Mike Meyers' CompTIA Security Course for Exam SY0-401 (Course & Labs)

Mike Meyers' CompTIA Security Course for Exam SY0-401 (Course...
ISBN : 978-1-61691-672-5

Gain hands-on expertise in CompTIA Security+ certification exam by Mike Meyers’ CompTIA Security+ Certification Guide course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. Mike Meyers’ CompTIA Security+ Certification Guide course and performance-based labs cover all the objectives of CompTIA Security+ SY0-401 exam which include the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and much more. CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security.


uCertify uses content from well known publishers, instructors, and subject matter experts. They have a minimum of 15 years of experience in their fields. uCertify brings these textbooks to life. It is full of interactive activities that keep the learner engaged. uCertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. At the end of every lesson, uCertify courses guide the learners on the path they should follow.

uCertify platform supports 50+ different types of interactive activities, connect the idea, or try it yourself lab activities embedded throughout its course. These interactive activities keep learners engaged and make learning fun.

Here's What You Get

Exercises Flashcards Glossary

Each lesson comes with Exercises & Flashcards. There is no limit to the number of times learners can attempt these. Exercises come with detailed remediation, which ensures that learners are confident on the topic before proceeding. Flashcards help master the key concepts. Glossary defines the key terms.

Exercise Questions
Glossary of terms

Test Prep & Practice Questions

uCertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam.

Here's What You Get

Pre-assessments Questions
Full Length Tests


Full Remediation

Each question comes with detailed remediation explaining not only why an answer option is correct but also why the incorrect answer options are incorrect.

Unlimited Practice

Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available.

Learn, Test and Review Mode

Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it.


Online labs can be used to supplement training. uCertify labs are an inexpensive & safe way to explore and learn. uCertify labs are versatile - labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training.

Here's What You Get

Performance based lab
Video tutorials

Hands on Activities

Meet the Security+ Exam

The Basics of Security

Understanding Security Governance

Risk Management

  • Identifying risk actions
  • Identifying security factors

IT Risk Assessment

  • Identifying service associated with cloud computing
  • Identifying risk assessment process

Understanding Cryptography

  • Identifying approaches of non-mathematical cryptography
  • Identifying data state

Cryptographic Methods

  • Identifying hashing algorithm
  • Identifying asymmetric algorithms

Application of Cryptographic Methods

  • Creating a virtual volume

Public Key Infrastructure

  • Identifying the authority process
  • Understanding public cryptographic initiatives

Understanding Identification and Authentication

  • Understanding biometric authentication

Understanding Authorization

  • Identifying access control methods

Authentication Methods and Services

  • Identifying authentication protocols
  • Identifying the CHAP process

User Account Management

  • Creating a GPO and linking it with the existing GPO
  • Managing password policies
  • Configuring account-lockout policies

Host Threats

  • Identifying types of malware

Host Hardening

  • Understanding methods of OS hardening
  • Installing the Avast antivirus and scanning the system

Hardening Host Network Services

  • Identifying tunneling protocols

Storage Security

  • Identifying RAID level characteristics
  • Encrypting flash drive with BitLocker

Static Hosts

LAN Review

  • Understanding the network infrastructure devices
  • Identifying device for network connectivity
  • Describing Network Address Translation

Network Threats

  • Identifying man-in-the-middle attack

Network Hardening

  • Identifying attacks

Network Monitoring

  • Understanding key areas of reporting

Host Application Threats

  • Managing add-ons

Web Application Threats

  • Identifying web application attack

Application Hardening

Internet Service Hardening

  • Understanding email protocols
  • Understanding application layer protocols
  • Identifying TCP ports
  • Identifying protocols for secure connections
  • Identifying SSL session between two hosts

Virtualization Security

  • Understanding primary virtualization topics

Wireless Threats

  • Identifying wireless attacks

Wireless Hardening

Environmental Security and Controls

  • Identifying retardants of fire extinguishers

Perimeter and Physical Controls

  • Identifying control function
  • Identifying physical security devices

Third-Party Security

Cloud Security

  • Identifying cloud computing service models
  • Understanding cloud models

Mobile Security

  • Describing application control

Social Engineering

  • Identifying social engineering attacks

Security Training

  • Identifying steps for creating password

Security Assessment

  • Identifying penetration test types

Incident Response

Forensics Procedures

Business Continuity

Disaster Recovery

  • Identifying backup types
  • Identifying various alternate site

Appendix A: Exam Objectives Map

Exam Information

Security+ is a certification from CompTIA granted to those who obtain a passing score on a single entry-level exam. In addition to adding Security+ to your resume as a stand-alone certification, you can use it as an elective in many vendor-certification tracks.

