CompTIA On-Demand: CompTIA Security + Certification Training Course Outline
*** Note: This is an On-Demand Self Study Class, 5-days of content, $1,295 ***
You can take this class at any time, there are no set dates. It covers the same content as the 5-day instructor-led class of the same name. The cost for this CompTIA On-Demand class is $1,295. Customers must call us directly to purchase this class at 800-288-8221.
CompTIA On-Demand Learner Profiles
CompTIA On-Demand is a self-study training solution that was designed for two types of learners. First, CompTIA On-Demand is a great fit for individuals with considerable IT experience who don't need a traditional 5-day class to prepare for a CompTIA exam. They can pick and choose topics to make the most effective use of their time. Second, CompTIA On-Demand is perfect for highly-motivated individuals who are new to a technology and need to space their learning over a period of weeks or months. These learners can take their time and repeat sections as needed until they master the new concepts.
About CompTIA On-Demand
Our CompTIA On-Demand classes are self-study courses with 30 to 40 hours of content. They include hours of videos, hands-on labs using the actual software, and knowledge checks that mirror the content found in the traditional live instructor-led version of this course. Those features are all part of the standard CompTIA On-Demand training. But don't settle for any other self-study class! Check out the "ONLC Extras" that you get when purchasing this course from us.
ONLC Training Centers bundles in valuable extras with our CompTIA On-Demand Courses. These extras are not available from other training companies.
Certification Exam Vouchers Included (A $320 value!)
All of our CompTIA classes include the cost of the CompTIA exam vouchers. With this class, a voucher for exam SY0-401 is included--a $320 value. Students must schedule when and where they will take the exam through Pearson Vue, the CompTIA testing service.
Exam Prep Software.
This practice exam software will help you prepare for you actual certification exam. These dynamic practice tests provide links to the training content. If you answer a question wrong, you can go back to that topic for review. (12-Month Access.)
Classroom Live Labs.
These labs give you access to real equipment without the need for time-consuming installation and setup. You get easy browser-based access to the equipment you need to work through the labs that go with the course content. Requires only a browser and high-speed internet access. (12-Month Access.)
24/7 Online Support.
You will be able to chat online with a content matter expert while you are taking your CompTIA On-Demand class. And, with your permission, the expert can even take over your computer to provide with assistance with your labs. (3-Month Access.)
ILT Participant Option.
You've purchased CompTIA On-Demand, have gone through the training and decided that you still want a live class. Just pay difference between CompTIA On-Demand course and and the Instructor-Led Training (ILT) class and you can have a seat in our live class. Get both self-study and live, instructor-led training for the retail price of the instructor-led class alone!
Do You Still Prefer a Live, Instructor-led Class?
Already know CompTIA On-Demand training is not right for you? We also offer this same course content in a live, instructor-led format. For more details, click on the link below:
Instructor-led CompTIA Security+ Certification Training
This self-study CompTIAฎ Security+ฎ course (equivalent to our 5-day instructor-led course) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-401) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
Retaking an Exam
Retake exams are at your own cost. A voucher is good for a single exam attempt. If you do not pass, you will need to purchase another voucher to retake that exam. ONLC does not provide free "retake vouchers." Therefore, be sure to do the necessary preparation before scheduling your exam.
Exam Prep Software
All of our CompTIA classes include access to web-based practice exams. CompTIA certification exams are very rigorous and challenging. By studying after the class and using these practice exams, you will greatly improve your chances of passing the actual certification exam the first time. Exam prep software is included with all CompTIA classes delivered by ONLC Training Centers.
In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.
Identify the fundamental concepts of computer security.
Identify security threats and vulnerabilities.
Manage data, application, and host security.
Implement network security.
Identify and implement access control and account management security measures.
Identify and implement compliance and operational security measures.
Troubleshoot and manage security incidents.
Plan for business continuity and disaster recovery.
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windowsฎ-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS Xฎ, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.
To ensure your success in your course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts. You can obtain this level of skills and knowledge by taking the following course:
or equivalent knowledge, and six to nine months experience in networking, including configuring security parameters, are strongly recommended.
Additional introductory courses or work experience in application development and programming, or in network and operating system administration for any software platform or system are helpful but not required.
It is important to note that you do note actually need Network+ certification. However, there can be as many as 10 questions on the Security+ exam that are related to Network+ topics mostly focused on IP addressing.
