Security+ is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ (Exam SY0-501) certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today’s job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
Target audience This course is designed for information technology (IT) professionals who:
have networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks;
are familiarity with other operating systems, such as macOS®, Unix®, or Linux®;
want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles.
This course is also designed for students who are seeking the CompTIA Security+ certification and who want to prepare for the CompTIA Security+ SY0-501 Certification Exam.
To ensure your success in this course, you should have:
basic Windows user skills and a fundamental understanding of computer and networking concepts;
CompTIA A+ and Network+ certifications, or equivalent knowledge;
at least six to nine months’ experience in networking, including configuring security parameters, are strongly recommended.
Program:
Lesson 1: Comparing and Contrasting Attacks
Compare and Contrast Information Security Roles
Explain Threat Actor Types
Compare and Contrast Social Engineering Attack Types
Determine Malware Types
Lesson 2: Comparing and Contrasting Security Controls
Compare and Contrast Security Control and Framework Types
Follow Incident Response Procedures
Lesson 3: Assessing Security Posture with Software Tools
Explain Penetration Testing Concepts
Assess Security Posture with Topology Discovery Software Tools
Assess Security Posture with Fingerprinting and Sniffing Software Tools
Assess Security Posture with Vulnerability Scanning Software Tools
Lesson 4: Explaining Basic Cryptography Concepts
Compare and Contrast Basic Concepts of Cryptography
Explain Hashing and Symmetric Cryptographic Algorithms
Explain Asymmetric Cryptographic Algorithms
Lesson 5: Implementing a Public Key Infrastructure
Implement Certificates and Certificate Authorities
Implement PKI Management
Lesson 6: Implementing Identity and Access Management Controls
Compare and Contrast Identity and Authentication Concepts
Install and Configure Authentication Protocols
mplement Multifactor Authentication
Lesson 7: Managing Access Services and Accounts
Install and Configure Authorization and Directory Services
Implement Access Management Controls
Differentiate Account Management Practices
Implement Account Auditing and Recertification
Lesson 8: Implementing a Secure Network Architecture
Implement Secure Network Architecture Concepts
Install and Configure a Secure Switching Infrastructure
Install and Configure Network Access Control
Install and Configure a Secure Routing and NAT Infrastructure
Lesson 9: Installing and Configuring Security Appliances
Install and Configure Firewalls and Proxies
Install and Configure Load Balancers
Install and Configure Intrusion Detection/Prevention Systems
Install and Configure Data Loss Prevention (DLP) Systems
Install and Configure Logging and SIEM Systems
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Install and Configure a Wireless Infrastructure
Install and Configure Wireless Security Settings
Explain the Importance of Physical Security Controls
Lesson 11: Deploying Secure Host, Mobile, and Embedded Systems
After completing this course, students will be able to:
compare and contrast attacks;
compare and contrast security controls;
use security assessment tools;
explain basic cryptography concepts;
implement a public key infrastructure;
implement identity and access management controls;
manage access services and accounts;
implement a secure network architecture;
install and configure security appliances;
install and configure wireless and physical access security;
deploy secure host, mobile, and embedded systems;
implement secure network access protocols;
implement secure network applications;
explain risk management and disaster recovery concepts;
describe secure application development concepts;
explain organizational security concepts.
Koolitus aitab valmistuda eksamiks: CompTIA Security+ SY0-501 Certification Exam
Koolitaja: Peep Võrno Peep on serverite ja võrkude vastu suurt huvi tundnud juba aastast 1992. Koolitajana on ta aktiivsemalt tegutsenud alates aastast 2003.
Sertifikaadid ja tunnistused:Microsoft Certified Trainer (MCT) aastast 2003
Koolitushind sisaldab:
õppematerjale;
koolitaja konsultatsiooni õpitud teemade kohta e-posti teel pärast koolitust;
tunnistust.
Lisaks pakume:
vajadusel tasuta korduskoolitust kui tunned, et mõni oskus vajab täiendamist või pidid endast mittesõltuvatel põhjustel koolituse katkestama;