
CompTIA Security+ Training and Certification
Program Features:
- Â Instructor-led learning
- Â Covers 6 domains required to become an IT security professional
- Â Industry-recognized course completion certificate
- Â Hands-on based learning
- Â Exam Voucher Included
- Â Access to CertMaster Labs (Optional)
Delivery Mode: Live Virtual Classroom
Prerequisites: There are no specific prerequisites to take up this certification but it is recommended that individuals take the Network+ certification before taking the CompTIA Security+ 601 training and certification exam.
Target Audience: The CompTIA Security+ course is ideal for professionals who are working in the roles of system administrators, network administrators, security administrators, and IT auditors.
Key Learning Outcomes:
By the end of this online CompTIA Security+ training, you will be able to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
- Identify, analyze, and respond to security events and incidents
Â
Course Curriculum:
Lesson 01 – Attacks, Threats, and Vulnerabilities
Comparing Security Roles and Controls
- Â Compare and Contrast Information Security Roles
- Â Compare and Contrast Security Control and Framework Types
- Â Q&A with Knowledge Checks
Threat Actors and Threat
- Â Threat Actor Types and Attack Vectors
- Â Threat Intelligence Sources
- Â Q&A with Knowledge Checks
Performing Security Assessments
- Â Assess Organizational Security with Network Reconnaissance Tools
- Â Security Concerns with General Vulnerability Types
- Â Vulnerability Scanning Techniques
- Â Penetration Testing Concepts
- Â Q&A with Knowledge Checks
Identifying Social Engineering and Malware
- Â Compare and Contrast Social Engineering Techniques.
- Â Analyze Indicators of Malware-Based Attacks
- Â Q&A with Knowledge Checks
Lesson 02 – Architecture and Design
Summarizing Basic Cryptographic Concepts
- Â Compare and Contrast Cryptographic Ciphers
- Â Summarize Cryptographic Modes of Operation
- Â Summarize Cryptographic Use Cases and Weaknesses
- Â Summarize Other Cryptographic Technologies
- Q&A with Knowledge Checks
Implementing Public Key Infrastructure
- Â Certificates and Certificate Authorities
- Â PKI Management
- Â Q&A with Knowledge Checks
Implementing Authentication Controls
- Â Authentication Design Concepts
- Â Knowledge-Based Authentication
- Â Authentication Technologies
- Â Biometrics Authentication Concepts
- Q&A with Knowledge Checks
Implementing Identity and Account Management Controls
- Â Identity and Account Types
- Â Account Policies
- Â Authorization Solutions
- Â Importance of Personnel Policies
- Q&A with Knowledge Checks
Â
Lesson 03 – Implementation
Implementing Secure Network Designs Secure Network Designs
- Â Secure Switching and Routing
- Â Secure Wireless Infrastructure
- Â Load Balancers
- Â Q&A with Knowledge Checks
Implementing Network Security Appliances
- Â Firewalls and Proxy Servers
- Â Network Security Monitoring
- Â Use of SIEM
- Â Q&A with Knowledge Checks
Implementing Secure Network Protocols Secure Network Operations Protocols
- Â Secure Application Protocols
- Â Secure Remote Access Protocols
- Â Q&A with Knowledge Checks
Implementing Host Security Solutions
- Â Secure Firmware
- Â Endpoint Security
- Â Embedded System Security Implications
- Q&A with Knowledge Checks
Implementing Secure Mobile Solutions
- Mobile Device Management
- Â Secure Mobile Device Connections
- Q&A with Knowledge Checks
Â
Lesson 04 – Operations and Incident Response
Secure Application Concepts
- Â Analyze Indicators of Application Attacks
- Â Analyze Indicators of Web Application Attacks
- Â Secure Coding Practices
- Â Secure Script Environments
- Â Deployment and Automation Concepts
- Q&A with Knowledge Checks
Implementing Secure Cloud Solutions
- Â Secure Cloud and Virtualization Services
- Â Apply Cloud Security Solutions
- Â Infrastructure as Code Concepts
- Q&A with Knowledge Checks
Explaining Data Privacy and Protection Concepts
- Â Privacy and Data Sensitivity Concepts
- Â Privacy and Data Protection Controls
- Â Q&A with Knowledge Checks
Performing Incident Response Incident Response Procedures
- Â Utilize Appropriate Data Sources for Incident Response
- Â Apply Mitigation Controls
- Â Q&A with Knowledge Checks
Explaining Digital Forensics
- Â Key Aspects of Digital Forensics Documentation
- Â Key Aspects of Digital Forensics Evidence Acquisition
- Â Q&A with Knowledge Checks
Lesson 05 – Governance, Risk, and Compliance
Summarizing Risk Management Concepts
- Â Risk Management Processes and Concepts
- Â Business Impact Analysis Concepts
- Q&A with Knowledge Checks
Implementing Cybersecurity Resilience
- Â Redundancy Strategies
- Â Backup Strategies
- Cybersecurity Resilience Strategies
- Q&A with Knowledge Checks
Explaining Physical Security
- Â Importance of Physical Site Security Controls
- Importance of Physical Host Security Controls
- Â Q&A with Knowledge Checks
Â
Bank Transfer Option Details
Transfer payments should be made to:
Account Name: Upgraded Era Solutions Ltd
Bank: Access Bank
Account Number: 0070621595
For more information or inquiry, kindly send us a mail to info@upgradedera.com