0% found this document useful (0 votes)
52 views11 pages

CompTIA Security Brochure Op01

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views11 pages

CompTIA Security Brochure Op01

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CompTIA Security + SY0-501 Exam

Certification Training

edureka!
About the Course
Edureka’s CompTIA Security+ SY0-501 Training is designed to help you prepare for the new CompTIA Security+ certification exam. You
will be able to establish the core knowledge required of any cybersecurity role. It incorporates the best practices involved in
troubleshooting networks, techniques in risk management, risk mitigation, threat management and intrusion detection, etc., to ensure
that the security professionals have hands-on problem-solving skills.

What will you learn?


Edureka's CompTIA Security+ training will teach you the fundamental principles of installing and configuring cybersecurity controls and
participating in incident response and risk mitigation. You will be able to identify strategies developed by cyber adversaries to attack
networks, deploy countermeasures to defend them, understand the principles of organizational security, and implement the elements
of products.

Who should go for this CompTIA Security+ Training?


Enthusiasts looking to build a career in security domain such as System admin,
Security Consultant, Network Admin, Security Specialist, Security Engineer, etc.
Professionals looking for Junior Penetration Tester and IT Auditor job role
Professionals willing to attain CompTIA’s Security+ Certification.
Cyber Security Enthusiasts

What are the pre-requisites for this CompTIA


Security+ Training?
There are no specific prerequisites to take up this certification but
having an understanding for Linux OS and networking will be an
add on.
What are the objectives of our CompTIA Security+
Training?
On course completion, you will be able to:
Identify potent threats and vulnerabilities that may cause
harm to a network or system
Identify corrective measures for incident response
Implement cryptographic standards and products.
Install, configure, and deploy network components, identity and access
services (Identity & Access Management), and management controls
Understand the principles of organizational security and the elements of
effective security policies.
Implement secure network architecture concepts and systems design.
Describe how wireless and remote access security is enforced.
Identify risks and take corrective measures for risk mitigation and
management
Summarize application and coding vulnerabilities and identify
development and deployment methods designed to mitigate them.
Identify strategies for ensuring business continuity, fault tolerance, and
disaster recovery.

Course Duration
32 Hours

IND 08040423753 | US +1415 682 6002


sales@edureka.co https://www.edureka.co/comptia-security-plus-certification-training
How will I execute the Practicals?
Edureka will provide each participant an access to the virtual lab environment to execute the practicals. Each learner will have access to
the virtual lab for 60 days. You’ll be able to access the lab via your browser which requires minimal hardware configuration.

What are the system requirements for this CompTIA Security+ Online Training?
Hardware Requirements:
Memory – 4 GB RAM
Processor – Intel Core i3 CPU @2.00 GHz or above
Storage – 20 GB HDD/SDD or above

Course Outline

Module 1 - Threats, Attacks, and Vulnerabilities

Objectives:

Compare and contrast different types of social engineering techniques


Given a scenario, analyze potential indicators to determine the type of attack
Analyze potential indicators associated with application and network attacks
Explain different threat actors, vectors, and intelligence sources
Explain the security concerns associated with various types of vulnerabilities
Explain the techniques used in penetration testing

IND 08040423753 | US +1415 682 6002


sales@edureka.co https://www.edureka.co/comptia-security-plus-certification-training
Topics:

Security Policy Frameworks and Compliance


Threat Actors Vulnerability Scanning and Pen Tests
Social Engineering Security Assessment Techniques
Phishing & Types of Malware Pen Testing Concepts
Trojans and Spyware Vulnerability Scanning Concepts
Security Control Types Exploitation Frameworks
Defence in Depth

Module 2 - Security Posture & Incident Response

Objectives:

Summarize the techniques used in security assessments


Explain the importance of security concepts in an enterprise environment.
Use the appropriate tool to assess organizational security
Summarize the importance of policies, processes, and procedures for incident response
Given an incident, utilize appropriate data sources to support an investigation
Apply mitigation techniques or controls to secure an environment

Topics:

Topology & Service Discovery Preparation Phase


Packet Capture Tools Identification Phase
Remote Access Trojans Containment Phase
Honeypots and Honeynets Eradication and Recovery Phases
Incident Response Procedures

IND 08040423753 | US +1415 682 6002


sales@edureka.co https://www.edureka.co/comptia-security-plus-certification-training
Module 3 - Cryptography & PKI
Objectives:

Summarize the basics of cryptographic concepts


Implement Symmetric & Asymmetric Algorithms
Understand Cryptographic Attacks & how to mitigate them
Implement public key infrastructure

Topics:

Cryptographic Terminology and Ciphers Digital Certificates


Cryptographic Products Certificate Authorities
Hashing Algorithms Types of Certificate
Symmetric Algorithms Implementing PKI
Asymmetric Algorithms Storing and Distributing Keys
Diffie-Hellman and Elliptic Curve Key Status and Revocation
Transport Encryption PKI Trust Models
Cryptographic Attacks PGP / GPG
PKI Standards

