CompTIA Security+

CompTIA Security+ Training Philippines

Download PDF
CompTIA Security+

COURSE CODE

841

DURATION

5 days

Overview

Courses Benefits

CompTIA Security+ certification is an internationally-recognized, vendor-neutral certification for network security. Through this network security course, students will learn security concepts, and tools to help them react to security incidents. More importantly, students will learn how to anticipate security risks and defend against network security attacks.CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. This practical hands-on 5-day course will teach students the fundamental principles of installing and configuring computer and network security systems.

You Will Learn How To

  • Identify network attack strategies and defenses
  • Understand the principles of organizational security and the elements of effective security policies
  • Know the technologies and uses of encryption standards and products
  • Identify network- and host-based security technologies and practices
  • Describe how remote access security is enforced
  • Describe the standards and products used to enforce security on web and communications technologies
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery

Who Should Attend

This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing.

Course Prequisites

Students should have around 24 months experience of networking support. The following skills and knowledge before starting this course:

  • Know the function and basic features of the components of a PC.
  • Use Windows to create and manage files and use basic administrative features (Explorer, Control Panel and Management Consoles).
  • Basic network terminology (such as OSI Model, Topology, Ethernet, TCP/IP).
  • TCP/IP addressing, core protocols, and troubleshooting tools.

Course Investment

Course Outline

Identifying Security Fundamentals

  • Identify Information Security Concepts
  • Identify Basic Security Controls
  • Identify Basic Authentication and Authorization Concepts
  • Identify Basic Cryptography Concepts

Analyzing Risk

  • Analyze Organizational Risk
  • Analyze the Business Impact of Risk

Identifying Security Threats

  • Identify Types of Attackers
  • Identify Social Engineering Attacks
  • Identify Malware
  • Identify Software-Based Threats
  • Identify Network-Based Threats
  • Virtual LANs (VLAN)
  • Identify Wireless Threats
  • Identify Physical Threats

Conducting Security Assessments

  • Identify Vulnerabilities
  • Assess Vulnerabilities
  • Implement Penetration Testing

Implementing Host and Software Security

  • Implement Host Security
  • Implement Cloud and Virtualization Security
  • Implement Mobile Device Security
  • Incorporate Security in the Software Development Lifecycle

Implementing Network Security

  • Configure Network Security Technologies
  • Secure Network Design Elements
  • Implement Secure Networking Protocols and Services
  • Secure Wireless Traffic

Managing Identity Access

  • Implement Identity and Access Management
  • Configure Directory Services
  • Configure Access Services
  • Manage Accounts

Implementing Cryptography

  • Identify Advanced Cryptography Concepts
  • Select Cryptographic Algorithms
  • Configure a Public Key Infrastructure
  • Enroll Certificates
  • Back Up and Restore Certificates and Private Keys
  • Revoke Certificates

Implementing Operational Security

  • Evaluate Security Frameworks and Guidelines
  • Incorporate Documentation in Operational Security
  • Implement Security Strategies
  • Manage Data Security Processes
  • Implement Physical Controls

Addressing Issues

  • Troubleshoot Common Security Issues
  • Respond to Security Incidents
  • Investigate Security Incidents

Ensuring Business Continuity

  • Select Business Continuity and Disaster Recovery Processes
  • Develop a Business Continuity Plan

Schedule

May 6 - 10, 2019 (9:00am - 5:00pm)

Request More Info