CompTIA Security+ Certification Exam Preparation
In this training course, you gain the foundational knowledge needed to pass the CompTIA Security+ certification exam, and the skills to ensure compliance and operational security in your organization. Included in your course tuition is a CompTIA Security+ Study Guide and access to numerous practice exam questions. Your tuition also includes a CompTIA Security+ exam voucher on request.
Content
- Introduction to the CompTIA Security+ Exam
- The six domains of knowledge
- Expected level of expertise
- Assessing initial readiness
- Securing the Network
- Communication security goals
- Evaluating network design and components
- Examining ports, protocols and threats
- Implementing wireless security
- Secure administration principles
- Designing for security
- Managing VLANs and firewall rules
- Implementing port security
- Leveraging flood guards
- Compliance and Operational Security
- Risk-related concepts
- Inspecting methods of control
- Conducting risk reduction
- Formulating risk models
- Evaluating risk
- Mitigation strategies
- Deterrence, avoidance and transference
- Incident response
- Preparing security awareness training
- Business continuity measures
- Assessing environmental controls
- Planning for disaster recovery
- Analyzing continuity of business plans
- Implementing high availability
- Access Controls
- Infrastructure principles
- Assessing MAC, DAC and RBAC
- Comparing logical and physical access controls
- Strengthening the infrastructure
- Utilizing 802.1x and RADIUS
- Implementing multifactor authentication
- Kerberos and CHAP
- Application, Data and Host Security
- Security assessment tools
- Patch management
- Fuzzers
- Securing mobile devices and BYOD
- Host security tools and techniques
- Anti-malware
- Data Loss Prevention
- Physical Security
- Threats and Vulnerabilities
- Identifying vulnerabilities and threats
- Isolating botnets, viruses and worms
- Preventing man-in-the-middle attacks
- Stopping social engineering ploys
- Zero day attacks
- Spamming, phishing and vishing
- Application attacks
- Detecting buffer overflows
- Rejecting injection attacks
- Preventing cookie misuse
- Halting Cross-Site Scripting (XSS)