical Security Control Mechanisms
- Introduction
- Lab Topology
- Exercise 1 - Physical Security
- Exercise 2 - Data Destruction and Disposal Methods
- Review
Cyber Security Vulnerabilities of Embedded Systems
- Introduction
- Lab Topology
- Exercise 1 - Security Implications of Embedded and Specialized Systems
- Review
Identity and Account Management Mechanisms
- Introduction
- Lab Topology
- Exercise 1 - Identity
- Exercise 2 - Account Types
- Exercise 3 - Account Policies
- Review
Data Protection Implementation
- Introduction
- Lab Topology
- Exercise 1 - Data Breach
- Exercise 2 - Data Classifications and Privacy Enhancing Techniques
- Exercise 3 - Organizational Roles and Responsibilities for data
- Exercise 4 - Information Life Cycle
- Review
Gathering Intelligence on Threat Actors and Vectors
- Introduction
- Lab Topology
- Exercise 1 - Actors and Threats
- Exercise 2 - Threat Vectors
- Exercise 3 - Threat Intelligence Sources
- Exercise 4 - Research Sources
- Exercise 5 - Threat Map
- Exercise 6 - Vulnerability Databases
- Review
Application Hardening Deployment Techniques
- Introduction
- Lab Topology
- Exercise 1 - Secure Application Development, Deployment, and Automation Concepts
- Review
Incident Response Policies and Procedures
- Introduction
- Lab Topology
- Exercise 1 - Incident Response Process, Attack Frameworks and Stakeholder Management
- Exercise 2 - Disaster Recovery, Business Continuity and Continuity of Operations
- Exercise 3 - Incident Response Teams and Retention Policies
- Review
Identifying Indicators of a Network Attack
- Introduction
- Lab Topology
- Exercise 1 - Wireless
- Exercise 2 - Domain Name System (DNS)
- Exercise 3 - Other Types of Attacks
- Exercise 4 - Malicious Code or Script Execution
- Review
Authentication and Authorization Implementation Techniques
- Introduction
- Lab Topology
- Exercise 1 - Using Directory Services to Administer User and Group Accounts
- Exercise 2 - Authentication Methods
- Exercise 3 - Biometric
- Exercise 4 - Enable Multifactor Authentication
- Review
Implementing Wireless Security Configurations
- Introduction
- Lab Topology
- Exercise 1 - Wireless Network and its Security
- Review
Implementing a Public Key Infrastructure
- Introduction
- Lab Topology
- Exercise 1 - PKI Fundamentals
- Exercise 2 - Create a Self-signed Certificate
- Exercise 3 - Install and Configure Active Directory Certificate Services
- Exercise 4 - Configure Certificate Revocation Lists (CRLs)
- Exercise 5 - Manage Certificate Templates
- Exercise 6 - Configure Certificate Auto Enrollment
- Exercise 7 - Implement Key Archival
- Review
Cryptographic Basic Concepts
- Introduction
- Lab Topology
- Exercise 1 - Knowing the Cryptographic Concepts
- Exercise 2 - Implementing Cryptography
- Exercise 3 - Using Steganography
- Review
Identifying Different Cyber Attacks
- Introduction
- Lab Topology
- Exercise 1 - Malware
- Exercise 2 - Creating Standalone Payloads with Msfvenom
- Exercise 3 - Performing Online Password Attacks
- Exercise 4 - Performing Offline Password Attacks
- Exercise 5 - Explaining Physical and Other Attacks
- Review
Cloud and Virtualization Concepts
- Introduction
- Lab Topology
- Exercise 1 - Virtualization and Cloud Computing Concepts
- Review
Securing a Cloud Infrastructure
- Introduction
- Lab Topology
- Exercise 1 - Cloud Security Controls and Solutions
- Review
Security Assessment Techniques
- Introduction
- Lab Topology
- Exercise 1 - Threat Hunting
- Exercise 2 - Studying Vulnerability Scans
- Exercise 3 - Exploring Syslog/Security Information and Event Management (SIEM)
- Review
Implementing Secure Network Solutions
- Introduction
- Lab Topology
- Exercise 1 - Load Balancing
- Exercise 2 - Network Segmentation
- Exercise 3 - Virtual Private Network (VPN)
- Exercise 4 - Port Security
- Exercise 5 - Network Appliances and Services
- Review
Securing an Environment using Mitigating Techniques
- Introduction
- Lab Topology
- Exercise 1 - Mitigation Techniques
- Exercise 2 - Software Restriction Policies
- Exercise 3 - Firewall
- Review
Cybersecurity Backup and Restore Strategies
- Introduction
- Lab Topology
- Exercise 1 - Redundancy
- Exercise 2 - Replication
- Exercise 3 - Backup Types
- Exercise 4 - Create a System Image Backup
- Exercise 5 - Non-Persistence and Resilience
- Review
Identifying Different Application Exploits
- Introduction
- Lab Topology
- Exercise 1 - Cross Site Scripting
- Exercise 2 - SQL Injection
