- March 13, 2017 - March 17, 2017
8:00 am - 4:00 pm
- January 16, 2017 - January 20, 2017
8:00 am - 4:00 pm
- April 17, 2017 - April 21, 2017
8:00 am - 4:00 pm
Course Delivery: Online Live Course Length: 5 days
Overview: In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-401).
Prerequisites: After mastering CompTIA’s vendor-neutral approach to Security students may wish to look to a vendor-specific approach to security in a Microsoft of Cisco offering. Additionally students may want to expand their security knowledge by focusing on security policy and procedures in CISSP. For a more targeted approach to Security there is the CEH offering.
To ensure your success in your course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts.
CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including configuring security parameters, are strongly recommended.
- CompTIA Network+ Certification
- CompTIA A+ Certification
- Using Microsoft Windows 8.1
- Microsoft Windows 8.1: Transition from Windows 7
Target Audience: This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.
Course Objectives: Upon successful completion of this course, students will be able to:
- Identify the fundamental concepts of computer security.
- Identify security threats and vulnerabilities.
- Manage data, application, and host security.
- Implement network security.
- Identify and implement access control and account management security measures.
- Manage certificates.
- Identify and implement compliance and operational security measures.
- Manage risk.
- Troubleshoot and manage security incidents.
- Plan for business continuity and disaster recovery.
The Information Security Cycle
Information Security Controls
Security Policy Fundamentals
Identifying Security Threats and Vulnerabilities
Wireless Threats and Vulnerabilities
Physical Threats and Vulnerabilities
Managing Data, Application, and Host Security
Manage Data Security
Manage Application Security
Manage Device and Host Security
Manage Mobile Security
Implementing Network Security
Configure Security Parameters on Network Devices and Technologies Network Design Elements and Components
Implement Networking Protocols and Services
Apply Secure Network Administration Principles
Secure Wireless TrafficUsed in Network+ Figures
Implementing Access Control, Authentication, and Account Management
Access Control and Authentication Services
Implement Account Management Security Controls
Install a CA Hierarchy
Secure Network Traffic by Using Certificates
Back Up and Restore Certificates and Private Keys
Implementing Compliance and Operational Security
Security Awareness and Training
Integrate Systems and Data with Third Parties
Implement Vulnerability Assessment Tools and Techniques
Scan for Vulnerabilities
Mitigation and Deterrent Techniques
Troubleshooting and Managing Security Incidents
Respond to Security Incidents
Recover from a Security Incident
Business Continuity and Disaster Recovery Planning
Plan for Disaster Recovery
Execute DRPs and Procedures