OneSource Professional Training Solutions
OneSource Professional Training Solutions, Inc. presents
 

Security+ Prep Course On-Site Training

This on-site training class is also available as Public Schedule Seminar.

Security+ Prep Course

Course Description/Agenda


CompTIA's Security+ is the premier vendor-neutral security certification and demonstrates your knowledge of security concepts, tools, and procedures. It confirms your ability to react to security incidents, and it validates your skill in anticipating security risks and guarding against them.

In this course, you will learn to proactively implement sound security protocols to mitigate security risks, quickly respond to security issues, and retroactively identify where security breaches may have occurred. You will also learn to design a network, on-site or in the cloud, with security in mind.

Our Security+ Prep Course prepares you for the Security+ certification exam based on the 2011 objectives (Exam SYO-301), which is included in the approved list of certifications to meet DoD Directive 8570.1 requirements.

This course is your one source for exam preparation and includes pre-class online access to:

  • Security+ reading plan
  • Security+ study guide
  • Security+ certification practice exams

During class, you'll have access to:

  • Security+ student manual
  • Additional Security+ practice exam questions
  • Comprehension exercises, study digest, and quick reference card

Post-class, you'll have access to:

  • Security+ exam voucher

In our Security+ Prep Course, you will learn to:

  • Proactively implement sound security protocols to mitigate security risks
  • Quickly respond to security issues
  • Retroactively identify where security breaches may have occurred
  • Design a network, on-site or in the cloud, with security in mind

This course uses Official CompTIA Approved Quality Content, which assures that all test objectives are covered in the training material.

What You'll Learn

  • Mitigating threats
  • Cryptography
  • Authentication
  • User and role-based security
  • Peripheral security
  • Public key infrastructure
  • Application and messaging security
  • Ports and protocols
  • Network security
  • Wireless security
  • Remote access security
  • Auditing, logging, and monitoring
  • Vulnerability testing and monitoring
  • Organizational security
  • Business continuity
  • CompTIA Security+ objectives map
  • CompTIA Security+ acronyms

Who Should Attend

Candidates for the Security+ certification (SY0-301)

Course Prerequisites

CompTIA A+ certification and CompTIA Network+ certification or equivalent experience

Course Outline

1. Mitigating Threats

  • System maintenance
  • Application security
  • Physical security
  • Malware
  • Social engineering

2. Cryptography

  • Symmetric cryptography
  • Public key cryptography

3. Authentication

  • Authentication factors and requirements
  • Authentication systems
  • Authentication system vulnerabilities

4. User- and Role-Based Security

  • Baseline security policies
  • Resource access

5. Peripheral Security

  • File and disk encryption
  • Peripheral and component security
  • Mobile device security

6. Public Key Infrastructure

  • Public key cryptography
  • Implementing public key infrastructure (PKI)
  • Web server security with PKI

7. Application and Messaging Security

  • Application security
  • E-mail security
  • Social networking and messaging

8. Ports and Protocols

  • TCP/IP basics
  • Protocol-based attacks

9. Network Security

  • Network devices
  • Secure network topologies
  • Secure networking
  • Virtualization and cloud computing

10. Wireless Security

  • Wireless network security
  • Mobile device security

11. Remote Access Security

  • Remote access
  • Virtual private networks

12. Vulnerability Testing

  • Risk and vulnerability assessment
  • Auditing and logging
  • Intrusion detection and prevention systems
  • Incident response

13. Organizational Security

  • Organizational policies
  • Education and training
  • Disposal and destruction

14. Business Continuity

  • Redundancy planning
  • Disaster recovery
  • Environmental controls

Appendix A: CompTIA Security+ Objectives Map

Appendix B: CompTIA Security+ Acronyms

Labs

Lab activities include instructor-led question and answer sessions, interactive group discussions, as well as hands-on activities.

1. Mitigating Threats Lab Activities

  • Identifying common security threats
  • Updating the operating system
  • Managing software patches
  • Checking for and installing service packs
  • Determining whether you need to update your computer's BIOS
  • Configuring Windows Firewall
  • Managing application security
  • ID-related security concerns
  • Plant security
  • Identifying and differentiating malware
  • Installing antivirus software
  • Scanning your system for spyware
  • Social engineering
  • Phishing
  • Comparing anti-spam measures
  • Evaluating the risks of social networking

2. Cryptography Lab Activities

  • Encrypting and decrypting data with a one-time pad
  • Calculating hashes
  • Sharing a secret message with steganography
  • Public key cyptography
  • Certificates
  • Certificate trusts
  • Comparing single- and dual-sided certificates
  • Quantum cryptography

3. Authentication Lab Activities

  • Evaluating authentication factors
  • Requirements of a secure authentication system
  • Comparing authentication protocols
  • NTLM authentication
  • Components of Kerberos
  • Null sessions
  • Identifying authentication vulnerabilities
  • Capturing passwords with a protocol analyzer
  • Cracking passwords

4. User- and Role-Based Security Lab Activities

  • Using MBSA to analyze security
  • Creating a console to manage local security policies
  • Using the GPMC
  • Creating users and groups based on security needs
  • Securing file resources

5. Peripheral Security Lab Activities

  • Enabling file-based encryption
  • Creating an encrypted volume
  • Mounting, using, and dismounting an encrypted volume
  • Risks associated with common peripherals
  • Using Windows Policies to mitigate the security risks of peripherals
  • Vulnerabilities of mobile devices
  • Mobile device security

6. PKI Lab Activities

  • Life cycle and management of certificates
  • Installing a stand-alone root certificate authority (CA)
  • Installing an enterprise subordinate CA
  • Implementing a file-based certificate request
  • Managing your certificate server
  • Requesting a user certificate
  • Revoking a certificate
  • Enabling the EFS recovery agent template
  • Enrolling for a recovery agent certificate
  • Enabling key archival
  • Re-e

     

    More Seminar Information

    OneSource Professional Training Solutions, Inc.
    OneSource Professional Training Solutions

    Delivery Method

    On-Site Training On-Site Training

    Also Available As

    Seminar Seminar

     
Add to favorites Add to favorites
Email Email this page
 

On-Site Training
Information Request Form

Please complete the form for more information and/or a quote for this on-site class.

Name:

Email

Phone:

City and State

Company:

Number of students:
(at least 10 for consideration)

When do you want to hold the
seminar?

How long would you like for the
seminar?

Additional comments to trainer:

We value your privacy!