Welcome to ONLC Training Centers

CompTIA On-Demand: CompTIA Security + Certification Training


Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.

CompTIA On-Demand: CompTIA Security + Certification Training Course Outline

Please Note: This course aligns with the SYO-601 exam, which is scheduled to retire July 2024 -please plan accordingly
*** Note: This is an On-Demand Self Study Class, 180-day, 24/7 access via the internet ***
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
CompTIA On-Demand is a self-study training solution that is a great fit for individuals with considerable IT experience who don't need a traditional 5-day class to prepare for a CompTIA exam. The online CompTIA Security training is also a good option for individuals who can only study in their free time and need to take the course at their own pace.

Course Overview
You may take this Security+ certification course at any time; there are no set dates. The course includes hours of videos, demonstrations, lab exercises, and printed course materials. The security training course will prepare students for the CompTIA Security+ SY0-601 exam. Topics covered in the Security+ certification course include: understanding threats, analyzing attacks, cryptography, implementing secure networks, operational procedures, forensics, and more. Note: The 180-day CompTIA Security course access period begins at time of purchase.

Target Student
The CompTIA Security+ course is aimed at IT professionals with career roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator. It is recommended that students have taken CompTIA Network+ certification course and exam, together with career experience in networking support/IT administration.

Course Prerequisites
Students should meet the following criteria prior to taking the Security+ certification course:
• Recommended that students have taken CompTIA Network+ certification course and exam, together with 24 months experience in networking support/IT administration
• Know the function and basic features of the components of a PC
• Use Windows Server to create and manage files and use basic administrative features (Explorer, Control Panel,Management Consoles, Command Line Tools)
• Operate the Linux OS using basic command-line tools
• Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers)
• Understand TCP/IP addressing, core protocols, and troubleshooting tools

Additional Notes Regarding CompTIA Certification Exams
As with most professional IT certifications, many additional hours of study are required before the class (meeting the prerequisites) and after the class (reviewing exam objectives and practice questions). Expect to spend a significant number of hours studying before you take a CompTIA or any other IT professional exam.

ONLC Extras
ONLC Training Centers bundles in valuable extras with our CompTIA On-Demand Courses. These extras are not available from other security training companies.

Certification Exam Voucher Included (A $340 value!) All of our CompTIA classes include the cost of the CompTIA exam voucher. Students must schedule when and where they will take the exam through Pearson Vue, the CompTIA testing service.

Exam Prep Software. This web-based practice exam will help your prepare for you actual certification exam. These dynamic practice tests provide links to the training content. If you answer an exam question wrong, you can go back to that topic for additional study and review.

Classroom Live Labs. These labs give you access to real equipment without the need for time-consuming installation and setup. You get easy browser-based access to the equipment you need to work through the labs that align with the CompTIA security course content. Requires only a browser and high-speed internet access.

24/7 Online Support. You will be able to chat online with a content matter expert while you are taking your On-Demand class. And, with your permission, the CompTIA Security expert can even take over your computer to provide assistance with your labs. (3-Month Access.)

ONLC’s Exam Pass Guarantee
ONLC’s CompTIA certification classes come with an Exam Pass Guarantee. What that essentially means is that we want to make sure that everyone is taking advantage of the Practice Exam that we are providing and achieve a score of 85% or better in Certification Mode prior to us releasing the initial exam voucher.

The Security Plus certification practice exam is ordered upon request. Once you provide a copy of the course Certificate of Completion along with lab completion documentation we will email the web-based practice test. After achieving a score of 85% or better, email proof to [email protected] and we will go ahead and release the exam voucher to you within 24 business hours. Should you fail the exam on the first attempt, after submitting your authorized exam score and additional study, we will then provide a second voucher. However, should you decide to not take the practice exam or to take the exam without first achieving the 85% in certification mode, the Exam Pass is null and void. Please read through our:
Exam Pass Guarantee

Do You Still Prefer a Live, Instructor-led Class?
Already know On-Demand training is not right for you? We also offer this CompTIA security course in a live, instructor-led format. For more details, click on the link below:
Instructor-led CompTIA Security+ Certification Training

This CompTIA Security course takes 5 days to complete and includes 10h 45m of video presentation plus hours of practice labs.

Course Outline

Chapter 1 - Understanding Threats, Attacks, and Vulnerabilities
Topic A: Introduction to Security Concepts
Security Fundamentals
Security Terms
Topic B: Identifying Threat Actors and Vectors
Actors and Threats
Actor Attributes
Attack Vectors
Information Gathering
Intelligence Sources
Research Sources
Demo - Research Sources
Topic C: Understanding Vulnerabilities
Vulnerability Fundamentals
Security Impacts
Vulnerability Types
Vulnerability Types (cont.)
Topic D: Understanding Attack Types
Attack Types
Understanding Malware Types
Attacking Passwords and User Credentials
Physical Attacks
Other Attack Types
Topic E: Identifying Social Engineering Techniques
Social Engineering Principles
Other Social Engineering Types
Other Social Engineering Types (cont.)

