fbpx
course-banner.jpg

CompTIA Security+ (SECP)

CompTIA is a not-for-profit trade association with the purpose of advancing the interests of IT professionals and IT channel organizations and its industry-leading IT certifications are an important part of that mission. CompTIA's Security+ certification is a foundation-level certificate designed for IT administrators with two years' experience whose job role is focused on system security.

5 Days
From £1,500.00 incl. VAT

Live online events

5 days, 09:00 AM GMT - 05:00 PM GMT

Online

  • £1,500.00 incl. VAT

Description

CompTIA is a not-for-profit trade association with the purpose of advancing the interests of IT professionals and IT channel organizations and its industry-leading IT certifications are an important part of that mission. CompTIA's Security+ certification is a foundation-level certificate designed for IT administrators with two years' experience whose job role is focused on system security.

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

The Official CompTIA® Security+® (Exam SY0-501): 2019 Update is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ (Exam SY0-501) certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.

This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

Audience Profile

This course is designed for information technology (IT) professionals who have networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix®, or Linux®; and who want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles.

This course is also designed for students who are seeking the CompTIA Security+ certification and who want to prepare for the CompTIA Security+ SY0-501 Certification Exam.

Prerequisites

Experience in networking, including configuring security parameters, are strongly recommended.

What's included

  • Study Guide
  • Experienced SECP Instructor
  • Remote access to a virtual lab
  • Exam Voucher (Optional)
  • Certificate on Completion
  • Refreshments (Classroom training)

Exam Details

  • Exam SY0-501

Course Outline

Module 1: Comparing and Contrasting Attacks

Lessons:

  • Compare and Contrast Information Security Roles
  • Explain Threat Actor Types
  • Compare and Contrast Social Engineering Attack Types
  • Determine Malware Types

Module 2: Comparing and Contrasting Security Controls

Lessons:

  • Compare and Contrast Security Control and Framework Types
  • Follow Incident Response Procedures

Module 3: Assessing Security Posture with Software Tools

Lessons:

  • Explain Penetration Testing Concepts
  • Assess Security Posture with Topology Discovery Software Tools
  • Assess Security Posture with Fingerprinting and Sniffing Software Tools
  • Assess Security Posture with Vulnerability Scanning Software Tools

Module 4: Explaining Basic Cryptography Concepts

Lessons:

  • Compare and Contrast Basic Concepts of Cryptography
  • Explain Hashing and Symmetric Cryptographic Algorithms
  • Explain Asymmetric Cryptographic Algorithms

Module 5: Implementing a Public Key Infrastructure

Lessons:

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management

Module 6: Implementing Identity and Access Management Controls

Lessons:

  • Compare and Contrast Identity and Authentication Concepts
  • Install and Configure Authentication Protocols
  • Implement Multifactor Authentication

Module 7: Managing Access Services and Accounts

Lessons:

  • Install and Configure Authorization and Directory Services
  • Implement Access Management Controls
  • Differentiate Account Management Practices
  • Implement Account Auditing and Recertification

Module 8: Implementing a Secure Network Architecture

Lessons:

  • Implement Secure Network Architecture Concepts
  • Install and Configure a Secure Switching Infrastructure
  • Install and Configure Network Access Control
  • Install and Configure a Secure Routing and NAT Infrastructure

Module 9: Installing and Configuring Security Appliances

Lessons:

  • Install and Configure Firewalls and Proxies
  • Install and Configure Load Balancers
  • Install and Configure Intrusion Detection/Prevention Systems
  • Install and Configure Data Loss Prevention (DLP) Systems
  • Install and Configure Logging and SIEM Systems

Module 10: Installing and Configuring Wireless and Physical Access Security

Lessons:

  • Install and Configure a Wireless Infrastructure
  • Install and Configure Wireless Security Settings
  • Explain the Importance of Physical Security Controls

Module 11: Deploying Secure Host, Mobile, and Embedded Systems

Lessons:

  • Implement Secure Hardware Systems Design
  • Implement Secure Host Systems Design
  • Implement Secure Mobile Device Systems Design
  • Implement Secure Embedded Systems Design

Module 12: Implementing Secure Network Access Protocols

Lessons:

  • Implement Secure Network Operations Protocols
  • Implement Secure Remote Access Protocols
  • Implement Secure Remote Administration Protocols

Module 13: Implementing Secure Network Applications

Lessons:

  • Implement Secure Web Services
  • Implement Secure Communications Services
  • Summarize Secure Virtualization Infrastructure
  • Summarize Secure Cloud Services

Module 14: Explaining Risk Management and Disaster Recovery Concepts

Lessons:

  • Explain Risk Management Processes and Concepts
  • Explain Resiliency and Automation Strategies
  • Explain Disaster Recovery and Continuity of Operation Concepts
  • Summarize Basic Concepts of Forensics

Module 15: Summarizing Secure Application Development Concepts

Lessons:

  • Explain the Impact of Vulnerability Types
  • Summarize Secure Application Development Concepts

Module 16: Explaining Organizational Security Concepts

Lessons:

  • Explain the Importance of Security Policies
  • Implement Data Security and Privacy Practices
  • Explain the Importance of Personnel Management

Our registered and postal address is:
The Pinnacle, Office 203, 170 Midsummer Boulevard, Milton Keynes, MK9 1BP

ICSI LTD is registered in England No. 8680530