Details
- CompTIA Security+ (SY0-501) Exam Voucher
- 5 days of high quality classroom or live online training
- Hands-on Labs
- CompTIA Security+ Accredited Instructor
- Access to ActiveLearning's Virtual Labs
- More than 160 end of chapter drill questions with answer keys
- 2 full mock exams with answer keys
- Online access to CompTIA Security+ learning resources
- Official CompTIA Security+ Digital Courseware
- Over 30 IT security checklists that you can use back at work
- Certificate of Attendance
- Exam Prep Guarantee
- Unlimited course refresher for 1 year (Note: exams are not included)
CompTIA Security+ certification is an internationally-recognized, vendor-neutral certification for network security. Through this network security course, students will learn security concepts, and tools to help them react to security incidents. More importantly, students will learn how to anticipate security risks and defend against network security attacks.
CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. This practical hands-on 5-day course will teach students the fundamental principles of installing and configuring computer and network security systems.
- Identify network attack strategies and defenses
- Understand the principles of organizational security and the elements of effective security policies
- Know the technologies and uses of encryption standards and products
- Identify network and host-based security technologies and practices
This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking and IT security professionals, PC support analysts and application developers.
- Maximum of 90 questions
- Multiple choice and performance-based
- 90 minutes
- Passing Score: 750 (scale of 100 - 900)
- Testing Provider: Pearson Vue Testing Centers or Online Testing
Outline
- Compare and Contrast Information Security Roles
- Explain Threat Actor Types
- Compare and Contrast Social Engineering Attack Types
- Determine Malware Types
- Compare and Contrast Security Control and Framework Types
- Follow Incident Response Procedures
- Explain Penetration Testing Concepts
- Assess Security Posture with Topology Discovery Software Tools
- Assess Security Posture with Fingerprinting and Sniffing Software Tools
- Assess Security Posture with Vulnerability Scanning Software Tools
- Compare and Contrast Basic Concepts of Cryptography
- Explain Hashing and Symmetric Cryptographic Algorithms
- Explain Asymmetric Cryptographic Algorithms
- Implement Certificates and Certificate Authorities
- Implement PKI Management
- Compare and Contrast Identity and Authentication Concepts
- Install and Configure Authentication Protocols
- Implement Multifactor Authentication
- Install and Configure Authorization and Directory Services
- Implement Access Management Controls
- Differentiate Account Management Practices
- Implement Account Auditing and Recertification
- Implement Secure Network Architecture Concepts
- Install and Configure a Secure Switching Infrastructure
- Install and Configure Network Access Control
- Install and Configure a Secure Routing and NAT Infrastructure
- Install and Configure Firewalls and Proxies
- Install and Configure Load Balancers
- Install and Configure Intrusion Detection/Prevention Systems
- Install and Configure Data Loss Prevention (DLP) Systems
- Install and Configure Logging and SIEM Systems
- Install and Configure a Wireless Infrastructure
- Install and Configure Wireless Security Settings
- Explain the Importance of Physical Security Controls
- Implement Secure Hardware Systems Design
- Implement Secure Host Systems Design
- Implement Secure Mobile Device Systems Design
- Implement Secure Embedded Systems Design
- Implement Secure Network Operations Protocols
- Implement Secure Remote Access Protocols
- Implement Secure Remote Administration Protocols
- Implement Secure Web Services
- Implement Secure Communications Services
- Summarize Secure Virtualization Infrastructure
- Summarize Secure Cloud Services
- Explain Risk Management Processes and Concepts
- Explain Resiliency and Automation Strategies
- Explain Disaster Recovery and Continuity of Operation Concepts
- Summarize Basic Concepts of Forensics
- Explain the Impact of Vulnerability Types
- Summarize Secure Application Development Concepts
- Explain the Importance of Security Policies
- Implement Data Security and Privacy Practices
- Explain the Importance of Personnel Management
ActiveLearning, Inc. is the Philippines' leading provider of Information Technology and Project Management education, where thousands of students take courses from Application Development to Project Management to Network Security, and much more. Our courses are taught by expert instructors, and learning is enhanced through a blend of in-depth lectures, workshops, and hands-on exercises.
Expert Instructors
Learn from expert instructors who practice what they teach. Our instructors are involved in constant research and development, who constantly apply the lessons they teach, and who know the same technical issues you face every day.
Superior Courseware
Our courseware go through rigorous evaluation before they are released for instruction. By constantly monitoring industry developments, we make sure that you get course materials that are up to date.
Interactivity
More than just classroom lectures, practical, hands-on exercises are carefully developed for you to immediately put in to practice what you learn. By being immersed in a classroom setting, you get to participate, inquire, and be involved - all essential in expediting the learning process. Aspects you won't find in Computer-Based-Training and self-study. ...