5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Skills     Security     Security Accreditations and Best Practice
CompTIA Security+ is a vendor-neutral certification representing an internationally recognized validation of foundation-level security skills and knowledge. It is leveraged by organizations and security professionals around the world. This course will prepare you for the SY0-501 exam, which will certify that the successful candidate has the knowledge and skills necessary to secure systems, applications, networks, and devices; conduct threat analysis and countermeasure techniques; perform risk mitigation activities; and function with an awareness of the proper policies, laws, and regulations.

Objectives

Deploying Mobile Devices Securely

  • specify connection methods
  • compare deployment models
  • describe passwords, pins, and screen locks
  • define application and content management
  • describe remote wipe
  • compare geofencing and geolocation
  • describe push notification services
  • define biometrics and context-aware authentication
  • classify containerization and storage segmentation
  • describe full device encryption
  • describe enforcement and monitoring
  • describe enforcement and monitoring

Implementing Secure Protocols

  • work with SSH
  • describe Secure Sockets Layer and Transport Layer Security (SSL/TLS)
  • describe HTTPS
  • describe DNSSEC
  • describe SRTP
  • describe FTPS
  • describe SFTP
  • describe LDAPS
  • describe work with SNMPv3
  • describe NTPv3
  • describe Secure POP/IMAP
  • describe S/MIME
  • work with routing protocol authentication

Troubleshooting Security Issues

  • define unencrypted credentials
  • describe logs and events anomalies
  • specify permission issues
  • define access violations
  • specify certificate issues
  • describe data exfiltration
  • describe misconfigured devices
  • recognize weak security configurations
  • classify personnel issues
  • define unauthorized software
  • define baseline deviation
  • recognize license compliance violation
  • describe asset management
  • specify authentication issues

Identity and Access Services

  • compare identity and access management concepts
  • compare and contrast identity and access management concepts
  • define NTLM
  • compare PAP, CHAP, and MSCHAP
  • describe RADIUS
  • describe Terminal Access Controller Access Control System (TACACS+)
  • recognize Kerberos
  • define LDAP
  • describe secure token
  • define SAML
  • specify OpenID Connect
  • define OAuth
  • describe Shibboleth

Access Control Models

  • define MAC
  • define DAC
  • define ABAC
  • describe role-based access control
  • describe rule-based access control

Biometric Factors

  • use a fingerprint scanner
  • work with a retinal and iris scanner
  • use voice recognition
  • describe facial recognition
  • compare FAR, FRR, and CER

Additional Access Controls

  • define tokens
  • describe certificate-based authentication
  • define file system security
  • define database security