Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications Autodesk Microsoft QuickBooks Windows Computer Programming Computer Programming Programming Classes Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map How It Works How It Works About ed2go Externship Programs Financial Assistance Corporate Training Find a School Student Blog Military

CONTACT US

(855) 520-6806

See all results for ""

See All Courses

ed2go Information Technology Security CompTIA Security+ Certification Training
Return to Security
comptia-security

CompTIA™ Security+ Certification Training

Gain the skills you need to be a security professional, and prepare to take the CompTIA™ Security+ certification SY0-501 exam, as you master the basics of system security, network infrastructure, access control, and organizational security. Once you complete this course, you'll be proficient in installation and configuring systems to secure applications, networks, and devices; performing threat analysis and responding with appropriate mitigation techniques; participating in risk mitigation activities; and operating with an awareness of applicable policies, laws, and regulations. This course offers enrollment with or without a voucher. The voucher is pre paid access to sit for the certifying exam upon eligibility. After completing the course, you're encouraged to set up your own exam dates and times at a testing center close to you. 

6 Months / 80 Course Hrs
Open enrollment

Offered in Partnership with your Preferred School

George Mason University

Why this school? It's been chosen based on your location or if you've visited this school's website. Change School

Bundle and Save

Include Voucher: Access to certification exam

Self-paced. Study at your own schedule

No Voucher

Self-paced. Study at your own schedule

Contact Us for additional information

CompTIA Security+ Certification Training

Contact Us

Details + Objectives

Course Code: GES330

What You Will Learn
  • Perform network design security, risk calculations, penetration testing, and risk management
  • Implement device security, wireless security, static environment security, secure authentication methods and authorization models
  • Manage attack types, mitigating malware, discovery tools, and security administrative principles
How the course is taught
  • Self-paced, online course
  • 6 months to complete
  • Open enrollment, begin anytime
  • 80 course hours
How you will benefit
  • Prepare to successfully pass the CompTIA™ Security+ Exam SY0-501
  • Develop the necessary skills for a career as an IA technician, security consultant, information security analyst, or forensic analyst
  • Create an initial understanding of or build upon your existing IT knowledge by exploring computer and network security concepts

Outline

Expand All
I. Security Attacks and Cryptography
A.   Section A
      1. Notes: Introduction to Security
      2. Textbook Reading: Chapter 1
      3. Study Aid: Unit 1 Section A: Flash Cards
      4. Unit 1: Section A Videos
      5. Watch Unit 1: Section A Videos Here
      6. PowerPoint: Introduction to Security
      7. Study Aid: Unit 1 Section A: Matching Game
      8. Answer Key: End of Chapter 1 Textbook Questions
      9. Study Aid: Unit 1 Section A: Learning Game
      10. Quiz 1
         
B.   Section B
      1. Notes: Malware and Social Engineering Attacks 
      2. Textbook Reading: Chapter 2 
      3. Study Aid: Unit 1 Section B: Flash Cards 
      4. Unit 1: Section B Videos 
      5. Watch Unit 1: Section B Videos Here 
      6. PowerPoint: Malware and Social Engineering Attacks 
      7. Study Aid: Unit 1 Section B: Matching Game 
      8. Answer Key: End of Chapter 2 Textbook Questions 
      9. Study Aid: Unit 1 Section B: Learning Game 
      10. Quiz 2
      11. Lab: Social Engineering Reconnaissance
         
C.   Section C
      1. Notes: Basic Cryptography
      2. Textbook Reading: Chapter 3
      3. Study Aid: Unit 1 Section C: Flash Cards
      4. Unit 1: Section C Videos
      5. Watch Unit 1: Section C Videos Here
      6. PowerPoint: Basic Cryptography
      7. Study Aid: Unit 1 Section C: Matching Game
      8. Answer Key: End of Chapter 3 Textbook Questions
      9. Study Aid: Unit 1 Section C: Learning Game
      10. Quiz 3
         
