Livelab CompTIA Security+ (SY0-601)

$169.00
$204.49 incl. vat

ADD_TO_CART_INFO_FOR_BUSINESS

duration: 33 hours |

access duration: 180 days |

Details

CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. Security+ is aligned to the latest trends and techniques – covering the most core technical skills in risk assessment and management, incident response, forensics, enterprise networks, hybrid/cloud operations, and security controls, ensuring high-performance on the job.

This Livelab offers you hands-on experience. This Livelab simulate real-world workplace scenarios. This allows you to develop the practical skills that employers are looking for. With this Practicelab you develop your lateral thinking and problem-solving skills.

You will get started with the following topics:

  • Identifying different cyber attacks.
  • Penetration testing techniques.
  • Determining security vulnerabilities.
  • Authentication and authorization solutions.
  • Digital data forensic techniques.
  • Organizational risk management and policies.

And much more...

The Livelab, in combination with the training, prepares you optimally for the CompTIA Security + (SY0-601) exam. This exam replaces the SY0-501.

Result

After completing this Livelab, users will have gained hands-on experience in penetration testing and implementing preventative measures to secure a corporate network against possible cybersecurity attacks. In addition, further knowledge will be gained on how to handle a cybersecurity incident.

Finally, with this Livelab you will gain the practical experience required for the CompTIA Security + (SY0-601) exam.

Prerequisites

We recommend that you first complete the training CompTIA CompTIA Security + (SY0-601). In addition, it is important to have the correct prior knowledge. It is advisable to first familiarize yourself with the CompTIA A+ and the CompTIA Network+.

Target audience

Network Administrator, Security Specialist

Content

Livelab CompTIA Security+ (SY0-601)

33 hours

Control Mechanisms, Standards and Frameworks

  • Introduction
  • Lab Topology
  • Exercise 1 - Privacy and Sensitive Data Concepts
  • Review

Mobile Security Solutions

  • Introduction
  • Lab Topology
  • Exercise 1 - Connection Methods and Receivers
  • Exercise 2 - Mobile Device Management (MDM)
  • Exercise 3 - Mobile Devices
  • Exercise 4 - Enforcement and Monitoring
  • Exercise 5 - Deployment Models
  • Review

Incident Response Tools

  • Introduction
  • Lab Topology
  • Exercise 1 - Configuring System Logging
  • Exercise 2 - Using Tcpdump and Logging
  • Exercise 3 - Capturing Packets with Wireshark
  • Exercise 4 - Work with Logs in Windows
  • Review

Authentication and Authorization Solutions

  • Introduction
  • Lab Topology
  • Exercise 1 - Authentication Management
  • Exercise 2 - Authentication
  • Exercise 3 - Access Control Schemes
  • Exercise 4 - Manage File Permissions and Ownership on a Linux System
  • Review

Digital Data Forensic Techniques

  • Introduction
  • Lab Topology
  • Exercise 1 - Data Forensic Techniques
  • Review

Implementation of Secure Protocols

  • Introduction
  • Lab Topology
  • Exercise 1 - Working with Domain Name System Security Extensions (DNSSEc)
  • Exercise 2 - Configuring IPSec
  • Exercise 3 - Knowing the Security Protocols
  • Review

Physical Security Control Mechanisms

  • Introduction
  • Lab Topology
  • Exercise 1 - Physical Security
  • Exercise 2 - Data Destruction and Disposal Methods
  • Review

Cyber Security Vulnerabilities of Embedded Systems

  • Introduction
  • Lab Topology
  • Exercise 1 - Security Implications of Embedded and Specialized Systems
  • Review

Identity and Account Management Mechanisms

  • Introduction
  • Lab Topology
  • Exercise 1 - Identity
  • Exercise 2 - Account Types
  • Exercise 3 - Account Policies
  • Review

