CompTIA™ Security+ Certification Training (Voucher Included)

The Security+ training course will assist you in preparing for the CompTIA Security+ certification SY0-601 exam through comprehensive material that covers the key objectives and fundamentals to perform core security functions while pursuing an information technology-based career. Successful completion of this course will allow you to assess an organization's security strength while recommending and implementing appropriate security solutions based on those assessments. Learners will be able to...

SHARE
6 Months / 80 Course Hrs
Open Enrollment
Offered in partnership with your preferred school

George Mason University

Why this school?The school has been chosen based on your location or if you've visited this school's website.Change School
Bundle and save
for additional information

CompTIA™ Security+ Certification Training (Voucher Included)

Enroll Now

Course code: GES330

What you will learn

  • Perform network design security, risk calculations, penetration testing, and risk management
  • Implement device security, wireless security, static environment security, secure authentication methods, and authorization models
  • Manage attack types, mitigating malware, discovery tools, and security administrative principles

How you will benefit

  • Prepare to successfully pass the CompTIA? Security+ Exam SY0-601
  • Become compliant to Department of Defense (DoD) Directive 8570
  • Develop the necessary skills for a career as an IA technician, security consultant, information security analyst, or forensic analyst
  • Create an initial understanding of or build upon your existing IT knowledge by exploring computer and network security concepts, trends and techniques

