CompTIA Security+


Course Number: CTIA-102

Duration: 5 days (32.5 hours)

Format: Live, hands-on

CompTIA Security+ Training Overview

This CompTIA® Security+® training teaches attendees how to install and configure systems to secure applications, networks, and devices, as well as how to perform threat analysis and respond appropriately while taking into account applicable policies, laws, and regulations. In addition, this course is preparation for the CompTIA Security+ Certification Exam (SY0-501).

Location and Pricing

Accelebrate offers instructor-led enterprise training for groups of 3 or more online or at your site. Most Accelebrate classes can be flexibly scheduled for your group, including delivery in half-day segments across a week or set of weeks. To receive a customized proposal and price quote for private corporate training on-site or online, please contact us.

In addition, some Business Skills courses are available as live, online classes for individuals.

Objectives

All students will be able to:

  • Compare security roles and security controls
  • Explain threat actors and threat intelligence
  • Perform security assessments
  • Identify social engineering attacks and malware types
  • Summarize basic cryptographic concepts and implement public key infrastructure
  • Implement authentication controls
  • Implement identity and account management controls
  • Implement secure network designs, network security appliances, and secure network protocols
  • Implement host, embedded/Internet of Things, and mobile security solutions
  • Implement secure cloud solutions
  • Explain data privacy and protection concepts
  • Explain data privacy and protection concepts
  • Summarize risk management concepts and implement cybersecurity resilience
  • Explain physical security

Prerequisites

Students should have some IT administration security experience.

Outline

Expand All | Collapse All

Introduction
Security Roles and Security Controls
  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
Threat Actors and Threat Intelligence
  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources
Security Assessments
  • Assess Organizational Security with Network
  • Reconnaissance Tools
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts
Social Engineering and Malware
  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-Based Attacks
Basic Cryptographic Concepts
  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies
Public Key Infrastructure
  • Implement Certificates and Certificate Authorities
  • Implement PKI Management
Authentication Controls
  • Summarize Authentication Design Concepts
  • Implement Knowledge-Based Authentication
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts
Identity and Account Management Controls
  • Implement Identity and Account Types
  • Implement Account Policies
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies
Secure Network Designs
  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers
Network Security Appliances
  • Implement Firewalls and Proxy Servers6
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM
Secure Network Protocols
  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocols
Host Security Solutions
  • Implement Secure Firmware
  • Implement Endpoint Security
  • Explain Embedded System Security Implications
Secure Mobile Solutions
  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections
Secure Application Concepts
  • Analyze Indicators of Application Attacks
  • Analyze Indicators of Web Application Attacks
  • Summarize Secure Coding Practices
  • Implement Secure Script Environments
  • Summarize Deployment and Automation Concepts
Secure Cloud Solutions
  • Summarize Secure Cloud and Virtualization Services
  • Apply Cloud Security Solutions
  • Summarize Infrastructure as Code Concepts
Data Privacy and Protection Concepts
  • Explain Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls
Incident Response
  • Summarize Incident Response Procedures
  • Utilize Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls
Digital Forensics
  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition
Risk Management Concepts
  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts
Cybersecurity Resilience
  • Implement Redundancy Strategies
  • Implement Backup Strategies
  • Implement Cybersecurity Resiliency Strategies
Physical Security
  • Explain the Importance of Physical Site Security Controls
  • Explain the Importance of Physical Host Security Controls
Conclusion

Training Materials:

All CompTIA training students receive:

  • Student Guide
  • CertMaster Labs
  • CertMaster Practice
  • Certification Voucher

Software Requirements:

Accelebrate provides a remote hosted environment.



Learn faster

Our live, instructor-led lectures are far more effective than pre-recorded classes

Satisfaction guarantee

If your team is not 100% satisfied with your training, we do what's necessary to make it right

Learn online from anywhere

Whether you are at home or in the office, we make learning interactive and engaging

Multiple Payment Options

We accept check, ACH/EFT, major credit cards, and most purchase orders



Recent Training Locations

Alabama

Birmingham

Huntsville

Montgomery

Alaska

Anchorage

Arizona

Phoenix

Tucson

Arkansas

Fayetteville

Little Rock

California

Los Angeles

Oakland

Orange County

Sacramento

San Diego

San Francisco

San Jose

Colorado

Boulder

Colorado Springs

Denver

Connecticut

Hartford

DC

Washington

Florida

Fort Lauderdale

Jacksonville

Miami

Orlando

Tampa

Georgia

Atlanta

Augusta

Savannah

Hawaii

Honolulu

Idaho

Boise

Illinois

Chicago

Indiana

Indianapolis

Iowa

Cedar Rapids

Des Moines

Kansas

Wichita

Kentucky

Lexington

Louisville

Louisiana

New Orleans

Maine

Portland

Maryland

Annapolis

Baltimore

Frederick

Hagerstown

Massachusetts

Boston

Cambridge

Springfield

Michigan

Ann Arbor

Detroit

Grand Rapids

Minnesota

Minneapolis

Saint Paul

Mississippi

Jackson

Missouri

Kansas City

St. Louis

Nebraska

Lincoln

Omaha

Nevada

Las Vegas

Reno

New Jersey

Princeton

New Mexico

Albuquerque

New York

Albany

Buffalo

New York City

White Plains

North Carolina

Charlotte

Durham

Raleigh

Ohio

Akron

Canton

Cincinnati

Cleveland

Columbus

Dayton

Oklahoma

Oklahoma City

Tulsa

Oregon

Portland

Pennsylvania

Philadelphia

Pittsburgh

Rhode Island

Providence

South Carolina

Charleston

Columbia

Greenville

Tennessee

Knoxville

Memphis

Nashville

Texas

Austin

Dallas

El Paso

Houston

San Antonio

Utah

Salt Lake City

Virginia

Alexandria

Arlington

Norfolk

Richmond

Washington

Seattle

Tacoma

West Virginia

Charleston

Wisconsin

Madison

Milwaukee

Alberta

Calgary

Edmonton

British Columbia

Vancouver

Manitoba

Winnipeg

Nova Scotia

Halifax

Ontario

Ottawa

Toronto

Quebec

Montreal

Puerto Rico

San Juan