Welcome to ONLC Training Centers

CompTIA On-Demand: CompTIA Security + Certification Training

Microsoft Gold Partner

Price:$1295

Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.


CompTIA On-Demand: CompTIA Security + Certification Training Course Outline

*** Note: This is an On-Demand Self Study Class, 180-day, 24/7 access via the internet ***
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
CompTIA On-Demand is a self-study training solution that is a great fit for individuals with considerable IT experience who don't need a traditional 5-day class to prepare for a CompTIA exam.

Course Overview
You may take this course at any time; there are no set dates. The course includes hours of videos, demonstrations, lab exercises and printed courseware. The course will prepare students for the CompTIA Security+ SY0-601 exam. Topics covered include: understanding threats, analyzing attacks, cryptography, implementing secure networks, operational procedures, forensics, and more. Note: The 180-day course access period begins at time of purchase.

Target Student
The CompTIA Security+ course is aimed at IT professionals with job roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator and network administrator. It is recommended that students have taken CompTIA Network+ certification course and exam, together with experience in networking support/IT administration.

Course Prerequisites
Students should meet the following criteria prior to taking the course:
• Recommended that students have taken CompTIA Network+ certification course and exam, together with 24 months experience in networking support/IT administration
• Know the function and basic features of the components of a PC
• Use Windows Server to create and manage files and use basic administrative features (Explorer, Control Panel,Management Consoles, Command Line Tools)
• Operate the Linux OS using basic command-line tools
• Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers)
• Understand TCP/IP addressing, core protocols, and troubleshooting tools

Additional Notes Regarding CompTIA Certification Exams
As with most professional IT certifications, many additional hours of study are required before the class (meeting the prerequisites) and after the class (reviewing exam objectives and practice questions). Expect to spend a significant number of hours studying before you take a CompTIA or any other IT professional exam.

ONLC Extras
ONLC Training Centers bundles in valuable extras with our CompTIA On-Demand Courses. These extras are not available from other training companies.

Certification Exam Voucher Included (A $340 value!) All of our CompTIA classes include the cost of the CompTIA exam voucher. Students must schedule when and where they will take the exam through Pearson Vue, the CompTIA testing service.

Exam Prep Software. This web-based practice exam will help you prepare for you actual certification exam. These dynamic practice tests provide links to the training content. If you answer a question wrong, you can go back to that topic for review.

Classroom Live Labs.These labs give you access to real equipment without the need for time-consuming installation and setup. You get easy browser-based access to the equipment you need to work through the labs that align with the course content. Requires only a browser and high-speed internet access.

24/7 Online Support. You will be able to chat online with a content matter expert while you are taking your On-Demand class. And, with your permission, the expert can even take over your computer to provide assistance with your labs. (3-Month Access.)

ONLC’s Exam Pass Guarantee
ONLC’s CompTIA certification classes come with an Exam Pass Guarantee. What that essentially means is that we want to make sure that everyone is taking advantage of the Practice Test that we are providing and achieve a score of 85% or better in Certification Mode prior to us releasing the initial exam voucher.
The practice test is ordered upon request. Once you provide a copy of the course Certificate of Completion along with lab completion documentation we will email the web-based practice test. After achieving a score of 85% or better, email proof to exam@onlc.com and we will go ahead and release the exam voucher to you within 24 business hours. Should you fail the exam on the first attempt, after submitting your authorized exam score and additional study, we will then provide a second voucher. However, should you decide to not take the practice exam or to take the exam without first achieving the 85% in certification mode, the Exam Pass is null and void. Please read through our:
Exam Pass Guarantee

Do You Still Prefer a Live, Instructor-led Class?
Already know On-Demand training is not right for you? We also offer this course in a live, instructor-led format. For more details, click on the link below:
Instructor-led CompTIA Security+ Certification Training

Duration
This course takes 5 days to complete and includes 10h 45m of video presentation plus hours of practice labs.

Course Outline

Chapter 1 - Understanding Threats, Attacks, and Vulnerabilities
Topic A: Introduction to Security Concepts
Security Fundamentals
Security Terms
Topic B: Identifying Threat Actors and Vectors
Actors and Threats
Hackers
Actor Attributes
Attack Vectors
Information Gathering
Intelligence Sources
Research Sources
Demo - Research Sources
Topic C: Understanding Vulnerabilities
Vulnerability Fundamentals
Security Impacts
Vulnerability Types
Vulnerability Types (cont.)
Topic D: Understanding Attack Types
Attack Types
Understanding Malware Types
Attacking Passwords and User Credentials
Physical Attacks
Other Attack Types
Topic E: Identifying Social Engineering Techniques
Social Engineering Principles
Phishing
Other Social Engineering Types
Other Social Engineering Types (cont.)