How the course is taught

  • Self-paced, online course
  • 6 Months to complete
  • Open enrollment, begin anytime
  • 80 course hours
  1. Introduction
    1. Welcome
      1. About the Course
      2. About the Certification
  2. Security Foundations
    1. Introduction to Security
      1. Key Terms: Introduction to Security
      2. Flashcards: Introduction to Security
      3. Readings and Resources: Introduction to Security
      4. Slide Deck: Introduction to Security
      5. Self-Assessment: Introduction to Security
      6. Critical Questions: Introduction to Security
      7. Supplemental Projects: Introduction to Security
      8. Complimentary Lecture Prep: Introduction to Security
      9. Access Complimentary Lectures - Security Foundations
      10. Key Terms Practice Quiz: Introduction to Security
      11. Quiz: Part 1
    2. Threat Management
      1. Key Terms: Threat Management
      2. Flashcards: Threat Management
      3. Readings and Resources: Threat Management
      4. Slide Deck: Threat Management
      5. Self-Assessment: Threat Management
      6. Critical Questions: Threat Management
      7. Supplemental Projects: Threat Management
      8. Complimentary Lecture Prep: Threat Management
      9. Access Complimentary Lectures - Threat Management
      10. Key Terms Practice Quiz: Threat Management
      11. Quiz: Part 2
  3. Security and Protection
    1. Threats and Attacks
      1. Key Terms: Threats and Attacks
      2. Flashcards: Threats and Attacks
      3. Readings and Resources: Threats and Attacks
      4. Slide Deck: Threats and Attacks
      5. Self-Assessment: Threats and Attacks
      6. Critical Questions: Threats and Attacks
      7. Supplemental Projects: Threats and Attacks
      8. Complimentary Lecture Prep: Threats and Attacks
      9. Access Complimentary Lectures - Threats and Attacks
      10. Key Terms Practice Quiz: Threats and Attacks
      11. Quiz: Part 3
    2. Endpoint Application Development
      1. Key Terms: Endpoint Application Development
      2. Flashcards: Endpoint Application Development
      3. Readings and Resources: Endpoint Application Development
      4. Slide Deck: Endpoint Application Development
      5. Self-Assessment: Endpoint Application Development
      6. Critical Questions: Endpoint Application Development
      7. Supplemental Projects: Endpoint Application Development
      8. Complimentary Lecture Prep: Endpoint Application Development
      9. Access Complimentary Lectures - Endpoint Application Development
      10. Key Terms Practice Quiz: Endpoint Application Development
      11. Quiz: Part 4
    3. Mobile Device Security
      1. Key Terms: Mobile Device Security
      2. Flashcards: Mobile Device Security
      3. Readings and Resources: Mobile Device Security
      4. Slide Deck: Mobile Device Security
      5. Self-Assessment: Mobile Device Security
      6. Critical Questions: Mobile Device Security
      7. Supplemental Projects: Mobile Device Security
      8. Complimentary Lecture Prep: Mobile Device Security
      9. Access Complimentary Lectures - Mobile Device Security
      10. Key Terms Practice Quiz: Mobile Device Security
      11. Quiz: Part 5
  4. Cryptography
    1. The Basics
      1. Key Terms: The Basics
      2. Flashcards: The Basics
      3. Readings and Resources: The Basics
      4. Slide Deck: The Basics
      5. Self-Assessment: The Basics
      6. Critical Questions: The Basics
      7. Supplemental Projects: The Basics
      8. Complimentary Lecture Prep: The Basics
      9. Access Complimentary Lectures - The Basics
      10. Key Terms Practice Quiz: The Basics
      11. Quiz: Part 6
    2. Part 7: Keys and Protocols
      1. Key Terms: Keys and Protocols
      2. Flashcards: Keys and Protocols
      3. Readings and Resources: Keys and Protocols
      4. Slide Deck: Keys and Protocols
      5. Self-Assessment: Keys and Protocols
      6. Critical Questions: Keys and Protocols
      7. Supplemental Projects: Keys and Protocols
      8. Complimentary Lecture Prep: Keys and Protocols
      9. Access Complimentary Lectures - Keys and Protocols
      10. Key Terms Practice Quiz: Keys and Protocols
      11. Quiz: Part 7
  5. Security on Networks
    1. Networking Threats
      1. Key Terms: Networking Threats
      2. Flashcards: Networking Threats
      3. Readings and Resources: Networking Threats
      4. Slide Deck: Networking Threats
      5. Self-Assessment: Networking Threats
      6. Critical Questions: Networking Threats
      7. Supplemental Projects: Network Threats
      8. Complimentary Lecture Prep: Network Threats
      9. Access Complimentary Lectures = Networking Threats
      10. Key Terms Practice Quiz: Networking Threats
      11. Quiz: Part 8
    2. Network Applications
      1. Key Terms: Network Applications
      2. Flashcards: Networking Applications
      3. Readings and Resources: Network Applications
      4. Slide Deck: Network Applications
      5. Self-Assessment: Network Applications
      6. Critical Questions: Network Applications
      7. Supplemental Projects: Network Applications
      8. Complimentary Lecture Prep: Network Applications
      9. Access Complimentary Lectures - Networking Applications
      10. Key Terms Practice Quiz: Networking Applications
      11. Quiz: Part 9
    3. Cloud and Virtualization
      1. Key Terms: Cloud and Virtualization
      2. Flashcards: Cloud and Virtualization
      3. Readings and Resources: Cloud and Virtualization
      4. Slide Deck: Cloud and Virtualization
      5. Self-Assessment: Cloud and Virtualization
      6. Critical Questions: Cloud and Virtualization
      7. Supplemental Projects: Cloud and Virtualization
      8. Complimentary Lecture Prep: Cloud and Virtualization
      9. Access Complimentary Lectures - Cloud and Virtualization
      10. Key Terms Practice Quiz: Cloud and Virtualization
      11. Quiz: Part 10
    4. Wireless Networks
      1. Key Terms: Wireless Networks
      2. Flashcards: Wireless Networks
      3. Readings and Resources: Wireless Security
      4. Slide Deck: Wireless Networks
      5. Self-Assessment: Wireless Networks
      6. Critical Questions: Wireless Network
      7. Supplemental Projects: Wireless Security
      8. Complimentary Lecture Prep: Wireless Security
      9. Access Complimentary Lectures - Wireless Networking
      10. Key Terms Practice Quiz: Wireless Security
      11. Quiz: Part 11
  6. Enterprise Security
    1. Authentication
      1. Key Terms: Authentication
      2. Flashcards: Authentication
      3. Readings and Resources: Authentication
      4. Slide Deck: Authentication
      5. Self-Assessment: Authentication
      6. Critical Questions: Authentication
      7. Supplemental Projects: Authentication
      8. Complimentary Lecture Prep: Authentication
      9. Access Complimentary Lectures = Authentication
      10. Key Terms Practice Quiz: Authentication
      11. Quiz: Part 12
    2. Incidents
      1. Key Terms: Incidents
      2. Flashcards: Incidents
      3. Readings and Resources: Incidents
      4. Slide Deck: Incidents
      5. Self-Assessment: Incidents
      6. Critical Questions: Incidents
      7. Supplemental Projects: Incidents
      8. Complimentary Lecture Prep: Incidents
      9. Access Complimentary Lectures = Incidents
      10. Key Terms Practice Quiz: Incidents
      11. Quiz: Part 13
    3. Resilience
      1. Key Terms: Resilience
      2. Key Terms: Resilience
      3. Flashcards: Resilience
      4. Slide Deck: Resilience
      5. Self-Assessment: Resilience
      6. Critical Questions: Resilience
      7. Supplemental Projects: Resilience
      8. Complimentary Lecture Prep: Resilience
      9. Access Complimentary Lectures = Resilience
      10. Key Terms Practice Quiz: Resilience
      11. Quiz: Part 14
    4. Risk Management
      1. Key Terms: Risk Management
      2. Flashcards: Risk Management
      3. Readings and Resources: Risk Management
      4. Slide Deck: Risk Management
      5. Self-Assessment: Risk Management
      6. Critical Questions: Risk Management
      7. Supplemental Projects: Risk Management
      8. Complimentary Lecture Prep: Risk Management
      9. Access Complimentary Lectures = Risk Management
      10. Key Terms Practice Quiz: Risk Management
      11. Quiz: Part 15
  7. Conclusion
    1. Final Exam
    2. Completion Confirmation

