CompTIA Security+ Official Training & Certification Program by GlobalKnowledge Philippines - SpeedyCourse Philippines
We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Details

This course, will prepare students to pass the current CompTIA Security+ certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field.

Prerequisite: there is no prerequisite, but it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience, with an emphasis on security. Because human error is the number one cause for a network security breach, CompTIA Security+ is recognized by the technology community as a valuable credential that proves competency with information security.

Outline

Lesson 1: Security overview

·       Topic A: Introduction to network security

·       Topic B: Understanding security threats

·       Topic C: Creating a secure network strategy

·       Topic D: Windows Server 2003 server access control

Lesson 2: Authentication

·       Topic A: Introduction to authentication

·       Topic B: Kerberos

·       Topic C: Challenge Handshake Authentication Protocol

·       Topic D: Digital certificates

·       Topic E: Security tokens

·       Topic F: Biometrics


Lesson 3: Attacks and malicious code

·       Topic A: Denial of service attacks

·       Topic B: Man-in-the-middle attacks

·       Topic C: Spoofing

·       Topic D: Replays

·       Topic E: TCP session hijacking

·       Topic F: Social engineering

·       Topic G: Attacks against encrypted data

·       Topic H: Software exploitation

 Lesson 4: Remote access

·       Topic A: Securing remote communications

·       Topic B: Authentication

·       Topic C: Virtual private networks

·       Topic D: Telecommuting vulnerabilities

Lesson 5: E-mail

·       Topic A: Secure e-mail and encryption

·        Topic B: PGP and S/MIME encryption

·        Topic C: E-mail vulnerabilities

Lesson 6: Web security

·       Topic A: SSL/TLS protocol

·        Topic B: Vulnerabilities of Web tools

·        Topic C: Configuring Internet Explorer security

Lesson 7: Directory and file transfer services

·       Topic A: Introduction to directory services

·       Topic B: File transfer services

·        Topic C: File sharing

Lesson 8: Wireless and instant messaging

·       Topic A: IEEE 802.11

·        Topic B: WAP 1.x and WAP 2.0

·        Topic C: Wired equivalent privacy

·        Topic D: Instant messaging

Lesson 9: Network devices

·       Topic A: Understanding firewalls

·        Topic B: Routers

·        Topic C: Switches

·        Topic D: Telecom, cable modem, and wireless devices

·        Topic E: Securing remote access

·        Topic F: Intrusion detection systems

·        Topic G: Network monitoring

Lesson 10: Transmission and storage media

·       Topic A: Transmission media

·       Topic B: Storage media

 Lesson 11: Network security topologies

·       Topic A: Security topologies

·       Topic B: Network Address Translation

·       Topic C: Tunneling

·       Topic D: Virtual Local Area Networks

Lesson 12: Intrusion detection

·       Topic A: Intrusion detection systems

·        Topic B: Network-based and host-based IDS

·        Topic C: Active and passive detection

·        Topic D: Honeypots

·        Topic E: Incident response


Lesson 13: Security baselines

·       Topic A: OS/NOS hardening

·       Topic B: Network hardening

·       Topic C: Application hardening

·       Topic D: Workstations and servers


Lesson 14: Cryptography

·       Topic A: Concepts of cryptography

·       Topic B: Public Key Infrastructure (PKI)

·       Topic C: Key management and life cycle

·       Topic D: Setting up a certificate server


Lesson 15: Physical security

·       Topic A: Access control

·       Topic B: Environment

Lesson 16: Disaster recovery and business continuity

·       Topic A: Disaster recovery

·       Topic B: Business continuity

·       Topic C: Policies and procedures

·       Topic D: Privilege management


Lesson 17: Computer forensics and advanced topics

·        Topic A: Understanding computer forensics

·        Topic B: Risk identification

·        Topic C: Education and training

·        Topic D: Auditing

·        Topic E: Documentation

Reviews
Be the first to write a review about this course.
Write a Review

Global KMC is a private training company that certifies individuals in various IT and business skills.  It is an Authorized Training Center for the International Council of E-Commerce Consultants (EC-Council) - the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigators (CHFI) program, License Penetration Tester (LPT) program and various other programs offered in over 60 countries around the globe.  It is an authority in Digital Forensics training and solutions including multi-media and mobile forensics.  The company is also anAuthorized Training Partner for CompTia offering Security+, A+, Project+, Mobile+, Network+, Cloud+.  Global also offers various technical training on Cisco (CCNA, CCNP);  Microsoft (MCSA, MCSE, Desktop Technician, etc); Linux (Fundamentals, System Admin, Network Admin); CISSPITILIBM-i2 Analysts Notebook, to name a few.

For the Softskills training, Global is known in areas of: Project Management (PMP); Six Sigma (Yellow Belt, Green Belt, Black Belt); Communication; Train-the-Trainers; Risk Management, etc. ...

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.