Length: 5 Days
The Security+ certification is considered to be the minimum level of certification for all IT security positions beyond entry-level. This course delivers the core knowledge required to pass the exam and the skills necessary to advance to an intermediate-level security job.
To ensure your success in this course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts.
CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months’ experience in networking, including configuring security parameters, are strongly recommended. Students can obtain this level of skill and knowledge by taking any of the following courses:
- CompTIA A+:
- CompTIA Network+
Additional introductory courses or work experience in application development and programming, or in network and operating system administration for any software platform or system, are helpful but not required.
WHAT YOU’LL LEARN
On course completion, you will be able to:
- Identify the fundamental components of information security.
- Analyze risk.
- Identify various threats to information security.
- Conduct security assessments to detect vulnerabilities.
- Implement security for hosts and software.
- Implement security for networks.
- Manage identity and access.
- Implement cryptographic solutions in the organization.
- Implement security at the operational level.
- Address security incidents.
- Ensure the continuity of business operations in the event of an incident.
WHO SHOULD ATTEND
This course is targeted toward the IT professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.
Lesson 1: Identifying Security Fundamentals
- Identify Information Security Concepts
- Identify Basic Security Controls
- Identify Basic Authentication and Authorization
- Identify Basic Cryptography Concepts
Lesson 2: Analyzing Risk
- Analyze Organizational Risk
- Analyze the Business Impact of Risk
Lesson 3: Identifying Security Threats
- Identify Types of Attackers
- Identify Social Engineering Attacks
- Identify Malware
- Identify Software-Based Threats
- Identify Network-Based Threats
- Identify Wireless Threats
- Identify Physical Threats
Lesson 4: Conducting Security Assessments
- Identify Vulnerabilities
- Assess Vulnerabilities
- Implement Penetration Testing
Lesson 5: Implementing Host and Software Security
- Implement Host Security
- Implement Cloud and Virtualization Security
- Implement Mobile Device Security
- Incorporate Security in the Software Development Lifecycle
Lesson 6: Implementing Network Security
- Configure Network Security Technologies
- Secure Network Design Elements
- Implement Secure Networking Protocols and Services
- Secure Wireless Traffic
Lesson 7: Managing Identity and Access
- Implement Identity and Access Management
- Configure Directory Services
- Configure Access Services
- Manage Accounts
Lesson 8: Implementing Cryptography
- Identify Advanced Cryptography Concepts
- Select Cryptographic Algorithms
- Configure a Public Key Infrastructure
- Enroll Certificates
- Back Up and Restore Certificates and Private Keys
- Revoke Certificates
Lesson 9: Implementing Operational Security
- Evaluate Security Frameworks and Guidelines
- Incorporate Documentation in Operational Security
- Implement Security Strategies
- Manage Data Security Processes
- Implement Physical Controls
Lesson 10: Addressing Security Incidents
- Troubleshoot Common Security Issues
- Respond to Security Incidents
- Investigate Security Incidents
Lesson 11: Ensuring Business Continuity
- Select Business Continuity and Disaster Recovery
- Develop a Business Continuity Plan