MIS Global Technologies

COURSE

CompTIA Security+

CompTIA Security+ is a global certification that certifies the fundamental skills required to perform key security responsibilities and pursue a career in IT security. Attacks, threats, and vulnerabilities; architecture and design; implementation; operations and incident response; and governance, risk, and compliance will all be covered in this course. Individuals with demonstrated skills are in high demand in today’s employment market, and the material and activities in this course can help you expand your computer security skill set so that you can successfully fulfil your obligations in any security-related work.

5-days Online Class

Internediate

English

CompTIA Security+

Introduction to CompTIA Security+

CompTIA Security+ is the first security certification a candidate should obtain. It establishes the fundamental knowledge essential for any cybersecurity profession and serves as a stepping stone to intermediate-level cybersecurity jobs. Security+ combines best practises in hands-on troubleshooting, ensuring candidates have the practical security problem-solving abilities required to:

  • Assess the corporate security posture and recommend and deploy relevant security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an understanding of applicable laws and rules, including governance, risk, and compliance principles
  • Identify, analyze, and respond to security events and incidents

What will you learn?

EXAM CODE: SY0-601

To earn your CompTIA Security+ certification, you’ll need to pass one certification exam: EXAM CODE: SY0-601

Program Outcome

In this course, you will apply information security in a number of scenarios:

Instructor-Led Training

An instructor-led training session, whether in-person or online, is base on classroom.

E-Learning

Learners can go through the content and activities at their own pace.

Hybrid Training

Combines traditional, face-to-face “seat time” with some online learning activities.

Curriculum | Your study plan

1.1 Security Overview 
1.2 Defense Planning 
1.3 Using the Simulator 
2.1 Understanding 
2.2 Malware 
2.3 Social Engineering 
2.4 Vulnerability Concerns
3.1 Physical Threats
3.2 Device and Network Protection 
3.3 Environmental Controls
4.1  Manageable Network Plan 
4.2  Windows System Hardening 
4.3  File Server Security 
4.4  Linux Host Security
5.1  Security Appliances 
5.2  Firewalls 
5.3  Demilitarized Zones 
5.4  Network Address Translation 
5.5  Virtual Private Networks 
5.6  Web Threat Protection 
5.7  Network Access Control 
5.8  Network Threats 
5.9  Network Applications 
5.10  Network Device Vulnerabilities 
5.11  Switch Security and Attacks 
5.12  Using VLANs 
5.13  Router Security

6.1  Access Control Models 
6.2  Authentication 
6.3  Authorization 
6.4  Windows User Management 
6.5  Active Directory Overview 
6.6  Hardening Authentication 
6.7  Linux Users 
6.8  Linux Groups 
6.9  Remote Access 
6.10  Network Authentication 
 

7.1  Cryptography 
7.2  Cryptography Implementations 
7.3  Hashing 
7.4  File Encryption 
7.5  Public Key Infrastructure
 

 8.1  Wireless Overview 
8.2  Wireless Attacks 
8.3  Wireless Defenses

9.1  Host Virtualization 
9.2 Virtual Networking 
9.3  Software-Defined Networking 
9.4  Cloud Services 
9.5  Mobile Devices 
9.6  Cloud Security 
9.7  Mobile Device Management 
9.8  BYOD Security 
9.9  Embedded and Specialized Systems

10.1  Data Transmission Security 
10.2  Data Loss Prevention 
10.3  Web Application Attacks 
10.4  Application Development and Security 
 

  11.1  Penetration Testing 
11.2  Monitoring and Reconnaissance 
11.3  Intrusion Detection 
11.4  Security Assessment Techniques 
11.5  Protocol Analyzers 
11.6  Analyzing Network Attacks 
11.7  Password Attacks

12.1  Incident Response 
12.2  Mitigation of an Incident 
12.3  Log Management 
12.4  Windows Logging 
12.5  Digital Forensics 
12.6  File and Packet Manipulation 
12.7  Redundancy 
12.8  Backup and Restore
 

13.1  Organizational Security Policies 
13.2  Risk Management 
13.3  Email
 

14.1  Audits 
14.2  Controls and Frameworks 
14.3  Sensitive Data and Privacy

Testimony | What our students said?

Login

Email US

We are glad that you preferred to contact us. Please fill our short form and one of our friendly team members will contact you back.

    X
    CONTACT US