Overview

The CompTIA® Security+® course is designed to help you prepare for the SY0-401 exam. Students will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.

Who Should Attend

This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

Course Objectives

Upon successful completion of this course, students will be able to: identify the fundamental concepts of computer security. identify security threats and vulnerabilities. examine network security. manage application, data and host security. identify access control and account management security measures. manage certificates. identify compliance and operational security measures. manage risk. manage security incidents. develop business continuity and disaster recovery plans.

Next Steps and Related Courses
  • Certified Ethical Hacker (CEH)

1 - Security Fundamentals

  • Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals

2 - Identifying Security Threats and Vulnerabilities

  • Social Engineering
  • Malware
  • Physical Threats and Vulnerabilities
  • Software-Based Threats
  • Network-Based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities

3 - Managing Data, Application, and Host Security

  • Manage Data Security
  • Manage Application Security
  • Manage Device and Host Security
  • Manage Mobile Security

4 - Implementing Network Security

  • Configure Security Parameters on Network Devices and Technologies
  • Network Design Elements and Components
  • Implement Networking Protocols and Services
  • Apply Secure Network Administration Principles
  • Secure Wireless Traffic

5 - Implementing Access Control, Authentication, and Account Management

  • Access Control and Authentication Services
  • Implement Account Management Security Controls

6 - Managing Certificates

  • Install a Certificate Authority (CA) Hierarchy
  • Enroll Certificates
  • Secure Network Traffic by Using Certificates
  • Renew Certificates
  • Revoke Certificates
  • Back Up and Restore Certificates and Private Keys
  • Restore Certificates and Private Keys

7 - Implementing Compliance and Operational Security

  • Physical Security
  • Legal Compliance
  • Security Awareness and Training
  • Integrate Systems and Data with Third Parties

8 - Risk Management

  • Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques

9 - Troubleshooting and Managing Security Incidents

  • Respond to Security Incidents
  • Recover from a Security Incident

10 - Business Continuity and Disaster Recovery Planning

  • Business Continuity
  • Plan for Disaster Recovery
  • Execute Disaster Recovery Plans and Procedures