Loading...

Course Description

This series is focused on CompTIA’s Security+ certifications. Security+ is a vendor-neutral certification that is recognized worldwide as a benchmark for information system security best practices. The series is intended for aspiring IT security professionals entering into security. The series follows the CompTIA specified objectives for the SY0-601 exam.

This is a self-paced, asyncronous learning course. It includes virtual labs and a practice certification exam.

Course Outline

  • THREATS, ATTACKS, AND VULNERABILITIES
    • Overview
    • Social Engineering Techniques
    • Malware
    • Password Attacks - Types
    • Password Attacks - Tools
    • Application Attacks - Injections
    • Application Attacks - System Resources
    • Application Attacks - XSS And XSRF
    • Application Attacks - Replay Attacks
    • Network Attacks - DNS Attacks
    • Network Attacks - Layer 2 Attacks
    • Network Attacks - DoS And DDoS
    • Network Attacks - MiTM And MiTB
    • Network Attacks - Wireless
    • Vulnerabilities
    • Threat Intelligence - OSINT
    • Threat Intelligence - Threat Maps And Feeds
    • Threat Intelligence Vulnerability Databases Feed
    • Threat Actors And Vectors
  • CRYPTOGRAPHY
    • Cryptography Concepts
    • Encryption And Steganography
    • Hashing
    • Secure Protocols
    • Symmetric Vs. Asymmetric Encryption
    • PKI Concepts
    • Certificates
    • Keys
    • IPSec
  • IDENTITY AND ACCESS MANAGEMENT
    • Authentication And Authorization
    • Authentication Methods
    • Additional Authentication Methods
    • Biometrics
    • Authentication Protocols - PAP And CHAP
    • Authentication Protocols - EAP And 802.1X
    • Authentication Protocols - RADIUS And TACACS
    • Authentication Protocols - Kerberos
    • Access Control Schemes
    • Account Management - Account Types
    • Account Management - Password Policies
    • Account Management - Account Policies
  • IMPLEMENTING SECURITY
    • Application Security
    • Physical Security
    • Wireless Security
    • Secure Data Destruction
    • Host Security - Endpoint Protection
    • Host Security - Hardening
    • Mobile Device Deployment
    • Mobile Device Management And Enforcement
    • Mobile Device Connections
    • Specialized Systems
    • Network Security - Segmentation
    • Network Security - VPNs
    • Network Security - Proxies And Load Balancing
    • Network Security - Port Security
    • Network Security - Firewalls
    • Network Security - NIDS And NIPS
  • CLOUD AND VIRTUALIZATION
    • Virtualization
    • Cloud Concepts
    • Cloud Services
    • Cloud Models
    • Computing Types
    • Cloud Security Controls
  • OPERATIONAL RESILIENCY
    • Hardware Redundancy
    • Site Redundancy
    • Non-Persistence Concepts
    • Backup And Recovery
  • OPERATIONAL SECURITY AND INCIDENT RESPONSE
    • Network Reconnaissance And Discovery
    • Packet Capture And Replay
    • Vulnerability Scans
    • SIEM And SOAR Systems
    • Pentesting Techniques
    • Pentesting Exercise Types
    • Digital Forensics Concepts
    • Investigational Data Sources
    • Incident Response Process
    • Incident Response Plans
    • Attack Frameworks
  • GOVERNANCE, RISK AND COMPLIANCE
    • Security Controls
    • Regulations, Standards And Frameworks
    • Spotlight On General Data Protection Regulation
    • Organizational Security Policies - Personnel
    • Organizational Security Policies - 3rd Party Risk
    • Organizational Security Policies - Data
    • Organizational Security Policies - Other Areas
    • Risk Management Concepts - Vocabulary
    • Risk Management Concepts - Types & Strategies
    • Risk Management Concepts - Risk Analysis
    • Risk Management Concepts Business Impact Analysis
    • Privacy And Data Sensitivity Breaches & Data Types
    • Privacy, Data Sensitivity - Privacy Enhancing Tech
    • Privacy, Data Sensitivity, Roles, Responsibilities
    • Privacy And Data Sensitivity - Other Areas

Notes

Cost of the actual exam is NOT included in course fee.

This course is offered in partnership with ITProTV and will run on their platform. Students will be emailed a link and access code after registering.

Testimonials

ITProTV is CompTIA's Official Video Training Partner.
Loading...
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .