Security+ v4

Security+ is a vendor-neutral certification that proves competency in network security and risk management. Security+ labs focus on the principles and best practices in network security. Students gain hands-on practice in the skills needed to secure a network and prepare for industry certification.

Security+ labs are supported in NETLAB+ using the Security+ v4 Pod.

Certification Resources: Please see the table below for details on how the labs map to the CompTIA Security+ Certification Exam Objectives and the CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601).

Security+ v4 Supported Labs

Lab Title CompTIA Security+ (SY0-601)
Exam Objectives
All-In-One CompTIA Security+ Sixth Edition
ISBN-13: 978-1260464009
Chapters
1 Social Engineering Attack 1.1: Compare and contrast different types of social engineering techniques
1.2: Given a scenario, analyze potential indicators to determine the type of attack
1: Social Engineering Techniques
2: Type of Attack Indicators
2 Analyze Types of Malware & Application Attacks 1.2: Given a scenario, analyze potential indicators to determine the type of attack
1.3: Given a scenario, analyze potential indicators associated with application attacks
1.6: Explain the security concerns associated with various types of vulnerabilities
2: Type of Attack Indicators
3: Application Attack Indicators
6: Vulnerabilities
3 Analyzing Types of Web Application Attacks 1.3: Given a scenario, analyze potential indicators associated with application attacks 3: Application Attack Indicators
4 Investigating ARP Poisoning 1.4: Given a scenario, analyze potential indicators associated with network attacks 4: Network Attack Indicators
5 Analyzing Types of Attacks and Mitigation Techniques 1.2: Given a scenario, analyze potential indicators to determine the type of attack
1.3: Given a scenario, analyze potential indicators associated with application attacks
1.4: Given a scenario, analyze potential indicators associated with network attacks
1.6: Explain the security concerns associated with various types of vulnerabilities
2: Type of Attack Indicators
3: Application Attack Indicators
4: Network Attack Indicators
6: Vulnerabilities
6 Vulnerability Checks with OpenVAS 1.6: Explain the security concerns associated with various types of vulnerabilities
1.7: Summarize the techniques used in security assessments
6: Vulnerabilities
7: Security Assessments
7 Performing Active Reconnaissance 1.7: Summarize the techniques used in security assessments
1.8: Explain the techniques used in penetration testing
4.1: Given a scenario, use the appropriate tool to assess organizational security
7: Security Assessments
8: Penetration Testing
26: Tools/Assess Organizational Security
8 Identifying & Analyzing Network/Host Intrusion Detection System (NIDS/HIDS) Alerts 1.7: Summarize the techniques used in security assessments
3.2: Given a scenario, implement host or application security solutions
3.3: Given a scenario, implement secure network designs
4.3: Given an incident, utilize appropriate data sources to support an investigation
7: Security Assessments
18: Host and Application Security
19: Secure Network Design
28: Investigations
9 Virtualization, Group Policy Objects (GPO) 2.2: Summarize virtualization and cloud computing concepts
2.4: Summarize authentication and authorization design concepts
10: Virtualization and Cloud Security
12: Authentication and Authorization
10 JavaScript Obfuscation & Dead Code Injection 2.3: Summarize secure application development, deployment, and automation concepts 11: Secure Application Development, Deployment, and Automation Concepts
11 Configuring a RADIUS Server 3.8: Given a scenario, implement authentication and authorization solutions 24: Implement Authentication and Authorization
12 Setting Up a Load Balancer 2.5: Given a scenario, implement cybersecurity resilience 13: Cybersecurity Resilience
13 IoT Management 2.6: Explain the security implications of embedded and specialized systems 14: Embedded and Specialized Systems
14 Cryptography Concepts 2.8: Summarize the basics of cryptographic concepts 16: Cryptographic Concepts
15 Implementing Common Protocols and Services for Basic Security Practices 3.1: Given a scenario, implement secure protocols
3.3: Given a scenario, implement secure network designs
17: Secure Protocols
19: Secure Network Design
16 Securing Data with Encryption Software 2.1: Explain the importance of security concepts in an enterprise environment
3.2: Given a scenario, implement host or application security solutions
9: Enterprise Security Architecture
18: Host and Application Security
17 Configuring a Network-Based Firewall 3.3: Given a scenario, implement secure network designs
4.4: Given an incident, apply mitigation techniques or controls to secure an environment
19: Secure Network Design
29: Mitigation Techniques and Controls
18 Wireless Networking Attack and Mitigation Techniques 3.4: Given a scenario, install and configure wireless security settings 20: Wireless Security
19 Working with Android 3.5: Given a scenario, implement mobile solutions 21: Secure Mobile Solutions
20 Linux Account Management 3.7: Given a scenario, implement identity and account management controls 23: Identity and Account Management Controls
21 PKI Management with Windows 3.9: Given a scenario, implement public key infrastructure 25: Public Key Infrastructure
22 Capturing Network Traffic 3.1: Given a scenario, implement secure protocols
4.1: Given a scenario, use the appropriate tool to assess organizational security
17: Secure Protocols
26: Tools/Assess Organizational Security
23 Incident Response Procedures 1.2: Given a scenario, analyze potential indicators to determine the type of attack
4.1: Given a scenario, use the appropriate tool to assess organizational security
4.2: Summarize the importance of policies, processes, and procedures for incident response
4.3: Given an incident, utilize appropriate data sources to support an investigation
2: Type of Attack Indicators
26: Tools/Assess Organizational Security
27: Incident Response Policies, Processes, and Procedures
28: Investigations
24 Performing Backups 2.5: Given a scenario, implement cybersecurity resilience 13: Cybersecurity Resilience
25 Using Autopsy for Forensics and Lost Data Recovery 4.1: Given a scenario, use the appropriate tool to assess organizational security
4.5: Explain the key aspects of digital forensics
26: Tools/Assess Organizational Security
30: Digital Forensics

Academic Book List

The book listed below is a recommended resource to accompany the NDG Security+ v4 labs.

CompTIA Security+ All-in-One Exam Guide 
Sixth Edition (Exam SY0-601) 6th Edition
by Wm. Arthur Conklin (Author), Greg White (Author), Dwayne Williams
ISBN-13: 978-1260464009
ISBN-10: 1260464008
Enabling the Labs

To enable the Security+ v4 labs, install the NDG Security+ v4 course using the Course Manager. See the Course Manager section of the NETLAB+ VE Admin Guide for details. The course content will then be available to be added to classes.

SECPLUS v4