IT Skills Security Security Accreditations and Best Practice
CompTIA Security+ is a vendor-neutral certification representing an internationally recognized validation of foundation-level security skills and knowledge. It is leveraged by organizations and security professionals around the world. This course will prepare you for the SY0-501 exam, which will certify that the successful candidate has the knowledge and skills necessary to secure systems, applications, networks, and devices; conduct threat analysis and countermeasure techniques; perform risk mitigation activities; and function with an awareness of the proper policies, laws, and regulations.
Objectives |
Deploying Mobile Devices Securely - specify connection methods
- compare deployment models
- describe passwords, pins, and screen locks
- define application and content management
- describe remote wipe
- compare geofencing and geolocation
- describe push notification services
- define biometrics and context-aware authentication
- classify containerization and storage segmentation
- describe full device encryption
- describe enforcement and monitoring
- describe enforcement and monitoring
Implementing Secure Protocols - work with SSH
- describe Secure Sockets Layer and Transport Layer Security (SSL/TLS)
- describe HTTPS
- describe DNSSEC
- describe SRTP
- describe FTPS
- describe SFTP
- describe LDAPS
- describe work with SNMPv3
- describe NTPv3
- describe Secure POP/IMAP
- describe S/MIME
- work with routing protocol authentication
Troubleshooting Security Issues - define unencrypted credentials
- describe logs and events anomalies
- specify permission issues
- define access violations
- specify certificate issues
- describe data exfiltration
- describe misconfigured devices
- recognize weak security configurations
- classify personnel issues
- define unauthorized software
- define baseline deviation
- recognize license compliance violation
- describe asset management
- specify authentication issues
Identity and Access Services - compare identity and access management concepts
- compare and contrast identity and access management concepts
- define NTLM
- compare PAP, CHAP, and MSCHAP
- describe RADIUS
- describe Terminal Access Controller Access Control System (TACACS+)
- recognize Kerberos
- define LDAP
- describe secure token
- define SAML
- specify OpenID Connect
- define OAuth
- describe Shibboleth
Access Control Models - define MAC
- define DAC
- define ABAC
- describe role-based access control
- describe rule-based access control
Biometric Factors - use a fingerprint scanner
- work with a retinal and iris scanner
- use voice recognition
- describe facial recognition
- compare FAR, FRR, and CER
Additional Access Controls - define tokens
- describe certificate-based authentication
- define file system security
- define database security
|