Scroll to top button

Pearson CompTIA Security+ SY0-501

ISBN : 9781616919948

Prepare for the CompTIA Security+ SY0-501 certification exam with the CompTIA Security+ SY0-501 course and lab. The lab simulates real-world, hardware, software, and command-line interface environments and can be mapped to any text-book, course or training. CompTIA Security+ course and lab provide skills and knowledge to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security. This certification covers the most important principles for securing a network and managing risk.

CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals that include the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and much more. The CompTIA Network+ certification is recommended before taking the Security+ exam.

Lessons
Lessons
19+
Quizzes
429+
Flashcards
330+
Glossary of terms
330+
TestPrep
Pre Assessment Questions
80+
Post Assessment Questions
80+
Lab
Performance lab
Learn the real world skills using LiveLab.
57+
Video tutorials
Get interactive learning videos with transcripts and voice-over.
57+
Hours
Signify the duration of video tutorials in labs.
06:22+

Videos and How To

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
42+
Hours
05:41+
Exam related FAQs
What are the prerequisites for this exam? CompTIA Network+ and two years of experience in IT administration with a focus on security.
What is the exam registration fee? USD 330
Where do I take the exam? Pearson VUE
What is the format of the exam? The exam consists of multiple choice and performance-based questions.
How many questions are asked in the exam? The exam contains 90 questions.
What is the duration of the exam? 90 minutes
What is the passing score? 750

(on a scale of 0-900)

What is the exam's retake policy?

In the event that you fail your first attempt at passing the SY0-501 examination, CompTIA's retake policy is:

  • CompTIA does not require a waiting period between the first and second attempt to pass such examination. However, if you need a third or subsequent attempt to pass the examination, you shall be required to wait for a period of at least fourteen calendar days from the date of your last attempt before you can retake the exam.
  • If a candidate has passed an exam, he/she cannot take it again without prior consent from CompTIA.
  • A test result found to be in violation of the retake policy will not be processed, which will result in no credit awarded for the test taken. Repeat violators will be banned from participation in the CompTIA Certification Program.
  • Candidates must pay the exam price each time they attempt the exam. CompTIA does not offer free re-tests or discounts on retakes.
What is the validity of the certification? CompTIA Security+ certification expires after three years from the date of issue, after which the certification holder will need to renew their certification via CompTIA's Continuing Education Program.
Where can I find more information about this exam? To know more about the Pearson-SY0-501-complete, click here.
Which certification covers this exam?
What are the career opportunities after passing this exam?
  • Security Architect
  • Security Engineer
  • Security Administrator
  • Systems Administrator
  • Network Administrator
  • Security Consultant/Specialist
  • Who Should Read This Book?
  • CompTIA Security+ Exam Topics
  • Security 101
  • Think Like a Hacker
  • Threat Actor Types and Attributes
  • Review Key Topics
  • Malicious Software Types
  • Delivery of Malware
  • Preventing and Troubleshooting Malware
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Implementing Security Applications
  • Securing Computer Hardware and Peripherals
  • Securing Mobile Devices
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Hardening Operating Systems
  • Virtualization Technology
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Securing the Browser
  • Securing Other Applications
  • Secure Programming
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Network Design
  • Cloud Security and Server Defense
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Ports and Protocols
  • Malicious Attacks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Firewalls and Network Security
  • NIDS Versus NIPS
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Securing Wired Networks and Devices
  • Securing Wireless Networks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Physical Security
  • Authentication Models and Components
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Access Control Models Defined
  • Rights, Permissions, and Policies
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Conducting Risk Assessments
  • Assessing Vulnerability with Security Tools
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Monitoring Methodologies
  • Using Tools to Monitor Systems and Networks
  • Conducting Audits
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Cryptography Concepts
  • Encryption Algorithms
  • Hashing Basics
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Public Key Infrastructure
  • Security Protocols
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Redundancy Planning
  • Disaster Recovery Planning and Procedures
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Social Engineering
  • User Education
  • Facilities Security
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios
  • Legislative and Organizational Policies
  • Incident Response Procedures
  • IT Security Frameworks
  • Lesson Summary
  • Review Key Topics
  • Complete the Real-World Scenarios

Hands on Activities (Labs)

  • Using Windows Defender
  • Managing Windows Firewall
  • Encrypting Files with EFS
  • Configuring Windows Firewall
  • Using BitLocker in Windows 10
  • Configuring Group Policy Settings
  • Managing Services with Group Policy
  • Configuring Audit Group Policy
  • Creating a Virtual Machine
  • Importing a Virtual Machine
  • Configuring Secondary Virtual Hard Disk
  • Installing the Web Server IIS Server Role
  • Installing and Configuring NLB Nodes
  • Configuring NLB Operations
  • Creating a Virtual Switch
  • Configuring a Perimeter Firewall
  • Viewing Results of Live Hosts
  • Verifying Network Services
  • Enabling Intrusion Prevention and Detection
  • Spoofing MAC Address with SMAC
  • Clearing the DNS Cache
  • Using Ettercap for ARP Spoofing
  • Detecting Phishing Site Using Netcraft
  • Preventing Zone Transfers
  • Simulating a DoS Attack
  • Implementing Data Execution Prevention
  • Securing Default Accounts
  • Resetting a Password
  • Creating a Fine-Grained Password Policy
  • Configuring Remote Access VPN
  • Configuring a Static TCP/IP Address
  • Configuring Kerberos Policy Settings
  • Installing Remote Access Services
  • Assigning Permissions to Folders
  • Restricting Local Accounts
  • Creating a User Account and Configuring Restrictions
  • Configuring Account Policies
  • Managing a User Account
  • Running a Security Scan to Identify Vulnerabilities
  • Remediating Vulnerabilities on the Local Workstation
  • Remediating Vulnerabilities on the Network  
  • Using Network Monitoring
  • Observing Traffic Patterns Using Wireshark
  • Analyzing Protocols with Wireshark
  • Working with Task Manager
  • Viewing Running Processes on a Linux-based Machine
  • Enabling Debug Logging on the DNS Server
  • Enabling Audit Policies
  • Enabling Object Access Auditing
  • Configuring SSL Connections
  • Configuring the SSL Port Setting
  • Using OpenSSL to Create a Public/Private Key Pair
  • Adding a Certificate to MMC
  • Installing Windows Server Backup
  • Creating a Backup Schedule
  • Creating a Backup Once

Customer Testimonials

Eugene McBride
best
Get the best learning experience with more than 400+ courses of uCertify. The blended learning module is very helpful. And the quality of the course is awesome.
Chidiebere Eboh
excellent
I must say I’m extremely impressed with the course structure and the methods implemented to ensure adequate learning; not only from the notes but the online labs and the quiz.
Christian Castro
excellent
The uCertify definitely simplifies and streamlines the art of online training. After perusing one of their courses "CompTIA Security+ SY0-501", I knew within the first 5 minutes their curriculum and front-end platform was designed with the student in mind. The platform is simple and appealing, yet has all the necessary tools for the student to stay engaged and on track. I fully endorse uCertify and look forward to using their products, teaching lessons and services.
×