CompTIA Security+

DURATION: 5 days (~40 giờ)    

COURSE INTRODUCTION    

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

COURSE OBJECTIVES:

After finish the course, student will have knowledges and skills to:

  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.

  • Understand the principles of organizational security and the elements of effective security policies.

  • Know the technologies and uses of cryptographic standards and products.

  • Install and configure network- and host-based security technologies.

  • Describe how wireless and remote access security is enforced.

  • Describe the standards and products used to enforce security on web and communications technologies.

  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.

  • Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them

AUDIENCE

  • Systems Administrator
  • Security Administrator
  • Security Specialist
  • Security Engineer
  • Network Administrator
  • Junior IT Auditor/ Penetration Tester
  • Security Consultant

PREREQUISITES:

  • A minimum of two years’ experience in IT administration with a focus on security

  • Day-to-day technical information security experience

  • Broad knowledge of security concerns and implementation, including the topics in the domain list

RELATED COURSES

  • CompTIA Network +

  • CompTIA Linux +

  • CompTIA CySA+

COMPLETION CERTIFICATE

  • After finish the course, student will receive completion certificate issued by CompTIA and SmartPro

COURSE CONTENT

Module 1: Threats, Attacks, and Vulnerabilities

  • Given a scenario, analyze indicators of compromise and determine the type of malware.
  • Compare and contrast types of attacks.
  • Explain threat actor types and attributes.
  • Explain penetration testing concepts.
  • Explain vulnerability scanning concepts.
  • Explain the impact associated with types of vulnerabilities.

Module 2: Technologies and Tools

  • Install and configure network components, both hardware-and software-based, to support organizational security
  •  Given a scenario, use appropriate software tools to assess the security posture of an organization.
  • Given a scenario, troubleshoot common security issues
  • Given a scenario, analyze and interpret output from security technologies
  • Given a scenario, deploy mobile devices securely.
  • Given a scenario, implement secure protocols.

Module 3: Architecture and Design

  • Explain use cases and purpose for frameworks, best practices and secure configuration guides.
  • Given a scenario, implement secure network architecture concepts.
  • Given a scenario, implement secure systems design
  • Explain the importance of secure staging deployment concepts
  • Explain the security implications of embedded systems.
  • Summarize secure application development and deployment concepts.
  • Summarize cloud and virtualization concepts.
  • Explain how resiliency and automation strategies reduce risk.
  • Explain the importance of physical security controls

Module 4: Identity and Access Management

  • Compare and contrast identity and access management concepts
  • Given a scenario, install and configure identity and access services
  • Given a scenario, implement identity and access management controls
  • Given a scenario, differentiate common account management practices.

Module 5: Risk Management

  • Explain the importance of policies, plans and procedures related to organizational security.
  • Summarize business impact analysis concepts
  • Explain risk management processes and concepts
  • Given a scenario, follow incident response procedures.
  • Summarize basic concepts of forensics
  • Explain disaster recovery and continuity of operation concepts
  • Compare and contrast various types of controls.
  • Given a scenario, carry out data security and privacy practices

Module 6: Cryptography and PKI

  • Compare and contrast basic concepts of cryptography
  • Explain cryptography algorithms and their basic characteristics
  • Given a scenario, install and configure wireless security settings
  • Given a scenario, implement public key infrastructure
KHÓA HỌC LIÊN QUAN
TRUNG TÂM KHẢO THÍ
CÓ THỂ BẠN QUAN TÂM
Array
(
)