Scroll to top button

SY0-401 : Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Pearson CompTIA: Security+ SY0-401 (Course & Lab)
ISBN : 978-1-61691-515-5
Gain hands-on expertise in CompTIA Security+ certification exam by Pearson CompTIA: Security+ SY0-401 course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. Pearson CompTIA: Security+ SY0-401 course and performance-based labs cover all the objectives of CompTIA Security+ SY0-401 exam which include the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and much more. CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security.


uCertify uses content from well known publishers, instructors, and subject matter experts. They have a minimum of 15 years of experience in their fields. uCertify brings these textbooks to life. It is full of interactive activities that keep the learner engaged. uCertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. At the end of every lesson, uCertify courses guide the learners on the path they should follow.

uCertify platform supports 50+ different types of interactive activities, connect the idea, or try it yourself lab activities embedded throughout its course. These interactive activities keep learners engaged and make learning fun.

Here's What You Get

Flashcards Quizzes Glossary

Each lesson comes with Flashcards & Quizzes. There is no limit to the number of times learners can attempt these. Flashcards help master the key concepts. Glossary defines the key terms.

Glossary of terms
Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.


Test Prep & Practice Questions

uCertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Here's What You Get

Pre-assessments Questions
Full Length Tests
Post-Assessments Questions


Full Remediation

Each question comes with detailed remediation explaining not only why an answer option is correct but also why the incorrect answer options are incorrect.

Unlimited Practice

Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available.

Learn, Test and Review Mode

Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.


Online labs can be used to supplement training. uCertify labs are an inexpensive & safe way to explore and learn. uCertify labs are versatile - labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training.

Here's What You Get

Performance based lab
Video tutorials

Hands on Activities

CompTIA® Security+ SY0-401 Authorized Cert Guide, Academic Edition

Introduction to Security

  • Joining SpyNet community using Windows Defender

Computer Systems Security

  • Configuring Windows firewall settings
  • Identifying types of viruses
  • Identifying the filename extension
  • Identifying types of malware
  • Understanding classification of viruses
  • Scanning the computer
  • Protecting a computer by blocking communications
  • Downloading and installing the Avast antivirus, and scanning the system
  • Creating a new inbound rule
  • Blocking a connection
  • Identifying measures for spamming protection
  • Identifying Intrusion detection key terms
  • Understanding passive responses of intrusion
  • Identifying sequence in which the IDS instructs the TCP to reset connections
  • Identifying primary areas of security topologies
  • Working with a host-based IDS
  • Identifying causes of compromised security
  • Viewing the Generate Random Password screenshot
  • Enabling BitLocker
  • Viewing the current version of BIOS
  • Understanding security measures for mobile devices

OS Hardening and Virtualization

  • Identifying methods of updating an operating system
  • Downloading the Windows 7 service pack
  • Viewing the update history and details
  • Understanding methods of OS hardening
  • Sharing a folder with a different user on a single computer
  • Understanding primary virtualization topics
  • Editing a virtual hard disk file

Application Security

  • Configuring IE settings to avoid disruption in computer operations
  • Configuring the settings in Content Advisor
  • Customizing group and user access with MMC
  • Deleting the web browsing history
  • Understanding web-based applications
  • Identifying ethical hacking approaches

Network Design Elements

  • Understanding the network infrastructure devices
  • Identifying device for network connectivity
  • Identifying PBX system layers
  • Understanding router protocols
  • Understanding the network devices
  • Identifying TCP/IP architecture layer protocols
  • Understanding application layer protocols
  • Understanding Internet layer protocols
  • Spotting the intranet network
  • Identifying technologies to create less vulnerable networks
  • Identifying cloud computing service models
  • Understanding cloud models
  • Identifying service associated with cloud computing
  • Installing the FTP server under the Web Server role

Networking Protocols and Threats

  • Understanding email protocols
  • Understanding TCP/IP protocols
  • Identifying TCP ports
  • Identifying ports and services
  • Understanding protocols
  • Viewing the ARP table
  • Identifying types of system attack
  • Identifying attacks
  • Preventing IP address spoofing

Network Perimeter Security

  • Identifying types of firewall

Securing Network Media and Devices

  • Enabling LMHOSTS lookup
  • Configuring wireless network settings
  • Creating a network bridge

Physical Security and Authentication Models

  • Understanding WAP security levels
  • Identifying physical security devices
  • Configuring NPS Accounting
  • Configuring NPS network policy
  • Identifying the tunnel
  • Identifying wireless protocols
  • Understanding technologies used to communicate in the 802.11 standard
  • Configuring NPS to provide RADIUS authentication
  • Identifying authentication services
  • Identifying types of authentication services
  • Enabling the network policy server
  • Identifying authentication protocols

Access Control Methods and Models

  • Identifying access control methods
  • Turning off the guest account
  • Configuring account time limits
  • Identifying Information models

Vulnerability and Risk Assessment

  • Identifying risk actions
  • Identifying security factors
  • Understanding measures of risk calculation
  • Identifying key aspects of standard documents
  • Performing penetration testing
  • Understanding quality risk assessment values
  • Understanding code-breaking techniques
  • Performing XArp software installation
  • Identifying vulnerability scanning tasks
  • Determining vulnerability of a network to attacks

Monitoring and Auditing

  • Understanding key areas of reporting
  • Viewing disk configuration
  • Viewing memory usage of programs
  • Viewing the running processes of all the users
  • Viewing details of an event in Windows Server
  • Adding counters
  • Understanding security posture methods
  • Viewing different event details

