Scroll to top button

SY0-401 : Pearson CompTIA: Security+ SY0-401 (Course & Lab)

pearson-SY0-401-complete
Pearson CompTIA: Security+ SY0-401 (Course & Lab)
ISBN : 978-1-61691-515-5
Gain hands-on expertise in CompTIA Security+ certification exam by Pearson CompTIA: Security+ SY0-401 course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. Pearson CompTIA: Security+ SY0-401 course and performance-based labs cover all the objectives of CompTIA Security+ SY0-401 exam which include the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and much more. CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security.

Here's what you will get

CompTIA Security+ is a standalone certification from CompTIA with the exam code SY0-401. This certification covers the most important principles for securing a network and managing risk. The CompTIA Network+ certification is recommended before taking the Security+ exam.

Lessons
21+
Quizzes
100+
Flashcards
276+
Glossary of terms
176+
Pre-assessment Questions
105+
Full Length Tests
2+
Post-Assessment Questions
100+
Performance based lab
128+
Video tutorials
18+
Minutes
25+

Videos and How To..

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Videos
29+
Hours
04:45+
Exam FAQs
What is the exam registration fee?
USD 320
 

Pricing and taxes may vary from country to country.

What is the format of the exam? Multiple choice and performance-based
How many questions are asked in the exam? The exam contains 90 questions.
What is the duration of the exam? 90 minutes
What is the passing score? 750

(on a scale of 100-900)

What is the exam's retake policy?

SY0-401 examination, CompTIA's retake policy is:

  • CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least fourteen calendar days from the date of your last attempt before you can retake the exam.
  • If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
  • A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
Where can I find more information about this exam? To know more about the pearson-SY0-401-complete, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Security Engineer
  • Network Administrator
  • IA Technician or Manager
  • Security Consultant/Specialist

Here's what you will learn

  • Security 101
  • Think Like a Hacker
  • Chapter Review Activities
  • Computer Systems Security Threats
  • Implementing Security Applications
  • Securing Computer Hardware, Peripherals, and Mobile Devices
  • Chapter Review Activities
  • Case Studies for Chapter 2
  • Hardening Operating Systems
  • Virtualization Technology
  • Chapter Review Activities
  • Case Studies for Chapter 3
  • Securing the Browser
  • Securing Other Applications
  • Secure Programming
  • Chapter Review Activities
  • Case Studies for Chapter 4
  • Network Design
  • Cloud Security and Server Defense
  • Chapter Review Activities
  • Case Studies for Chapter 5
  • Ports and Protocols
  • Malicious Attacks
  • Chapter Review Activities
  • Case Studies for Chapter 6
  • Firewalls and Network Security
  • NIDS Versus NIPS
  • Chapter Review Activities
  • Case Studies for Chapter 7
  • Securing Wired Networks and Devices
  • Chapter Review Activities
  • Case Studies for Chapter 8
  • Physical Security
  • Authentication Models and Components
  • Chapter Review Activities
  • Case Studies for Chapter 9
  • Access Control Models Defined
  • Rights, Permissions, and Policies
  • Chapter Review Activities
  • Case Studies for Chapter 10
  • Conducting Risk Assessments
  • Assessing Vulnerability with Security Tools
  • Chapter Review Activities
  • Case Studies for Chapter 11
  • Monitoring Methodologies
  • Using Tools to Monitor Systems and Networks
  • Conducting Audits
  • Chapter Review Activities
  • Case Studies for Chapter 12
  • Cryptography Concepts
  • Encryption Algorithms
  • Hashing Basics
  • Chapter Review Activities
  • Case Studies for Chapter 13
  • Public Key Infrastructure
  • Web of Trust
  • Security Protocols
  • Chapter Review Activities
  • Case Studies for Chapter 14
  • Redundancy Planning
  • Disaster Recovery Planning and Procedures
  • Chapter Review Activities
  • Case Study for Chapter 15
  • Environmental Controls
  • Social Engineering
  • Legislative and Organizational Policies
  • Chapter Review Activities
  • Case Studies for Chapter 16
  • Getting Ready and the Exam Preparation Checklist
  • Tips for Taking the Real Exam
  • Beyond the CompTIA Security+ Certification
  • Case Study for Chapter 17

Hands on Activities (Labs)

