CompTIA - Security+ course

Provided by

About the course

Security+ is the global benchmark for best practices in IT security. It validates competency in network security, compliance and operational security, threats and vulnerabilities, application, data and host security, identity management, and cryptography. Security+ certification will turn you into an in-demand, trusted source for IT security issues in your organisation because CompTIA’s Security+ is the global benchmark for best practices in IT security. It validates competency in network security, compliance and operational security, threats and vulnerabilities, application, data and host security, identity management, and cryptography.Course Outline:


Lesson 1 - Security Fundamentals:
 The Information Security Cycle
 Information Security Controls
 Authentication Methods
 Cryptography Fundamentals
 Security Policy Fundamentals


Lesson 2 - Identifying Security Threats and Vulnerabilities:
 Social Engineering
 Malware
 Software-Based Threats
 Network Based Threats
 Wireless Threats and Vulnerabilities
 Physical Threats and Vulnerabilities


Lesson 3 - Managing Data, Application and Host Security:
 Manage Data Security
 Manage Application
 Security


Lesson 4 - Implementing Network Security:
 Configure Security Parameters on Network Devices and Technologies
 Network Design Elements and Components
 Apply Secure Network Administration Principles
 Secure Wireless Traffic


Lesson 5 - Implementing Access Controls, Authentication and Account Management:

Continued…
 Access Control and Authentication Services
 Implement Account Management Security Controls


Lesson 6 - Managing Certificates:
 Install a CA Hierarchy
 Enroll Certificates
 Secure Network Traffic using Certificates
 Renew Certificates
 Back Up and Restore Certificates and Private Keys
 Revoke Certificates


Lesson 7 - Implementing Compliance and Operational Security:
 Physical Security
 Legal Compliance
 Security Awareness and Training
 Integrate Systems and Data with Third Parties


Lesson 8 - Risk Management:
 Risk Analysis
 Implement Vulnerability Assessment Tools and Techniques
 Scan for Vulnerabilities
 Mitigation and Deterrent Techniques


Lesson 9 - Troubleshooting & Managing Security Incidents:
 Respond to Security Incidents
 Recover from a Security Incident 


Lesson 10 - Business Continuity & Disaster recovery:
 Business Continuity 
 Plan for Disaster Recovery
 Execute DRP’s and Procedures


 


 

 

Related article

A concerning chuck of National Health Service trusts in England and Wales lack sufficient in-house cyber security expertise, new research has revea...