Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Computer Applications Computer Applications Autodesk Microsoft QuickBooks Windows Computer Science Computer Science Programming Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map Resources Resources About ed2go Externship Programs Financial Assistance Find a School Blog MyCAA


(855) 520-6806

See all results for ""

See All Courses

ed2go Test Prep Exam Prep CompTIA Security+ Certification Prep 2
Return to Exam Prep

CompTIA® Security+ Certification Prep 2

The U.S. Department of Labor forecasts that computer security and related computer-support specialties will be among the fastest-growing occupations through 2026. CompTIA's Security+ certificate is widely regarded as the entry-level certificate for this fast-growing field. Getting that certificate requires passing CompTIA's challenging SY0-501 exam.

After completing CompTIA® Security+ Certification Prep 1, this course continues preparation for the CompTIA® Security+ certification and provides key terminology and concepts needed to pass the SY0-501 exam. It's condensed in a format for rapid reading and provides helpful study tools, including games and practice questions to aid your learning. All of the content is geared toward helping you prepare to pass the SY0-501 exam, so you can leave the test center with your Security+ passing score in hand.

Offered in Partnership with your Preferred School


Why this school? It's been chosen based on your location or if you've visited this school's website. Change School

CompTIA Security+ Certification Prep 2

Details + Objectives

Course Code: sc3

What You Will Learn
  • Review the key terminology and concepts needed to ace the SY0-501 exam
  • Discover helpful study tools, including games and practice questions to aid your learning
  • Learn how to protect the crucial data that allows organizations to function on a daily basis
How the course is taught
  • Instructor-led or self-paced online course
  • 6-12 weeks to complete
  • 24 course hours
How you will benefit
  • Acquire knowledge and skills for some of the fastest-growing occupations in the United States
  • Gain confidence that you will leave the test center with your Security+ passing score in hand
  • Open the door to new career opportunities as you develop a solid understanding of encryption and data management


Expand All

You'll start off with a brief review of the Security+ exam and its objectives. Then you'll jump right into learning about access control. Authentication—verifying that a user requesting entry to a system or network is who they claim to be—is the first step in access control, which protects valuable and sensitive resources from unauthorized users and evildoers. In this lesson, you'll explore authentication, as well as its methods, protocols, and devices.

Authorization and Access Control

You previously learned about the authentication step in access control. In this lesson, you're going to continue your exploration of access control with a closer look at authorization and access control. Both of these are extremely important parts of the security policies protecting network resources. You'll take a detailed look at the elements that make up these two processes.

Managing and Securing User Accounts

This lesson will cover the policy and administration of accounts in a secure environment. It will first go over the different types of accounts you might work with, including individual accounts and group accounts. Then you'll learn about password policies, which govern how to make passwords as strong as possible, when passwords should expire, and how to deal with lost or forgotten passwords. Lastly, the lesson will discuss permissions, privileges, and the administrative actions required to minimize vulnerability.

Risk Management

Network administrators are constantly managing risk. But what does that really mean? In this lesson, you'll investigate the elements of the risk management process, including vulnerabilities, threats, risks, and likelihood and the methods used to identify, determine, or calculate each. The ultimate goal of risk management is to reduce risk to a level that's acceptable to the system and organization. In this lesson, you'll discover the methods that are used to figure out what level of risk is acceptable.


If you work in network security, being cryptic is just part of the job! Cryptography, or encryption, is used to prevent unauthorized people from being able to understand or use intercepted data. In this lesson, you'll explore the concepts behind encryption and the primary types of encryption in use. You'll learn about the most common encryption algorithms and ciphers and about the secure transport of encrypted data.

Public Key Infrastructure

With the Internet being so integrated these days, everyone depends on a security and validation system that's easy to take for granted: the public key infrastructure (PKI). The PKI protects you, often unknowingly, from people and companies that may be untrustworthy. In this lesson, you'll learn about the PKI and the security elements that work to protect you, including how and why they work.

Data Security

How can you protect the crucial data that allows your organization to function day in and day out? That's the question that will be addressed in this lesson. You'll start with a look at data loss prevention systems, which manage, identify, and protect data in its various states. You'll get acquainted with data encryption applications and hardware-based encryption devices. And you'll cover some considerations for off-site and remote data storage—what should you keep in mind about data when deciding where to store it and back it up? Maintaining your data's integrity and security is incredibly important, so you won't want to miss this lesson.

