Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
Gain expertise in managing digitalized oil and gas assets with EnergyEdge's course, focusing on practical applications of digital transformation.
Enhance your knowledge in process safety engineering with EnergyEdge's advanced classroom training course. Register now to secure your spot!
Gain expertise in process safety management engineering through EnergyEdge's course. Participate in our classroom training to enhance your skills and knowledge.
Explore cutting-edge power system training with EnergyEdge. Learn about integrating solar, storage, and DERs for efficient energy management. Enroll now!
Unlock the potential of cross-border electricity trading in Southeast Asia with EnergyEdge. Explore our comprehensive training program for industry professionals.
Enhance your forecasting skills with EnergyEdge's Advanced Load Forecasting Methodology course. Join our classroom training for expert insights.
Develop your expertise in process hazard assessment and lead HAZOP teams effectively with EnergyEdge's classroom training course. Enroll now!
Dive deep into well integrity management with EnergyEdge's classroom training. Take your skills to the next level today!
Our new 20 day part time program is designed to develop students over a longer period to develop their skillset, knowledge and learn all things barbershop in a barbershop environment. You will be taken on a journey by our experienced Educators with in-depth lectures and demonstrations. Students will work initially on real hair mannequin heads before transitioning to clients, all provided by the Academy, learning the renowned Sid Sottung method of hair design. Our nurturing educators work to develop each student until services can be performed independently.