CompTIA Security+ Certification Exam Preparation

In this training course, you gain the foundational knowledge needed to pass the CompTIA Security+ certification exam, and the skills to ensure compliance and operational security in your organization. Included in your course tuition is a CompTIA Security+ Study Guide and access to numerous practice exam questions. Your tuition also includes a CompTIA Security+ exam voucher on request.

Content


  1. Introduction to the CompTIA Security+ Exam
    • The six domains of knowledge
    • Expected level of expertise
    • Assessing initial readiness
  2. Securing the Network
    • Communication security goals
      • Evaluating network design and components
      • Examining ports, protocols and threats
      • Implementing wireless security
    • Secure administration principles
      • Designing for security
      • Managing VLANs and firewall rules
      • Implementing port security
      • Leveraging flood guards
  3. Compliance and Operational Security
    • Risk-related concepts
      • Inspecting methods of control
      • Conducting risk reduction
      • Formulating risk models
      • Evaluating risk
    • Mitigation strategies
      • Deterrence, avoidance and transference
      • Incident response
      • Preparing security awareness training
    • Business continuity measures
      • Assessing environmental controls
      • Planning for disaster recovery
      • Analyzing continuity of business plans
      • Implementing high availability
  4. Access Controls
    • Infrastructure principles
      • Assessing MAC, DAC and RBAC
      • Comparing logical and physical access controls
    • Strengthening the infrastructure
      • Utilizing 802.1x and RADIUS
      • Implementing multifactor authentication
      • Kerberos and CHAP
  5. Application, Data and Host Security
    • Security assessment tools
      • Patch management
      • Fuzzers
      • Securing mobile devices and BYOD
    • Host security tools and techniques
      • Anti-malware
      • Data Loss Prevention
      • Physical Security
  6. Threats and Vulnerabilities
    • Identifying vulnerabilities and threats
      • Isolating botnets, viruses and worms
      • Preventing man-in-the-middle attacks
      • Stopping social engineering ploys
      • Zero day attacks
      • Spamming, phishing and vishing
    • Application attacks
      • Detecting buffer overflows
      • Rejecting injection attacks
      • Preventing cookie misuse
      • Halting Cross-Site Scripting (XSS)