CompTIA Security+ Certification

Category:
comptia_security+_logo

CompTIA Security+ Certification

This 5-day course provides an excellent introduction to the security field and is typically a better entry point than jumping right into an advanced security program.
Share on facebook
Share on twitter
Share on linkedin

Overview

This 5-day course provides an excellent introduction to the security field and is typically a better entry point than jumping right into an advanced security program. With Security+, participants will build a solid foundation of knowledge that they can build upon – helping them to advance the career in the months and years to come.

Prerequisites

Participants who wish to take up CompTIA Security+ Certification should have the following requirements:

  • CompTIA A+ and Network+ certifications, or equivalent knowledge
  • 6 to 9 months experience in networking, including configuring security parameters, are strongly recommended

Who Should Attend?

The CompTIA Security+ Certification is intended for Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

Course Outline

  • Compare and Contrast Information Security Roles
  • Explain Threat Actor Types
  • Compare and Contrast Social Engineering Attack Types
  • Determine Malware Types
  • Compare and Contrast Security Control and Framework Types
  • Follow Incident Response Procedures
  • Explain Penetration Testing Concepts
  • Assess Security Posture with Topology Discovery Software Tools
  • Assess Security Posture with Fingerprinting and Sniffing Software Tools
  • Assess Security Posture with Vulnerability Scanning Software Tools
  • Compare and Contrast Basic Concept of Cryptography
  • Explain Hashing and Symmetric Cryptographic Algorithms
  • Explain Asymmetric Cryptographic Algorithms
  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
  • Compare and Contrast Identity and Authentication Concepts
  • Install and Configure Authentication Protocols
  • Implement Multifactor Authentication
  • Install and Configure Authorization and Directory Services
  • Implement Access Management Controls
  • Differentiate Account Management Practices
  • Implement Account Auditing and Recertification
  • Implement Secure Network Architecture Concepts
  • Install and Configure a Secure Switching Infrastructure
  • Install and Configure Network Access Control
  • Install and Configure a Secure Routing and NAT Infrastructure
  • Install and Configure Firewalls and Proxies
  • Install and Configure Load Balancers
  • Install and Configure Intrusion Detection/Prevention Systems
  • Install and Configure Data Loss Prevention (DLP) Systems
  • Install and Configure Logging and SIEM Systems
  • Install and Configure a Wireless Infrastructure
  • Install and Configure Wireless Security Settings
  • Explain the Importance of Physical Security Controls
  • Implement Secure Hardware Systems Design
  • Implement Secure Host Systems Design
  • Implement Secure Mobile Device Systems Design
  • Implement Secure Embedded Systems Design
  • Implement Secure Network Operations Protocols
  • Implement Secure Remote Access Protocols
  • Implement Secure Remote Administration Protocols
  • Implement Secure Web Services
  • Implement Secure Communications Services
  • Summarize Secure Virtualization Infrastructure
  • Summarize Secure Cloud Services
  • Explain Risk Management Processes and Concepts
  • Explain Resiliency and Automation Strategies
  • Explain Disaster Recovery and Continuity of Operation Concepts
  • Summarize Basic Concepts of Forensics
  • Explain the Impact of Vulnerability Types
  • Summarize Secure Application Development Concepts
  • Explain the Importance of Security Policies
  • Implement Data Security and Privacy Practices
  • Explain the Importance of Personnel Management

Get Brochure and Pricing

More Like This

Get the course Brochure & Pricing

Our course consultant will contact you within 1 working day

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Stay-Home-Series-main-header-v2

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Open chat
Get in touch with our consultant