CompTIA - Security+ - Training Courses | Afi U.

CompTIA - Security+

CompTIA® Security+® (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.  
CompTIA Authorized Partner

Upcoming sessions

Show all sessionsarrow icon
Guaranteed to run
  • Duration: 5 days
  • Regular price: $3,625
  • Preferential price: $3,025tip icon

Course outline

Languages
These scheduled public sessions are offered in English or in French. The educational material is in English.
CertificationCertification Exam Objectives : SY0-601
Audience

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.

Prerequisites
To ensure your success in this course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts.
Objectives
In this course, you will implement information security across a variety of different contexts.
You will:
  • Identify the fundamental components of information security.
  • Analyze risk.
  • Identify various threats to information security.
  • Conduct security assessments to detect vulnerabilities.
  • Implement security for hosts and software.
  • Implement security for networks.
  • Manage identity and access.
  • Implement cryptographic solutions in the organization.
  • Implement security at the operational level.
  • Address security incidents.
  • Ensure the continuity of business operations in the event of an incident.

Contents

Lesson 1: Comparing Security Roles and Security Controls
• Compare and Contrast Information Security Roles
• Compare and Contrast Security Control and Framework Types
Lesson 2: Explaining Threat Actors and Threat Intelligence
• Explain Threat Actor Types and Attack Vectors
• Explain Threat Intelligence Sources
Lesson 3: Performing Security Assessments
• Assess Organizational Security with Network
• Reconnaissance Tools
• Explain Security Concerns with General Vulnerability Types
• Summarize Vulnerability Scanning Techniques
• Explain Penetration Testing Concepts
Lesson 4: Identifying Social Engineering and Malware
• Compare and Contrast Social Engineering Techniques
• Analyze Indicators of Malware-Based Attacks
Lesson 5: Summarizing Basic Cryptographic Concepts
• Compare and Contrast Cryptographic Ciphers
• Summarize Cryptographic Modes of Operation
• Summarize Cryptographic Use Cases and Weaknesses
• Summarize Other Cryptographic Technologies
Lesson 6: Implementing Public Key Infrastructure
• Implement Certificates and Certificate Authorities
• Implement PKI Management
Lesson 7: Implementing Authentication Controls
• Summarize Authentication Design Concepts
• Implement Knowledge-Based Authentication
• Implement Authentication Technologies
• Summarize Biometrics Authentication Concepts
Lesson 8: Implementing Identity and Account Management Controls
• Implement Identity and Account Types
• Implement Account Policies
• Implement Authorization Solutions
• Explain the Importance of Personnel Policies
Lesson 9: Implementing Secure Network Designs
• Implement Secure Network Designs
• Implement Secure Switching and Routing
• Implement Secure Wireless Infrastructure
• Implement Load Balancers
Lesson 10: Implementing Network Security Appliances
• Implement Firewalls and Proxy Servers
• Implement Network Security Monitoring
• Summarize the Use of SIEM
Lesson 11: Implementing Secure Network Protocols
• Implement Secure Network Operations Protocols
• Implement Secure Application Protocols
• Implement Secure Remote Access Protocols
Lesson 12: Implementing Host Security Solutions
• Implement Secure Firmware
• Implement Endpoint Security
• Explain Embedded System Security Implications
Lesson 13: Implementing Secure Mobile Solutions
• Implement Mobile Device Management
• Implement Secure Mobile Device Connections
Lesson 14: Summarizing Secure Application Concepts
• Analyze Indicators of Application Attacks
• Analyze Indicators of Web Application Attacks
• Summarize Secure Coding Practices
• Implement Secure Script Environments
• Summarize Deployment and Automation Concepts
Lesson 15: Implementing Secure Cloud Solutions
• Summarize Secure Cloud and Virtualization Services
• Apply Cloud Security Solutions
• Summarize Infrastructure as Code Concepts
Lesson 16: Explaining Data Privacy and Protection Concepts
• Explain Privacy and Data Sensitivity Concepts
• Explain Privacy and Data Protection Controls
Lesson 17: Performing Incident Response
• Summarize Incident Response Procedures
• Utilize Appropriate Data Sources for Incident Response
• Apply Mitigation Controls
Lesson 18: Explaining Digital Forensics
• Explain Key Aspects of Digital Forensics Documentation
• Explain Key Aspects of Digital Forensics Evidence Acquisition
Lesson 19: Summarizing Risk Management Concepts
• Explain Risk Management Processes and Concepts
• Explain Business Impact Analysis Concepts
Lesson 20: Implementing Cybersecurity Resilience
• Implement Redundancy Strategies
• Implement Backup Strategies
• Implement Cybersecurity Resiliency Strategies
Lesson 21: Explaining Physical Security
• Explain the Importance of Physical Site Security Controls
• Explain the Importance of Physical Host Security Controls

Surround yourself with the best

Ralph Pierre Pelry
Trainer