CompTIA Security+
Short Description
Full Description
CompTIA Security+ is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
-
Module 01: Network Security
- Lesson 01: Implement Security configuration parameters on network devices and other technologies
- Lesson 02: Given a scenario, use secure network administration principles
- Lesson 03: Explain Network design elements and components
- Lesson 04: Given a scenario, implement common protocols and services
- Lesson 05: Given a scenario, troubleshoot security issues related to wireless networking
-
Module 02: Compliance and Operational Security
- Lesson 01: Explain the importance of risk related concepts
- Lesson 02: Summarize the security implications of integrating systems and data with third parties
- Lesson 03: Given a scenario, implement appropriate risk mitigation strategies
- Lesson 04: Given a scenario, implement basic forensic procedures
- Lesson 05: Summarize common incident response procedures
- Lesson 06: Explain the importance of security related awareness and training
- Lesson 07: Compare and contrast physical security and environmental controls
- Lesson 08: Summarize risk management best practices
- Lesson 09: Given a scenario, select the appropriate control to meet the goals of security
-
Module 03: Threats and Vulnerabilities
- Lesson 01: Explain types of malware
- Lesson 02: Summarize Various types of attacks
- Lesson 03: Summarize social engineering attacks and the associated effectiveness with each attack
- Lesson 04: Explain types of wireless attacks
- Lesson 05: Explain types of application attacks
- Lesson 06: Analyze a scenario and select the appropriate type of mitigation and deterrent techniques
- Lesson 07: Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities
- Lesson 08: Explain the proper use of penetration testing versus vulnerability scanning
-
Module 04: Application, Data and Host Security
- Lesson 01: Explain the importance of application security controls and techniques
- Lesson 02: Summarize mobile security concepts and technologies
- Lesson 03: Given a scenario, select the appropriate solution to establish host security
- Lesson 04: Implement the appropriate controls to ensure data security
- Lesson 05: Compare and contrast alternative methods to mitigate security risks in static environments
-
Module 05: Access Control and Identity Management
-
Module 06: Cryptography