D.   Completion
      1. Study Aid: Unit 1: Flash Cards
      2. Study Aid: Unit 1: Matching Game
      3. Study Aid: Unit 1: Learning Game
      4. Exam 1
II. Security and Networking
A.   Section A
      1. Notes: Advanced Cryptography and PKI
      2. Textbook Reading: Chapter 4
      3. Study Aid: Unit 2 Section A: Flash Cards
      4. Unit 2: Section A Videos
      5. Watch Unit 2: Section A Videos Here
      6. PowerPoint: Advanced Cryptography and PKI
      7. Study Aid: Unit 2 Section A: Matching Game
      8. Answer Key: End of Chapter 4 Textbook Questions
      9. Study Aid: Unit 2 Section A: Learning Game
      10. Quiz 4
      11. Lab: Understanding PKI Concepts
         
B.   Section B
      1. Notes: Application and Networking-Based Attacks
      2. Textbook Reading: Chapter 5
      3. Study Aid: Unit 2 Section B: Flash Cards
      4. Unit 2: Section B Videos
      5. Watch Unit 2: Section B Videos Here
      6. PowerPoint: Networking and Server Attacks
      7. Study Aid: Unit 2 Section B: Matching Game
      8. Answer Key: End of Chapter 5 Textbook Questions
      9. Study Aid: Unit 2 Section B: Learning Game
      10. Quiz 5
      11. Lab: Implementing DNSSEC
      12. Lab: Protocols and Services - SNMP
         
C.   Section C
      1. Notes: Network Security Devices, Design, and Technology
      2. Textbook Reading: Chapter 6
      3. Study Aid: Unit 2 Section C: Flash Cards
      4. Unit 2: Section C Videos
      5. Watch Unit 2: Section C Videos Here
      6. PowerPoint: Network Security Devices, Design, and Technology
      7. Study Aid: Unit 2 Section C: Matching Game
      8. Answer Key: End of Chapter 6 Textbook Questions
      9. Study Aid: Unit 2 Section C: Learning Game
      10. Quiz 6
      11. Lab: Firewall Rule Based Management
      12. Lab: Firewalls and Evasion
      13. Lab: NAT and OpenSSH
      14.  Lab: Install and Configure Network Load Balancing
         
D.   Completion
      1. Study Aid: Unit 2: Flash Cards
      2. Study Aid: Unit 2: Matching Game
      3. Study Aid: Unit 2: Learning Game
      4. Exam 2
III. Securing Networks and Clients
A.   Section A
      1. Notes: Administering a Secure Network
      2. Textbook Reading: Chapter 7
      3. Study Aid: Unit 3 Section A: Flash Cards
      4. Unit 3: Section A Videos
      5. Watch Unit 3: Section A Videos Here
      6. PowerPoint: Administering a Secure Network
      7. Study Aid: Unit 3 Section A: Matching Game
      8. Answer Key: End of Chapter 7 Textbook Questions
      9. Study Aid: Unit 3 Section A: Learning Game
      10. Quiz 7
      11. Lab: Application Data - Establish Host Security
      12. Lab: Implementing a Network Policy Server
         
B.   Section B
      1. Notes: Wireless Network Security
      2. Textbook Reading: Chapter 8
      3. Study Aid: Unit 3 Section B: Flash Cards
      4. Unit 3: Section B Videos
      5. Watch Unit 3: Section B Videos Here
      6. PowerPoint: Wireless Network Security
      7. Study Aid: Unit 3 Section B: Matching Game
      8. Answer Key: End of Chapter 8 Textbook Questions
      9. Study Aid: Unit 3 Section B: Learning Game
      10. Quiz 8
      11. Lab: Network Vulnerabilities Part 1
      12. Lab: Network Vulnerabilities Part 2
      13.  Lab: Password Cracking Tools 
         
