Online Training Course

CompTIA Security+

CyberVista’s Security+ Training Course enables practitioners to participate, learn, and partner with other professionals as they prepare to earn the highly in-demand Security+ certification.

Comptia_sec+444x110

Who should earn the Security+?

The Security+ is an entry-level to intermediate certification designed for experienced practitioners, managers, and executives. It covers a wide range of cybersecurity topics across six domains.  The Security+ certification also meets the U.S. Department of Defense Directive 8570/8140.


Systems Administrator
Network Administrator
Junior IT Auditor
Junior Penetration Tester
Security Analyst
Threat Analyst

Course Overview

As an Authorized Partner to CompTIA,  CyberVista’s Security+ Training Course enables practitioners to participate, learn, and partner with other professionals as they prepare to earn the Security+ certification. Our courses train for the most up-to-date version of the Security+ exam referred to as the SY0-501 or “501” exam.

We offer Security+ training in two delivery varieties based on the needs of organizations. The comprehensive Live Online Security+ Course is taught online over eight consecutive weeks with a live instruction once per week to complement the all of the tools and materials in the online portal. This option is available for teams of 20 or more participants. For all other needs,  the Video On-Demand Security+ Course allows participating practitioners to move at their own pace and is available down to a single participant.

Readiness guarantee – CyberVista offers a course readiness or retake guarantee on all Certify courses. If any individual taking this training course does not pass the exam on the first try or does not feel prepared following the completion of the course can retake the course at no additional charge for up to one full year.
This course includes:
  • 60+ 5-15 minute on-demand training videos
  • 350+ practice question bank
  • 100 question diagnostic exam
  • 100 question final exam
  • 350+ digital flashcards
  • Performance Tracker
  • Summary Notes
  • Summary Videos
  • Lesson Book
  • CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide

Course Outline

    • 1.1 Malware Types
    • 1.2. Types of Attacks
      • 1.2.A Types of Attacks Part 1
      • 1.2.B Types of Attacks Part 2
      • 1.2.C Types of Attacks Part 3
    • 1.3 Threat Actors Types and Attributes
    • 1.4 Penetration Testing Concepts
    • 1.5 Vulnerability Scanning Concepts
    • 1.6 Types of Vulnerabilities
    • 2.1 Network Components
      • 2.1.A Network Components Part 1
      • 2.1.B Network Components Part 2
      • 2.1.C Network Components Part 3
    • 2.2 Software Tools To Assess Security Posture
    • 2.3 Common Security Issues
    • 2.4 Security Technologies
    • 2.5 Secure Mobile Device Deployment
    • 2.6 Security Protocols and Use Cases
    • 3.1 Frameworks, Guides, and Layered Security
    • 3.2 Secure Network Architecture Concepts
    • 3.3 Secure Systems Design
    • 3.4 Secure Staging Deployment
    • 3.5 Embedded Systems
    • 3.6 Secure Application Development and Deployment
    • 3.7 Cloud and Virtualization Concepts
    • 3.8 Resiliency and Automation Strategies
    • 3.9 Physical Security Controls
    • 4.1 Identity and Access Management Concepts
    • 4.2 Identity and Access Services
    • 4.3 Identity and Access Management Controls
    • 4.4 Common Account Management Practices
    • 4.1 Identity and Access Management Concepts
    • 4.2 Identity and Access Services
    • 4.3 Identity and Access Management Controls
    • 4.4 Common Account Management Practices
    • 5.1 Policies, Plans, and Procedures
    • 5.2 Business Impact Analysis Concepts
    • 5.3 Risk Management Processes and Concepts
    • 5.4 Follow Incident Response Procedures
    • 5.5 Basic Concepts of Forensics
    • 5.6 Disaster Recovery and COOP
    • 5.7 Types of Controls
    • 5.8 Data Security and Privacy Practices
    • 6.1 Basic Concepts of Cryptography
    • 6.2 Cryptographic Algorithms and Characteristics
      • 6.2.A Cryptographic Algorithms and Characteristics Part 1
      • 6.2.B Cryptographic Algorithms and Characteristics Part 2
    • 6.3 Wireless Security Settings
    • 6.4 Public Key Infrastructure
      • 6.4.A Public Key Infrastructure Part 1
      • 6.4.B Public Key Infrastructure Part 2

Why CyberVista?

When it comes to certification training, we know that you and your organization have several options to choose from. This is what separates CyberVista from the pack. 

Data Driven

Live reporting provides an objective view of performance and progress.

Affordable

Total costs average 50% less per person compared to traditional providers.

Effective

Drive real results with high-quality training and practical applications.

Tailored

Designed to adapt to the organization and the individual employee.

Certify Your Workforce

Get your team certified more effectively than ever before. Request more information on training options for your entire cybersecurity and IT teams.