Course Description
In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-501).
COURSE OBJECTIVES:In this course, you will implement information security across a variety of different contexts. You will:•Identify the fundamental components of information security.•Analyze risk.•Identify various threats to information security.•Conduct security assessments to detect vulnerabilities.•Implement security for hosts and software.•Implement security for networks.•Manage identity and access.•Implement cryptographic solutions in the organization.•Implement security at the operational level.•Address security incidents.•Ensure the continuity of business operations in the event of an incident.
Agenda
Outline: |
|
Lesson 1: Security Fundamentals |
Information Security Cycle Information Security Controls Authentication Methods Cryptography Fundamentals Security Policy Fundamentals
|
|
Lesson 2: Security Threats and Vulnerabilities |
Social Engineering Physical Threats and Vulnerabilities Network-Based Threats Wireless Threats and Vulnerabilities Software Based Threats
|
Lesson 3: Network Security |
Network Devices and Technologies Network Design Elements and Components Implement Networking Protocols Apply Network Security Administration Principles Secure Wireless Traffic
|
Lesson 4: Managing Application, Data and Host Security |
Establish Device/Host Security Application Security Data Security Mobile Security
|
Lesson 5: Access Control, Authentication, and Account Management |
Access Control and Authentication Services Implement Account Management Security Controls
|
|
Lesson 6: Managing Certificates |
Install a Certificate Authority (CA) Hierarchy Enroll Certificates Secure Network Traffic by Using Certificates Renew Certificates Revoke Certificates Back Up and Restore Certificates and Private Keys Restore Certificates and Private Keys
|
Lesson 7: Compliance and Operational Security |
Physical Security Legal Compliance Security Awareness and Training
|
Lesson 8: Risk Management |
Risk Analysis Implement Vulnerability Assessment Tools and Techniques Scan for Vulnerabilities Mitigation and Deterrent Techniques
|
Lesson 9: Managing Security Incidents |
Respond to Security Incidents Recover from a Security Incident
|
|
Lesson 10: Business Continuity and Disaster Recovery Planning |
Business Continuity Plan for Disaster Recovery Execute Disaster Recovery Plans and Procedures
|
|
|
*Content, days, and times vary depending on your location. Please view the outline on the checkout page prior to purchase or
contact the local center for more information.
Audience
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.
Comments
Virtual CompTIA Security+ Certification (2011 Objectives) Online Live training option
Imagine an industry-leading classroom training experience from wherever you have access to the Internet.
The Virtual Online Live events listed here gives you an effective and proven online virtual learning experience with the freedom to attend virtually from anywhere.
There is also an option of experiencing Online Live from one of the many national partner centers where a computer and headset will be provided for you.
This rich and engaging virtual classroom environment lets you conveniently interact with instructors and other students.
You will hear and see your instructor as they teach the course and answer your questions via voice or text.
Choose the online live virtual training option and you can access the recorded version even after the class has finished.
The onDemand labs give you access to the same client and server technologies covered in class so you can test, apply and hone your skills by accessing the labs before and even after the class.
Technical Requirements: a computer or laptop with a modern browser and high speed internet access along with one or two monitors.