C.   Section C
      1. Notes: Client and Application Security
      2. Textbook Reading: Chapter 9
      3. Study Aid: Unit 3 Section C: Flash Cards
      4. Unit 3: Section C Videos
      5. Watch Unit 3: Section C Videos Here
      6. PowerPoint: Client and Application Security
      7. Study Aid: Unit 3 Section C: Matching Game
      8. Answer Key: End of Chapter 9 Textbook Questions
      9. Study Aid: Unit 3 Section C: Learning Game
      10. Quiz 9
      11. Lab: Data Encryption
         
D.   Completion
      1. Study Aid: Unit 3: Flash Cards
      2. Study Aid: Unit 3: Matching Game
      3. Study Aid: Unit 3: Learning Game
      4. Exam 3
IV. Mobile Security and Access Management
A.   Section A
      1. Notes: Mobile and Embedded Device Security
      2. Textbook Reading: Chapter 10
      3. Study Aid: Unit 4 Section A: Flash Cards
      4. Unit 4: Section A Videos
      5. Watch Unit 4: Section A Videos Here
      6. PowerPoint: Mobile and Embedded Device Security
      7. Study Aid: Unit 4 Section A: Matching Game
      8. Answer Key: End of Chapter 10 Textbook Questions
      9. Study Aid: Unit 4 Section A: Learning Game
      10. Quiz 10
         
B.   Section B
      1. Notes: Authentication and Account Management
      2. Textbook Reading: Chapter 11
      3. Study Aid: Unit 4 Section B: Flash Cards
      4. Unit 4: Section B Videos
      5. Watch Unit 4: Section B Videos Here
      6. PowerPoint: Authentication and Account Management
      7. Study Aid: Unit 4 Section B: Matching Game
      8. Answer Key: End of Chapter 11 Textbook Questions
      9. Study Aid: Unit 4 Section B: Learning Game
      10. Quiz 11
      11. Lab: Implementing AD Federation Services
      12. Lab: Configuring RADIUS
         
C.   Section C
      1. Notes: Access Management
      2. Textbook Reading: Chapter 12
      3. Study Aid: Unit 4 Section C: Flash Cards
      4. Unit 4: Section C Videos
      5. Watch Unit 4: Section C Videos Here
      6. PowerPoint: Access Management
      7. Study Aid: Unit 4 Section C: Matching Game
      8. Answer Key: End of Chapter 12 Textbook Questions
      9. Study Aid: Unit 4 Section C: Learning Game
      10. Quiz 12
      11. Lab: Implement Patching using WSUS
         
D.   Completion
      1. Study Aid: Unit 4: Flash Cards
      2. Study Aid: Unit 4: Matching Game
      3. Study Aid: Unit 4: Learning Game
      4. Exam 4
V. Business Continuity and Risk Mitigation
A.   Section A
      1. Notes: Vulnerability Assessment and Data Security
      2. Textbook Reading: Chapter 13
      3. Study Aid: Unit 5 Section A: Flash Cards
      4. Unit 5: Section A Videos
      5. Watch Unit 5: Section A Videos Here
      6. PowerPoint: Vulnerability Assessment and Data Security
      7. Study Aid: Unit 5 Section A: Matching Game
      8. Answer Key: End of Chapter 13 Textbook Questions
      9. Study Aid: Unit 5 Section A: Learning Game
      10. Quiz 13
      11. Lab: Scanning and Remediating Vulnerabilities with OpenVAS
         
B.   Section B
      1. Objective 5.6: Explain disaster recovery and continuity of operation concepts.
      2. Notes: Business Continuity
      3. Textbook Reading: Chapter 14
      4. Study Aid: Unit 5 Section B: Flash Cards
      5. Unit 5: Section B Videos
      6. Watch Unit 5: Section B Videos Here
      7. PowerPoint: Business Continuity
      8. Study Aid: Unit 5 Section B: Matching Game
      9. Answer Key: End of Chapter 14 Textbook Questions
      10. Study Aid: Unit 5 Section B: Learning Game
      11. Quiz 14
      12. Lab: Configuring IDS and Honeypots
      13. Lab: Backup and Recovery
      14. Lab: Managing Local Storage and Virtual Hard Disks
      15. Lab: Introduction to Digital Forensics 
         
