
CompTIA Security+
COURSE DURATION
• 5 days in classroom or virtual
COURSE DESCRIPTION
The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.
The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the successful candidate will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations.
WHAT YOU GET
• Expert Instructor lead training
• Accredited course material
• Study guide to assist with exam preparation
• Access to Certmaster
• Examination fees included*
• Pass for sure commitment*
COURSE OUTLINE
The CompTIA Security + Consist of Training from all 6 Domains
Domain 1.0 – Network Security
• Implement security configuration parameters on network devices and other technologies
• Given a scenario, use secure network administration principles
• Explain network design elements and components
• Given a scenario. Implement common protocols and services
• Given a scenario, troubleshoot security issues related to wireless networking
Domain 2.0 – Compliance and Operational Security
• Explain the importance of risk related concepts
• Summarize the security implications of integrating systems and data with third parties
• Given a scenario, implement appropriate risk mitigation strategies
• Given a scenario, implement basic forensic procedures
• Summarize common incident response procedures
• Explain the importance of security related awareness and training
• Compare and contrast physical security and environmental controls
• Summarize risk management best practices
• Given a scenario, select the appropriate control to meet the goals of security
Domain 3.0 – Threats and Vulnerabilities
• Explain types of malware
• Summarize various types of attacks
• Summarize social engineering attacks and associated effectiveness with each attack
• Explain types of wireless attacks
• Explain types of application attacks
• Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
• Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities
• Explain the proper use of penetration testing versus vulnerability planning
Domain 4.0 – Application, Data and Host Security
• Explain the importance of security controls and techniques
• Summarize mobility security concepts and technologies
• Given a scenario, select the appropriate solution to establish host security
• Implement the appropriate controls to ensure data security
• Compare and contrast alternative methods to mitigate security risk in static environments
Domain 5.0 – Access Control and Identity Management
• Compare and contrast the function and purpose of authentication services
• Given a scenario, select the appropriate authentication, authorization or access control
• Install and configure security controls when performing account management, based on best practices
Domain 6.0 – Cryptography
• Given a scenario, utilize general cryptography concepts
• Given a scenario, use appropriate cryptographic methods
• Given a scenario, use appropriate PKI, certificate management and associated components
WHO SHOULD ATTEND?
• Help desk staff
• IT security professionals
• Networking technicians
• Desktop support technicians
• Storage technicians
• Students looking to gain a better understanding of networks
• Managers with IT
PREREQUISITES
• There are no specific prerequisites
• Basic understanding of computers and networking is preferred
• 2 years or more of IT administration with a focus on security experience is an advantage
• Day to day technical information security experience
• Broad knowledge of security concerns and implementation
