CompTIA Security+ is a global certification that validates the baseline IT security skills needed to perform core security functions and pursue an IT security career
CompTIA® Security+® (Exam SY0-401) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.
On completion of this course candidates will be competent in:
Identifying strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
Understanding the principles of organizational security and the elements of effective security policies.
Know the technologies and uses of cryptographic standards and products.
Install and configure network- and host-based security technologies.
Describe how wireless and remote access security is enforced.
Describe the standards and products used to enforce security on web and communications technologies.
Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
Possible Employment : Security Architect,Security Engineer, Security Consultant.
Identifying Security Threats
Managing Data, Application,
and Host Security
Implementing Access Control,
Authentication, and Account
Implementing Compliance and
Troubleshooting and Managing
Business Continuity and
Disaster Recovery Planning
Identifying Security Threats and Vulnerabilities
Topic A: The Information Security Cycle Topic B: Information Security Controls Topic C: Authentication Methods Topic D: Cryptography Fundamentals Topic E: Security Policy Fundamentals
Topic A: Social Engineering Topic B: Malware Topic C: Software-Based Threats Topic D: Network-Based Threats Topic E: Wireless Threats and Vulnerabilities Topic F: Physical Threats and Vulnerabilities
Managing Data, Application, and Host Security
Implementing Network Security
Topic A: Manage Data Security Topic B: Manage Application Security Topic C: Manage Device and Host Security Topic D: Manage Mobile Security
Topic A: Configure Security Parameters on Network Devices and Technologies Topic B: Network Design Elements and Components Topic C: Implement Networking Protocols and Services Topic D: Apply Secure Network Administration Principles Topic E: Secure Wireless Traffic
Implementing Access Control, Authentication, and Account Management
Topic A: Access Control and Authentication Services Topic B: Implement Account Management Security Controls
Topic A: Install a CA Hierarchy Topic B: Enroll Certificates Topic C: Secure Network Traffic by Using Certificates Topic D: Renew Certificates Topic E: Back Up and Restore Certificates and Private Keys Topic F: Revoke Certificates
Implementing Compliance and Operational Security
Topic A: Physical Security Topic B: Legal Compliance Topic C: Security Awareness and Training Topic D: Integrate Systems and Data with Third Parties
Topic A: Risk Analysis Topic B: Implement Vulnerability Assessment Tools and Techniques Topic C: Scan for Vulnerabilities Topic D: Mitigation and Deterrent Techniques
Troubleshooting and Managing Security Incidents
Business Continuity and Disaster Recovery Planning
Topic A: Respond to Security Incidents Topic B: Recover from a Security Incident
Topic A: Business Continuity Topic B: Plan for Disaster Recovery Topic C: Execute DRPs and Procedures
This course will be facilitator led training, exam preparations, lab exercises to ensure competency.
After completion of this course the candidate will be prepared to take an international accredited certification exam.
After completion of this course the candidate will receive a certificate of competence from the institution.
Accredited by the department of higher education and training