Course Outline
1 – Comparing Security Roles and Controls
- Topic 1A: Compare and Contrast Information Security Roles
- Topic 1B: Compare and Contrast Security Control and Framework Types
2 – Explaining Threat Actors and Threat Intelligence
- Topic 2A: Explain Threat Actor Types and Attack Vectors
3 – Performing Security Assessments
- Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
- Topic 3B: Explain Security Concerns with General Vulnerability Types
- Topic 3C: Summarize Vulnerability Scanning Techniques
- Topic 3D: Explain Penetration Testing Concepts
4 – Identifying Social Engineering and Malware
- Topic 4A: Compare and Contrast Social Engineering Techniques
- Topic 4B: Analyze Indicators of Malware-Based Attacks
5 – Summarizing Basic Cryptographic Concepts
- Topic 5A: Compare and Contrast Cryptographic Ciphers
- Topic 5B: Summarize Cryptographic Modes of Operation
- Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
- Topic 5D: Summarize Other Cryptographic Technologies
6 – Implementing Public Key Infrastructure
- Topic 6A: Implement Certificates and Certificate Authorities
- Topic 6B: Implement PKI Management
7 – Implementing Authentication Controls
- Topic 7A: Summarize Authentication Design Concepts
- Topic 7B: Implement Knowledge-Based Authentication
- Topic 7C: Implement Authentication Technologies
- Topic 7D: Summarize Biometrics Authentication Concepts
8 – Implementing Identity and Account Management Controls
- Topic 8A: Implement Identity and Account Types
- Topic 8B: Implement Account Policies
- Topic 8C: Implement Authorization Solutions
- Topic 8D: Explain the Importance of Personnel Policies
9 – Implementing Secure Network Designs
- Topic 9A: Implement Secure Network Designs
- Topic 9B: Implement Secure Switching and Routing
- Topic 9C: Implement Secure Wireless Infrastructure
- Topic 9D: Implement Load Balancers
10 – Implementing Network Security Appliances
- Topic 10A: Implement Firewalls and Proxy Servers
- Topic 10B: Implement Network Security Monitoring
- Topic 10C: Summarize the Use of SIEM
11 – Implementing Secure Network Protocols
- Topic 11A: Implement Secure Network Operations Protocols
- Topic 11B: Implement Secure Application Protocols
- Topic 11C: Implement Secure Remote Access Protocols
12 – Implementing Host Security Solutions
- Topic 12A: Implement Secure Firmware
- Topic 12B: Implement Endpoint Security
- Topic 12C: Explain Embedded System Security Implications
13 – Implementing Secure Mobile Solutions
- Topic 13A: Implement Mobile Device Management
- Topic 13B: Implement Secure Mobile Device Connections
14 – Summarizing Secure Application Concepts
- Topic 14A: Analyze Indicators of Application Attacks
- Topic 14B: Analyze Indicators of Web Application Attacks
- Topic 14C: Summarize Secure Coding Practices
- Topic 14D: Implement Secure Script Environments
- Topic 14E: Summarize Deployment and Automation Concepts
15 – Implementing Secure Cloud Solutions
- Topic 15A: Summarize Secure Cloud and Virtualization Services
- Topic 15B: Apply Cloud Security Solutions
- Topic 15C: Summarize Infrastructure as Code Concepts
16 – Explaining Data Privacy and Protection Concepts
- Topic 16A: Explain Privacy and Data Sensitivity Concepts
- Topic 16B: Explain Privacy and Data Protection Controls
17 – Performing Incident Response
- Topic 17A: Summarize Incident Response Procedures
- Topic 17B: Utilize Appropriate Data Sources for Incident Response
- Topic 17C: Apply Mitigation Controls
18 – Explaining Digital Forensics
- Topic 18A: Explain Key Aspects of Digital Forensics Documentation
- Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
19 – Summarizing Risk Management Concepts
- Topic 19A: Explain Risk Management Processes and Concepts
20 – Implementing Cybersecurity Resilience
- Topic 20A: Implement Redundancy Strategies
- Topic 20B: Implement Backup Strategies
- Topic 20C: Implement Cybersecurity Resiliency Strategies
21 – Explaining Physical Security
- Topic 21A: Explain the Importance of Physical Site Security Controls
- Topic 21B: Explain the Importance of Physical Host Security Controls
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Learning Objectives
In this course you will:
-
- Prepare for the CompTIA Security+ exam
-
- Confidently explain and define an array of security vulnerabilities
-
- Navigate the complexities of secure system and network design
-
- Explore the defensive measures like PKI, firewalls and IDS
-
- Implement robust identity management and access control
No special instructions regarding this course's target audience provided. Please contact us to discuss if you are unsure whether this course is for you!
No special prerequisites for this course provided. If you are unsure whether you might need to take another course first, please contact us to discuss.
Ten (10) business days’ notice is required to reschedule a class with no additional fees. Notify TOPTALENT LEARNING as soon as possible at 469-721-6100 or by written notification to info@toptalentlearning.com to avoid rescheduling penalties.
Please contact our team at 469-721-6100; we will gladly guide you through the online purchasing process.
You will receive a receipt and an enrollment confirmation sent to the email you submitted at purchase. Your enrollment email will have instructions on how to access the class. Any additional questions our team is here to support you. Please call us at 469-721-6100.
If a student is 15 minutes late, they risk losing their seat to a standby student. If a student is 30 minutes late or more, they will need to reschedule. A no-show fee will apply. Retakes are enrolled on a stand-by basis. The student must supply previously issued courseware. Additional fees may apply.
You will receive a ‘Certificate of Completion’ once you complete the class. If you purchased an exam voucher for the class, a team member from TOPTALENT LEARNING will reach out to discuss your readiness for the voucher and make arrangements to send it.