Module 3 - Cryptography & PKI


Objectives:

Summarize authentication and authorization design concepts


Implement identity and account management controls
Implement authentication and authorization solutions
Understand LDAP & Active Directory

IND 08040423753 | US +1415 682 6002


sales@edureka.co https://www.edureka.co/comptia-security-plus-certification-training
Topics:

Access Control Systems Federation and Trusts


Identification & Authentication Federated Identity Protocols
LAN Manager / NTLM Formal Access Control Models
Kerberos Account Types
PAP, CHAP, and MS-CHAP Windows Active Directory
Password Attacks Creating and Managing Accounts
Token-based & Biometric Authentication Account Policy Enforcement
Common Access Card Credential Management Policies
Authorization Account Restrictions
Directory Services Accounting and Auditing
RADIUS and TACACS+

Module 5 - Secure Network Architecture and Design


Objectives:

Understand how to make a network secure


Implement secure network designs
Install and Configure Security Appliances

Topics:

Network Zones and Segments Network Access Control


Subnetting Routing Infrastructure
Switching Infrastructure Network Address Translation
Switching Attacks and Hardening Software Defined Networking
Endpoint Security Basic & Stateful Firewalls

IND 08040423753 | US +1415 682 6002


sales@edureka.co https://www.edureka.co/comptia-security-plus-certification-training
Implementing a Firewall or Gateway Denial of Service Attacks
Web Application Firewalls Load Balancers
Proxies and Gateways

Module 6 - Secure Wireless Access & System Design

Objectives:

Explain the security implications of embedded and specialized systems


Implement host or application security solutions
Install and configure wireless security settings
Understand various hardening concepts
Deploying Secure Host Embedded Systems

Topics:

Wireless LANs Hardware / Firmware Security


WEP and WPA Peripheral Device Security
Wi-Fi Authentication Secure Configurations
Extensible Authentication Protocol OS Hardening
Wi-Fi Site Security Patch Management
Personal Area Networks Embedded Systems
Trusted Computing Security for Embedded Systems

IND 08040423753 | US +1415 682 6002


sales@edureka.co https://www.edureka.co/comptia-security-plus-certification-training
Module 7 - Secure Protocols and Services

Objectives:

Understand all the important security protocols & where they are used
Implementing Secure Network Access Protocols
Given a scenario, implement secure protocols
Implementing Secure Network Applications

Topics:

DHCP Security Voice and Video Services


DNS Security Voice over IP (VoIP)
Network Management Protocols Remote Access Architecture
HTTP and Web Servers Virtual Private Networks
SSL / TLS and HTTPS IPsec and IKE
Web Security Gateways Remote Access Servers
Email Services Remote Administration Tools
S/MIME Hardening Remote Access Infrastructure
File Transfer

Module 8 – Mobile & Cloud Security


Objectives:

Summarize mobile and cloud computing concepts


Explain the importance of physical security controls
Implement secure mobile solutions
Apply cybersecurity solutions to the cloud

IND 08040423753 | US +1415 682 6002


sales@edureka.co https://www.edureka.co/comptia-security-plus-certification-training
Topics:

Mobile Device Deployments Cloud Security Best Practices


Mobile Connection Methods Site Layout and Access
Mobile Access Control Systems Gateways and Locks
Enforcement and Monitoring Alarm Systems
Virtualization Technologies Surveillance
Virtualization Security Best Practices Hardware Security
Cloud Computing Environmental Controls

Module 9 - Risk Management & Secure Application Development

Objectives:

Summarize secure application development, deployment, and automation concepts


Summarize risk management processes and concepts
Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture

Topics:

Business Impact Analysis Web Browser Exploits


Identification of Critical Systems Secure Application Design
Risk Assessment Secure Coding Concepts
Risk Mitigation Auditing Applications
Application Vulnerabilities Secure DevOps
Application Exploits

IND 08040423753 | US +1415 682 6002


sales@edureka.co https://www.edureka.co/comptia-security-plus-certification-training
Module 10 - Organisational Security & Digital Forensics

Objectives:

Implement cybersecurity resilience


Explain the key aspects of digital forensics
Explaining Disaster Recovery Concepts
Explain the importance of policies to organizational security
Explain privacy and sensitive data concepts in relation to security

Topics:

Continuity of Operations Planning Data Roles


Disaster Recovery Planning Data Sensitivity Labeling and Handling
Resiliency Strategies Data Wiping and Disposal
Recovery Sites Privacy and Employee Conduct Policies
Backup Plans and Policies Security Policy Training
Resiliency and Automation Strategies Forensic Procedures
Corporate Security Policy Collecting Evidence
Personnel Management Policies Capturing System Images
Interoperability Agreements Handling and Analyzing Evidence

IND 08040423753 | US +1415 682 6002


sales@edureka.co https://www.edureka.co/comptia-security-plus-certification-training

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy