CompTIA Security+ Certification 2018
About this course
In this course, students will implement, monitor, and troubleshoot infrastructure, application, information, and operational security. Students will prepare for the CompTIA Security+ certification examination (SY0-501).
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; preparing for the CompTIA Security+ certification examination; or using Security+ as the foundation for advanced security certifications or career roles.
1 - IDENTIFYING SECURITY FUNDAMENTALS
Identify Information Security Concepts
Identify Basic Security Controls
Identify Basic Authentication and Authorization Concepts
Identify Basic Cryptography Concepts
2 - ANALYZING RISK
Analyze Organizational Risk
Analyze the Business Impact of Risk
3 - IDENTIFYING SECURITY THREATS
Identify Types of Attackers
Identify Social Engineering Attacks
Identify Software-Based Threats
Identify Network-Based Threats
Identify Wireless Threats
Identify Physical Threats
4 - CONDUCTING SECURITY ASSESSMENTS
Implement Penetration Testing
5 - IMPLEMENTING HOST AND SOFTWARE SECURITY
Implement Host Security
Implement Cloud and Virtualization Security
Implement Mobile Device Security
Incorporate Security in the Software Development Lifecycle
6 - IMPLEMENTING NETWORK SECURITY
Configure Network Security Technologies
Secure Network Design Elements
Implement Secure Networking Protocols and Services
Secure Wireless Traffic
7 - MANAGING IDENTITY AND ACCESS
Implement Identity and Access Management
Configure Directory Services
Configure Access Services
8 - IMPLEMENTING CRYPTOGRAPHY
Identify Advanced Cryptography Concepts
Select Cryptographic Algorithms
Configure a Public Key Infrastructure
Back Up and Restore Certificates and Private Keys
9 - IMPLEMENTING OPERATIONAL SECURITY
Evaluate Security Frameworks and Guidelines
Incorporate Documentation in Operational Security
Implement Security Strategies
Manage Data Security Processes
Implement Physical Controls
10 - ADDRESSING SECURITY INCIDENTS
Troubleshoot Common Security Issues
Respond to Security Incidents
Investigate Security Incidents
11 - ENSURING BUSINESS CONTINUITY
Select Business Continuity and Disaster Recovery Processes Develop a Business Continuity Plan
In this course, you will implement information security across a variety of different contexts.
•Identify the fundamental components of information security.
•Identify various threats to information security.
•Conduct security assessments to detect vulnerabilities.
•Implement security for hosts and software.
•Implement security for networks.
•Manage identity and access.
•Implement cryptographic solutions in the organization.
•Implement security at the operational level.
•Address security incidents.
•Ensure the continuity of business operations in the event of an incident.
Key Highlights and USPs Enumerates Why to Choose Us.
• Committed professionals with global experience
• Pan India reach, strong in Northern Region of India and expanding
• Strong Eco-System with industry connect and linkages with all stake holders
• Collaborative Model to offer the best solutions
• Value based organization with high integrity and transparency
• All our Competence Offering are world wide based
• Practical, field exposure and on-the-Job-Training
• Innovative solution offerings for Corporate Training.
Why Choose Leelajay Technologies?
Certified & Industry Experts Trainers
Multiple Training Delivery Models
Assessments and Mock Tests
Advance Analytical Reports
Contact our Relationship Managers for Corporate Packages requirements.