Complete Course Syllabus
0.0 - Introduction
0.1 - About CompTIA Security Plus Certification (SY0-701)
Domain 1 - General Security Concepts
1.1 - Compare and contrast various types of security controls.
1.2 - Summarize fundamental security concepts
1.3 - Explain the importance of change management processes and the impact to security.
1.4 - Explain the importance of using appropriate cryptographic solutions.
Domain 2 - Threats, Vulnerabilities, and Mitigations
2.1 - Compare and contrast common threat actors and motivations.
2.2 - Explain common threat vectors and attack surfaces
2.3 - Explain various types of vulnerabilities
2.4 - Given a scenario, analyze indicators of malicious activity.
2.5 - Explain the purpose of mitigation techniques used to secure the enterprise.
Domain 3 - Security Architecture
3.1 - Compare and contrast security implications of different architecture models.
3.2 - Given a scenario, apply security principles to secure enterprise infrastructure.
3.3 - Compare and contrast concepts and strategies to protect data.
3.4 - Explain the importance of resilience and recovery in security architecture.
Domain 4 - Security Operations
4.9 - Given a scenario, use data sources to support an investigation.
4.1 - Given a scenario, apply common security techniques to computing resources.
4.2 - Explain the security implications of proper hardware, software, and data asset management.
4.3 - Explain various activities associated with vulnerability management.
4.4 - Explain security alerting and monitoring concepts and tools.
4.5 - Given a scenario, modify enterprise capabilities to enhance security.
4.6 - Given a scenario, implement and maintain identity and access management.
4.7 - Explain the importance of automation and orchestration related to secure operations.
4.8 - Explain appropriate incident response activities.
Domain 5 - Security Program Management and Oversight
5.1 - Summarize elements of effective security governance.
5.2 - Explain elements of the risk management process.
5.3 - Explain the processes associated with third-party risk assessment and management.
5.4 - Summarize elements of effective security compliance.
5.5 - Explain types and purposes of audits and assessments.
5.6 - Given a scenario, implement security awareness practices.
What Students Are Saying
"The curriculum is perfectly designed for success."
"The most practical and useful course I've ever taken."
"The quality of instruction is world-class."
⚡ LIMITED TIME: 75% OFF
One Subscription = ALL Courses!
₹1,999/year
Not just this course - you get all 231+ Courses
- ✓ All 231+ courses included
- ✓ Lifetime updates & new courses
- ✓ Expert support anytime
- ✓ Instant access to everything
One payment • All courses forever • No limits
Why Choose Hackz Training?
- ✓ Lifetime access to all course materials and future updates
- ✓ Expert instructor support and mentorship
- ✓ Industry-recognized certification
- ✓ Comprehensive projects to build your portfolio
- ✓ Career guidance and job placement assistance
- ✓ Access to exclusive student community