CompTIA On-Demand: CompTIA Security + Certification Training Course Outline
*** Note: This is an On-Demand Self Study Class, 5-days of content, 12-month unlimited access, $1,295 ***
You can take this class at any time, there are no set dates. It covers the same content as the 5-day instructor-led class of the same name. The cost for this CompTIA On-Demand class is $1,295.
CompTIA On-Demand Learner Profiles
CompTIA On-Demand is a self-study training solution that was designed for two types of learners. First, CompTIA On-Demand is a great fit for individuals with considerable IT experience who don't need a traditional 5-day class to prepare for a CompTIA exam. They can pick and choose topics to make the most effective use of their time. Second, CompTIA On-Demand is perfect for highly-motivated individuals who are new to a technology and need to space their learning over a period of weeks or months. These learners can take their time and repeat sections as needed until they master the new concepts.
About CompTIA On-Demand
Our CompTIA On-Demand classes are self-study courses with 30 to 40 hours of content. They include hours of videos, hands-on labs using the actual software, and knowledge checks that mirror the content found in the traditional live instructor-led version of this course. Those features are all part of the standard CompTIA On-Demand training. But don't settle for any other self-study class! Check out the "ONLC Extras" that you get when purchasing this course from us.
ONLC Training Centers bundles in valuable extras with our CompTIA On-Demand Courses. These extras are not available from other training companies.
Certification Exam Vouchers Included (A $330 value!)
All of our CompTIA classes include the cost of the CompTIA exam vouchers. With this class, a voucher for exam SY0-501 is included--a $330 value. Students must schedule when and where they will take the exam through Pearson Vue, the CompTIA testing service.
Exam Prep Software.
This practice exam software will help you prepare for you actual certification exam. These dynamic practice tests provide links to the training content. If you answer a question wrong, you can go back to that topic for review. (12-Month Access.)
Classroom Live Labs.
These labs give you access to real equipment without the need for time-consuming installation and setup. You get easy browser-based access to the equipment you need to work through the labs that go with the course content. Requires only a browser and high-speed internet access. (12-Month Access.)
24/7 Online Support.
You will be able to chat online with a content matter expert while you are taking your CompTIA On-Demand class. And, with your permission, the expert can even take over your computer to provide with assistance with your labs. (3-Month Access.)
ILT Participant Option.
You've purchased an Adobe On-Demand title, have gone through the training and decided that you still want a live class. Just pay difference between Adobe On-Demand course and and the Instructor-Led Training (ILT) class or classes and you can have a seat in our live events. You will get both self-study and live, instructor-led training for the retail price of the instructor-led class alone!
Do You Still Prefer a Live, Instructor-led Class?
Already know Adobe On-Demand training is not right for you? We also offer this same course content in a live, instructor-led format. For more details, click on the link below:
Instructor-led CompTIA Security+ Certification Training
This self-study CompTIA® Security+® course (equivalent to our 5-day instructor-led course) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
Retaking an Exam
Retake exams are at your own cost. A voucher is good for a single exam attempt. If you do not pass, you will need to purchase another voucher to retake that exam. ONLC does not provide free "retake vouchers." Therefore, be sure to do the necessary preparation before scheduling your exam.
Exam Prep Software
All of our CompTIA classes include access to web-based practice exams. CompTIA certification exams are very rigorous and challenging. By studying after the class and using these practice exams, you will greatly improve your chances of passing the actual certification exam the first time. Exam prep software is included with all CompTIA classes delivered by ONLC Training Centers.
In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.
Identify the fundamental concepts of computer security.
Identify security threats and vulnerabilities.
Manage data, application, and host security.
Implement network security.
Identify and implement access control and account management security measures.
Identify and implement compliance and operational security measures.
Troubleshoot and manage security incidents.
Plan for business continuity and disaster recovery.
CompTIA Security+ is aimed at IT professionals with job roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator and network administrator.