Securing Mobile Devices

As businesses go global and standard business hours no longer apply, mobile devices are becoming more common in organizational networks. In this lesson, you'll look at the threats that mobile devices introduce and the security methods for removing these threats. You'll investigate some internal measures for dealing with mobile devices, including what you can to protect data if a device is lost or stolen. You'll also explore what you should include in external security policies for mobile devices, and you'll see how technologies like mobile biometrics, voice encryption, and GPS tracking can help on the mobile security front. Mobile devices are only getting more essential to people's business and personal lives, so securing them is an increasingly important priority.

Virtualization and Cloud Computing

If you're working in IT these days, chances are you're working with virtualization in some form. But what exactly is virtualization? This lesson will build on what you learned about it in the first course. You'll find out how server virtualization works and explore virtualization software and hardware. You'll also learn how virtualization can benefit an organization as well as the particular security concerns that come along with it. You'll finish up with a look at the various types of cloud computing available today.

Application, Host, and Hardware Security

In this lesson, you'll focus on the security of application software. There are a few ways to make applications more secure, including application hardening and careful patch management. You'll see how these work and take a look at some common application attacks. You'll also see how to make sure the in-house software development process is as secure as you can make it. The lesson will even discuss the ways in which a host computer is secured both internally and externally.

Penetration Testing, Vulnerability Scanning, and Data Recovery

Do you know the differences between penetration testing and vulnerability scanning? When is it best to use each? In this lesson, you'll find out the answers to those questions. You'll take a look at the six phases of the penetration testing process and find out how vulnerability management works. Then you'll look at methods of software vulnerability testing, including black box, white box, and gray box testing. The lesson will conclude with a discussion of disaster recovery plans and data backup methods.

Preparing for the Security+ Exam

The CompTIA Security+ exam covers a wide-range of security concepts, topics, terminology, and practices, as well as a bit of hardware and software. In this lesson, which is the last of the two prep courses for the Security+ exam, you'll review the key terms and concepts that will be on the exam. The lesson will revisit what you really must know, and you'll get some final tips for taking a CompTIA exam.

View All Sections

Instructors & Support

Ron Gilster

Ron Gilster is a best-selling author with more than 40 titles in print. He writes on topics including information technology (IT) certifications, real estate, and business. Ron has held a variety of IT-related positions, ranging from computer operator to senior manager. He has worked in consulting, manufacturing, software development, telecommunications, and higher education. He has an MBA and holds A+, Network+, i-Net+, CCNA, and AAGG certifications. He has developed and facilitated numerous courses and has taught in A+, Network+, and CCNA boot camps. His books include CompTIA Cloud+ CV0-001 In Depth,CCNA For Dummies, A+ Certification for Dummies, Server+ For Dummies, Network+ For Dummies, i-Net+ For Dummies, Cisco Networking For Dummies, MCSA For Dummies, CCDA For Dummies, Microsoft Office SharePoint Server 2007: A Beginner's Guide, CEA-CompTIA DHTI+ Digital Home Technology Integrator All-In-One Exam Guide, and PC Hardware: A Beginner's Guide.




You should complete the CompTIA® Security+ Certification Prep 1 course prior to enrolling in this course. In addition, CompTIA recommends that you have A+ and Network+ certifications and two years of on-the-job networking experience, prior to taking this exam. These certifications and the work experience aren't absolutely required, but you should have substantial knowledge of TCP/IP networking and computer and networking hardware to get the most out of this course and understand the concepts and terminology required for the exam.


Hardware Requirements:

  • This course can be taken on either a PC or Mac.

Software Requirements:

  • PC: Windows 8 or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.


  • Email capabilities and access to a personal email account.
Instructional Materials

The instructional materials required for this course are included in enrollment and will be available online.


Expand All
When can I get started?

Instructor-Led: A new session of each course begins each month. Please refer to the session start dates for scheduling.

Self-Paced: You can start this course at any time your schedule permits.

How does it work?

Instructor-Led: Once a session starts, two lessons will be released each week, for the 6 week duration of your course. You will have access to all previously released lessons until the course ends.

Self-Paced: You have three-month access to the course. After enrolling, you can learn and complete the course at your own pace, within the allotted access period.

How long do I have to complete each lesson?

Instructor-Led: The interactive discussion area for each lesson automatically closes 2 weeks after each lesson is released, so you're encouraged to complete each lesson within two weeks of its release.

Self-Paced: There is no time limit to complete each lesson, other than completing all lessons before your three-month access expires.

What if I need an extension?

Instructor-Led: The Final Exam will be released on the same day as the last lesson. Once the Final Exam has been released, you will have 2 weeks plus 10 days to complete the Final and finish any remaining lessons in your course. No further extensions can be provided beyond these 10 days.

Self-Paced: Because this course is self-paced, no extensions will be granted after the start of your enrollment.

Browse All