Security Fundamentals with CompTIA® (Security+)
This course provides a comprehensive and expert-led training experience, by covering five key domains that are essential for understanding and excelling in the field of information security. Participants of the course will delve into general security concepts, threats, vulnerabilities, mitigations, security architecture, operations, and program management. The course features practical exercises and hands-on labs to develop skills, ensuring that participants are well prepared for the SY0-701 certification exam.
Plans
Contact us
Apply or ask a question!
If you want to apply for the course or ask a question about it, feel free to use this form. |
||||||||||||||||||
|
Course target
- Foundational Knowledge: gain a solid understanding of essential security concepts, principles, terminology, and best practices;
- Threat Mitigation: identify, assess, and mitigate various security threats, vulnerabilities, risks;
- Practical skills: hands-on skills related to securing digital environments, managing access controls, and responding to incidents;
- Preparation for Certification: prepare for the CompTIA+ certification exam.
Audience
IT professionals who want to enhance their knowledge and skills in the field of cybersecurity. It is particularly relevant for individuals in roles such as Security Administrators, Security Specialists, Systems Administrators, Help Desk Analysts, and Security Engineers.
At Course Completion you will be able to:
- Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts;
- Implement secure network architecture concepts and systems design;
- Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security;
- Install and configure identity and access services, as well as management controls;
- Implement and summarize risk management best practices and the business impact;
- Install and configure wireless security settings and implement public key infrastructure.
Prerequisites
It is recommended to have at least 2 years of experience in IT administration with a focus on security, hands-on experience with technical information security, and broad knowledge of security concepts.
Training materials
The student training materials includes access to CompTIA Security+ CertMaster training environment.
Certification Exam
CompTIA SY0-701 exam (the exam fee is already included in the course price).
Course outline
General Security Concepts
- Compare and contrast various types of security controls;
- Summarize fundamental security concepts;
- Explain the importance of change management processes and the impact to security;
- Explain the importance of using appropriate cryptographic solutions.
Security Operations
- Given a scenario, apply common security techniques to computing resources;
- Explain the security implications of proper hardware, software, and data asset management;
- Explain various activities associated with vulnerability management;
- Explain security alerting and monitoring concepts and tools;
- Given a scenario, modify enterprise capabilities to enhance security;
- Given a scenario, implement and maintain identity and access management;
- Explain the importance of automation and orchestration related to secure operations;
- Explain appropriate incident response activities;
- Given a scenario, use data sources to support an investigation.
Security Architecture
- Compare and contrast security implications of different architecture models;
- Given a scenario, apply security principles to secure enterprise infrastructure;
- Compare and contrast concepts and strategies to protect data;
- Explain the importance of resilience and recovery in security architecture.
Threats, Vulnerabilities, and Mitigations
- Compare and contrast common threat actors and motivations;
- Explain common threat vectors and attack surfaces;
- Explain various types of vulnerabilities;
- Given a scenario, analyze indicators of malicious activity;
- Explain the purpose of mitigation techniques used to secure the enterprise.
Security Program Management and Oversight
- Summarize elements of effective security governance;
- Explain elements of the risk management process;
- Explain the processes associated with third-party risk assessment and management;
- Summarize elements of effective security compliance;
- Explain types and purposes of audits and assessments;
- Given a scenario, implement security awareness practices.
If you want to get more information about this course, contact us by phone +371 67505091 or send an e-mail at mrn@bda.lv.