Overview

Students will gain an in depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products.

Learning Objectives

Upon completion, the Certified Security Principles+ candidate will not only be able to competently take the CSP+ exam but will also understand basic cyber security knowledge to keep companies’ IP and IT infrastructure safe.

Course Modules

  1. Introduction to IT Security
  2. Section 1 – Understanding Security
  3. Section 2 – Responsibilities
  4. Section 3 – Building a Security Program
  5. Section 4 – CIA Triad
  6. Section 5 – Governance, Risk, Compliance
  7. Section 6 – State of Security Today
  1. Risk Management
  2. Section 1 – Risk Management
  3. Section 2 – Risk Assessment
  4. Section 3 – Types of Risk, Threats and Vulnerabilities
  5. Section 4 – Mitigating Attacks
  6. Section 5 – Discovering Vulnerabilities and Threats
  7. Section 6 – Responding to Risk
  1. Understanding of Cryptography
  2. Section 1 – Understanding Cryptography
  3. Section 2 – Symmetric Encryption
  4. Section 3 – Asymmetric Encryption
  5. Section 4 – Hashing
  6. Section 5 – PKI
  7. Section 6 – Cryptography in Use
  1. Understanding Identity and Access Management
  2. Section 1 – Identity Management
  3. Section 2 – Authentication Techniques
  4. Section 3 – Single Sign-on
  5. Section 4 – Access Control Monitoring
  1. Managing Data Security
  2. Section 1 – Different Types of Storage
  3. Section 2 – Encryption Options
  4. Section 3 – Data Management
  1. Managing Network Security
  2. Section 1 – Protocols and Services
  3. Section 2 – Network and Security Devices
  4. Section 3 – Network Design
  5. Section 4 – Wireless Networking
  1. Managing Server/Host Security
  2. Section 1 – The Operating Systems
  3. Section 2 – Hardening the OS
  4. Section 3 – Physical Security
  1. Application Security for Non-Developers
  2. Section 1 – Application Security Principles
  3. Section 2 – Software Development Life Cycle
  4. Section 3 – OWASP Top 10
  5. Section 4 – Hardening Web Applications
  6. Section 5 – Patch/Update/Configuration Management
  1. Understanding Mobile Device Security (IoT)
  2. Section 1 – What devices are we talking about?
  3. Section 2 – What is the risk?
  4. Section 3 – Hardening Mobile/IoT Devices
  5. Section 4 – Corporate Management
  1. Managing Day to Day Security
  2. Section 1 – Company Responsibilities
  3. Section 2 – Product Management
  4. Section 3 – Business Continuity Basics
  5. Section 4 – Incident Response
  6. Section 5 – Why train?
  1. Understanding Compliance and Auditing
  2. Section 1 – Benefits of Compliance
  3. Section 2 – Assurance Frameworks
  4. Section 3 – What is auditing?