Overview

About this course

CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.

Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Course Objective

The CompTIA Security+ course will equip the student with the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. This course will prepare you for the CompTIA Security+ SY0-501 exam.

Prerequisites

To ensure your success in this course, you should have experience with basic computer user skills, be able to complete tasks in a Microsoft Windows environment, be able to search for, browse, and access information on the Internet, and have basic knowledge of computing concepts. You can obtain this level of skills and knowledge by taking the following official CompTIA courses:

  • The Official CompTIA® IT Fundamentals+
  • CompTIA A+ Core Series
  • CompTIA Network+

Please Note: The prerequisites for this course might differ significantly from the prerequisites for the CompTIA certification exams. For the most up-to-date information about the exam prerequisites go to https://certification.comptia.org/training/exam-objectives 

Outline

Lesson 1: Comparing and Contrasting Attacks

  • Compare and Contrast Information Security Roles
  • Explain Threat Actor Types Topic 1C: Compare and Contrast Social Engineering Attack Types
  • Determine Malware Types

Lesson 2: Comparing and Contrasting Security Controls

  • Compare and Contrast Security Control and Framework Types
  • Follow Incident Response Procedures

Lesson 3: Using Security Assessment Tools

  • Explain Penetration Testing Concepts
  • Use Topology Discovery Software Tools
  • Use Fingerprinting and Sniffing Software Tools
  • Use Vulnerability Scanning Software Tools

Lesson 4: Comparing and Contrasting Basic Concepts of Cryptography

  • Compare and Contrast Basic Concepts of Cryptography
  • Compare and Contrast Cryptographic Attack Types
  • Explain Hashing and Symmetric Cryptographic Algorithms
  • Explain Asymmetric Cryptographic Algorithms

Lesson 5: Implementing Public Key Infrastructure

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management

Lesson 6: Implementing Identity and Access Management Controls

  • Compare and Contrast Identity and Authentication Concepts
  • Install and Configure Authentication Protocols
  • Implement Multifactor Authentication

Lesson 7: Managing Access Services and Accounts

  • Install and Configure Authorization and Directory Services
  • Implement Access Management Controls
  • Differentiate Account Management Practices
  • Implement Account Auditing and Recertification

Lesson 8: Implementing Secure Network Architecture Concepts

  • Implement Secure Network Architecture Concepts
  • Install and Configure Secure Switching Infrastructure
  • Install and Configure Network Access Control
  • Install and Configure Secure Routing and NAT Infrastructure

Lesson 9: Installing and Configuring Security Appliances

  • Install and Configure Firewalls and Proxies
  • Install and Configure Load Balancers
  • Install and Configure Intrusion Detection/Prevention Systems
  • Install and Configure Logging and SIEM Systems

Lesson 10: Installing and Configuring Wireless and Physical Access Security

  • Install and Configure Wireless Infrastructure
  • Install and Configure Wireless Security Settings
  • Explain the Importance of Physical Security Controls

Lesson 11: Deploying Secure Host, Embedded, and Mobile Systems

  • Implement Secure Hardware Systems Design
  • Implement Secure Host Systems Design
  • Implement Secure Embedded Systems Design
  • Implement Secure Mobile Device Systems Design

Lesson 12: Implementing Secure Network Access Protocols

  • Implement Secure Network Operations Protocols
  • Implement Secure Remote Access Protocols
  • Implement Secure Remote Administration Protocols

Lesson 13: Implementing Secure Network Applications

  • Implement Secure Web Services
  • Implement Secure Communications Services
  • Implement Secure Virtualization Infrastructure
  • Implement Secure Cloud Services

Lesson 14: Explaining Risk Management and Disaster Recovery Concepts

  • Explain Risk Management Processes and Concepts
  • Explain Disaster Recovery Planning Concepts
  • Explain Resiliency and Continuity of Operations Strategies
  • Summarize Basic Concepts of Forensics

Lesson 15: Summarizing Secure Application Development Concepts

  • Explain the Impact of Vulnerability Types
  • Summarize Secure Application Development Concepts

Lesson 16: Explaining Organizational Security Concepts

  • Explain the Importance of Security Policies
  • Implement Data Security and Privacy Practices
  • Explain the Importance of Personnel Management

Please fill out your details below and one of our team will assist you with you booking.

Please enter your details below and we will send you the full course outline.