CompTIA Security+

CompTIA Security+ Training Philippines

Download PDF
CompTIA Security+

COURSE CODE

841

DURATION

5 days

Overview

What You Get

  • CompTIA Security+ (SY0-501) Exam Voucher
  • 5 days of high quality classroom training
  • Hands-on Labs
  • CompTIA Security+ Accredited Trainer
  • Access to ActiveLearning's CompTIA Security+ Exam Simulator
  • More than 160 end of chapter drill questions with answer keys
  • 2 full mock exams with answer keys
  • Online access to CompTIA Security+ learning resources
  • Official CompTIA Security+ Digital Courseware
  • Over 30 IT security checklists that you can use back at work
  • Certificate of Attendance
  • Exam Prep Guarantee
  • Lunch, morning and afternoon refreshments
  • Unlimited course refresher for 1 year (Note: exams are not included)

Courses Benefits

CompTIA Security+ certification is an internationally-recognized, vendor-neutral certification for network security. Through this network security course, students will learn security concepts, and tools to help them react to security incidents. More importantly, students will learn how to anticipate security risks and defend against network security attacks.CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. This practical hands-on 5-day course will teach students the fundamental principles of installing and configuring computer and network security systems.

You Will Learn How To

  • Identify network attack strategies and defenses
  • Understand the principles of organizational security and the elements of effective security policies
  • Know the technologies and uses of encryption standards and products
  • Identify network- and host-based security technologies and practices
  • Describe how remote access security is enforced
  • Describe the standards and products used to enforce security on web and communications technologies
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery

Who Should Attend

This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing.

Course Prequisites

Students should have around 24 months experience of networking support. The following skills and knowledge before starting this course:

  • Know the function and basic features of the components of a PC.
  • Use Windows to create and manage files and use basic administrative features (Explorer, Control Panel and Management Consoles).
  • Basic network terminology (such as OSI Model, Topology, Ethernet, TCP/IP).
  • TCP/IP addressing, core protocols, and troubleshooting tools.

Course Investment

Course Outline

Comparing and Contrasting Attacks

  • Compare and Contrast Information Security Roles
  • Explain Threat Actor Types
  • Compare and Contrast Social Engineering Attack Types
  • Determine Malware Types

Comparing and Contrasting Security Controls

  • Compare and Contrast Security Control and Framework Types
  • Follow Incident Response Procedures

Assessing Security Posture with Software Tools

  • Explain Penetration Testing Concepts
  • Assess Security Posture with Topology Discovery Software Tools
  • Assess Security Posture with Fingerprinting and Sniffing Software
    Tools
  • Assess Security Posture with Vulnerability Scanning Software Tools

Explaining Basic Cryptography Concepts

  • Compare and Contrast Basic Concepts of Cryptography
  • Explain Hashing and Symmetric Cryptographic Algorithms
  • Explain Asymmetric Cryptographic Algorithms

Implementing a Public Key Infrastructure

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management

Implementing Identity and Access Management Controls

  • Compare and Contrast Identity and Authentication Concepts
  • Install and Configure Authentication Protocols
  • Implement Multifactor Authentication

Managing Access Services and Accounts

  • Install and Configure Authorization and Directory Services
  • Implement Access Management Controls
  • Differentiate Account Management Practices
  • Implement Account Auditing and Recertification

Implementing a Secure Network Architecture

  • Implement Secure Network Architecture Concepts
  • Install and Configure a Secure Switching Infrastructure
  • Install and Configure Network Access Control
  • Install and Configure a Secure Routing and NAT Infrastructure

Installing and Configuring Security Appliances

  • Install and Configure Firewalls and Proxies
  • Install and Configure Load Balancers
  • Install and Configure Intrusion Detection/Prevention Systems
  • Install and Configure Data Loss Prevention (DLP) Systems
  • Install and Configure Logging and SIEM Systems

Installing and Configuring Wireless and Physical Access

  • Install and Configure a Wireless Infrastructure
  • Install and Configure Wireless Security Settings
  • Explain the Importance of Physical Security Controls

Deploying Secure Host, Mobile, and Embedded Systems

  • Implement Secure Hardware Systems Design
  • Implement Secure Host Systems Design
  • Implement Secure Mobile Device Systems Design
  • Implement Secure Embedded Systems Design

Implementing Secure Network Access Protocols

  • Implement Secure Network Operations Protocols
  • Implement Secure Remote Access Protocols
  • Implement Secure Remote Administration Protocols

Implementing Secure Network Applications

  • Implement Secure Web Services
  • Implement Secure Communications Services
  • Summarize Secure Virtualization Infrastructure
  • Summarize Secure Cloud Services

Explaining Risk Management and Disaster Recovery
Concepts

  • Explain Risk Management Processes and Concepts
  • Explain Resiliency and Automation Strategies
  • Explain Disaster Recovery and Continuity of Operation Concepts
  • Summarize Basic Concepts of Forensics

Summarizing Secure Application Development Concepts

  • Explain the Impact of Vulnerability Types
  • Summarize Secure Application Development Concepts

Explaining Organizational Security Concepts

  • Explain the Importance of Security Policies
  • Implement Data Security and Privacy Practices
  • Explain the Importance of Personnel Management

Schedule

Dec 9 - 13, 2019 (9:00am - 5:00pm)

Reviews

"The instructor was very generous in providing us any information regarding the topics we have discussed. He was able to impart his knowledge to us and answered all our questions. I liked his way of teaching because he was able to provide actual examples."

CompTIA Security+

Maricel Cabrera

IT Senior Specialist, Okada Manila

"The instructor is knowledgeable about the course and made the student learned by stating examples through experience. Will recommend the course to others and most of all the instructor."

CompTIA Security+

Catherine Joy Coronado

IT Manager, BDO

Request More Info