Data Protection Implementation

  • Introduction
  • Lab Topology
  • Exercise 1 - Data Breach
  • Exercise 2 - Data Classifications and Privacy Enhancing Techniques
  • Exercise 3 - Organizational Roles and Responsibilities for data
  • Exercise 4 - Information Life Cycle
  • Review

Gathering Intelligence on Threat Actors and Vectors

  • Introduction
  • Lab Topology
  • Exercise 1 - Actors and Threats
  • Exercise 2 - Threat Vectors
  • Exercise 3 - Threat Intelligence Sources
  • Exercise 4 - Research Sources
  • Exercise 5 - Threat Map
  • Exercise 6 - Vulnerability Databases
  • Review

Application Hardening Deployment Techniques

  • Introduction
  • Lab Topology
  • Exercise 1 - Secure Application Development, Deployment, and Automation Concepts
  • Review

Incident Response Policies and Procedures

  • Introduction
  • Lab Topology
  • Exercise 1 - Incident Response Process, Attack Frameworks and Stakeholder Management
  • Exercise 2 - Disaster Recovery, Business Continuity and Continuity of Operations
  • Exercise 3 - Incident Response Teams and Retention Policies
  • Review

Identifying Indicators of a Network Attack

  • Introduction
  • Lab Topology
  • Exercise 1 - Wireless
  • Exercise 2 - Domain Name System (DNS)
  • Exercise 3 - Other Types of Attacks
  • Exercise 4 - Malicious Code or Script Execution
  • Review

Authentication and Authorization Implementation Techniques

  • Introduction
  • Lab Topology
  • Exercise 1 - Using Directory Services to Administer User and Group Accounts
  • Exercise 2 - Authentication Methods
  • Exercise 3 - Biometric
  • Exercise 4 - Enable Multifactor Authentication
  • Review

Implementing Wireless Security Configurations

  • Introduction
  • Lab Topology
  • Exercise 1 - Wireless Network and its Security
  • Review

Implementing a Public Key Infrastructure

  • Introduction
  • Lab Topology
  • Exercise 1 - PKI Fundamentals
  • Exercise 2 - Create a Self-signed Certificate
  • Exercise 3 - Install and Configure Active Directory Certificate Services
  • Exercise 4 - Configure Certificate Revocation Lists (CRLs)
  • Exercise 5 - Manage Certificate Templates
  • Exercise 6 - Configure Certificate Auto Enrollment
  • Exercise 7 - Implement Key Archival
  • Review

Cryptographic Basic Concepts

  • Introduction
  • Lab Topology
  • Exercise 1 - Knowing the Cryptographic Concepts
  • Exercise 2 - Implementing Cryptography
  • Exercise 3 - Using Steganography
  • Review

Identifying Different Cyber Attacks

  • Introduction
  • Lab Topology
  • Exercise 1 - Malware
  • Exercise 2 - Creating Standalone Payloads with Msfvenom
  • Exercise 3 - Performing Online Password Attacks
  • Exercise 4 - Performing Offline Password Attacks
  • Exercise 5 - Explaining Physical and Other Attacks
  • Review

Cloud and Virtualization Concepts

  • Introduction
  • Lab Topology
  • Exercise 1 - Virtualization and Cloud Computing Concepts
  • Review

Securing a Cloud Infrastructure

  • Introduction
  • Lab Topology
  • Exercise 1 - Cloud Security Controls and Solutions
  • Review

Security Assessment Techniques

  • Introduction
  • Lab Topology
  • Exercise 1 - Threat Hunting
  • Exercise 2 - Studying Vulnerability Scans
  • Exercise 3 - Exploring Syslog/Security Information and Event Management (SIEM)
  • Review

Implementing Secure Network Solutions

  • Introduction
  • Lab Topology
  • Exercise 1 - Load Balancing
  • Exercise 2 - Network Segmentation
  • Exercise 3 - Virtual Private Network (VPN)
  • Exercise 4 - Port Security
  • Exercise 5 - Network Appliances and Services
  • Review

