CompTIA Security+

This course offers the skill to implement, monitor, and troubleshoot infrastructure, application, information, and operational security. A manufacturer-independent credential that is recognized and appreciated globally. 

CompTIA Security +

This course will offer you the expertise to proof  your full understanding of  IT security with the CompTIA Security + certification. 

It Offers the skill to implement, monitor, and troubleshoot infrastructure, application, information, and operational security. A manufacturer-independent credential that is recognized and appreciated globally. 

This course is aimed at IT professionals and safety coordinators.

Objectives

With this course you achieve the following goals:

·         Security + CompTIA is aimed at IT professionals who want to acquire basic knowledge in the field of IT security or want to have already acquired skills officially confirmed. 

·         The focus of the certification is on general security concepts for access control, authentication and the defense against external attacks.

·          In addition, security aspects for the communication and the infrastructure are treated. The basics of encryption are also a prerequisite for the successful completion of the exam.

Requirements

This course is aimed at:

·         Aspiring security coordinators.

The following requirements are recommended by the manufacturer:

·         Candidates of CompTIA Security + do not need to prove admission requirements. However, it is recommended that you have at least two years of experience in network administration with a focus on security. It is also recommended to first complete the CompTIA Network + certification.

 

Course Outline

Introduction

·         The CompTIA Security + certification

·         Requirements for CompTIA Security +

·         The risk situation

·         Categories of information security

·         Solution approaches at a glance

·         TCSEC, ITSEC and Common Criteria

·         Solution approaches for the practice

·         Security management and policies

·         Questions about this module

Encryption Technology

·         Foundations of Cryptography

·         Symmetric encryption

·         Asymmetric encryption

·         Hybrid encryption

·         PKI in theory and practice

·         Questions about this module

The Identity

·         Identities and their rights

·         authentication methods

·         Protocols for authentication

·         The non-repudiation

·         From handling passwords

·         Questions about this module

 Physical Security

·         access regulations

·         Bauschutz

·         electrostatic discharge

·         power supply

·         Questions about this module

Implement system security

·         Which systems are meant?

·         configuration management

·         Working with guidelines

·         Basics of system hardening

·         A word about mobile devices

·         Software update is not a luxury

·         Viruses and Trojans

·         combat viruses

·         Questions about this module

The user is the interface

·         Classification of information

·         Privacy Policy

·         From dealing with the staff

·         Social engineering

·         E-mail security

·         Secure data

·         Data Loss Prevention

·         Questions about this module

Security for Networks

·         Access Control Models

·         Separation of IT systems

·         TCP / IP core protocols

·         Other transport and network protocols

·         applications

·         Questions about this module

 Vulnerabilities and Attacks

·         Attacks against IT systems

·         Input Validation

·         Attacks against applications

·         Attacks against clients

·         Network attacks

·         Attacks against the cloud

·         steganography

·         From hats and attackers

·         Questions about this module

 Remote Access

·         Virtual Private Network

·         Remote access server

·         Logs for remote access

·         vulnerability

·         Questions about this module

Wireless Technologies and Concepts

·         All standard starts with IEEE 802.11

·         The network construction

·         Security in wireless connections

·         Basic security measures

·         Bluetooth ?? Risks and measures

·         Questions about this module

System and Network Monitoring

·         SNMP protocols

·         performance monitoring

·         The monitoring of networks

·         Monitoring programs

·         firewalls

·         IDS and IPS

·         Unified Threat Management

·         Questions about this module

Penetration Testing and Forensics

·         Penetration Testing

·         Forensics

·         Questions about this module

The Emergency Planning

·         fault tolerance

·         Redundant connections and systems

·         Emergency Preparedness Planning

·         analysis

·         implementation

·         Test the disaster recovery plan

·         Maintenance of disaster recovery

·         Highlights for disaster recovery

·         Questions about the chapter

Security Audit

·         Basics of security audits

·         standards

·         reporting

·         Complementary measures

·         Questions about this module

Fill Form

Training Type:CoorporatePrivate

JOIN AN UPCOMING CLASS FOR THIS COURSE