COMP103 CompTIA Security+ (Live Course)
Course Overview
Course Duration: 5 days
The CompTIA Security+ course provides students with core knowledge required to show competency in risk identification and participate in risk mitigation activities, provide infrastructure, application, operational and information security, apply security controls to maintain confidentiality, integrity and availability, identify appropriate technologies and products, and operate with an awareness of applicable policies, laws and regulations. This course focuses on all official exam objectives of the CompTIA Security+ examination. In order to attain the Security+ certification students must pass the Security+ SY0-301 examination.
What You'll Learn
- Explain the security function and purpose of network devices and technologies -
- Apply and implement secure network administration principles -
- Distinguish and differentiate network design elements and compounds -
- Implement and use common protocols -
- Identify commonly used default network ports -
- Implement wireless network in a secure manner -
- Explain risk related concepts -
- Carry out appropriate risk mitigation strategies -
- Execute appropriate incident response procedures -
- Explain the importance of security related awareness and training Compare and contrast aspects of business continuity
- Explain the impact and proper use of environmental controls
- Execute disaster recovery plans and procedures
- Exemplify the concepts of confidentiality, integrity and availability (CIA) Analyze and differentiate among types of malware
- Analyze and differentiate among types of attacks Analyze and differentiate among types of social engineering attacks
- Analyze and differentiate among types of wireless attacks
- Analyze and differentiate among types of application attacks
- Analyze and differentiate among types of mitigation and deterrent techniques
- Implement assessment tools and techniques to discover security threats and vulnerabilities
- Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning
- Explain the importance of application security
- Carry out appropriate procedures to establish host security
- Explain the importance of data security
- Explain the function and purpose of authentication services
- Explain the fundamental concepts and best practices related to authentication, authorization and access control
- Implement appropriate security controls when performing account management
- Summarize general cryptography concepts
- Use and apply appropriate cryptographic tools and products
- Explain the core concepts of public key infrastructure
- Implement PKI, certificate management and associated components
What You'll Get
Prerequisite
- A minimum of 2 years experience in IT administration with a focus on security
- Day to day technical information security experience
- Broad knowledge of security concerns and implementation
If you have 3 or more students that need to be trained and don't see a course or location near you, call your Borderless Learning representative at 760-688-4045 to discuss getting another public session added to our schedule.
Choose | Year | Start | End | Location | GTR |
---|