Module 1 Security Threats and Controls
Security Controls Why is Security Important? Security Policy Security Controls Identification Authentication Authorization Basic Authorization Policies Accounting Labs Hyper-V
Threats and Attacks Vulnerability, Threat, and Risk Social Engineering Phishing Malware Trojans and Spyware Preventing Malware Anti-Virus Software Removing Malware Labs Trojans and Malware Protection
Network Attacks Network Fundamentals Sniffers and Protocol Analyzers ARP Attacks IP Spoofing and Hijacking Network Mappers and Port Scanners Denial of Service Attacks Labs Network Vulnerabilities
Assessment Tools and Techniques Vulnerability Assessments and Pentests Security Assessment Techniques Vulnerability Scanners Honeypots and Honeynets Labs Baseline Security Analyzer
Module 2 Cryptography and Access Control
Cryptography Uses of Cryptography Cryptographic Terminology and Ciphers Encryption Technologies Cryptographic Hash Functions Symmetric Encryption Asymmetric Encryption Diffie-Hellman ECC and Quantum Cryptography Transport Encryption Cryptographic Attacks Steganography Labs Steganography
Public Key Infrastructure PKI and Certificates Certificate Authorities Implementing PKI Creating Keys Key Recovery Agents Key Status and Revocation PKI Trust Models Cryptographic Standards PGP / GPG Labs Configuring Certificate Services
Password Authentication LAN Manager / NTLM Kerberos PAP and CHAP Password Protection Password Attacks Labs Password Sniffing
Strong Authentication Token-based Authentication Biometric Authentication Common Access Card Extensible Authentication Protocol RADIUS and TACACS+ Federation and Trusts
Authorization and Account Management Privilege Policies Directory Services Lightweight Directory Access Protocol Windows Active Directory Creating and Managing User Accounts Managing Group Accounts Account Policy Enforcement User Rights, Permissions, and Access Reviews
Module 3 Network Security
Secure Network Design Secure Network Topologies Demilitarized Zones Other Security Zones Network Device Exploitation Switches and VLANs Switch Vulnerabilities and Exploits Routers Network Address Translation
Security Appliances and Applications Basic Firewalls Stateful Firewalls Proxies and Gateways Implementing a Firewall or Gateway Web and Email Security Gateways Intrusion Detection Systems IDS Analysis Engines Monitoring System Logs
Wireless Network Security Wireless LANs WEP and WPA Wi-Fi Authentication Additional Wi-Fi Security Settings Wi-Fi Site Security
VPN and Remote Access Security Remote Access Virtual Private Networks IPSec Remote Access Servers Remote Administration Tools Hardening Remote Access Infrastructure Labs Configuring a VPN
Network Application Security Application Layer Security DHCP Security DNS Security SNMP Security Storage Area Network Security IPv4 versus IPv6 Telephony Labs Attacks Against DHCP and DNS
Module 4 Host, Data, and Application Security
Host Security Computer Hardening Host Security Management Plan OS Hardening Patch Management Endpoint Security Network Access Control Labs Network Access Protection
Data Security Data Handling Data Encryption Data Loss Prevention Backup Plans and Policies Backup Execution and Frequency Restoring Data and Verifying Backups Data Wiping and Disposal Labs Data Leakage Prevention
Web Services Security HyperText Transport Protocol SSL / TLS Web Servers Load Balancers File Transfer Labs HTTP and HTTPS
Web Application Security Web Application Technologies Web Application Databases Web Application Exploits Web Application Browser Exploits Secure Web Application Design Auditing Web Applications Web Browser Security Labs Web Application Vulnerabilities
Virtualization and Cloud Security Virtualization Technologies Virtual Platform Applications Virtualization Best Practices Cloud Computing Risks of Cloud Computing
Module 5 Operational Security
Site Security Site Layout and Access Gateways and Locks Alarm Systems Surveillance Hardware Security Environmental Controls Hot and Cold Aisles RFI / EMI Fire Prevention and Suppression
Mobile and Embedded Device Security Static Environments Mitigating Risk in Static Environments Mobile Device Security Mobile Device Management BYOD Concerns Mobile Application Security Bluetooth and NFC
Risk Management Business Continuity Concepts Risk Calculation Risk Mitigation Integration with Third Parties Service Level Agreements Change and Configuration Management
Disaster Recovery Disaster Recovery Planning IT Contingency Planning Clusters and Sites
Incident Response and Forensics Incident Response Procedures Preparation Detection, and Analysis Containment Eradication, and Recovery Forensic Procedures Collection of Evidence Handling and Analyzing Evidence Labs Computer Forensic Tools
Security Policies and Training Corporate Security Policy Operational Policies Privacy and Employee Policies Standards and Best Practice Security Policy Training and User Habits Labs Scenerio Questions
View outline in Word