CompTIA Security+ Certification Course Overview
This CompTIA Security+ training course will help you gain skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, and laws.
Skills Covered
Secure networks and applications
Perform threat analysis
Risk Management
Cryptography
Identity and Access Management
LAN
Secure Protocols
Vulnerability Scanning Assessment
Incident Response
CompTIA Security+ Certification Course Curriculum
Elgibility
The CompTIA Security+ course is ideal for professionals who are working in the roles of system administrators, network administrators, security administrators, and IT auditors.
-
01 Introduction
-
02 The CIA of Security
-
03 Threat Actors
-
04 What is Risk
-
05 Managing Risk
-
06 Using Guides for Risk Assessment
-
07 Security Controls
-
08 Interesting Security Controls
-
09 Defense in Depth
-
10 IT Security Governance
-
11 Security Policies
-
12 Frameworks
-
13 Quantitative Risk Calculations
-
14 Business Impact Analysis
-
15 Organizing Data
-
16 Security Training
-
17 Third Party Agreements
-
01 Cryptography Basics
-
02 Cryptographic Methods
-
03 Symmetric Cryptosystems
-
04 Symmetric Block Modes
-
05 RSA Cryptosystems
-
06 Diffie-Hellman
-
07 PGP GPG
-
08 Hashing
-
09 HMAC
-
10 Steganography
-
11 Certificates and Trust
-
12 Public Key Infrastructure
-
13 Cryptographic Attacks
-
01 Identification
-
02 Authorization Concepts
-
03 Access Control List
-
04 Password Security
-
05 Linux File Permissions
-
06 Windows File Permissions
-
07 User Account Management
-
08 AAA
-
09 Authentication Methods
-
10 Single Sign On
-
01 OS Utilities
-
02 OS Utilities ipconfig
-
03 Network Scanners
-
04 Protocol Analyzers
-
05 SNMP
-
06 Logs
-
01 Denial of Service
-
02 Host Threats
-
03 Man in the Middle
-
04 System Resiliency
-
05 RAID
-
06 NAS and SAN
-
07 Physical Hardening
-
08 RFI, EMI and ESD
-
09 Host Hardening
-
10 Data and System Security
-
11 Disk Encryption
-
12 Hardware Firmware Security
-
13 Secure OS Types
-
14 Securing Peripherals
-
15 Malware
-
16 Analyzing Output
-
17 IDS and IPS
-
18 Automation Strategies
-
19 Data Destruction
-
01 LAN Review
-
02 Network Topologies Review
-
03 Network Zone Review
-
04 Network Access Controls
-
05 The Network Firewall
-
06 Proxy Servers
-
07 Honeypots
-
08 Virtual Private Networks
-
09 IPSec
-
10 NIDS NIPS
-
11 SIEM
-
01 Wireless Review
-
02 Living in Open Networks
-
03 Vulnerabilities with Wireless Access Points
-
04 Cracking WEP
-
05 Cracking WPA
-
06 Cracking WPS
-
07 Wireless Hardening
-
08 Wireless Access Points
-
09 Virtualization Basics
-
10 Virtual Security
-
11 Containers
-
12 IaaS
-
13 PaaS
-
14 SaaS
-
15 Deployment Models
-
16 Static Hosts
-
17 Mobile Connectivity
-
18 Deploying Mobile Devices
-
19 Mobile Enforcement
-
20 Mobile Device Management
-
21 Physical Controls
-
22 HVAC
-
23 Fire Suppression
-
01 Secure Applications and Protocols
-
02 Network Models
-
03 Know Your Protocols TCP IP
-
04 Know Your Protocols Applications
-
05 Transport Layer Security
-
06 Internet Service Hardening
-
07 Protecting Your Servers
-
08 Secure Code Development
-
09 Secure Deployment Concepts
-
10 Code Quality and Testing
-
01 Vulnerability Scanning Tools
-
02 Vulnerability Scanning Assessment
-
03 Social Engineering Principles
-
04 Social Engineering Attacks
-
05 Attacking Web Sites
-
06 Attacking Applications
-
07 Exploiting a Target
-
08 Vulnerability Impact
-
01 Incident Response
-
02 Digital Forensics
-
03 Contingency Planning
-
04 Backups