C.   Section C
      1. Notes: Risk Mitigation
      2. Textbook Reading: Chapter 15
      3. Study Aid: Unit 5 Section C: Flash Cards
      4. Unit 5: Section C Videos
      5. Watch Unit 5: Section C Videos Here
      6. PowerPoint: Risk Mitigation
      7. Study Aid: Unit 5 Section C: Matching Game
      8. Answer Key: End of Chapter 15 Textbook Questions
      9. Study Aid: Unit 5 Section C: Learning Game
      10. Quiz 15
      11. Lab: Managing Certificates
      12. Lab: Implementing Software RAID
         
D.   Completion
      1. Study Aid: Unit 5: Flash Cards
      2. Study Aid: Unit 5: Matching Game
      3. Study Aid: Unit 5: Learning Game
      4. Exam 5
VI. Business Continuity and Risk Mitigation
A.   Course Completion
      1. Textbook Reading: Review
      2. Study Aid: Final Review: Flash Cards
      3. Practice Final Exam Quiz
      4. Study Aid: Final Review: Matching Game
      5. Course Completion Survey Feedback
      6. Study Aid: Final Review: Learning Game
      7. Final Exam
View All Sections

Instructors & Support

David Grimes

David Grimes has more than 10 years of management and leadership experience in the private and non-profit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in Technology Education.

Requirements

Prerequisites / Requirements

Prerequisites:

There are no prerequisites for this course. However, it is recommended to have at least two years of technical networking experience with an emphasis on security. 

Requirements:

Hardware Requirements: 

  • This course can be taken on either a PC or Mac device.
  • Mac users are encouraged to have access to a Windows environment on their device.

Software Requirements: 

  • PC: Windows 7 or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Flash Player. Click here to download the Flash Player.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Email capabilities and access to a personal email account.
  • Software must be installed and fully operational before the course begins.
Instructional Materials

The instructional materials required for this course are included in enrollment and will be available online.

About Certification

comptia

If you want to earn a credential from the world’s leading technology association, look no further than a course certified by CompTIA. With a focus on cloud and mobile technology, information security, and networking technology, CompTIA provides vendor-neutral certifications in a wide variety of skillsets in the IT industry. CompTIA certifications ensure that the IT workforce is well-trained, knowledgeable, and able to perform the real-life tasks needed to be successful. From entry-level to expert, CompTIA offers IT certification options that cover all your bases.

FAQs

Expand All
Can I register for a course if I am an international student?

Yes, ed2go courses are online, so you never have to actually travel to the school. Most schools offer telephone or online registration.

Does this course prepare for a certification?

No.

When can I start the course?

This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.

How long does it take to complete this course?

This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.

What if I don't have enough time to complete my course within the time frame provided?

The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.

What kind of support will I receive?

You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via e-mail) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.

What happens when I complete the course?

Upon successful completion of the course, you will be awarded a Certificate of Completion.

Am I guaranteed a job?

This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.

Can I get financial assistance?

ed2go courses are non-credit, so they do not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more: https://www.ed2go.com/career/financial-assistance

How can I get more information about this course?

If you have questions that are not answered on our website, please feel free to contact us via LIVE CHAT or by calling us at (855) 520-6806. If you are visiting us during non-business hours, please feel free to send us a question using the Contact Us form.

How can I do the applied labs if I don't have the equipment?

The majority of labs can be done using the online lab system. You'll receive a link to schedule the lab for each course section that includes a lab.

Do the CompTIA courses get me prepared for actual certification?

The ed2go CompTIA Online Training courses give you the training for the exam. Once you complete your online course work, you can move forward to take the certification exam. CompTIA certification testing is administered by third-party vendors such as Prometric and Virtual University Enterprises (VUE), two leading providers of technology-based testing. Both offer a network of computer-based testing centers with thousands of locations worldwide. 

Browse All