CompTIA Security+ (SY0-501)(Partnercursus)


The CompTIA Security+ (2017 Objectives) course is designed to help you prepare for the SY0-501 exam.
The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.


  • This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation. It will prepare you to take the CompTIA Security+ SY0-501 exam by providing 100% coverage of the objectives and content examples listed on the syllabus. Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, such as CompTIA Cybersecurity Analyst (CSA)+, CompTIA Advanced Security Practitioner (CASP), and ISC’s CISSP (Certified Information Systems Security Professional). On course completion, you will be able to:
  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and uses of cryptographic standards and products.
  • Install and configure network- and host-based security technologies.
  • Describe how wireless and remote access security is enforced.
  • Describe the standards and products used to enforce security on web and communications technologies.
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
  • Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.


CompTIA Security+ is aimed at IT professionals with job roles such as security engineer, security consultant /specialist, information assurance technician, junior auditor / penetration tester, security administrator, systems administrator, and network administrator.


Onderstaande voorkennis is vereist:

Networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux.


In verband met COVID-19 worden alle klassikale cursussen in ieder geval tot 1 juni 2020 virtueel aangeboden!
Persoonlijk advies?


Secure Application Development
Identity and Access Services

  • Module 1 / Threats, Attacks, and Vulnerabilities
    • Indicators of Compromise
      • Why is Security Important?
      • Security Policy
      • Threat Actor Types
      • The Kill Chain
      • Social Engineering
      • Phishing
      • Malware Types
      • Trojans and Spyware
      • Open Source Intelligence
    • Critical Security Controls
      • Security Control Types
      • Defense in Depth
      • Frameworks and Compliance
      • Vulnerability Scanning and Pen Tests
      • Security Assessment Techniques
      • Pen Testing Concepts
      • Vulnerability Scanning Concepts
      • Exploit Frameworks
    • Security Posture Assessment Tools
      • Topology Discovery
      • Service Discovery
      • Packet Capture
      • Packet Capture Tools
      • Remote Access Trojans
      • Honeypots and Honeynets
    • Incident Response
      • Incident Response Procedures
      • Preparation Phase
      • Identification Phase
      • Containment Phase
      • Eradication and Recovery Phases
  • Module 2 / Identity and Access Management
    • Cryptography
      • Uses of Cryptography
      • Cryptographic Terminology and Ciphers
      • CryptographicProducts
      • Hashing Algorithms
      • Symmetric Algorithms
      • Asymmetric Algorithms
      • Diffie-Hellman and Elliptic Curve
      • Transport Encryption
      • Cryptographic Attacks
      • Lab
      • Implementing Public Key Infrastructure Public Key Infrastructure
      • PKI Standards
      • Digital Certificates
      • Certificate Authorities
      • Types of Certificate
      • Implementing PKI
      • Storing and Distributing Keys
      • Key Status and Revocation
      • PKI Trust Models
      • PGP / GPG
      • Lab
      • Deploying Certificates and Implementing Key Recovery
    • Identification and Authentication
      • Access Control Systems
      • Identification
      • Authentication
      • LAN Manager / NTLM
      • Kerberos
      • PAP, CHAP, and MS-CHAP
      • Password Attacks
      • Token-based Authentication
      • Biometric Authentication
      • Common Access Card
      • Lab
      • Using Password Cracking Tools
      • Authorization
      • Directory Services
      • RADIUS and TACACS+
      • Federation and Trusts
      • Federated Identity Protocols
    • Account Management
      • Formal Access Control Models
      • Account Types
      • Windows Active Directory
      • Creating and Managing Accounts
      • Account Policy Enforcement
      • Credential Management Policies
      • Account Restrictions
      • Accounting and Auditing
  • Module 3 / Architecture and Design (1)
    • Secure Network Design
      • Network Zones and Segments
      • Subnetting
      • Switching Infrastructure
      • Switching Attacks and Hardening
      • Endpoint Security
      • Network Access Control
      • Routing Infrastructure
      • Network Address Translation
      • Software Defined Networking
    • Firewalls and Load Balancers
      • Basic Firewalls
      • Stateful Firewalls
      • Implementing a Firewall or Gateway
      • Web Application Firewalls
      • Proxies and Gateways
      • Denial of Service Attacks
      • Load Balancers
    • IDS and SIEM
      • Intrusion Detection Systems
      • Configuring IDS
      • Log Review and SIEM
      • Data Loss Prevention
      • Malware and Intrusion Response
    • Secure Wireless Access
      • Wireless LANs
      • WEP and WPA
      • Wi-Fi Authentication
      • Extensible Authentication Protocol
      • Additional Wi-Fi Security Settings
      • Wi-Fi Site Security
      • Personal Area Networks
    • Physical Security Controls
      • Site Layout and Access
      • Gateways and Locks
      • Alarm Systems
      • Surveillance
      • Hardware Security
      • Environmental Controls#Module 4 / Architecture and Design (2)
    • Secure Protocols and Services
      • DHCP Security
      • DNS Security
      • Network Management Protocols
      • HTTP and Web Servers
      • SSL / TSL and HTTPS
      • Web Security Gateways
      • Email Services
      • S/MIME
      • File Transfer
      • Voice and Video Services
      • VoIP
      • Labs
      • Implementing Secure Network Addressing Services
      • Configuring a Secure Email Service
    • Secure Remote Access
      • Remote Access Architecture
      • Virtual Private Networks
      • IPSec
      • Remote Access Servers
      • Remote Administration Tools
      • Hardening Remote Access Infrastructure
      • Lab
      • Implementing a Virtual Private Network Secure Systems Design
      • Trusted Computing
      • Hardware / Firmware Security
      • Peripheral Device Security
      • Secure Configurations
      • OS Hardening
      • Patch Management
      • Embedded Systems
      • Security for Embedded Systems
    • Secure Mobile Device Services
      • Mobile Device Deployments
      • Mobile Connection Methods
      • Mobile Access Control Systems
      • Enforcement and Monitoring
    • Secure Virtualization and Cloud Services
      • Virtualization Technologies
      • Virtualization Security Best Practices
      • Cloud Computing
      • Cloud Security Best Practices
  • Module 5 / Risk Management
    • Forensics
      • Forensic Procedures
      • Collecting Evidence
      • Capturing System Images
      • Handling andmAnalyzing Evidence
      • Lab
      • Using Forensic Tools
    • Disaster Recovery and Resiliency
      • Continuity of Operations Plans
      • Disaster Recovery Planning
      • Resiliency Strategies
      • Recovery Sites
      • Backup Plans and Policies
      • Resiliency and Automation Strategies
    • Risk Management
      • Business Impact Analysis
      • Identification of Critical Systems
      • Risk Assessment
      • Risk Mitigation
      • Application Vulnerabilities
      • Application Exploits
      • Web Browser Exploits
      • Secure Application Design
      • Secure Coding Concepts
      • Auditing Applications
      • Secure DevOps
    • Organizational Security
      • Corporate Security Policy
      • Personnel Management Policies
      • Interoperability Agreements
      • Data Roles
      • Data Sensitivity Labeling and Handling
      • Data Wiping and Disposal
      • Privacy and Employee Conduct Policies
      • Security Policy Training

