• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Security+

Security+

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • 5 days

  • All levels

Description

Security+ training course description

A hands on course aimed at getting delegates successfully through the CompTia Security+ examination.

What will you learn

  • Explain general security concepts.

  • Describe the security concepts in communications.

  • Describe how to secure an infrastructure.

  • Recognise the role of cryptography.

  • Describe operational/organisational security.

Security+ training course details

  • Who will benefit:

Those wishing to pass the Security+ exam.

  • Prerequisites:

TCP/IP foundation for engineers

  • Duration

5 days

Security+ training course contents
  • General security concepts


Non-essential services and protocols. Access
control: MAC, DAC, RBAC. Security attacks: DOS,
DDOS, back doors, spoofing, man in the middle,
replay, hijacking, weak keys, social engineering,
mathematical, password guessing, brute force,
dictionary, software exploitation. Authentication:
Kerberos, CHAP, certificates, usernames/
passwords, tokens, biometrics. Malicious code:
Viruses, trojan horses, logic bombs, worms.
Auditing, logging, scanning.

  • Communication security


Remote access: 802.1x, VPNs, L2TP, PPTP,
IPsec, RADIUS, TACACS, SSH. Email: S/MIME,
PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS,
IM, packet sniffing, privacy, Javascript, ActiveX,
buffer overflows, cookies, signed applets, CGI,
SMTP relay. LDAP. sftp, anon ftp, file sharing,
sniffing, 8.3 names. Wireless: WTLS, 802.11,
802.11x, WEP/WAP.

  • Infrastructure security


Firewalls, routers, switches, wireless, modems,
RAS, PBX, VPN, IDS, networking monitoring,
workstations, servers, mobile devices. Media
security: Coax, UTP, STP, fibre. Removable
media. Topologies: Security zones, DMZ, Intranet,
Extranet, VLANs, NAT, Tunnelling. IDS: Active/
passive, network/host based, honey pots, incident
response. Security baselines: Hardening OS/NOS,
networks and applications.

  • Cryptography basics


Integrity, confidentiality, access control,
authentication, non-repudiation. Standards and
protocols. Hashing, symmetric, asymmetric. PKI:
Certificates, policies, practice statements,
revocation, trust models. Key management and
certificate lifecycles. Storage: h/w, s/w, private key
protection. Escrow, expiration, revocation,
suspension, recovery, destruction, key usage.

  • Operational/Organisation security


Physical security: Access control, social
engineering, environment. Disaster recovery:
Backups, secure disaster recovery plans.
Business continuity: Utilities, high availability,
backups. Security policies: AU, due care, privacy,
separation of duties, need to know, password
management, SLAs, disposal, destruction, HR
policies. Incident response policy. Privilege
management: Users, groups, roles, single sign
on, centralised/decentralised. Auditing. Forensics:
Chain of custody, preserving and collecting
evidence. Identifying risks: Assets, risks, threats,
vulnerabilities. Role of education/training. Security
documentation.

About The Provider

Tags

Reviews