MIS Global Technologies

Course Price:

$ 4,250.00

CompTIA Security+

Course features

Program Description


CompTIA Security+ is a global certification that certifies the fundamental skills required to perform key security responsibilities and pursue a career in IT security. Attacks, threats, and vulnerabilities; architecture and design; implementation; operations and incident response; and governance, risk, and compliance will all be covered in this course. Individuals with demonstrated skills are in high demand in today’s employment market, and the material and activities in this course can help you expand your computer security skill set so that you can successfully fulfil your obligations in any security-related work.

CompTIA Security+ is the first security certification a candidate should obtain. It establishes the fundamental knowledge essential for any cybersecurity profession and serves as a stepping stone to intermediate-level cybersecurity jobs. Security+ combines best practises in hands-on troubleshooting, ensuring candidates have the practical security problem-solving abilities required to:

  • Assess the corporate security posture and recommend and deploy relevant security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an understanding of applicable laws and rules, including governance, risk, and compliance principles
  • Identify, analyze, and respond to security events and incidents

To earn your CompTIA Security+ certification, you’ll need to pass one certification exam:

  • EXAM CODE: SY0-601 


Program Outcome

In this course, you will apply information security in a number of scenarios:

  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and uses of cryptographic standards and products.
  • Install and configure network- and host-based security technologies.
  • Describe how wireless and remote access security is enforced.
  • Describe the standards and products used to enforce security on web and communications technologies.
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
  • Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.

SECTION 1.0: INTRODUCTION 

1.1 Security Overview 
1.2 Defense Planning 
1.3 Using the Simulator 

 SECTION 2.0: THREATS, ATTACKS, AND VULNERABILITIES 

2.1 Understanding 
2.2 Malware 
2.3 Social Engineering 
2.4 Vulnerability Concerns

SECTION 3.0: PHYSICAL 

3.1 Physical Threats
3.2 Device and Network Protection 
3.3 Environmental Controls

SECTION 4.0: NETWORKS AND HOSTS DESIGN AND DIAGNOSIS 

4.1  Manageable Network Plan 
4.2  Windows System Hardening 
4.3  File Server Security 
4.4  Linux Host Security

SECTION 5.0: DEVICES AND INFRASTRUCTURE 

5.1  Security Appliances 
5.2  Firewalls 
5.3  Demilitarized Zones 
5.4  Network Address Translation 
5.5  Virtual Private Networks 
5.6  Web Threat Protection 
5.7  Network Access Control 
5.8  Network Threats 
5.9  Network Applications 
5.10  Network Device Vulnerabilities 
5.11  Switch Security and Attacks 
5.12  Using VLANs 
5.13  Router Security

SECTION 6.0: IDENTITY, ACCESS, AND ACCOUNT MANAGEMENT 

6.1  Access Control Models 
6.2  Authentication 
6.3  Authorization 
6.4  Windows User Management 
6.5  Active Directory Overview 
6.6  Hardening Authentication 
6.7  Linux Users 
6.8  Linux Groups 
6.9  Remote Access 
6.10  Network Authentication 
 

SECTION 7.0: CRYPTOGRAPHY AND PKI 

7.1  Cryptography 
7.2  Cryptography Implementations 
7.3  Hashing 
7.4  File Encryption 
7.5  Public Key Infrastructure
 

SECTION 8.0: WIRELESS THREATS 

 8.1  Wireless Overview 
8.2  Wireless Attacks 
8.3  Wireless Defenses

SECTION 9.0: VIRTUALIZATION, CLOUD SECURITY, AND SECURING MOBILE DEVICES 

  9.1  Host Virtualization 
9.2 Virtual Networking 
9.3  Software-Defined Networking 
9.4  Cloud Services 
9.5  Mobile Devices 
9.6  Cloud Security 
9.7  Mobile Device Management 
9.8  BYOD Security 
9.9  Embedded and Specialized Systems

SECTION 10.0: SECURING DATA AND APPLICATIONS 

10.1  Data Transmission Security 
10.2  Data Loss Prevention 
10.3  Web Application Attacks 
10.4  Application Development and Security 
 

SECTION 11.0: SECURITY ASSESSMENTS 

  11.1  Penetration Testing 
11.2  Monitoring and Reconnaissance 
11.3  Intrusion Detection 
11.4  Security Assessment Techniques 
11.5  Protocol Analyzers 
11.6  Analyzing Network Attacks 
11.7  Password Attacks

SECTION 12.0: INCIDENT RESPONSE, FORENSICS, AND RECOVERY 

12.1  Incident Response 
12.2  Mitigation of an Incident 
12.3  Log Management 
12.4  Windows Logging 
12.5  Digital Forensics 
12.6  File and Packet Manipulation 
12.7  Redundancy 
12.8  Backup and Restore
 

SECTION 13.0: RISK MANAGEMENT

13.1  Organizational Security Policies 
13.2  Risk Management 
13.3  Email
 

SECTION 14.0: GOVERNANCE AND COMPLIANCE 

14.1  Audits 
14.2  Controls and Frameworks 
14.3  Sensitive Data and Privacy

Share:

Login

Email US

We are glad that you preferred to contact us. Please fill our short form and one of our friendly team members will contact you back.

    X
    CONTACT US