In this instructor-led, online training course, you will be prepared for the CompTIA Security+ certification exam.The Security+ certification is an international, vendor-neutral certification. The Security+ certification is proof of a person’s knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents.
Curriculum
1 Section
0 Lessons
32 Hours
Expand all sectionsCollapse all sections
Course Outline
01. General Security Concepts
Compare and contrast various types of security controls.
Compare and contrast various types of security controls.
Defense in Depth, CIA, and Non-Repudiation
Authentication, Authorization, and Accounting (AAA)
Gap Analysis and Zero Trust
Physical Security
Deception and Disruption Technology
Explain the importance of change management and the impact to security.
Change Management
Explain the importance of using appropriate cryptographic solutions.
Symmetric and Asymmetric Encryption
Hashing and Obfuscation
Public Key Infrastructure
Block Chain and the Open Public Ledger
Data Encryption
TPM, HSM, KMS, and Secure Enclave
02. Threats, Vulnerabilities, and Mitigations
Compare and contrast common threat actors and motivations. Threat Actors and Their Motivations
Explain common threat vectors and attack surfaces. Various Threat Vectors and Attack Surfaces
Human Threat Vectors / Social Engineering
Explain various types of vulnerabilities. Application and Web-based Vulnerabilities
Operating System-based Vulnerabilities
Hardware Vulnerabilities
Virtualization and Cloud Vulnerabilities
Supply Chain Vulnerabilities
Zero-day Vulnerabilities and More
Given a Scenario, Analyze Indicators of Malicious Activity Malware Attacks
Physical Attacks
Network Attacks
Application Attacks
Cryptographic and Password Attacks
Indicators of Malicious Activity
Explain the purpose of mitigation techniques used to secure the enterprise. Mitigation Techniques Used to Secure the Enterprise
03. Security Architecture
Compare and contrast security implications of different architecture models. Security Implications of Different Architecture Models
Considerations of Different Architecture Models
Given a scenario, apply security principles to secure enterprise infrastructure. Infrastructure Considerations
Secure Communication Access
Compare and contrast concepts and strategies to protect data. Data Types and Classifications
Methods to Secure Data
Explain the importance of resilience and recovery in security architecture. Resilience and Recovery in Security Architecture
04. Security Operations
Given a scenario, apply common security techniques to computing resources. Secure Baselines and Hardening Targets
Wireless and Mobile Solutions Security
Application Security and Sandboxing
Explain the security implications of proper hardware, software, and data asset management. Hardware, Software, and Data Asset Management
Explain various activities associated with vulnerability management. Vulnerability Management Identification Methods
Vulnerability Management Analysis
Vulnerability Management Response, Remediation, and Reporting
Explain security alerting and monitoring concepts and tools. Monitoring Activities and Concepts
Security Alerting and Monitoring Tools
Given a scenario, modify enterprise capabilities to enhance security. Modify Enterprise Capabilities to Enhance Security
Given a scenario, implement and maintain identity and access management. Identity and Access Management
Multifactor Authentication
Password Concepts and Privileged Access Management Tools
Explain the importance of automation and orchestration related to secure operations. Automation and Orchestration for Security
Explain appropriate incident response activities. Incident Response Process
Incident Response Testing, Analysis, and Digital Forensics
Given a scenario, use data sources to support an investigation. Data Sources to Support an Investigation
05. Security Program Management and Oversight
Summarize elements of effective security governance. Guidelines and Policies for Effective Security Governance
Standards and Procedures of Effective Security Governance
External Considerations of Effective Security Governance
Monitoring and Revision for Effective Security Governance
Types of Governance Structures of Effective Security Governance
Roles and Responsibilities for Systems and Data of Effective Security Governance
Explain elements of the risk management process. Elements of the Risk Management Process
Explain the processes associated with third-party risk assessment and management. Third-Party Risk Assessment and Management
Summarize elements of effective security compliance. Security Compliance
Privacy
Explain types and purposes of audits and assessments. Audits and Assessments
Penetration Testing
Given a scenario, implement security awareness practices. Security Awareness Practices