CompTIA Security+
CompTIA Security+ Training Philippines

Overview
What You Get
- CompTIA Security+ (SY0-501) Exam Voucher
- 5 days of high quality classroom or live online training
- Hands-on Labs
- CompTIA Security+ Accredited Instructor
- Access to ActiveLearning's Virtual Labs
- More than 160 end of chapter drill questions with answer keys
- 2 full mock exams with answer keys
- Online access to CompTIA Security+ learning resources
- Official CompTIA Security+ Digital Courseware
- Over 30 IT security checklists that you can use back at work
- Certificate of Attendance
- Exam Prep Guarantee
- Unlimited course refresher for 1 year (Note: exams are not included)
Course Benefits
CompTIA Security+ certification is an internationally-recognized, vendor-neutral certification for network security. Through this network security course, students will learn security concepts, and tools to help them react to security incidents. More importantly, students will learn how to anticipate security risks and defend against network security attacks.
CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. This practical hands-on 5-day course will teach students the fundamental principles of installing and configuring computer and network security systems.
You Will Learn How To
- Identify network attack strategies and defenses
- Understand the principles of organizational security and the elements of effective security policies
- Know the technologies and uses of encryption standards and products
- Identify network and host-based security technologies and practices
Who Should Attend
This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking and IT security professionals, PC support analysts and application developers.
About the Exam
- Maximum of 90 questions
- Multiple choice and performance-based
- 90 minutes
- Passing Score: 750 (scale of 100 - 900)
- Testing Provider: Pearson Vue Testing Centers or Online Testing
Course Investment
Course Outline
Comparing and Contrasting Attacks
- Compare and Contrast Information Security Roles
- Explain Threat Actor Types
- Compare and Contrast Social Engineering Attack Types
- Determine Malware Types
Comparing and Contrasting Security Controls
- Compare and Contrast Security Control and Framework Types
- Follow Incident Response Procedures
Assessing Security Posture with Software Tools
- Explain Penetration Testing Concepts
- Assess Security Posture with Topology Discovery Software Tools
- Assess Security Posture with Fingerprinting and Sniffing Software Tools
- Assess Security Posture with Vulnerability Scanning Software Tools
Explaining Basic Cryptography Concepts
- Compare and Contrast Basic Concepts of Cryptography
- Explain Hashing and Symmetric Cryptographic Algorithms
- Explain Asymmetric Cryptographic Algorithms
Implementing a Public Key Infrastructure
- Implement Certificates and Certificate Authorities
- Implement PKI Management
Implementing Identity and Access Management Controls
- Compare and Contrast Identity and Authentication Concepts
- Install and Configure Authentication Protocols
- Implement Multifactor Authentication
Managing Access Services and Accounts
- Install and Configure Authorization and Directory Services
- Implement Access Management Controls
- Differentiate Account Management Practices
- Implement Account Auditing and Recertification
Implementing a Secure Network Architecture
- Implement Secure Network Architecture Concepts
- Install and Configure a Secure Switching Infrastructure
- Install and Configure Network Access Control
- Install and Configure a Secure Routing and NAT Infrastructure
Installing and Configuring Security Appliances
- Install and Configure Firewalls and Proxies
- Install and Configure Load Balancers
- Install and Configure Intrusion Detection/Prevention Systems
- Install and Configure Data Loss Prevention (DLP) Systems
- Install and Configure Logging and SIEM Systems
Installing and Configuring Wireless and Physical Access
- Install and Configure a Wireless Infrastructure
- Install and Configure Wireless Security Settings
- Explain the Importance of Physical Security Controls
Deploying Secure Host, Mobile, and Embedded Systems
- Implement Secure Hardware Systems Design
- Implement Secure Host Systems Design
- Implement Secure Mobile Device Systems Design
- Implement Secure Embedded Systems Design
Implementing Secure Network Access Protocols
- Implement Secure Network Operations Protocols
- Implement Secure Remote Access Protocols
- Implement Secure Remote Administration Protocols
Implementing Secure Network Applications
- Implement Secure Web Services
- Implement Secure Communications Services
- Summarize Secure Virtualization Infrastructure
- Summarize Secure Cloud Services
Explaining Risk Management and Disaster Recovery Concepts
- Explain Risk Management Processes and Concepts
- Explain Resiliency and Automation Strategies
- Explain Disaster Recovery and Continuity of Operation Concepts
- Summarize Basic Concepts of Forensics
Summarizing Secure Application Development Concepts
- Explain the Impact of Vulnerability Types
- Summarize Secure Application Development Concepts
Explaining Organizational Security Concepts
- Explain the Importance of Security Policies
- Implement Data Security and Privacy Practices
- Explain the Importance of Personnel Management
Schedule
Mar 22 - 26, 2021 (Also available Live Online Training)
Reviews
"Ms. Kim is a great lecturer/trainer, she make sure the topics will discuss it clearly. If you have questions or clarifications she was able to explain more better."
PAM Delivery Lead, Infocentric Solutions Inc.
"Definitely a recommendation for future trainings. Expectations have been met. "
Linux System Administrator, BDO Unibank Inc.
"The instructor is very accommodating to all questions. It gives me a better picture of what It Security is. "
DBA, PLDT Global Corp. (Phils.)
"All was good, lesson flow is smooth. "
IT Security Analyst, Cambridge University Press
"The instructor was very generous in providing us any information regarding the topics we have discussed. He was able to impart his knowledge to us and answered all our questions. I liked his way of teaching because he was able to provide actual examples."
IT Senior Specialist, Okada Manila
"The instructor is knowledgeable about the course and made the student learned by stating examples through experience. Will recommend the course to others and most of all the instructor."
IT Manager, BDO