CompTIA Security+ Certification Prep (Exam SY0-701)

The CompTIA SY0-701 certification is your gateway to a career in information security. It enhances your knowledge in key areas such as cryptography, security infrastructure, and incident response. This certification validates your skills and expertise necessary for securing computer networks and devices, making it an essential credential for aspiring information security professionals.
Course Details

Price:

$2,675.00

Days:

1

Location:

Virtual

Course Overview

The CompTIA SY0-701 certification is your gateway to a career in information security. It enhances your knowledge in key areas such as cryptography, security infrastructure, and incident response. This certification validates your skills and expertise necessary for securing computer networks and devices, making it an essential credential for aspiring information security professionals.

– • Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
– • Implement secure network architecture concepts and systems design
– • Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security
– • Install and configure identity and access services, as well as management controls
– • Implement and summarize risk management best practices and the business impact
– • Install and configure wireless security settings and implement public key infrastructure

• Two years of experience in IT administration with a security focus.
• Basic Windows user skills.
• Fundamental understanding of computer and networking concepts.

• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• Security Operations
• Security Operations
• Security Operations
• Security Operations
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• Security Operations
• Security Operations
• Security Operations
• Security Operations
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• Security Operations
• Security Operations
• Security Operations
• Security Operations
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• Security Operations
• Security Operations
• Security Operations
• Security Operations
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight

Class Dates & Times
Filters Sort results
Reset Apply
5/12/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,675.00
6/23/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,675.00
7/21/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,675.00
7/21/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,675.00
8/18/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,675.00
9/22/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,675.00
10/27/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,675.00
11/17/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,675.00
12/15/2025
Virtual
09:00:00-17:00:00 CST
Enroll Now
$2,675.00
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.