Securing an Environment using Mitigating Techniques

  • Introduction
  • Lab Topology
  • Exercise 1 - Mitigation Techniques
  • Exercise 2 - Software Restriction Policies
  • Exercise 3 - Firewall
  • Review

Cybersecurity Backup and Restore Strategies

  • Introduction
  • Lab Topology
  • Exercise 1 - Redundancy
  • Exercise 2 - Replication
  • Exercise 3 - Backup Types
  • Exercise 4 - Create a System Image Backup
  • Exercise 5 - Non-Persistence and Resilience
  • Review

Identifying Different Application Exploits

  • Introduction
  • Lab Topology
  • Exercise 1 - Cross Site Scripting
  • Exercise 2 - SQL Injection
  • Exercise 3 - Information Leakage and Improper Error Handling
  • Exercise 4 - Race Conditions, Memory Leak, Resource Exhaustion and Overflow Attacks
  • Exercise 5 - Directory Traversal and Path Manipulation
  • Exercise 6 - Privilege Escalation
  • Exercise 7 - Driver Manipulation and Replay Attacks
  • Exercise 8 - Pass the Hash, API Attacks, Request Forgeries, Pointer Dereference and SSL Stripping
  • Review

Social Engineering Techniques and Exploits

  • Introduction
  • Lab Topology
  • Exercise 1 - Social Engineering
  • Exercise 2 - Social Engineering Principles
  • Exercise 3 - Reconnaissance
  • Review

Application and Host Hardening Techniques

  • Introduction
  • Lab Topology
  • Exercise 1 - Endpoint Protection
  • Exercise 2 - Boot Integrity
  • Exercise 3 - Database
  • Exercise 4 - Application Security
  • Exercise 5 - Hardening
  • Exercise 6 - Sandboxing
  • Review

Organizational Risk Management and Policies

  • Introduction
  • Lab Topology
  • Exercise 1 - Risk Types and Risk Management Strategies
  • Exercise 2 - Risk Analysis
  • Exercise 3 - Disasters and Business Impact Analysis
  • Review

Network Security Assessment Tools

  • Introduction
  • Lab Topology
  • Exercise 1 - Network Reconnaissance and Discovery
  • Exercise 2 - Information Gathering
  • Exercise 3 - File Manipulation
  • Exercise 4 - Shell and Script Environments
  • Exercise 5 - Packet Capture and Replay
  • Exercise 6 - Forensics
  • Exercise 7 - Exploitation Frameworks, Password Crackers and Data Sanitization
  • Review

Enterprise Network Security Configuration Concepts

  • Introduction
  • Lab Topology
  • Exercise 1 - Importance of Security Concepts in an Enterprise Environment
  • Exercise 2 - Set up a Honeypot with Pentbox
  • Review

Penetration Testing Techniques

  • Introduction
  • Lab Topology
  • Exercise 1 - Explain Penetration Testing and its Types
  • Review

Determining Security Vulnerabilities

  • Introduction
  • Lab Topology
  • Exercise 1 - Security Concerns and Vulnerabilities
  • Exercise 2 - Third-Party Risks
  • Exercise 3 - Improper or Weak Patch Management
  • Exercise 4 - Impacts
  • Review

Course options

We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.

Optional practice exam (trial exam)

To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam. 

Optional practice lab

To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediatelyThe lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience. 

WHY_ICTTRAININGEN

Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten

Orderproces

Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.

read more about the order process

What is included?

Certificate of participation No
Monitor Progress Yes
Mobile ready Yes
Sharing knowledge Unlimited access to our IT professionals community
Study advice Our consultants are here for you to advice about your study career and options
Study materials Certified teachers with in depth knowledge about the subject.
Service World's best service

Platform

Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Follow multiple courses? Read more about our Life Long Learning concept

read more

Contact us

Need training advise? Contact us!


contact