- Exercise 3 - Information Leakage and Improper Error Handling
- Exercise 4 - Race Conditions, Memory Leak, Resource Exhaustion and Overflow Attacks
- Exercise 5 - Directory Traversal and Path Manipulation
- Exercise 6 - Privilege Escalation
- Exercise 7 - Driver Manipulation and Replay Attacks
- Exercise 8 - Pass the Hash, API Attacks, Request Forgeries, Pointer Dereference and SSL Stripping
- Review
Social Engineering Techniques and Exploits
- Introduction
- Lab Topology
- Exercise 1 - Social Engineering
- Exercise 2 - Social Engineering Principles
- Exercise 3 - Reconnaissance
- Review
Application and Host Hardening Techniques
- Introduction
- Lab Topology
- Exercise 1 - Endpoint Protection
- Exercise 2 - Boot Integrity
- Exercise 3 - Database
- Exercise 4 - Application Security
- Exercise 5 - Hardening
- Exercise 6 - Sandboxing
- Review
Organizational Risk Management and Policies
- Introduction
- Lab Topology
- Exercise 1 - Risk Types and Risk Management Strategies
- Exercise 2 - Risk Analysis
- Exercise 3 - Disasters and Business Impact Analysis
- Review
Network Security Assessment Tools
- Introduction
- Lab Topology
- Exercise 1 - Network Reconnaissance and Discovery
- Exercise 2 - Information Gathering
- Exercise 3 - File Manipulation
- Exercise 4 - Shell and Script Environments
- Exercise 5 - Packet Capture and Replay
- Exercise 6 - Forensics
- Exercise 7 - Exploitation Frameworks, Password Crackers and Data Sanitization
- Review
Enterprise Network Security Configuration Concepts
- Introduction
- Lab Topology
- Exercise 1 - Importance of Security Concepts in an Enterprise Environment
- Exercise 2 - Set up a Honeypot with Pentbox
- Review
Penetration Testing Techniques
- Introduction
- Lab Topology
- Exercise 1 - Explain Penetration Testing and its Types
- Review
Determining Security Vulnerabilities
- Introduction
- Lab Topology
- Exercise 1 - Security Concerns and Vulnerabilities
- Exercise 2 - Third-Party Risks
- Exercise 3 - Improper or Weak Patch Management
- Exercise 4 - Impacts
- Review
Course options
We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.
Optional practice exam (trial exam)
To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam.
Optional practice lab
To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediately. The lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience.
Sign In
WHY_ICTTRAININGEN
Via ons opleidingsconcept bespaar je tot 80% op trainingen
Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo
Spar met medecursisten en profileer je als autoriteit in je vakgebied.
Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl
Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers
Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten
Orderproces
Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.
read more about the order process
Een zakelijk account aanmaken
Wanneer u besteld namens uw bedrijf doet u er goed aan om aan zakelijk account bij ons aan te maken. Tijdens het registratieproces kunt u hiervoor kiezen. U heeft vervolgens de mogelijkheden om de bedrijfsgegevens in te voeren, een referentie en een afwijkend factuuradres toe te voegen.
Betaalmogelijkheden
U heeft bij ons diverse betaalmogelijkheden. Bij alle betaalopties ontvangt u sowieso een factuur na de bestelling. Gaat uw werkgever betalen, dan kiest u voor betaling per factuur.

Cursisten aanmaken
Als u een zakelijk account heeft aangemaakt dan heeft u de optie om cursisten/medewerkers aan te maken onder uw account. Als u dus meerdere trainingen koopt, kunt u cursisten aanmaken en deze vervolgens uitdelen aan uw collega’s. De cursisten krijgen een e-mail met inloggegevens wanneer zij worden aangemaakt en wanneer zij een training hebben gekregen.
Voortgangsinformatie
Met een zakelijk account bent u automatisch beheerder van uw organisatie en kunt u naast cursisten ook managers aanmaken. Beheerders en managers kunnen tevens voortgang inzien van alle cursisten binnen uw organisatie.
What is included?
Certificate of participation | No |
Monitor Progress | Yes |
Mobile ready | Yes |
Sharing knowledge | Unlimited access to our IT professionals community |
Study advice | Our consultants are here for you to advice about your study career and options |
Study materials | Certified teachers with in depth knowledge about the subject. |
Service | World's best service |
Platform
Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

FAQ
Niet gevonden wat je zocht? Bekijk alle vragen of neem contact op.