Planning & Prijs


ervaringen verzameld via Logo Springtest

Lucienne Groenendaal

Secretarieel medewerkster

"Training was prima, goede tips gekregen met af en toe een grap en grol. Locatie was prima, goed verzogd vwb koffie/thee, fruit en koekje. Mensen ook zeer vriendelijk. Lunch was perfect en zeer uitgebreid."


Ariana Scheepers

"De cursus was goed, en de verzorging ook!Ik heb er veel van opgestoken! De lokatie in Nieuwegein is goed te bereiken met het openbaar vervoer, dus dat is prettig. Tot een volgenden keer."


Eric Pos

Procesbeheerder bij Gemeente Amersfoort

"Ik vond de training erg leerzaam. De inhoud was van een hoog niveau en de docent was goed thuis in de materie. Ik stel het vooral op prijs dat er diep op de concepten werd ingegaan."

Betalen op later moment
Schrijf je eerst in en betaal later op rekening of met de Groeikaart.
8,3 gemiddeld op Springest
Meer dan 450 cursisten deelden hun ervaring.
De cursus is toegevoegd aan jouw favorieten.

Jouw favorieten kun je bekijken via je profiel (deze vind je in het menu bovenaan de website).

Kunnen wij je helpen?

Laat jouw telefoonnummer of e-mailadres achter en wij nemen binnen 24 uur contact met je op.

Cursus: CompTIA Security+ (SY0-501)



Opmerking of vraag

Meer weten

Vul onderstaand formulier in en je ontvangt meer informatie over deze cursus.

Cursus: CompTIA Security+ (SY0-501)

Wij helpen je graag

Geen tijd om ons gehele aanbod aan cursussen te bekijken? Of heb je een andere vraag? Wij helpen je graag. Vul onderstaande vragen in en we nemen binnen 24 uur contact met je op.

CompTIA Security+ (SY0-501)

Actieve filters: Wis alle filters

Jouw persoonsgegevens worden opgenomen in onze beschermde database en worden niet aan derden verstrekt. Je stemt hiermee in dat wij jou van onze aanbiedingen op de hoogte houden. In al onze correspondentie zit een afmeldmogelijkheid