India

CompTIA Security+ Certification Training

You'll become proficient in basic security concepts such as attacks and mitigation, security applications, risk assessment, disaster recovery and incident reporting, and vulnerability assessment.
Temecula, CA P.O. Box 760,, Temecula, CA 92593
(951) 9723600

Course at a Glance

Mode of learning : Online - Instructor Lead(LVC)

Domain / Subject : Engineering & Technology

Function : Information Technology(IT)

Trainer name : Tracey Rossi

Duration : 80 Hours

Difficulty : Medium

CompTIA  Security+ Certification Training

In this program, you'll gain the skills you need to begin a career as a security professional and prepare yourself to take the CompTIA™ Security+ exam. You'll become proficient in basic security concepts such as attacks and mitigation, security applications, risk assessment, disaster recovery and incident reporting, and vulnerability assessment. This program will allow you to practice in virtual interactive lab environments. This online certificate program is offered in partnership with major colleges, universities, and other accredited education providers.

Objectives

By the end of this program, you'll be able to:

  • Explain general cryptography concepts
  • Explain basic hashing concepts and map algorithms
  • Explain and implement basic encryption applications and tools
  • Explain core concepts of PKI
  • Implement PKI and Certificate Services
  • Identify security threats
  • Assess security risks for system hardware and peripherals
  • Implement OS hardening practice and procedures
  • Identify, explain and implement ports and protocols
  • Identify network elements and components
  • Identify network security tools and apply them appropriately
  • Identify best practices for Access Control and identify the best models
  • Organize users and computers into appropriate security groups
  • Apply file and print permissions
  • Implement logical access control methods
  • Summarize the different authentication models and deploy them appropriately
  • Explain and apply physical security methods
  • Establish application security
  • Implement Security Applications
  • Explain hardware virtualization
  • Identify the vulnerabilities of wireless networking
  • Use monitoring tools on systems and networks
  • Compare and contrast various monitoring methodologies
  • Evaluate proper logging procedures
  • Conduct audits of system security settings
  • Conduct assessments on risk mitigation
  • Carry out vulnerability assessments
  • Explain the use of penetration testing versus vulnerability scanning
  • Explain redundancy planning and its components
  • Implement disaster recovery procedures
  • Execute appropriate incident response procedures
  • Identify and explain applicable legislation and organizational policies
  • Explain environmental controls
  • Reduce the risk of social engineering

Requirements

This program can be taken on a PC or a Mac. This program is compatible with the Windows XP and later operating systems and IE 7 and later browsers. High-speed Internet is recommended.

Adobe Flash Player and Adobe Acrobat Reader are required for this program. In addition, you will need PowerPoint, Windows Media Player Series 11 or later, DirectX 9+, and Java.

Note: All elements, except the Online Lab System, are available on Mac computers. Instructors will assist students in setting up a home virtual lab system.

The following materials will be included in your tuition:

  • CompTIA Security+ All-in-One Exam Guide

Prerequisites

Although it's not a prerequisite, it is helpful if you have at least two years of technical networking experience with an emphasis on security. The CompTIA™ Network+ certification is also recommended.

All of our programs are self-paced and open enrollment, so you can start them when you want and finish them at your own pace. 

 

Course Syllabus

  • Organizational Security; Social Engineering; General Cryptography Concepts; Cryptographic Algorithms and Protocols; Public Key Infrastructure (PKI)
  • Access Control; Physical Device and Media Security; Network Infrastructure Attacks; Network Design Elements and Components; Network Security; Threat Mitigation
  • Wireless Security; Operating System Hardening; Application Security; Security Baselines
  • Vulnerability Assessments and Auditing; Redundancy, Disaster Recovery, and Incident Response

Photos

Write Your Own Review


Write your review here (required)


Consider:
Is the price of course overrated?
would you recommend this course to others?
Is duration of the course sufficient enough?
Did you like the faculties?
What would you prefer in future classroom or online learning?


Disclaimer: The contents of the course & Institute are obtained from the institute’s website by automated scraping or manual updates. For the latest information, please refer the institute website directly. For any discrepancies in the content, contact us at