CompTIA Security+: SY0-401 (2015 update) COM04

Common price: £ 595.00 Our price: £ 395.00 each


CompTIA Security+: SY0-401 (2015 update)


CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents; it ensures that security personnel are anticipating security risks and guarding against them.

CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in:

  • Network security
  • Compliance and operational security
  • Threats and vulnerabilities
  • Application, data and host security
  • Access control and identity management
  • Cryptography

CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents; it ensures that security personnel are anticipating security risks and guarding against them.

Candidate job roles include security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator. Organizations that employ CompTIA Security+ certified staff include Hitachi Information Systems (Japan), Trendmicro (Philippines), Lockheed Martin, General Dynamics and Northrop Grumman. With Network Security being the fast growing sector within IT having your Security+ will put you or your team ahead of the competition!



Unit 01

Topic A: System Maintenance

Causes of Compromised Security

Technology Weaknesses

Configuration Weaknesses

Policy Weaknesses

Human Error and Malice

Securing the Operating System

Microsoft Update

Windows Update Categories

Demo – A-2: Updating the Operating System

Patch Management

Demo – A-3: Managing Software Patches

Service Packs

Demo – A-4: Checking for and Installing Service Packs

BIOS Version

BIOS Update

Demo – A-5: Determining Whether you Need to Update your Computer’s BIOS

Windows Firewall

User Account Control

Demo – A-6: Configuring Windows Firewall

Topic B: Application Security

Application Vulnerabilities


Demo – B-1: Managing Application Security

Topic C: Physical Security

Physical Access Control

Smart Card and Reader

Fingerprint Scanner

Biometric Devices

Plant Security

Cipher Lock


Topic D: Malware

Malware Varieties

Malware Effects Anti-malware

Antivirus Software

Anti-malware Products

Demo – D-2: Installing Antivirus Software

Windows Defender

Demo – D-3: Scanning your System for Spyware

Topic E: Social Engineering

Social Engineering

Types of Social Engineering

Social Engineering Countermeasures


Demo – E-2: Examining Phishing


Social Networking

Unit 02 – Cryptography

Topic A: Symmetric Cryptography

ROT13 Cipher


Symmetric Encryption in Action

Common Symmetric Ciphers


Uses for Hashes

MD5 Hash Algorithm


Hash Vulnerabilities

Demo – A-2: Calculating Hashes


Demo – A-3: Sharing a Secret Message with Steganography

Topic B: Public Key Cryptography

Public Key Cryptography

Asymmetric Encryption in Action

Common Asymmetric Ciphers

Demo – B-1: Exploring Public Key Cryptography

Digital Signatures

Signature Process

Features of Signatures

Digital Certificates

Certificate Types

Demo – B-2: Examining Certificates

Public Key Infrastructure

Certificate Policy

Certificate Practice Statement

Trust Models

Single-authority Trust Model

Hierarchical Trust Model

Web of Trust Model

Demo – B-3: Examining Certificate Trusts Single- and Dual-key Certificates

Quantum Cryptography

Unit 03 – Authentication

Topic A: Authentication Factors and Requirements

Three Steps to Secure Resources

Authentication Factors

One-factor Authentication

Two-factor Authentication

Three-factor Authentication


Identification and Authentication

Identity Proofing

Single Sign-on

Topic B: Authentication Systems

Authentication Protocols


NTLM Challenge-response

NTLM Vulnerabilities


Kerberos System Composed of:

Kerberos Data Types:

Kerberos Authentication Process

Cross-realm Authentication

Kerberos Security Weaknesses

Null Sessions

Topic C: Authentication System Variables

Authentication Vulnerabilities

Secure Passwords

Password Realities

Least Privilege

Demo – C-1: Identifying Authentication Vulnerabilities


Demo – C-2: Capturing Passwords with a Protocol Analyzer

Password Cracking

Password Guessing

SAM and SYSTEM Files

Demo – C-3: Cracking Passwords

Unit 04 – User – and Role-based Security

Topic A: Baseline Security Policies

Security Baselines

Demo – A-1: Using MBSA to Analyze Security

Group Policy Settings

Local GPO Types

GPO Editor

Local Computer GPO Nodes

Demo – A-2: Creating a Console to Manage Local Security Policies

Policy Properties Dialog Box

Container Types

Types of Domain GPOs

GPOs Applied in this Order

Demo – A-3: Using the GPMC

Topic B: Resource Access


Demo – B-1: Creating Users and Groups Based on Security Needs


File System Security

Access Control Models

Demo – B-2: Securing File Resources

Unit 05 – Peripheral Security

Topic A: File and Disk Encryption

File and Disk Encryption

File-level Encryption

Demo – A-1: Enabling File-based Encryption

Whole Disk Encryption

Windows BitLocker

BitLocker Life Cycle


Other Disk Encryption Tools

Demo – A-2: Creating an Encrypted Volume

Demo – A-3: Mounting, Using, and Dismounting an Encrypted Volume

Topic B: Peripheral and Component Security

Peripherals and Components

USB Drives


Shredding Standards

Demo – B-2: Using Windows Policies to Mitigate the Risks of Peripherals

Topic C: Mobile Device Security

Mobile Device Risks

Additional Concerns

Mitigating Risks

Screen Lock

Android Security Settings


Risks and Threats

Unit 06 – Public Key Infrastructure

Topic A: Public Key Cryptography


Setup and Initialization Phase

Administration Phase

Cancellation and Key History

Administrative Responsibilities

Topic B: Implementing Public Key Infrastructure

Microsoft Certificate Services

AD Integration Options

Demo – B-1: Installing a Standalone Root Certificate Authority

Demo – B-2: Installing an Enterprise Subordinate CA

Demo – B-3: Implementing a File-based Certificate Request

Demo – B-4: Managing your Certificate Server

User Certificates

Demo – B-5: Requesting a User Certificate

Certificate Revocation

Demo – B-6: Revoking a Certificate

Key Escrow and Recovery

Key Recovery Agent

Demo – B-7: Enabling the EFS Recovery Agent Template

Demo – B-8: Enrolling for a Recovery Agent Certificate

Demo – B-9: Enabling Key Archival

Demo – B-10: Re-enrolling All Certificates

Topic C: Web Server Security with PKI

Securing Web Servers

Commercial Certificate

Demo – C-1: Requesting and Installing a Web Server Certificate

Demo – C-2: Enabling SSL for the Certificate Server Website

HTTPS Connections

Demo – C-3: Making a Secure Connection

Demo – C-4: Requesting a Client Certificate via the Web

Unit 07 – Application and Messaging Security

Topic A: Application Security

Application Security

Programmer’s Perspective

Administrator’s Perspective

User’s Perspective

Application Attacks

Topic B: E-mail Security

E-mail Security

E-mail Application Security

Demo – B-2: Configuring an E-mail Client to Use Secure Authentication

Signed and Encrypted Mail


PGP Certificates


X.509 Certificates


Demo – B-3: Examining S/MIME Features

Using PGP

Demo – B-4: Installing Gnu Privacy Guard and Enigmail

Demo – B-5: Creating an OpenPGP Certificate and Key Pair

Signed Message

Demo – B-6: Sending a Signed Message

Topic C: Social Networking and Messaging

Social Networking

Instant Messaging



Finest instructors in the IT industry with a minimum of 15 years, real-world experience and are subject matter experts in their fields

Instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.

Custom practice exams prepare you more effectively than the traditional exam preps on the market. Practice quizzes after each module ensures confidence on the topic before proceeding.

World class Learning Management System (LMS) which allows you to interact and collaborate with other students, form study groups, engage in discussions, rate different courses and stay up to date with all the latest industry knowledge.

Every Students learns differently. That is why we provide Flash Cards and Education Games throughout our courses. Allowing students to train in ways that keep them engaged and focused.

Self-paced training programs are designed in a modular fashion to allow the flexibility to work with expert level instruction any time 24/7.All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.

Each student will have 12 months unlimited access to allow you to have access to the training anytime 24/7.


A certificate is awarded on successful completion of the programme to show employers your new skills. Often this is enough to verify your new level of learning but if you would like to take the full accredited examinations then please see below.


All CompTIA exams are booked through Prometric (Please use the link below to find your nearest testing centre.)

Please NOTE: Exams are not included

List of the comments:
No vote yet
WOW, thanks so much, this is an amazing post. click here You have done a wonderful job here and i am certainly looking forward to more. Keep it up
No vote yet
WOW, thanks so much, this is an amazing post. click here You have done a wonderful job here and i am certainly looking forward to more. Keep it up

Give your advice about this item:

Back to top