About this course

Course type Essentials
Course code COMSEC
Duration 5 Days

The CompTIA® Security ® (Exam SY0-301) course is designed to help you prepare for the SY0-301 exam, in which you will implement and monitor security on networks, applications, and operating systems, and respond to security breaches. Attending this course and using this student guide will help you prepare for certification. You should also refer to the exam objectives to see how they map to the course content.

It is strongly recommended that delegates undertake further post-course self-study before attempting the associated exam.

Target Audience:

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks and familiarity with other operating systems, such as Mac OS® X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security Certification examination; or use Security as the foundation for advanced security certifications or career roles.


  • Basic Windows skills and a fundamental understanding of computer and networking concepts are required.
  • CompTIA A and Network certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP, are strongly recommended. Students can obtain this level of skill and knowledge by taking any of the following QA courses:
  • CompTIA® A ® Certification: 2009 Exam Objectives (Windows® 7)
  • CompTIA® Network ® Certification (2009 Objectives)

Delegates will learn how to

At the end of this course you will be able to:

  • Identify the fundamental concepts of computer security.
  • Identify security threats and vulnerabilities.
  • Examine network security.
  • Manage application, data, and host security.
  • Identify access control and account management security measures.
  • Manage certificates.
  • Identify compliance and operational security measures.
  • Manage risk.
  • Manage security incidents.
  • Develop a BCP and DRP.


Mitigating threats

  • Topic A: System maintenance.
  • Topic B: Application security.
  • Topic C: Physical security.
  • Topic D: Malware.
  • Topic E: Social engineering.
  • Unit summary: Mitigating threats.


  • Topic A: Symmetric cryptography.
  • Topic B: Public key cryptography.
  • Unit summary: Cryptography.


  • Topic A: Authentication factors and requirements.
  • Topic B: Authentication systems.
  • Topic C: Authentication system vulnerabilities.
  • Unit summary: Authentication.

User- and role-based security

  • Topic A: Baseline security policies.
  • Topic B: Resource access.
  • Unit summary: User- and role-based security.

Peripheral security

  • Topic A: File and disk encryption.
  • Topic B: Peripheral and component security.
  • Topic C: Mobile device security.
  • Unit summary: Peripheral security.

Public key infrastructure

  • Topic A: Public key cryptography.
  • Topic B: Implementing public key infrastructure.
  • Topic C: Web server security with PKI
  • Unit summary: Public key infrastructure.

Application and messaging security

  • Topic A: Application security.
  • Topic B: E-mail security.
  • Topic C: Social networking and messaging.
  • Unit summary: Application and messaging security.

Ports and protocols

  • Topic A: TCP/IP basics.
  • Topic B: Protocol-based attacks.
  • Unit summary: Ports and protocols.

Network security

  • Topic A: Network devices.
  • Topic B: Secure network topologies.
  • Topic C: Secure networking.
  • Topic D: Virtualization and cloud computing.
  • Unit summary: Network security.

Wireless security

  • Topic A: Wireless network security.
  • Topic B: Mobile device security.
  • Unit summary: Wireless security.

Remote access security

  • Topic A: Remote access
  • Topic B: Virtual private networks.
  • Unit summary: Remote access security.

Vulnerability testing and monitoring

  • Topic A: Risk and vulnerability assessment
  • Topic B: Auditing and logging.
  • Topic C: Intrusion detection and prevention systems.
  • Topic D: Incident response.
  • Unit summary: Vulnerability testing and monitoring.

Organizational security

  • Topic A: Organizational policies.
  • Topic B: Education and training.
  • Topic C: Disposal and destruction.
  • Unit summary: Organizational security.

Business continuity

  • Topic A: Business continuity planning.
  • Topic B: Disaster recovery.
  • Topic C: Environmental controls.
  • Unit summary: Business continuity.

5 Days

Delivery Method

Delivery method


Face-to-face learning in the comfort of our quality nationwide centres, with free refreshments and Wi-Fi.

Find dates and prices

Online booking is currently not available for this course, to find out more please call us on 0345 074 7998 or email us at info@qa.com to discuss how we can help.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.