Course Description
CompTIA Security+ (SY0-601)
Alison
Master the core knowledge areas to prepare for and pass the CompTIA Security+ examination in this free online course. Are you planning to take the CompTIA Security+ 601 certification exams? Do you aspire to work as a security professional? We have designed this course to cover the knowledge areas tested in the CompTIA Security+ certification. You will learn to analyze threats and attacks, review system architecture and design and implement security protocols. Operational procedures, digital forensics and governance are also covered. Sign up today!
Course Code | 4861 |
College Name | Alison |
Course Category | CompTIA, Computers & IT (Information Technology) |
Course Type | Online Learning |
Course Qualification | CPD Certificate |
Course Location | Online Course |
Delivery mode | |
Course Fee | Free |
Course Duration | 6-10 hours |
Entry Requirements | Like all courses on the Alison Free Learning platform this is a free, CPD-accredited course. A Graduate can choose to buy a certificate or diploma upon successful completion of a course, but this is not required or necessary. At Alison we believe that free education, more than anything, has the power to break through boundaries and transform lives. Alison is the world’s largest free online empowerment platform for education and skills training, offering over 5000 CPD accredited courses and a range of impactful career development tools. It is a for-profit social enterprise dedicated to making it possible for anyone, to study anything, anywhere, at any time, for free online, at any subject level. Through our mission, we are a catalyst for positive social change, creating opportunity, prosperity, and equality for everyone. |
Career Path | In This Free Course, You Will Learn How To • Differentiate between a ‘threat’ and an ‘attack’ • Explain what ‘vulnerabilities’ are with regards to a network system • State the importance of authentication and authorization in security design • Discuss physical security controls that can be implemented in an organization • Explain the concepts of encryption and decryption of data • List the tools that can be used to assess security • Discuss how to utilize data sources for an investigation • Describe how digital forensics is carried out on a network system |
Comments, Questions & Reviews