Students should meet the following criteria prior to taking the course:
Recommended that students have taken CompTIA Network+ certification course and exam, together with 24 months experience of networking support/IT administration
Know the function and basic features of the components of a PC
Use Windows Server to create and manage files and use basic administrative features (Explorer, Control Panel, Management Consoles, Command Line Tools)
Operate the Linux OS using basic command-line tools
Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers)
Understand TCP/IP addressing, core protocols, and troubleshooting tools
Module 1 / Threats, Attacks, and Vulnerabilities
Indicators of Compromise Why is Security Important? Security Policy Threat Actor Types The Kill Chain Social Engineering Phishing Malware Types Trojans and Spyware Open Source Intelligence Labs VM Orientation Malware Types
Critical Security Controls Security Control Types Defense in Depth Frameworks and Compliance Vulnerability Scanning and Pen Tests Security Assessment Techniques Pen Testing Concepts Vulnerability Scanning Concepts Exploit Frameworks Lab Using Vulnerability Assessment Tools
Security Posture Assessment Tools Topology Discovery Service Discovery Packet Capture Packet Capture Tools Remote Access Trojans Honeypots and Honeynets Labs Using Network Scanning Tools 1 Using Network Scanning Tools 2 Using Steganography Tools
Incident Response Incident Response Procedures Preparation Phase Identification Phase Containment Phase Eradication and Recovery Phases
Module 2 / Identity and Access Management
Cryptography Uses of Cryptography Cryptographic Terminology and Ciphers Cryptographic Products Hashing Algorithms Symmetric Algorithms Asymmetric Algorithms Diffie-Hellman and Elliptic Curve Transport Encryption Cryptographic Attacks Lab Implementing Public Key Infrastructure
Public Key Infrastructure PKI Standards Digital Certificates Certificate Authorities Types of Certificate Implementing PKI Storing and Distributing Keys Key Status and Revocation PKI Trust Models PGP / GPG Lab Deploying Certificates and Implementing Key Recovery
Identification and Authentication Access Control Systems Identification Authentication LAN Manager / NTLM Kerberos PAP, CHAP, and MS-CHAP Password Attacks Token-based Authentication Biometric Authentication Common Access Card Lab Using Password Cracking Tools
Identity and Access Services Authorization Directory Services RADIUS and TACACS+ Federation and Trusts Federated Identity Protocols
Account Management Formal Access Control Models Account Types Windows Active Directory Creating and Managing Accounts Account Policy Enforcement Credential Management Policies Account Restrictions Accounting and Auditing Lab Using Account Management Tools
Module 3 / Architecture and Design (1)
Secure Network Design Network Zones and Segments Subnetting Switching Infrastructure Switching Attacks and Hardening Endpoint Security Network Access Control Routing Infrastructure Network Address Translation Software Defined Networking Lab Implementing a Secure Network Design
Firewalls and Load Balancers Basic Firewalls Stateful Firewalls Implementing a Firewall or Gateway Web Application Firewalls Proxies and Gateways Denial of Service Attacks Load Balancers Lab Implementing a Firewall
IDS and SIEM Intrusion Detection Systems Configuring IDS Log Review and SIEM Data Loss Prevention Malware and Intrusion Response Lab Using an Intrusion Detection System
Secure Wireless Access Wireless LANs WEP and WPA Wi-Fi Authentication Extensible Authentication Protocol Additional Wi-Fi Security Settings Wi-Fi Site Security Personal Area Networks
Physical Security Controls Site Layout and Access Gateways and Locks Alarm Systems Surveillance Hardware Security Environmental Controls
Module 4 / Architecture and Design (2)
Secure Protocols and Services DHCP Security DNS Security Network Management Protocols HTTP and Web Servers SSL / TSL and HTTPS Web Security Gateways Email Services S/MIME File Transfer Voice and Video Services VoIP Labs Implementing Secure Network Addressing Services Configuring a Secure Email Service
Secure Remote Access Remote Access Architecture Virtual Private Networks IPSec Remote Access Servers Remote Administration Tools Hardening Remote Access Infrastructure Lab Implementing a Virtual Private Network
Secure Systems Design Trusted Computing Hardware / Firmware Security Peripheral Device Security Secure Configurations OS Hardening Patch Management Embedded Systems Security for Embedded Systems
Secure Mobile Device Services Mobile Device Deployments Mobile Connection Methods Mobile Access Control Systems Enforcement and Monitoring
Secure Virtualization and Cloud Services Virtualization Technologies Virtualization Security Best Practices Cloud Computing Cloud Security Best Practices
Module 5 / Risk Management
Forensics Forensic Procedures Collecting Evidence Capturing System Images Handling and Analyzing Evidence Lab Using Forensic Tools
Disaster Recovery and Resiliency Continuity of Operations Plans Disaster Recovery Planning Resiliency Strategies Recovery Sites Backup Plans and Policies Resiliency and Automation Strategies
Risk Management Business Impact Analysis Identification of Critical Systems Risk Assessment Risk Mitigation
Secure Application Development Application Vulnerabilities Application Exploits Web Browser Exploits Secure Application Design Secure Coding Concepts Auditing Applications Secure DevOps Lab Identifying a Man-in-the-Browser Attack
Organizational Security Corporate Security Policy Personnel Management Policies Interoperability Agreements Data Roles Data Sensitivity Labeling and Handling Data Wiping and Disposal Privacy and Employee Conduct Policies Security Policy Training
View outline in Word