Description

Overview

This course will teach students about information systems risk. Topics covered include risk identification, assessment, evaluation, response, and monitoring, as well as information systems control design and implementation.

Series Taught By: John Glover

Available CEUs for Course Series Completion: 6
Students can earn up to 6 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

Course Details

  • 11:5:00 Hours
  • 12 Months Access
  • Presented by highly qualified, industry leading experts

About this Course

This series is focused on CompTIA’s Security+ certifications. Security+ is a vendor-neutral certification that is recognized worldwide as a benchmark for information system security best practices. The series is intended for aspiring IT security professionals that have finished their training and want an accelerated version of the SY0-501 series. It is recommended that candidates used this content to round off their training prior to sitting for the SY0-501 exam.

Objectives

  • Technologies and Tools
  • Risk Management
  • Architecture and Design
  • Threats, Attacks, and Vulnerabilities
  • Identity, Access, and Management

Audience

  • Network Administrators, Security Engineers, Support Analysts, Security Administrator.

Prerequisites

  • It is recommended that individuals take the Network+ certification before taking the Security+ training and certification exam

Course Outline

THREATS ATTACKS AND VULNERABILITIES

  • Overview
  • Determining Types Of Malware
  • Vulnerability Scanning And Pen Testing
  • Impact Of Various Vulnerabilities

TECHNOLOGIES AND TOOLS

  • Supporting Organizational Security
  • Supporting Organizational Security Part 2
  • Security Posture Assessment
  • Deploy Mobile Security
  • Implement Secure Protocols

ARCHITECTURE AND DESIGN

  • Best Practices, Guides And Configuration
  • Secure Network Architecture Concepts
  • App Development And Deployment
  • Cloud And Virtualization Concepts

IDENTITY AND ACCESS MANAGEMENT

  • Identity And Access Services
  • IAM Controls
  • Account Management Practices

RISK MANANGEMENT

  • Policies, Plans And Procedures
  • Risk Management Processes And BIA
  • IRP And Basic Forensics
  • Disaster Recovery And Business Continuity
  • Data Security And Privacy Practices

CRYPTOGRAPHY AND PKI

  • Cryptography Algorithms Basics
  • Wireless Security
  • Public Key Infrastructure