CompTIA Security+ Certification

CompTIA Security+ (Exam SY0-401) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.

Intended Audience:

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

Course Prerequisites:
Course Objectives:
  • Identify the fundamental concepts of computer security.
  • Identify security threats and vulnerabilities.
  • Manage data, application, and host security.
  • Implement network security.
  • Identify and implement access control and account management security measures.
  • Manage certificates.
  • Identify and implement compliance and operational security measures.
  • Manage risk.
  • Troubleshoot and manage security incidents.
  • Plan for business continuity and disaster recovery.
Course Outline:

Lesson 0: Assessment test

Lesson 1: Security Fundamentals

  • Topic A: The Information Security Cycle
  • Topic B: Information Security Controls
  • Topic C: Authentication Methods
  • Topic D: Cryptography Fundamentals
  • Topic E: Security Policy Fundamentals

Lesson 2: Identifying Security Threats and Vulnerabilities

  • Topic A: Social Engineering
  • Topic B: Malware
  • Topic C: Software-Based Threats
  • Topic D: Network-Based Threats
  • Topic E: Wireless Threats and Vulnerabilities
  • Topic F: Physical Threats and Vulnerabilities

Lesson 3: Managing Data, Application, and Host Security

  • Topic A: Manage Data Security
  • Topic B: Manage Application Security
  • Topic C: Manage Device and Host Security
  • Topic D: Manage Mobile Security

Lesson 4: Implementing Network Security

  • Topic A: Configure Security Parameters on Network Devices and Technologies
  • Topic B: Network Design Elements and Components
  • Topic C: Implement Networking Protocols and Services
  • Topic D: Apply Secure Network Administration Principles
  • Topic E: Secure Wireless Traffic

Lesson 5: Implementing Access Control, Authentication, and Account Management

  • Topic A: Access Control and Authentication Services
  • Topic B: Implement Account Management Security Controls

Lesson 6: Managing Certificates

  • Topic A: Install a CA Hierarchy
  • Topic B: Enroll Certificates
  • Topic C: Secure Network Traffic by Using Certificates
  • Topic D: Renew Certificates
  • Topic E: Back Up and Restore Certificates and Private Keys
  • Topic F: Revoke Certificates

Lesson 7: Implementing Compliance and Operational Security

  • Topic A: Physical Security
  • Topic B: Legal Compliance
  • Topic C: Security Awareness and Training
  • Topic D: Integrate Systems and Data with Third Parties

Lesson 8: Risk Management

  • Topic A: Risk Analysis
  • Topic B: Implement Vulnerability Assessment Tools and Techniques
  • Topic C: Scan for Vulnerabilities
  • Topic D: Mitigation and Deterrent Techniques

Lesson 9: Troubleshooting and Managing Security Incidents

  • Topic A: Respond to Security Incidents
  • Topic B: Recover from a Security Incident

Lesson 10: Business Continuity and Disaster Recovery Planning

  • Topic A: Business Continuity
  • Topic B: Plan for Disaster Recovery
  • Topic C: Execute DRPs and Procedures

Lesson 11: Final test


Trainer

Kouzma Pashkov (pashkovky@gmail.com) – information security expert. Since 2000 has designed and implemented Information Security Management Systems for government and commercial organizations. To approve qualification received top certifications (ISC)2, ISACA, Microsoft, EMC, CompTIA and HP. Since 2005 has taught information security courses in training centers in CIS. Since 2015 has cooperated with ERC Education Complex.