Chapter 2 - Analyzing Attacks
Topic A: Security Assessment Tools and Techniques
Understanding Assessments
Threat Hunting
Vulnerability Scanning
Syslog and SIEM
SIEM Components
Topic B: Application Attacks
Application Attacks
Privilege Escalation
Cross-Site Scripting
Application Attack Issues
Session Attacks
Additional Attacks
Topic C: Network Attacks
Introduction to Network Attacks
Wireless Network Attacks
Layer 2 Attacks
Service Attacks
Demo - DNS Poisoning
Malicious Code
Topic D: Penetration Testing
Penetration Testing
Environment Types
Pentesting Concepts
Network Reconnaissance
Exercise Types

Chapter 3 - Architecture and Design
Topic A: Enterprise Security Architecture
Enterprise Standardization Needs
Configuration Management
Data Protection
Additional Security Concepts
Disaster Recovery
Deception and Disruption
Topic B: Designing Authentication and Authorization
Authentication and Authorization
Authentication Methods
Authentication Technologies
Multifactor Authentication
Demo - Multifactor Authentication
Topic C: Designing Resiliency
Resiliency and Cybersecurity
Redundancy Concepts
Replication Concepts
Backup Concepts
Additional Resiliency Options
Topic D: Cloud and Virtualization Concepts
Cloud Models
Cloud Types
Cloud Service Providers
Additional Cloud Concepts
Additional Cloud Concepts (cont.)
Demo - Cloud Computing Security
Topic E: Securing Application Development and Deployment
Application Development Environments
Secure Coding Techniques
Automation Techniques
Application Design Concepts

Chapter 4 - Physical and System Security
Topic A: Physical Security Controls
Importance of Physical Controls
Standard Controls
Security Monitoring
Security Personnel
Secure Areas
Secure Data Destruction
Demo - Data Destruction Software
Topic B: Securing Embedded and Specialized Systems
Embedded Systems
Specialized Systems
Additional System Types
Communication Considerations

Chapter 5 – Cryptography
Topic A: Cryptographic Concepts
Introduction to Cryptography
Common Use Cases
Integrity Verification
Understanding Keys
Crypto Limitations
Additional Cryptographic Types
Topic B: Public Key Infrastructures
Introduction to PKIs
Certificate Authorities
Certificate Verification
Certificate Formats
Demo - Implementing PKI
Additional Concepts
Chapter 6 - Implementing Secure Networks
Topic A: Implement Secure Protocols
Network Protocols
Use Cases
Application Layer Protocols
IP Security
Topic B: Implement Secure Network Designs
Network Segmentation
High Availability
Virtual Private Networks
Secure Network Appliances
Demo - Configuring a Host-Based Firewall
Additional Network Security Concepts
Topic C: Implementing Security in the Cloud
Cloud Security Controls
Cloud Storage Security
Cloud Network Security
Compute Security
Additional Cloud Solutions
Topic D: Implement Wireless Security
Cryptographic Protocols
Authentication Protocols
Authentication Methods
Installation Considerations
Topic E: Implement Secure Mobile Solutions
Deployment Models
Connection Methods and Receivers
Mobile Device Management (MDM)
Mobile Devices
Enforcement and Monitoring
Additional Controls

Chapter 7 - Implementing Secure Hosts and Identities
Topic A: Implement Authentication and Authorization Systems
Understanding Identity
Access Control Methods
Demo - Role-Based Access Control
Authentication Management
Remote Access Authentication
Authentication and Authorization Protocols
Topic B: Implement Identity and Account Management Controls
Account Types
Account Policies
Demo - Configuring Account Policies
Additional Identity Terms
Topic C: Implement Host and Application Security Solutions
Endpoint Protection
Client Level Protections
Network Level Protections
Boot Integrity
Database Security
System Hardening
Application Security

Chapter 8 - Operational Procedures
Topic A: Using Tools to Assess Security
Network Reconnaissance and Discovery
Network Tools
Network Tools (cont.)
Demo - Using Network Tools
File Manipulation Tools
Packet Capture and Relay
Shell and Script Environments
Forensics Tools
Topic B: Utilizing Data Sources for Investigation
Vulnerability Scan Output
SIEM Dashboards
Log Files
Additional Monitoring
Topic C: Applying Mitigation Techniques
Reconfiguring Endpoint Solutions
Configuration Changes
Additional Mitigation Techniques

Chapter 9 - Incident Response and Forensics
Incident Response and Forensics
Topic A: Incident Response Policies and Procedures
Incident Response Plans
Incident Response Process
Attack Frameworks
Additional Plans
Demo - Examining IRPs
Topic B: Understanding Digital Forensics
Introduction to Forensics
Evidence Categories
Documentation and Evidence
Acquisition Concepts
Additional Concepts

Chapter 10 - Governance, Risk, and Compliance
Governance, Risk, and Compliance
Topic A: Introduction to Control Types
Security Controls
Control Categories
Control Types
Topic B: Understanding Governance
Introduction to Governance
Regulations and Standards
Key Frameworks
Demo - Data Loss Prevention (DLP)
Topic C: Implementing Security Policies
Personnel-Based Policies
Personnel-Based Policies (cont.)
Third-Party Risk Management
Credential Policies
Topic D: Implementing Risk Management
Risk Types
Risk Management Strategies
Risk Analysis
Risk Analysis (cont.)
Business Impact Analysis
Topic E: Compliance with Privacy and Sensitive Data
Organizational Consequences
Data Types
Privacy Enhancing Technologies
Roles and Responsibilities

View outline in Word


Attend hands-on, instructor-led CompTIA On-Demand: CompTIA Security + Certification Training training classes at ONLC's more than 300 locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of Security+ Courses and select the one that's right for you.


Class Format
Class Policies
Student Reviews

First Name

Last Name