Web Age Solutions Inc
Providing Technology Training and Mentoring For Modern Technology Adoption
Web Age Aniversary Logo
US Inquiries / 1.877.517.6540
Canadian Inquiries / 1.877.812.8887
Course #:TP2855

CompTIA Security+ Certification Training

The CompTIA Security+ course is designed to help you prepare for the SY0-501 exam. Students will implement and monitor security on networks, applications, and operating systems, and respond to security breaches. *The previous exam, SY0-401 will be retired on July 31, 2018.

Objectives

Upon successful completion of this course, students will be able to:

  • identify the fundamental concepts of computer security.
  • identify security threats and vulnerabilities.
  • examine network security.
  • manage application, data and host security.
  • identify access control and account management security measures.
  • manage certificates.
  • identify compliance and operational security measures.
  • manage risk.
  • manage security incidents.
  • develop business continuity and disaster recovery plans.

Audience

This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

Duration

Five days

Outline of CompTIA Security+ Certification Training

Chapter 1 - Security Fundamentals

  • Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals

Chapter 2 - Identifying Security Threats and Vulnerabilities

  • Social Engineering
  • Malware
  • Physical Threats and Vulnerabilities
  • Software-Based Threats
  • Network-Based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities

Chapter 3 - Managing Data, Application, and Host Security

  • Manage Data Security
  • Manage Application Security
  • Manage Device and Host Security
  • Manage Mobile Security

Chapter 4 - Implementing Network Security

  • Configure Security Parameters on Network Devices and Technologies
  • Network Design Elements and Components
  • Implement Networking Protocols and Services
  • Apply Secure Network Administration Principles
  • Secure Wireless Traffic

Chapter 5 - Implementing Access Control, Authentication, and Account Management

  • Access Control and Authentication Services
  • Implement Account Management Security Controls

Chapter 6 - Managing Certificates

  • Install a Certificate Authority (CA) Hierarchy
  • Enroll Certificates
  • Secure Network Traffic by Using Certificates
  • Renew Certificates
  • Revoke Certificates
  • Back Up and Restore Certificates and Private Keys
  • Restore Certificates and Private Keys

Chapter 7 - Implementing Compliance and Operational Security

  • Physical Security
  • Legal Compliance
  • Security Awareness and Training
  • Integrate Systems and Data with Third Parties

Chapter 8 - Risk Management

  • Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques

Chapter 9 - Troubleshooting and Managing Security Incidents

  • Respond to Security Incidents
  • Recover from a Security Incident

Chapter 10 - Business Continuity and Disaster Recovery Planning

  • Business Continuity
  • Plan for Disaster Recovery
  • Execute Disaster Recovery Plans and Procedures
We regularly offer classes in these and other cities. Atlanta, Austin, Baltimore, Calgary, Chicago, Cleveland, Dallas, Denver, Detroit, Houston, Jacksonville, Miami, Montreal, New York City, Orlando, Ottawa, Philadelphia, Phoenix, Pittsburgh, Seattle, Toronto, Vancouver, Washington DC.
US Inquiries / 1.877.517.6540
Canadian Inquiries / 1.877.812.8887