CompTIA Security+ Certification – SY0-501 Exam Training

Course Overview

This CompTIA Security+ training course will help you gain skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, and laws.

What you'll learn

100% Money Back Guarantee
No questions asked refund*

At It Nuggets Online, we value the trust of our patrons immensely. But, if you feel that a course does not meet your expectations, we offer a 7-day money-back guarantee. Just send us a refund request via email within 7 days of purchase and we will refund 100% of your payment, no questions asked!
  • Learn Research
  • Collect Usefull Data
  • Requirement Analysis Phase
  • Market competent Skills
  • Problem Solving Skills
  • Model Implementation Skills
  • Building or Developing Phase
  • Presenting and Testing Skills

    Course Includes:

  • 7+ hours on-demand video
  • 7+ articles
  • 20+ downloadable resources
  • Full access
  • Access on mobile and TV
  • Certificate of completion


Whether you work for a small company, a large corporate or from home, a computer will be one of the first pieces of office equipment you’re going to need. And they comes in different forms, such as laptops and desktops. Computer skills are a valuable addition to any employee’s personal portfolio. Upskilling and polishing your computer literacy can greatly increase your desirability to employers. This is the perfect opportunity to take on roles you might not have previously considered. As an employer, motivating your employees to become computer literate will increase productivity and also stave off problems that can cost time and significant amounts of money. Many companies have started to depend upon computerised technology to get work done. Which is why computer skills have become increasingly important. Having the necessary and basic computer course knowledge will put you a step ahead of others. You’ll have a big advantage over those who aren’t computer literate. It’s for this specific reason that many schools and tertiary institutions encourage students to complete basic computer studies. Here are three reasons why being computer literate is beneficial in the workplace.

Helping professionals thrive, not just survive

Learning — Blended to Perfection

Learning — Blended to Perfection

Learning — Blended to Perfection

Course Inquiry


Annual Salary

Hiring Companies

Training Options


Enroll Now
  • Lifetime access to high-quality self-paced eLearning content curated by industry experts
  • 4 hands-on projects to perfect the skills learnt
  • 2 simulation test papers for self-assessment
  • 24x7 learner assistance and support


Enroll Now
  • Everything in Self-Paced Learning, plus
  • 90 days of flexible access to online classes
  • Live, online classroom training by top instructors and practitioners
  • 24x7 learner assistance and support


  • Blended learning delivery model (self-paced e-learning and/or instructor-led options)
  • Flexible pricing options
  • Enterprise grade Learning Management System (LMS)
  • Enterprise dashboards for individuals and teams
  • 24x7 learner assistance and support
  • 24x7 learner assistance and support

Course Curriculum


The CompTIA Security+ course is ideal for professionals who are working in the roles of system administrators, network administrators, security administrators, and IT auditors.


There are no specific prerequisites to take up this certification but it is recommended that individuals take the Network+ certification before taking the Security+ training and certification exam.

Course Content

Lesson 01 Risk Management
01 Introduction
02 The CIA of Security
03 Threat Actors
04 What is Risk
05 Managing Risk
06 Using Guides for Risk Assessment
07 Security Controls
08 Interesting Security Controls
09 Defense in Depth
10 IT Security Governance
11 Security Policies
12 Frameworks
13 Quantitative Risk Calculations
14 Business Impact Analysis
15 Organizing Data
16 Security Training
17 Third Party Agreements
Lesson 02 Cryptography
01 Cryptography Basics
02 Cryptographic Methods
03 Symmetric Cryptosystems
04 Symmetric Block Modes
05 RSA Cryptosystems
06 Diffie-Hellman
08 Hashing
10 Steganography
11 Certificates and Trust
12 Public Key Infrastructure
13 Cryptographic Attacks
Lesson 03 Identity and Access Management
01 Identification
02 Authorization Concepts
03 Access Control List
04 Password Security
05 Linux File Permissions
06 Windows File Permissions
07 User Account Management
08 AAA
09 Authentication Methods
10 Single Sign On
Lesson 04 Tools of the Trade
01 OS Utilities
02 OS Utilities ipconfig
03 Network Scanners
04 Protocol Analyzers
06 Logs
Lesson 05 Securing Individual Systems
01 Denial of Service
02 Host Threats
03 Man in the Middle
04 System Resiliency
06 NAS and SAN
07 Physical Hardening
08 RFI, EMI and ESD
09 Host Hardening
10 Data and System Security
11 Disk Encryption
12 Hardware Firmware Security
13 Secure OS Types
14 Securing Peripherals
15 Malware
16 Analyzing Output
17 IDS and IPS
18 Automation Strategies
19 Data Destruction
Lesson 06 The Basic LAN
01 LAN Review
02 Network Topologies Review
03 Network Zone Review
04 Network Access Controls
05 The Network Firewall
06 Proxy Servers
07 Honeypots
08 Virtual Private Networks
09 IPSec
Lesson 07 Beyond the Basic LAN
01 Wireless Review
02 Living in Open Networks
03 Vulnerabilities with Wireless Access Points
04 Cracking WEP
05 Cracking WPA
06 Cracking WPS
07 Wireless Hardening
08 Wireless Access Points
09 Virtualization Basics
10 Virtual Security
11 Containers
12 IaaS
13 PaaS
14 SaaS
15 Deployment Models
16 Static Hosts
17 Mobile Connectivity
18 Deploying Mobile Devices
19 Mobile Enforcement
20 Mobile Device Management
21 Physical Controls
23 Fire Suppression
Lesson 08 Secure Protocols
01 Secure Applications and Protocols
02 Network Models
03 Know Your Protocols TCP IP
04 Know Your Protocols Applications
05 Transport Layer Security
06 Internet Service Hardening
07 Protecting Your Servers
08 Secure Code Development
09 Secure Deployment Concepts
10 Code Quality and Testing
Lesson 09 Testing Your Infrastructure
01 Vulnerability Scanning Tools
02 Vulnerability Scanning Assessment
03 Social Engineering Principles
04 Social Engineering Attacks
05 Attacking Web Sites
06 Attacking Applications
07 Exploiting a Target
08 Vulnerability Impact
Lesson 10 Dealing with Incidents
01 Incident Response
02 Digital Forensics
03 Contingency Planning
04 Backups

Course Training Session FAQ'S

IT Nuggets Online is a progressive IT company engaged in creating eye-grabbing computer-based content in English, for the benefit of students. we offer learning process that blends texts, visuals, animation, video clips, and sound to give a complete learning experience to students.
Everyone Take an Online Classes in Your Flexible Times.
Yes, You Can Enroll More Than Courses.
After Meeting the Certification Criteria Explained By Instructor which will be contain some quiz and hands on exercise then definitely you will get certification.