  • Joining SpyNet community using Windows Defender
  • Configuring Windows firewall settings
  • Identifying types of viruses
  • Identifying the filename extension
  • Identifying types of malware
  • Understanding classification of viruses
  • Scanning the computer
  • Protecting a computer by blocking communications
  • Downloading and installing the Avast antivirus, and scanning the system
  • Creating a new inbound rule
  • Blocking a connection
  • Identifying measures for spamming protection
  • Identifying Intrusion detection key terms
  • Understanding passive responses of intrusion
  • Identifying sequence in which the IDS instructs the TCP to reset connections
  • Identifying primary areas of security topologies
  • Working with a host-based IDS
  • Identifying causes of compromised security
  • Viewing the Generate Random Password screenshot
  • Enabling BitLocker
  • Viewing the current version of BIOS
  • Understanding security measures for mobile devices
  • Identifying methods of updating an operating system
  • Downloading the Windows 7 service pack
  • Viewing the update history and details
  • Understanding methods of OS hardening
  • Sharing a folder with a different user on a single computer
  • Understanding primary virtualization topics
  • Editing a virtual hard disk file
  • Configuring IE settings to avoid disruption in computer operations
  • Configuring the settings in Content Advisor
  • Customizing group and user access with MMC
  • Deleting the web browsing history
  • Understanding web-based applications
  • Identifying ethical hacking approaches
  • Understanding types of application attacks
  • Understanding the network infrastructure devices
  • Identifying device for network connectivity
  • Identifying PBX system layers
  • Understanding router protocols
  • Understanding the network devices
  • Identifying TCP/IP architecture layer protocols
  • Understanding application layer protocols
  • Understanding Internet layer protocols
  • Spotting the intranet network
  • Identifying technologies to create less vulnerable networks
  • Identifying cloud computing service models
  • Understanding cloud models
  • Identifying service associated with cloud computing
  • Installing the FTP server under the Web Server role
  • Understanding email protocols
  • Understanding TCP/IP protocols
  • Identifying TCP ports
  • Identifying ports and services
  • Understanding protocols
  • Viewing the ARP table
  • Identifying types of system attack
  • Identifying attacks
  • Preventing IP address spoofing
  • Identifying types of firewall
  • Enabling LMHOSTS lookup
  • Configuring wireless network settings
  • Creating a network bridge
  • Understanding WAP security levels
  • Identifying physical security devices
  • Configuring NPS Accounting
  • Configuring NPS network policy
  • Identifying the tunnel
  • Identifying wireless protocols
  • Understanding technologies used to communicate in the 802.11 standard
  • Configuring NPS to provide RADIUS authentication
  • Identifying authentication services
  • Identifying types of authentication services
  • Enabling the network policy server
  • Identifying authentication protocols
  • Identifying access control methods
  • Turning off the guest account
  • Configuring account time limits
  • Identifying Information models
  • Identifying risk actions
  • Identifying security factors
  • Understanding measures of risk calculation
  • Identifying key aspects of standard documents
  • Performing penetration testing
  • Understanding quantitative risk assessment values
  • Understanding code-breaking techniques
  • Performing XArp software installation
  • Identifying vulnerability scanning tasks
  • Determining vulnerability of a network to attacks
  • Understanding key areas of reporting
  • Viewing disk configuration
  • Viewing memory usage of programs
  • Viewing the running processes of all the users
  • Viewing details of an event in Windows Server
  • Adding counters
  • Understanding security posture methods
  • Viewing different event details
  • Checking the integrity of messages through MAC values
  • Identifying approaches of non-mathematical cryptography
  • Creating a virtual volume
  • Mounting and dismounting an encrypted volume
  • Understanding public cryptographic initiatives
  • Identifying asymmetric algorithms
  • Encrypting and decrypting a message
  • Encrypting and decrypting a message using the RSA algorithm
  • Encrypting a picture
  • Understanding PKCS standards
  • Identifying cryptographic attacks
  • Identifying hashing algorithm
  • Creating a hash rule in Windows Server 2012
  • Identifying the authority process
  • Examining certificate details
  • Examining the Microsoft Root Authority certificate details
  • Installing a subordinate Certification Authority
  • Managing the certificate server using the mmc tool
  • Adding the Active Directory Certificate Services role
  • Creating and backing up an encryption certificate
  • Backing up an encryption certificate and key
  • Understanding trust models
  • Understanding PKI trust models
  • Identifying tunneling protocols
  • Identifying protocols for secure connections
  • Understanding models for improving system performance
  • Identifying retardants of fire extinguishers
  • Identifying social engineering attacks
  • Identifying policies
  • Understanding information categories
  • Identifying areas to consider for the business policy

Copyright © 2002-2017 uCertify / All Rights Reserved.