David Grimes has more than 10 years of management and leadership experience in the private and non-profit sectors. Grimes is passionate about technology and education, having worked as academic dean, student services director, technology coordinator, teacher, consultant, and technology columnist. He holds a Master of Education and a Bachelor of Science from Ohio State University, both in Technology Education.

Prerequisites:

It is recommended to have at least two years of technical networking experience with an emphasis on security.

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac.
  • Mac users are encouraged to have access to a Windows environment on their device.

Software Requirements:

  • PC: Windows 8 or newer.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Instructional Material Requirements:

The instructional materials required for this course are included in enrollment. The following textbook will be shipped to you approximately 7-10 business days after enrollment:

  • CompTIA Security+ Guide to Network Security Fundamentals

Yes, ed2go courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country's regulations prior to enrolling in courses that prepare for certification.

The ed2go CompTIA Online Training courses give you the training for the exam. Once you complete your online course work, you can move forward to take the certification exam. CompTIA certification testing is administered by third-party vendors such as Prometric and Virtual University Enterprises (VUE), two leading providers of technology-based testing. Both offer a network of computer-based testing centers with thousands of locations worldwide.

This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.

This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.

The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.

You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via email) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.

Upon successful completion of the course, you will be awarded a Certificate of Completion.

This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.

This course is non-credit, so it does not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more about financial assistance.

If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us" form.

The majority of labs can be done using the online lab system. You'll receive a link to schedule the lab for each course section that includes a lab.

CompTIA
If you want to earn a credential from the world's leading technology association, look no further than a course certified by CompTIA. With a focus on cloud and mobile technology, information security, and networking technology, CompTIA provides vendor-neutral certifications in a wide variety of skillsets in the IT industry. CompTIA certifications ensure that the IT workforce is well-trained, knowledgeable, and able to perform the real-life tasks needed to be successful. From entry-level to expert, CompTIA offers IT certification options that cover all your bases.