Chapter 2 - Analyzing Attacks
Topic A: Security Assessment Tools and Techniques
Understanding Assessments
Threat Hunting
Vulnerability Scanning
Syslog and SIEM
SIEM Components
Topic B: Application Attacks
Application Attacks
Privilege Escalation
Cross-Site Scripting
Injections
Application Attack Issues
Session Attacks
Additional Attacks
Topic C: Network Attacks
Introduction to Network Attacks
Wireless Network Attacks
Layer 2 Attacks
Service Attacks
Demo - DNS Poisoning
Malicious Code
Topic D: Penetration Testing
Penetration Testing
Environment Types
Pentesting Concepts
Network Reconnaissance
Exercise Types

Chapter 3 - Architecture and Design
Topic A: Enterprise Security Architecture
Enterprise Standardization Needs
Configuration Management
Data Protection
Additional Security Concepts
Disaster Recovery
Deception and Disruption
Topic B: Designing Authentication and Authorization
Authentication and Authorization
Authentication Methods
Authentication Technologies
Biometrics
Multifactor Authentication
Demo - Multifactor Authentication
Topic C: Designing Resiliency
Resiliency and Cybersecurity
Redundancy Concepts
Replication Concepts
Backup Concepts
Additional Resiliency Options
Topic D: Cloud and Virtualization Concepts
Cloud Models
Cloud Types
Cloud Service Providers
Additional Cloud Concepts
Additional Cloud Concepts (cont.)
Demo - Cloud Computing Security
Topic E: Securing Application Development and Deployment
Application Development Environments
Secure Coding Techniques
Automation Techniques
Application Design Concepts

Chapter 4 - Physical and System Security
Topic A: Physical Security Controls
Importance of Physical Controls
Standard Controls
Security Monitoring
Security Personnel
Secure Areas
Secure Data Destruction
Demo - Data Destruction Software
Topic B: Securing Embedded and Specialized Systems
Embedded Systems
Specialized Systems
Additional System Types
Communication Considerations
Constraints

Chapter 5 – Cryptography
Topic A: Cryptographic Concepts
Introduction to Cryptography
Common Use Cases
Integrity Verification
Understanding Keys
Crypto Limitations
Quantum
Additional Cryptographic Types
Topic B: Public Key Infrastructures
Introduction to PKIs
Certificate Authorities
Certificates
Certificate Verification
Certificate Formats
Demo - Implementing PKI
Additional Concepts
Chapter 6 - Implementing Secure Networks
Topic A: Implement Secure Protocols
Network Protocols
Use Cases
Application Layer Protocols
IP Security
Topic B: Implement Secure Network Designs
Network Segmentation
High Availability
Virtual Private Networks
Secure Network Appliances
Firewalls
Demo - Configuring a Host-Based Firewall
Additional Network Security Concepts
Topic C: Implementing Security in the Cloud
Cloud Security Controls
Cloud Storage Security
Cloud Network Security
Compute Security
Additional Cloud Solutions
Topic D: Implement Wireless Security
Cryptographic Protocols
Authentication Protocols
Authentication Methods
Installation Considerations
Topic E: Implement Secure Mobile Solutions
Deployment Models
Connection Methods and Receivers
Mobile Device Management (MDM)
Mobile Devices
Enforcement and Monitoring
Additional Controls

Chapter 7 - Implementing Secure Hosts and Identities
Topic A: Implement Authentication and Authorization Systems
Understanding Identity
Access Control Methods
Demo - Role-Based Access Control
Authentication Management
Remote Access Authentication
Authentication and Authorization Protocols
Topic B: Implement Identity and Account Management Controls
Account Types
Account Policies
Demo - Configuring Account Policies
Additional Identity Terms
Topic C: Implement Host and Application Security Solutions
Endpoint Protection
Client Level Protections
Network Level Protections
Boot Integrity
Database Security
System Hardening
Application Security

Chapter 8 - Operational Procedures
Topic A: Using Tools to Assess Security
Network Reconnaissance and Discovery
Network Tools
Network Tools (cont.)
Demo - Using Network Tools
File Manipulation Tools
Packet Capture and Relay
Shell and Script Environments
Forensics Tools
Topic B: Utilizing Data Sources for Investigation
Vulnerability Scan Output
SIEM Dashboards
Log Files
Additional Monitoring
Topic C: Applying Mitigation Techniques
Reconfiguring Endpoint Solutions
Configuration Changes
Additional Mitigation Techniques

Chapter 9 - Incident Response and Forensics
Incident Response and Forensics
Topic A: Incident Response Policies and Procedures
Incident Response Plans
Incident Response Process
Exercises
Attack Frameworks
Additional Plans
Demo - Examining IRPs
Topic B: Understanding Digital Forensics
Introduction to Forensics
Evidence Categories
Documentation and Evidence
Acquisition Concepts
Integrity
Additional Concepts

Chapter 10 - Governance, Risk, and Compliance
Governance, Risk, and Compliance
Topic A: Introduction to Control Types
Security Controls
Control Categories
Control Types
Topic B: Understanding Governance
Introduction to Governance
Regulations and Standards
Key Frameworks
Benchmarks
Demo - Data Loss Prevention (DLP)
Topic C: Implementing Security Policies
Personnel-Based Policies
Personnel-Based Policies (cont.)
Third-Party Risk Management
Data
Credential Policies
Topic D: Implementing Risk Management
Risk Types
Risk Management Strategies
Risk Analysis
Risk Analysis (cont.)
Disasters
Business Impact Analysis
Topic E: Compliance with Privacy and Sensitive Data
Organizational Consequences
Data Types
Privacy Enhancing Technologies
Roles and Responsibilities

View outline in Word

GSP601

Attend hands-on, instructor-led CompTIA On-Demand: CompTIA Security + Certification Training training classes at ONLC's more than 300 locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of Security+ Courses and select the one that's right for you.

GENERAL INFO

Class Format
Class Policies
Student Reviews

Bookmark and Share


HAVE QUESTIONS?
First Name

Last Name

Company

Phone

Email

Location

Question/Comment



ONLC TRAINING CENTERS
800-288-8221
www.onlc.com