CompTIA Security+

CompTIA Security+ Training Philippines

Download PDF
CompTIA Security+

COURSE CODE

841

DURATION

5 days

Overview

Courses Benefits

CompTIA Security+ certification is an internationally-recognized, vendor-neutral certification for network security. Through this network security course, students will learn security concepts, and tools to help them react to security incidents. More importantly, students will learn how to anticipate security risks and defend against network security attacks.CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. This practical hands-on 5-day course will teach students the fundamental principles of installing and configuring computer and network security systems.

You Will Learn How To

  • Identify network attack strategies and defenses
  • Understand the principles of organizational security and the elements of effective security policies
  • Know the technologies and uses of encryption standards and products
  • Identify network- and host-based security technologies and practices
  • Describe how remote access security is enforced
  • Describe the standards and products used to enforce security on web and communications technologies
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery

Who Should Attend

This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing.

Course Prequisites

Students should have around 24 months experience of networking support. The following skills and knowledge before starting this course:

  • Know the function and basic features of the components of a PC.
  • Use Windows to create and manage files and use basic administrative features (Explorer, Control Panel and Management Consoles).
  • Basic network terminology (such as OSI Model, Topology, Ethernet, TCP/IP).
  • TCP/IP addressing, core protocols, and troubleshooting tools.

Course Investment

Course Outline

Security Fundamentals

  • Security Concepts
  • Why is Security Important?
  • Security Fundamentals
  • Access Control
  • Identification and Authentication
  • Accounting
  • Training
  • Threats
  • Types and Sources of Threats
  • What Makes a Network Secure?
  • Social Engineering
  • Malware
  • Network Attack Strategies
  • Operational Security
  • Corporate Security Policy
  • Risk Management
  • Privilege Policies
  • Disposal / Destruction Policy
  • HR Policy
  • Incident Response Policy

Cryptography

  • Cryptography
  • What is Cryptography?
  • Encryption Technologies
  • Cryptographic Attacks
  • Steganography
  • Public Key Infrastructure
  • What is PKI?
  • Implementing PKI
  • Cryptographic Standards

Implementing Local Security

  • Site Security
  • Physical Access Controls
  • Environmental Security
  • Network Security
  • Secure Network Topologies
  • Virtual LANs (VLAN)
  • Network Address Translation
  • Tunneling
  • Network Interconnections
  • Switches
  • Routers
  • Firewalls
  • SNMP
  • Network Access Control
  • Wireless Access Security
  • Wireless Technologies
  • Wireless LAN Security
  • Operating System Security
  • Computer Hardening
  • Hardening Windows
  • Hardening Other OS
  • Virtualization Technologies
  • Services and Protocols
  • Hardware and Software Updates
  • Authentication Technologies
  • Directory Services
  • Application Security
  • File and Print Services
  • Storage Security
  • Databases
  • DHCP Security
  • DNS Security
  • Auditing and Intrusion Detection Systems
  • Systems and Performance Monitoring
  • Audit Logs
  • Vulnerability Assessments
  • Intrusion Detection Systems
  • Honeypots

Implementing Remote Security

  • Remote Access Security
  • What is Remote Access?
  • Remote Access Infrastructure
  • Remote Connectivity Protocols
  • Remote Access Server
  • Enterprise Remote Access Authentication
  • Remote Authentication Protocols
  • Hardening Remote Access Infrastructure
  • Securing Email and Messaging Communications
  • Email Standards
  • Email Application Security
  • Email Authentication and Confidentiality
  • Instant Messaging and VoIP
  • File Transfer
  • Securing Web Services
  • HTTP
  • SSL / TLS
  • Web Servers
  • Web Browsers
  • Desktop Security Applications

Disaster Recovery and Business Continuity

  • Disaster Recovery and Business Continuity
  • Disaster Recovery Planning
  • Business Continuity
  • Secure Recovery
  • Backup Strategies

Schedule

Sept 17 - 21, 2018 (9:00am - 5:00pm)

Request More Info