ExpiredCompTIA Security+ Certification

Lorie Gregorchuk

  • March 13, 2017 - March 17, 2017
    8:00 am - 4:00 pm
  • January 16, 2017 - January 20, 2017
    8:00 am - 4:00 pm
  • April 17, 2017 - April 21, 2017
    8:00 am - 4:00 pm

 

Course Delivery: Online Live                                                                          Course Length: 5 days                    

Overview: In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-401).

Prerequisites: After mastering CompTIA’s vendor-neutral approach to Security students may wish to look to a vendor-specific approach to security in a Microsoft of Cisco offering. Additionally students may want to expand their security knowledge by focusing on security policy and procedures in CISSP. For a more targeted approach to Security there is the CEH offering.

To ensure your success in your course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts.

CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including configuring security parameters, are strongly recommended.

  • CompTIA Network+ Certification
  • CompTIA A+ Certification
  • Using Microsoft Windows 8.1
  • Microsoft Windows 8.1: Transition from Windows 7

 

Target Audience: This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

Course Objectives: Upon successful completion of this course, students will be able to:

  • Identify the fundamental concepts of computer security.
  • Identify security threats and vulnerabilities.
  • Manage data, application, and host security.
  • Implement network security.
  • Identify and implement access control and account management security measures.
  • Manage certificates.
  • Identify and implement compliance and operational security measures.
  • Manage risk.
  • Troubleshoot and manage security incidents.
  • Plan for business continuity and disaster recovery.

Course Outline:

Security Fundamentals

The Information Security Cycle

Information Security Controls

Authentication Methods

Cryptography Fundamentals

Security Policy Fundamentals

Identifying Security Threats and Vulnerabilities

Social Engineering

Malware

Software-Based Threats

Network-Based Threats

Wireless Threats and Vulnerabilities

Physical Threats and Vulnerabilities

Managing Data, Application, and Host Security

Manage Data Security

Manage Application Security

Manage Device and Host Security

Manage Mobile Security

Implementing Network Security

Configure Security Parameters on Network Devices and Technologies Network Design Elements and Components

Implement Networking Protocols and Services

Apply Secure Network Administration Principles

Secure Wireless TrafficUsed in Network+ Figures

Implementing Access Control, Authentication, and Account Management

Access Control and Authentication Services

Implement Account Management Security Controls

Managing Certificates

Install a CA Hierarchy

Enroll Certificates

Secure Network Traffic by Using Certificates

Renew Certificates

Back Up and Restore Certificates and Private Keys

Revoke Certificates

Implementing Compliance and Operational Security

Physical Security

Legal Compliance

Security Awareness and Training

Integrate Systems and Data with Third Parties

Risk Management

Risk Analysis

Implement Vulnerability Assessment Tools and Techniques

Scan for Vulnerabilities

Mitigation and Deterrent Techniques

Troubleshooting and Managing Security Incidents

Respond to Security Incidents

Recover from a Security Incident

Business Continuity and Disaster Recovery Planning

Business Continuity

Plan for Disaster Recovery

Execute DRPs and Procedures

Lorie GregorchukExpiredCompTIA Security+ Certification