DURATION: 5 days (~40 giờ)
COURSE INTRODUCTION
CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.
COURSE OBJECTIVES:
After finish the course, student will have knowledges and skills to:
-
Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
-
Understand the principles of organizational security and the elements of effective security policies.
-
Know the technologies and uses of cryptographic standards and products.
-
Install and configure network- and host-based security technologies.
-
Describe how wireless and remote access security is enforced.
-
Describe the standards and products used to enforce security on web and communications technologies.
-
Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
-
Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them
AUDIENCE
- Systems Administrator
- Security Administrator
- Security Specialist
- Security Engineer
- Network Administrator
- Junior IT Auditor/ Penetration Tester
- Security Consultant
PREREQUISITES:
-
A minimum of two years’ experience in IT administration with a focus on security
-
Day-to-day technical information security experience
-
Broad knowledge of security concerns and implementation, including the topics in the domain list
RELATED COURSES
-
CompTIA Network +
-
CompTIA Linux +
-
CompTIA CySA+
COMPLETION CERTIFICATE
-
After finish the course, student will receive completion certificate issued by CompTIA and SmartPro
COURSE CONTENT
Module 1: Threats, Attacks, and Vulnerabilities
- Given a scenario, analyze indicators of compromise and determine the type of malware.
- Compare and contrast types of attacks.
- Explain threat actor types and attributes.
- Explain penetration testing concepts.
- Explain vulnerability scanning concepts.
- Explain the impact associated with types of vulnerabilities.
Module 2: Technologies and Tools
- Install and configure network components, both hardware-and software-based, to support organizational security
- Given a scenario, use appropriate software tools to assess the security posture of an organization.
- Given a scenario, troubleshoot common security issues
- Given a scenario, analyze and interpret output from security technologies
- Given a scenario, deploy mobile devices securely.
- Given a scenario, implement secure protocols.
Module 3: Architecture and Design
- Explain use cases and purpose for frameworks, best practices and secure configuration guides.
- Given a scenario, implement secure network architecture concepts.
- Given a scenario, implement secure systems design
- Explain the importance of secure staging deployment concepts
- Explain the security implications of embedded systems.
- Summarize secure application development and deployment concepts.
- Summarize cloud and virtualization concepts.
- Explain how resiliency and automation strategies reduce risk.
- Explain the importance of physical security controls
Module 4: Identity and Access Management
- Compare and contrast identity and access management concepts
- Given a scenario, install and configure identity and access services
- Given a scenario, implement identity and access management controls
- Given a scenario, differentiate common account management practices.
Module 5: Risk Management
- Explain the importance of policies, plans and procedures related to organizational security.
- Summarize business impact analysis concepts
- Explain risk management processes and concepts
- Given a scenario, follow incident response procedures.
- Summarize basic concepts of forensics
- Explain disaster recovery and continuity of operation concepts
- Compare and contrast various types of controls.
- Given a scenario, carry out data security and privacy practices
Module 6: Cryptography and PKI
- Compare and contrast basic concepts of cryptography
- Explain cryptography algorithms and their basic characteristics
- Given a scenario, install and configure wireless security settings
- Given a scenario, implement public key infrastructure