Prepare for the following certification

Career Prospects
  • Security Engineer
  • Network Administrator
  • IA Technician or Manager
  • Security Consultant/Specialist
Exam FAQs
What are the prerequisites for this exam?
While there are no official prerequisites for the SY0-401 exam, both CompTIA and uCertify strongly recommend candidates to have minimum of two years of experience in IT administration with a focus on security.
What is the exam registration fee?
USD 320 

Pricing and taxes may vary from country to country.

Where do I take the exam?
The SY0-401 exam is administered by Pearson VUE at testing centers worldwide. Click here to find a testing center near you.
What is the format of the exam?
  • Multiple choice
  • Performance-based
How many questions are asked in the exam?
The exam contains 90 questions.
What is the duration of the exam?
90 minutes
What is the passing score?

(on a scale of 100-900)

What is the exam's retake policy?

SY0-401 examination, CompTIA's retake policy is:

  • CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least fourteen calendar days from the date of your last attempt before you can retake the exam.
  • If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
  • A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
Where can I find more information about this exam?
To know more about the MHE-SY0-401, click here.

Table of Content

Here's What you will Learn

Lesson 1: Meet the Security+ Exam

  • Why Do We Need Certification Exams?
  • The CompTIA Security+ Examination

Lesson 2: The Basics of Security

  • The Goals of Security
  • Other Elements of Security
  • Security Concepts

Lesson 3: Understanding Security Governance

  • Security Governance

Lesson 4: Risk Management

  • Risk Concepts

Lesson 5: IT Risk Assessment

  • Assessing Risk
  • Risk Assessment Methods

Lesson 6: Understanding Cryptography

  • Cryptography Concepts

Lesson 7: Cryptographic Methods

  • Cryptographic Algorithms

Lesson 8: Application of Cryptographic Methods

  • Application of Cryptographic Methods

Lesson 9: Public Key Infrastructure

  • PKI Concepts

Lesson 10: Understanding Identification and Authentication

  • Authentication Concepts

Lesson 11: Understanding Authorization

  • Authorization Concepts

Lesson 12: Authentication Methods and Services

  • Authentication Concepts

Lesson 13: User Account Management

  • Managing User Accounts

Lesson 14: Host Threats

  • Host-based Threats and Vulnerabilities

Lesson 15: Host Hardening

  • Hardening Hosts

Lesson 16: Hardening Host Network Services

  • Host Network Services

Lesson 17: Storage Security

  • Securing Data Storage

Lesson 18: Static Hosts

  • Static Environments

Lesson 19: LAN Review

  • Securing Networks
  • Secure Network Design

Lesson 20: Network Threats

  • Network Attacks

Lesson 21: Network Hardening

  • Securing and Defending Networks

Lesson 22: Network Monitoring

  • Monitoring Networks

Lesson 23: Host Application Threats

  • Application Attacks

Lesson 24: Web Application Threats

  • Threats from Web Applications

Lesson 25: Application Hardening

  • Securing Applications

Lesson 26: Internet Service Hardening

  • Internet and Application Service Protocols

Lesson 27: Virtualization Security

  • Securing Virtual Environments

Lesson 28: Wireless Threats

  • Wireless Attacks

Lesson 29: Wireless Hardening

  • Wireless Security Protocols
  • Wireless Authentication
  • Wireless Security Considerations
  • Troubleshooting Wireless Security Issues

Lesson 30: Environmental Security and Controls

  • Environmental Controls

Lesson 31: Perimeter and Physical Controls

  • Classifying Controls
  • Physical Controls

Lesson 32: Third-Party Security

  • Third-Party Business Practices

Lesson 33: Cloud Security

  • Cloud Computing

Lesson 34: Mobile Security

  • Mobile Devices in the Business World

Lesson 35: Social Engineering

  • Social Engineering Attacks

Lesson 36: Security Training

  • Security Awareness and Training

Lesson 37: Security Assessment

  • Security Assessment Tools and Techniques

Lesson 38: Incident Response

  • Incident Response Concepts
  • Incident Response Procedures

Lesson 39: Forensics Procedures

  • Forensic Concepts
  • Data Volatility
  • Critical Forensic Practices
  • Capturing Evidence
  • Analyzing Evidence

Lesson 40: Business Continuity

  • Risk Management Best Practices
  • Business Continuity Concepts
  • Business Continuity Planning
  • Exercises and Testing

Lesson 41: Disaster Recovery

  • Disaster Recovery Concepts

Lesson 42: Appendix A: Exam Objectives Map

  • Exam SY0-401

uCertify provides courses, simulator, labs, test prep kits for IT certifications including Microsoft, Oracle, Cisco, CompTIA, CIW, PMI, ISC2, Linux, Zend, Google, IC3 , Adobe and many more.

© 2002-2017 uCertify. All Rights Reserved