OneSource Professional Training Solutions, Inc.
presents
Security+ Prep Course On-Site Training
Security+ Prep Course
Course Description/Agenda
CompTIA's Security+ is the premier vendor-neutral security certification and
demonstrates your knowledge of security concepts, tools, and procedures. It
confirms your ability to react to security incidents, and it validates your
skill in anticipating security risks and guarding against them.
In this course, you will learn to proactively implement sound security
protocols to mitigate security risks, quickly respond to security issues, and
retroactively identify where security breaches may have occurred. You will also
learn to design a network, on-site or in the cloud, with security in mind.
Our Security+ Prep Course prepares you for the Security+ certification exam based on the 2011 objectives (Exam SYO-301), which is included in the approved list of certifications to meet DoD Directive 8570.1 requirements.
This course is your one source for exam preparation and includes pre-class
online access to:
- Security+ reading plan
- Security+ study guide
- Security+
certification practice exams
During class, you'll have access to:
- Security+ student
manual
- Additional Security+
practice exam questions
- Comprehension
exercises, study digest, and quick reference card
Post-class, you'll have access to:
In our Security+ Prep Course, you will learn to:
- Proactively implement sound security protocols to mitigate security
risks
- Quickly respond to security issues
- Retroactively identify where security breaches may have occurred
- Design a network, on-site or in the cloud, with security in mind
This course uses Official CompTIA Approved Quality Content, which assures
that all test objectives are covered in the training material.
What You'll Learn
- Mitigating threats
- Cryptography
- Authentication
- User and role-based security
- Peripheral security
- Public key infrastructure
- Application and messaging security
- Ports and protocols
- Network security
- Wireless security
- Remote access security
- Auditing, logging, and monitoring
- Vulnerability testing and monitoring
- Organizational security
- Business continuity
- CompTIA Security+ objectives map
- CompTIA Security+ acronyms
Who Should Attend Candidates for the Security+ certification (SY0-301) Course Prerequisites CompTIA A+ certification and CompTIA Network+ certification or equivalent
experience
Course Outline 1. Mitigating Threats
- System maintenance
- Application security
- Physical security
- Malware
- Social engineering
2. Cryptography
- Symmetric cryptography
- Public key cryptography
3. Authentication
- Authentication factors and requirements
- Authentication systems
- Authentication system vulnerabilities
4. User- and Role-Based Security
- Baseline security policies
- Resource access
5. Peripheral Security
- File and disk encryption
- Peripheral and component security
- Mobile device security
6. Public Key Infrastructure
- Public key cryptography
- Implementing public key infrastructure (PKI)
- Web server security with PKI
7. Application and Messaging Security
- Application security
- E-mail security
- Social networking and messaging
8. Ports and Protocols
- TCP/IP basics
- Protocol-based attacks
9. Network Security
- Network devices
- Secure network topologies
- Secure networking
- Virtualization and cloud computing
10. Wireless Security
- Wireless network security
- Mobile device security
11. Remote Access Security
- Remote access
- Virtual private networks
12. Vulnerability Testing
- Risk and vulnerability assessment
- Auditing and logging
- Intrusion detection and prevention systems
- Incident response
13. Organizational Security
- Organizational policies
- Education and training
- Disposal and destruction
14. Business Continuity
- Redundancy planning
- Disaster recovery
- Environmental controls
Appendix A: CompTIA Security+ Objectives Map
Appendix B: CompTIA Security+ Acronyms
Labs Lab activities include instructor-led question and answer sessions,
interactive group discussions, as well as hands-on activities.
1. Mitigating Threats Lab Activities
- Identifying common security threats
- Updating the operating system
- Managing software patches
- Checking for and installing service packs
- Determining whether you need to update your computer's BIOS
- Configuring Windows Firewall
- Managing application security
- ID-related security concerns
- Plant security
- Identifying and differentiating malware
- Installing antivirus software
- Scanning your system for spyware
- Social engineering
- Phishing
- Comparing anti-spam measures
- Evaluating the risks of social networking
2. Cryptography Lab Activities
- Encrypting and decrypting data with a one-time pad
- Calculating hashes
- Sharing a secret message with steganography
- Public key cyptography
- Certificates
- Certificate trusts
- Comparing single- and dual-sided certificates
- Quantum cryptography
3. Authentication Lab Activities
- Evaluating authentication factors
- Requirements of a secure authentication system
- Comparing authentication protocols
- NTLM authentication
- Components of Kerberos
- Null sessions
- Identifying authentication vulnerabilities
- Capturing passwords with a protocol analyzer
- Cracking passwords
4. User- and Role-Based Security Lab
Activities
- Using MBSA to analyze security
- Creating a console to manage local security policies
- Using the GPMC
- Creating users and groups based on security needs
- Securing file resources
5. Peripheral Security Lab Activities
- Enabling file-based encryption
- Creating an encrypted volume
- Mounting, using, and dismounting an encrypted volume
- Risks associated with common peripherals
- Using Windows Policies to mitigate the security risks of peripherals
- Vulnerabilities of mobile devices
- Mobile device security
6. PKI Lab Activities
- Life cycle and management of certificates
- Installing a stand-alone root certificate authority (CA)
- Installing an enterprise subordinate CA
- Implementing a file-based certificate request
- Managing your certificate server
- Requesting a user certificate
- Revoking a certificate
- Enabling the EFS recovery agent template
- Enrolling for a recovery agent certificate
- Enabling key archival
- Re-e
|
Add to favorites
Email this page
|