Encryption and Hashing Concepts

  • Checking the integrity of messages through MAC values
  • Identifying approaches of non-mathematical cryptography
  • Creating a virtual volume
  • Mounting and dismounting an encrypted volume
  • Understanding public cryptographic initiatives
  • Identifying asymmetric algorithms
  • Encrypting and decrypting a message
  • Encrypting and decrypting a message using the RSA algorithm
  • Encrypting a picture
  • Understanding PKCS standards
  • Identifying cryptographic attacks
  • Identifying hashing algorithm
  • Creating a hash rule in Windows Server 2012

PKI and Encryption Protocols

  • Identifying the authority process
  • Examining certificate details
  • Examining the Microsoft Root Authority certificate details
  • Installing a subordinate Certification Authority
  • Managing the certificate server using the mmc tool
  • Adding the Active Directory Certificate Services role
  • Creating and backing up an encryption certificate
  • Backing up an encryption certificate and key
  • Understanding trust models
  • Understanding PKI trust models
  • Identifying tunneling protocols
  • Identifying protocols for secure connections

Redundancy and Disaster Recovery

  • Understanding models for improving system performance

Policies, Procedures, and People

  • Identifying retardants of fire extinguishers
  • Understanding types of application attacks
  • Identifying social engineering attacks
  • Identifying policies
  • Understanding information categories
  • Identifying areas to consider for the business policy

Taking the Real Exam

Appendix A: Glossary

Appendix B: Q&A Flash Cards

Appendix C: Activities and Facts

Exam Information

CompTIA Security+ is a standalone certification from CompTIA with the exam code SY0-401. This certification covers the most important principles for securing a network and managing risk. The CompTIA Network+ certification is recommended before taking the Security+ exam.

Prepare for the following certification

Career Prospects
  • Security Engineer
  • Network Administrator
  • IA Technician or Manager
  • Security Consultant/Specialist
Exam FAQs
What is the exam registration fee?
USD 320

Pricing and taxes may vary from country to country.

What is the format of the exam?
Multiple choice and performance-based
How many questions are asked in the exam?
The exam contains 90 questions.
What is the duration of the exam?
90 minutes
What is the passing score?

(on a scale of 100-900)

What is the exam's retake policy?

SY0-401 examination, CompTIA's retake policy is:

  • CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least fourteen calendar days from the date of your last attempt before you can retake the exam.
  • If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
  • A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
Where can I find more information about this exam?
To know more about the pearson-SY0-401-complete, click here.

Table of Content

Here's What you will Learn

Lesson 1: CompTIA® Security+ SY0-401 Authorized Cert Guide, Academic Edition

Lesson 2: Introduction to Security

  • Security 101
  • Think Like a Hacker
  • Chapter Review Activities

Lesson 3: Computer Systems Security

  • Computer Systems Security Threats
  • Implementing Security Applications
  • Securing Computer Hardware, Peripherals, and Mobile Devices
  • Chapter Review Activities
  • Case Studies for Chapter 2

Lesson 4: OS Hardening and Virtualization

  • Hardening Operating Systems
  • Virtualization Technology
  • Chapter Review Activities
  • Case Studies for Chapter 3

Lesson 5: Application Security

  • Securing the Browser
  • Securing Other Applications
  • Secure Programming
  • Chapter Review Activities
  • Case Studies for Chapter 4

Lesson 6: Network Design Elements

  • Network Design
  • Cloud Security and Server Defense
  • Chapter Review Activities
  • Case Studies for Chapter 5

Lesson 7: Networking Protocols and Threats

  • Ports and Protocols
  • Malicious Attacks
  • Chapter Review Activities
  • Case Studies for Chapter 6

Lesson 8: Network Perimeter Security

  • Firewalls and Network Security
  • NIDS Versus NIPS
  • Chapter Review Activities
  • Case Studies for Chapter 7

Lesson 9: Securing Network Media and Devices

  • Securing Wired Networks and Devices
  • Chapter Review Activities
  • Case Studies for Chapter 8

Lesson 10: Physical Security and Authentication Models

  • Physical Security
  • Authentication Models and Components
  • Chapter Review Activities
  • Case Studies for Chapter 9

Lesson 11: Access Control Methods and Models

  • Access Control Models Defined
  • Rights, Permissions, and Policies
  • Chapter Review Activities
  • Case Studies for Chapter 10

Lesson 12: Vulnerability and Risk Assessment

  • Conducting Risk Assessments
  • Assessing Vulnerability with Security Tools
  • Chapter Review Activities
  • Case Studies for Chapter 11

Lesson 13: Monitoring and Auditing

  • Monitoring Methodologies
  • Using Tools to Monitor Systems and Networks
  • Conducting Audits
  • Chapter Review Activities
  • Case Studies for Chapter 12

Lesson 14: Encryption and Hashing Concepts

  • Cryptography Concepts
  • Encryption Algorithms
  • Hashing Basics
  • Chapter Review Activities
  • Case Studies for Chapter 13

Lesson 15: PKI and Encryption Protocols

  • Public Key Infrastructure
  • Web of Trust
  • Security Protocols
  • Chapter Review Activities
  • Case Studies for Chapter 14

Lesson 16: Redundancy and Disaster Recovery

  • Redundancy Planning
  • Disaster Recovery Planning and Procedures
  • Chapter Review Activities
  • Case Study for Chapter 15

Lesson 17: Policies, Procedures, and People

  • Environmental Controls
  • Social Engineering
  • Legislative and Organizational Policies
  • Chapter Review Activities
  • Case Studies for Chapter 16

Lesson 18: Taking the Real Exam

  • Getting Ready and the Exam Preparation Checklist
  • Tips for Taking the Real Exam
  • Beyond the CompTIA Security+ Certification
  • Case Study for Chapter 17

Lesson 19: Appendix A: Glossary

Lesson 20: Appendix B: Q&A Flash Cards

Lesson 21: Appendix C: Activities and Facts

Copyright © 2002-2017 uCertify / All Rights Reserved.