trainocate-comptia-training-b
Home > Vendors > comptia > ct-security+

CT-SECURITY+ - CompTIA® Security+

Overview

Duration: 5.0 days
The Official CompTIA® Security+® (Exam SY0-601) course is the primary curriculum you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.

Objectives

In this course, you will implement information security across a variety of different contexts.

You will:

  • Identify the fundamental components of information security.
  • Analyze risk.
  • Identify various threats to information security.
  • Conduct security assessments to detect vulnerabilities.
  • Implement security for hosts and software.
  • Implement security for networks.
  • Manage identity and access.
  • Implement cryptographic solutions in the organization.
  • Implement security at the operational level.
  • Address security incidents.
  • Ensure the continuity of business operations in the event of an incident

Content

Module 1: Comparing Security Roles and Security Controls

  • Topic 1A: Compare and Contrast Information Security Roles
  • Topic 1B: Compare and Contrast Security Control and Framework Types
  • Topic 1C: Compare and Contrast Social Engineering Attack Types
  • Topic 1D: Determine Malware Types

Module 2: Explaining Threat Actors and Threat Intelligence

  • Topic 2A: Explain Threat Actor Types and Attack Vectors
  • Topic 2B: Explain Threat Intelligence Sources

Module 3: Performing Security Assessments

  • Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
  • Topic 3B: Explain Security Concerns with General Vulnerability Types
  • Topic 3C: Summarize Vulnerability Scanning Techniques
  • Topic 3D: Explain Penetration Testing Concepts

Module 4: Identifying Social Engineering and Malware

  • Topic 4A: Compare and Contrast Social Engineering Techniques
  • Topic 4B: Analyze Indicators of Malware-Based Attacks

Module 5: Summarizing Basic Cryptographic Concepts

  • Topic 5A: Compare and Contrast Cryptographic Ciphers
  • Topic 5B: Summarize Cryptographic Modes of Operation
  • Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
  • Topic 5D: Summarize Other Cryptographic Technologies

Module 6: Implementing Public Key Infrastructure

  • Topic 6A: Implement Certificates and Certificate Authorities
  • Topic 6B: Implement PKI Management

Module 7: Implementing Authentication Controls

  • Topic 7A: Summarize Authentication Design Concepts
  • Topic 7B: Implement Knowledge-Based Authentication
  • Topic 7C: Implement Authentication Technologies
  • Topic 7D: Summarize Biometrics Authentication Concepts

Module 8: Implementing Identity and Account Management Controls

  • Topic 8A: Implement Identity and Account Types
  • Topic 8B: Implement Account Policies
  • Topic 8C: Implement Authorization Solutions
  • Topic 8D: Explain the Importance of Personnel Policies

Module 9: Implementing Secure Network Designs

  • Topic 9A: Implement Secure Network Designs
  • Topic 9B: Implement Secure Switching and Routing
  • Topic 9C: Implement Secure Wireless Infrastructure
  • Topic 9D: Implement Load Balancer

Module 10: Implementing Network Security Appliances

  • Topic 10A: Implement Firewalls and Proxy Servers
  • Topic 10B: Implement Network Security Monitoring
  • Topic 10C: Summarize the Use of SIEM

Module 11: Implementing Secure Network Protocols

  • Topic 11A: Implement Secure Network Operations Protocols
  • Topic 11B: Implement Secure Application Protocols
  • Topic 11C: Implement Secure Remote Access Protocols

Module 12: Implementing Host Security Solutions

  • Topic 12A: Implement Secure Firmware
  • Topic 12B: Implement Endpoint Security

Module 13: Implementing Secure Mobile Solutions

  • Topic 13A: Implement Mobile Device Management
  • Topic 13B: Implement Secure Mobile Device Connections

Module 14: Summarizing Secure Application Concepts

  • Topic 14A: Analyze Indicators of Application Attacks
  • Topic 14B: Analyze Indicators of Web Application Attacks
  • Topic 14C: Summarize Secure Coding Practices
  • Topic 14D: Implement Secure Script Environments
  • Topic 14E: Summarize Deployment and Automation Concepts

Module 15: Implementing Secure Cloud Solutions

  • Topic 15A: Summarize Secure Cloud and Virtualization Services
  • Topic 15B: Apply Cloud Security Solutions
  • Topic 15C: Summarize Infrastructure as Code Concepts

Module 16: Explaining Data Privacy and Protection Concepts

  • Topic 16A: Explain Privacy and Data Sensitivity Concepts
  • Topic 16B: Explain Privacy and Data Protection Controls

Module 17: Performing Incident Response

  • Topic 17A: Summarize Incident Response Procedures
  • Topic 17B: Utilize Appropriate Data Sources for Incident Response
  • Topic 17C: Apply Mitigation Controls

Module 18: Explaining Digital Forensics

  • Topic 18A: Explain Key Aspects of Digital Forensics Documentation
  • Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition

Module 19: Summarizing Risk Management Concepts

  • Topic 19A: Explain Risk Management Processes and Concepts
  • Topic 19B: Explain Business Impact Analysis Concepts

Module 20: Implementing Cybersecurity Resilience

  • Topic 20A: Implement Redundancy Strategies
  • Topic 20B: Implement Backup Strategies
  • Topic 20C: Implement Cybersecurity Resiliency Strategies

Module 21: Explaining Physical Security

  • Topic 21A: Explain the Importance of Physical Site Security Controls
  • Topic 21B: Explain the Importance of Physical Host Security Controls

Audience

This CompTIA Security+ course is targeted toward the:

  • Information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks and familiarity with other operating systems, such as macOS®, Unix, or Linux
  • Those who wants to further a career in IT by acquiring foundational knowledge of security topics
  • Candidates preparing for the CompTIA Security+ certification examination
  • Cybersecurity professionals using Security+ as the foundation for advanced security certifications or career roles

Prerequisites

To ensure your success in this course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts.

CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months’ experience in networking, including configuring security parameters, are strongly recommended. Students can obtain this level of skill and knowledge by taking any of the following courses:

  • CompTIA® A+
  • CompTIA® Network+

Additional introductory courses or work experience in application development and programming, or in network and operating system administration for any software platform or system, are helpful but not required. Note that the prerequisites for this course might differ significantly from the prerequisites for the CompTIA certification exams.

Certification

This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

Schedule




Enquire Now
 
 
 
 
Ko78OL
By clicking "Submit", I agree to the Terms Of Use and Privacy Policy