CompTIA Security+

Image

CompTIA Security+

CompTIA Security+ certification ensures that the candidate is highly skilled in installing, maintaining, securing. CompTIA Security+ certified professionals also possess good customer-relation communication skills. This certification course provides a perfect technical base for entry-level computer Security service.

The Security+ Certification from CompTIA is a valuable credential which is universally recognized. The Security+ exam validates your ability to apply knowledge of information security skills. Getting certified with CompTIA Security+, you can prove your mettle in the technology community which mandates this certification as a prerequisite for IT security jobs.

Risk identification and mitigation Ability to provide operational, information, application and infrastructure level security Secure the network to maintain availability, integrity and confidentiality of critical information Operate within a set of rules, policies and regulations wherever applicable

Prerequisites

Prior to attending our CompTIA Security+ Course Training in Delhi, students should be familiar with:

  • CompTIA A+ Certification
  • CompTIA Network+ Certification

Course Objectives

  • identify the fundamental concepts of computer security.
  • identify security threats and vulnerabilities.
  • examine network security.
  • manage application, data and host security.
  • identify access control and account management security measures.
  • manage certificates.
  • identify compliance and operational security measures.
  • manage risk.
  • manage security incidents.
  • develop business continuity and disaster recovery plans.

 


 

Course Curriculum


Section 1 : Security Fundamentals

  • Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals


Section 2: Identifying Security Threats and Vulnerabilities

  • Social Engineering
  • Malware
  • Physical Threats and Vulnerabilities
  • Software-Based Threats
  • Network-Based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities


Section 3 : Managing Data, Application, and Host Security

  • Manage Data Security
  • Manage Application Security
  • Manage Device and Host Security
  • Manage Mobile Security


Section 4 : Implementing Network Security

  • Configure Security Parameters on Network Devices and Technologies
  • Network Design Elements and Components
  • Implement Networking Protocols and Services
  • Apply Secure Network Administration Principles
  • Secure Wireless Traffic


Section 5 : Implementing Access Control, Authentication, and Account Management

  • Access Control and Authentication Services
  • Implement Account Management Security Controls


Section 6 : Managing Certificates

  • Install a Certificate Authority (CA) Hierarchy
  • Enroll Certificates
  • Secure Network Traffic by Using Certificates
  • Renew Certificates
  • Revoke Certificates
  • Back Up and Restore Certificates and Private Keys
  • Restore Certificates and Private Keys


Section 7 : Implementing Compliance and Operational Security

  • Physical Security
  • Legal Compliance
  • Security Awareness and Training
  • Integrate Systems and Data with Third Parties


Section 8 : Risk Management

  • Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques


Section 9 : Troubleshooting and Managing Security Incidents

  • Respond to Security Incidents
  • Recover from a Security Incident


Section 10 : Business Continuity and Disaster Recovery Planning

  • Business Continuity
  • Plan for Disaster Recovery
  • Execute Disaster Recovery Plans and Procedures