Course features
- Duration
- Skill level
- Language
- Student Enrolled
- 5 Days
- Intermediate
- English
- 25
Program Description
CompTIA Security+ is a global certification that certifies the fundamental skills required to perform key security responsibilities and pursue a career in IT security. Attacks, threats, and vulnerabilities; architecture and design; implementation; operations and incident response; and governance, risk, and compliance will all be covered in this course. Individuals with demonstrated skills are in high demand in today’s employment market, and the material and activities in this course can help you expand your computer security skill set so that you can successfully fulfil your obligations in any security-related work.
CompTIA Security+ is the first security certification a candidate should obtain. It establishes the fundamental knowledge essential for any cybersecurity profession and serves as a stepping stone to intermediate-level cybersecurity jobs. Security+ combines best practises in hands-on troubleshooting, ensuring candidates have the practical security problem-solving abilities required to:
- Assess the corporate security posture and recommend and deploy relevant security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an understanding of applicable laws and rules, including governance, risk, and compliance principles
- Identify, analyze, and respond to security events and incidents
To earn your CompTIA Security+ certification, you’ll need to pass one certification exam:
EXAM CODE: SY0-601
Program Outcome
In this course, you will apply information security in a number of scenarios:
- Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
- Understand the principles of organizational security and the elements of effective security policies.
- Know the technologies and uses of cryptographic standards and products.
- Install and configure network- and host-based security technologies.
- Describe how wireless and remote access security is enforced.
- Describe the standards and products used to enforce security on web and communications technologies.
- Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
- Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
SECTION 1.0: INTRODUCTION
SECTION 2.0: THREATS, ATTACKS, AND VULNERABILITIES
2.2 Malware
SECTION 3.0: PHYSICAL
3.2 Device and Network Protection
SECTION 4.0: NETWORKS AND HOSTS DESIGN AND DIAGNOSIS
4.1 Manageable Network Plan
4.2 Windows System Hardening
4.3 File Server Security
4.4 Linux Host Security
SECTION 5.0: DEVICES AND INFRASTRUCTURE
5.1 Security Appliances
5.2 Firewalls
5.3 Demilitarized Zones
5.4 Network Address Translation
5.5 Virtual Private Networks
5.6 Web Threat Protection
5.7 Network Access Control
5.8 Network Threats
5.9 Network Applications
5.10 Network Device Vulnerabilities
5.11 Switch Security and Attacks
5.12 Using VLANs
5.13 Router Security
SECTION 6.0: IDENTITY, ACCESS, AND ACCOUNT MANAGEMENT
6.1 Access Control Models
6.2 Authentication
6.3 Authorization
6.4 Windows User Management
6.5 Active Directory Overview
6.6 Hardening Authentication
6.7 Linux Users
6.8 Linux Groups
6.9 Remote Access
6.10 Network Authentication
SECTION 7.0: CRYPTOGRAPHY AND PKI
7.1 Cryptography
7.2 Cryptography Implementations
7.3 Hashing
7.4 File Encryption
7.5 Public Key Infrastructure
SECTION 8.0: WIRELESS THREATS
8.1 Wireless Overview
8.2 Wireless Attacks
8.3 Wireless Defenses
SECTION 9.0: VIRTUALIZATION, CLOUD SECURITY, AND SECURING MOBILE DEVICES
9.1 Host Virtualization
9.2 Virtual Networking
9.3 Software-Defined Networking
9.4 Cloud Services
9.5 Mobile Devices
9.6 Cloud Security
9.7 Mobile Device Management
9.8 BYOD Security
9.9 Embedded and Specialized Systems
SECTION 10.0: SECURING DATA AND APPLICATIONS
10.1 Data Transmission Security
10.2 Data Loss Prevention
10.3 Web Application Attacks
10.4 Application Development and Security
SECTION 11.0: SECURITY ASSESSMENTS
11.1 Penetration Testing
11.2 Monitoring and Reconnaissance
11.3 Intrusion Detection
11.4 Security Assessment Techniques
11.5 Protocol Analyzers
11.6 Analyzing Network Attacks
11.7 Password Attacks
SECTION 12.0: INCIDENT RESPONSE, FORENSICS, AND RECOVERY
12.1 Incident Response
12.2 Mitigation of an Incident
12.3 Log Management
12.4 Windows Logging
12.5 Digital Forensics
12.6 File and Packet Manipulation
12.7 Redundancy
12.8 Backup and Restore
SECTION 13.0: RISK MANAGEMENT
13.1 Organizational Security Policies
13.2 Risk Management
13.3 Email
SECTION 14.0: GOVERNANCE AND COMPLIANCE
14.1 Audits
14.2 Controls and Frameworks
14.3 Sensitive Data and Privacy