Security Fundamentals with CompTIA® (Security+)

Within the framework of the training, it is possible to obtain comprehensive information on the 5 main areas of information security. Topics covered in the course include key security concepts, threats, vulnerabilities, risk and mitigation, security architecture, operations and program management.

The curriculum is supplemented with practical exercises and laboratory work to promote a deeper understanding of what was learned within the course, fully preparing for the international certification exam.

Course duration, academic hours: 40
Price (excl. VAT) 1900,00 
Price (with VAT): 2299,00 
Lecturer: Ainis Mūsiņš
Ainis Mūsiņš
Ainis Musins is an experienced instructor of operating system administration, installation and troubleshooting, paying special attention to IT security. Certified in SUSE Linux Enterprise Server 15 and Certified Information Security Manager® (CISM) - global standards for developing robust information security programs. The specialist provides in-depth insight into the creation of security infrastructures, the identification of network threats and the implementation of effective countermeasures.

Viktors Meirāns

Plans

13. January, 2025 - 17. January, 2025
Place:
Online
Language:
lv
Lecturer:
Viktors Meirāns
Price (excl. VAT)
1900,00 
Price (with VAT):
2299,00 
Contact us

Apply or ask a question!

 

If you want to apply for the course or ask a question about it, feel free to use this form.

Please enter your first and last names
Please enter company name
Please enter your phone number
Please enter your email

Thank you! We will contact you.

Training schedule:
13.01.2025 09:00-16:15
14.01.2025 09:00-16:15
15.01.2025 09:00-16:15
16.01.2025 09:00-16:15
17.01.2025 09:00-16:15
Course target
  • Foundational Knowledge: gain a solid understanding of essential security concepts, principles, terminology, and best practices;
  • Threat Mitigation: identify, assess, and mitigate various security threats, vulnerabilities, risks;
  • Practical skills: hands-on skills related to securing digital environments, managing access controls, and responding to incidents;
  • Preparation for Certification: prepare for the CompTIA+ certification exam.
Audience

IT professionals who want to enhance their knowledge and skills in the field of cybersecurity:

  • security administrators;
  • security specialists;
  • system administrator;
  • help desk analysts;
  • security engineers.
At Course Completion you will be able to:
  • Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts.
  • Implement secure network architecture concepts and systems design.
  • Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security.
  • Install and configure identity and access services, as well as management controls.
  • Implement and summarize risk management best practices and the business impact.
  • Install and configure wireless security settings and implement public key infrastructure.
Prerequisites

It is recommended to have at least 2 years of experience in IT administration with a focus on security, hands-on experience with technical information security, and broad knowledge of security concepts.

Training materials

The student training materials includes access to CompTIA Security+ CertMaster training environment.

Certification Exam

CompTIA SY0-701 exam (the exam fee is already included in the course price).

Course outline

General Security Concepts

  • Compare and contrast various types of security controls;
  • Summarize fundamental security concepts;
  • Explain the importance of change management processes  and the impact to security;
  • Explain the importance of using appropriate cryptographic solutions.

Security Operations

  • Given a scenario, apply common security techniques to computing resources;
  • Explain the security implications of proper hardware, software, and data asset management;
  • Explain various activities associated with vulnerability management;
  • Explain security alerting and monitoring concepts and tools;
  • Given a scenario, modify enterprise capabilities to enhance security;
  • Given a scenario, implement and maintain identity and access management;
  • Explain the importance of automation and orchestration related to secure operations;
  • Explain appropriate incident response activities;
  • Given a scenario, use data sources to support an investigation.

Security Architecture

  • Compare and contrast security implications of different architecture models;
  • Given a scenario, apply security principles to secure enterprise infrastructure;
  • Compare and contrast concepts and strategies to protect data;
  • Explain the importance of resilience and recovery in security architecture.

Threats, Vulnerabilities, and Mitigations

  • Compare and contrast common threat actors and motivations;
  • Explain common threat vectors and attack surfaces;
  • Explain various types of vulnerabilities;
  • Given a scenario, analyze indicators of malicious activity;
  • Explain the purpose of mitigation techniques used to secure the enterprise.

Security Program Management and Oversight

  • Summarize elements of effective security governance;
  • Explain elements of the risk management process;
  • Explain the processes associated with third-party risk assessment and management;
  • Summarize elements of effective security compliance;
  • Explain types and purposes of audits and assessments;
  • Given a scenario, implement security awareness practices.

If you want to get more information about this course, contact us by phone +371 67505091 or send an e-mail at mrn@bda.lv.