5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice
The CompTIA Security+ course provides students with core knowledge required to show competency in risk identification and participate in risk mitigation activities, provide infrastructure, application, operational and information security, apply security controls to maintain confidentiality, integrity and availability, identify appropriate technologies and products, and operate with an awareness of applicable policies, laws and regulations. This course focuses on all official exam objectives of the CompTIA Security+ examination. In order to attain the Security+ certification students must pass the Security+ SY0-301 examination.

Prerequisites
The CompTIA Security+ Certification is aimed at an IT security professional who has:
A minimum of 2 years experience in IT administration with a focus on security
Day to day technical information security experience
Broad knowledge of security concerns and implementation


Certification
CompTIA Security+


Exams
SY0-301


Outline
CompTIA Security+
Session 1: Understanding Network Security
Session 2: Compliance and Operational Security
Session 3: Threats and Vulnerabilities
Session 4: Application, Host and Data Security
Session 5: Access Control and Identity Management
Session 6: Cryptography


Objectives

  • Explain risk related concepts
  • Implement wireless network in a secure manner
  • Identify commonly used default network ports
  • Implement and use common protocols
  • Distinguish and differentiate network design elements and compounds
  • Apply and implement secure network administration principles
  • Explain the security function and purpose of network devices and technologies
  • Implement PKI, certificate management and associated components
  • Explain the core concepts of public key infrastructure
  • Use and apply appropriate cryptographic tools and products
  • Analyze and differentiate among types of application attacks
  • Analyze and differentiate among types of wireless attacks
  • Analyze and differentiate among types of social engineering attacks
  • Analyze and differentiate among types of attacks
  • Analyze and differentiate among types of malware
  • Exemplify the concepts of confidentiality, integrity and availability (CIA)
  • Execute disaster recovery plans and procedures
  • Explain the impact and proper use of environmental controls
  • Compare and contrast aspects of business continuity
  • Explain the importance of security related awareness and training
  • Summarize general cryptography concepts
  • Implement appropriate security controls when performing account management
  • Explain the fundamental concepts and best practices related to authentication, authorization and access control
  • Explain the function and purpose of authentication services
  • Explain the importance of data security
  • Carry out appropriate procedures to establish host security
  • Explain the importance of application security
  • Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning
  • Implement assessment tools and techniques to discover security threats and vulnerabilities
  • Analyze and differentiate among types of mitigation and deterrent techniques
  • Execute appropriate incident response procedures
  • Carry out appropriate risk mitigation strategies