In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-501).TARGET AUDIENCE:
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.COURSE OBJECTIVES:
In this course, you will implement information security across a variety of different contexts. You will:•Identify the fundamental components of information security.•Analyze risk.•Identify various threats to information security.•Conduct security assessments to detect vulnerabilities.•Implement security for hosts and software.•Implement security for networks.•Manage identity and access.•Implement cryptographic solutions in the organization.•Implement security at the operational level.•Address security incidents.•Ensure the continuity of business operations in the event of an incident.
|Lesson 1: Security Fundamentals|
|Information Security Cycle |
Information Security Controls
Security Policy Fundamentals
|Lesson 2: Security Threats and Vulnerabilities|
|Social Engineering |
Physical Threats and Vulnerabilities
Wireless Threats and Vulnerabilities
Software Based Threats
|Lesson 3: Network Security|
|Network Devices and Technologies |
Network Design Elements and Components
Implement Networking Protocols
Apply Network Security Administration Principles
Secure Wireless Traffic
|Lesson 4: Managing Application, Data and Host Security|
|Establish Device/Host Security |
|Lesson 5: Access Control, Authentication, and Account Management|
|Access Control and Authentication Services |
Implement Account Management Security Controls
|Lesson 6: Managing Certificates|
|Install a Certificate Authority (CA) Hierarchy |
Secure Network Traffic by Using Certificates
Back Up and Restore Certificates and Private Keys
Restore Certificates and Private Keys
|Lesson 7: Compliance and Operational Security|
|Physical Security |
Security Awareness and Training
|Lesson 8: Risk Management|
|Risk Analysis |
Implement Vulnerability Assessment Tools and Techniques
Scan for Vulnerabilities
Mitigation and Deterrent Techniques
|Lesson 9: Managing Security Incidents|
|Respond to Security Incidents |
Recover from a Security Incident
|Lesson 10: Business Continuity and Disaster Recovery Planning|
|Business Continuity |
Plan for Disaster Recovery
Execute Disaster Recovery Plans and Procedures
*Content, days, and times vary depending on your location. Please view the outline on the checkout page prior to purchase or
contact the local center for more information.
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.
Virtual CompTIA Security+ Certification (2011 Objectives) Online Live training option
Imagine an industry-leading classroom training experience from wherever you have access to the Internet.
The Virtual Online Live events listed here gives you an effective and proven online virtual learning experience with the freedom to attend virtually from anywhere.
There is also an option of experiencing Online Live from one of the many national partner centers where a computer and headset will be provided for you.
This rich and engaging virtual classroom environment lets you conveniently interact with instructors and other students.
You will hear and see your instructor as they teach the course and answer your questions via voice or text.
Choose the online live virtual training option and you can access the recorded version even after the class has finished.
The onDemand labs give you access to the same client and server technologies covered in class so you can test, apply and hone your skills by accessing the labs before and even after the class.
Technical Requirements: a computer or laptop with a modern browser and high speed internet access along with one or two monitors.