About the course

CompTIA Security+ is a worldwide accepted security certification by CompTIA. CompTIA always updates Security+ certification syllabus and the exam based on current threats, vulnerabilities, security tools, mitigations for us to have better security knowledge. Security+ certification is essential for IT security professionals to build tighten security and protect our company assets from threats and disasters. The goal of this program is to provide you an intensive training & mentor you to pass CompTIA Security+ certification exam within one try.

What will I learn?

By following the current Security+  syllabus you will be able to cover the following main parts. SY0-501 is the latest syllabus announced by CompTIA on Oct. 4, 2017; which should be covered to pass the current exam: In this lesson, you will be able to learn:
  • Different types of Threats, Attacks, and vulnerabilities compare and contrast different types of attacks. This will cover 21% of the exam
  • Know different types of tools for intrusion detection, prevention on a system level, network level, encryption and management tools used in  IT security. This will cover 22%
  • Understand different types of architectures and design approaches to secure networks, virtualization, cloud, transportation, deployments. This will cover 15%
  • Understand different ways to manage, control resources accessibilities for different users using rules, levels and grouping techniques, and physical controls. This will cover 14%.
  • Learn risk management by identifying risks, analyzing impacts using quantitative and qualitative ways. Also, you will learn how to control, recover from disaster. This will cover 14%
  • Cryptography and Public Key Infrastructure (PKI). Know authentication, certification, encryption methods. Know Hashing, Ciphering, Private and public key methods. Will cover 12%.
For more, Please check the CompTIA-SY0-501 syllabus below.

Audience and Requirements

  • Anyone who is interested to know about security and pass CompTIA Security+  on the first attempt.
  • Anyone who wanted to pursue to be certified in SCCP, CISSP, CASp or CSA+.
  • Anyone who wanted to do a carrier on security admin or security tester professional

Training Highlights

  • Based on CompTIA-SY0-501 we will choose an up-to-date publicized Security+ book from the market and use it as our study reference.
  • We provide you practical solutions for hundreds of Security+ exam questions
  • Mentorship will be available through training and after training
  • You will be working on practical labs for better understanding, which is far more than the exam.

About the Exam

  • No prerequisite to taking the exam 
  • It will have 90 question scaled up to 900 point
  • The exam should be completed in 90 minutes, means 1 min for 1 question
  • The passing point is 750 point which means 83%
  • 90% of questions are a multiple choice but sometimes it  might ask you to choose two answers
  • 10% of the question is matching, or configuring known security files like wifi-router configuration
  • The exam costs you $330 in the USA, and it has 10% discount if you buy coupons before you register for the exam.

Curriculum


Module 1: General Security Concepts Information Security

  • 1.1  Physical Security
  • 1.2  Operational Security
  • 1.3  Management and Policies
  • 1.4  Goals of Information Security
  • 1.5  The Security Process
  • 1.6  Antivirus Software
  • 1.7  Access Control
  • 1.8  Authentication
  • 1.9  Services and Protocols
  • 1.10  Security Topologies
  • 1.11  Design Goals
  • 1.12  Security Zones
  • 1.13  Technologies
  • 1.14  Business Concerns

Module 2: Know Your Enemy Attack Strategies

  • 2.1  Access Attacks
  • 2.2  Modification and Repudiation Attacks
  • 2.3  Denial of Service Attacks (DoS)
  • 2.4  Common Attacks
  • 2.5  Security Concerns and TCP/IP
  • 2.6  The TCP/IP Protocol Suite
  • 2.7  Application Layer
  • 2.8  Host-to-Host or Transport Layer
  • 2.9  Internet Layer
  • 2.10  Network Interface Layer
  • 2.11  Encapsulation
  • 2.12  Protocols and Services
  • 2.13  TCP/IP Attacks
  • 2.14  Software Exploitation
  • 2.15  Surviving Malicious Code
  • 2.16  Viruses
  • 2.17  Trojan Horses
  • 2.18  Logic Bombs
  • 2.19  Worms
  • 2.20  Antivirus Software
  • 2.21  Social Engineering
  • 2.22  Auditing Processes and Files

Module 3: Infrastructure and Connectivity Infrastructure Security

  • 3.1  Hardware Components
  • 3.2  Software Components
  • 3.3  Devices
  • 3.4  Firewalls
  • 3.5  Routers
  • 3.6  Switches
  • 3.7  Wireless Access Points
  • 3.8  Modems
  • 3.9  Remote Access Services
  • 3.10  Telecom/PBX Systems
  • 3.11  Virtual Private Network
  • 3.12  Network Monitoring and Diagnostics
  • 3.13  Workstations
  • 3.14  Servers
  • 3.15  Mobile Devices
  • 3.16  Remote Access
  • 3.17  Serial Line Internet Protocol
  • 3.18  Point-to-Point Protocol
  • 3.19  Tunneling Protocols
  • 3.20  Internet Connections
  • 3.21  Ports and Sockets
  • 3.22  E-Mail
  • 3.23  Web
  • 3.24  File Transfer Protocol
  • 3.25  SNMP and Other TCP/IP Protocols
  • 3.26  Cabling
  • 3.27   Wires
  • 3.28   and Communications
  • 3.29  Coax

Module 4: Monitoring Communications Activity Network Monitoring

  • 4.1  Types of Network Traffic
  • 4.2  Network Monitoring Systems
  • 4.3  Intrusion Detection Systems
  • 4.4  Network-Based IDS
  • 4.5  Host-Based IDS
  • 4.6  Honey Pots
  • 4.7  Incident Response
  • 4.8  Incident Identification
  • 4.9  Investigating the Incident
  • 4.10  Repairing the Damage
  • 4.11  Documenting the Response
  • 4.12  Adjusting the Procedures
  • 4.13  Wireless Systems

Module 5: Implementing and Maintaining a Secure Network Overview of Network Security Threats

  • 5.1  Security Baselines
  • 5.2  OS/NOS Hardening
  • 5.3  Network Protocol Configuration
  • 5.4  Microsoft Windows 9x
  • 5.5  Microsoft Windows NT 4
  • 5.6  Microsoft Windows 2000
  • 5.7  Microsoft Windows XP
  • 5.8  Windows .NET Server 2003
  • 5.9  UNIX/Linux
  • 5.10  Novell NetWare
  • 5.11  IBM
  • 5.12  Apple Macintosh
  • 5.13  File Systems
  • 5.14  Operating System Updates
  • 5.15  Network Hardening
  • 5.16  Network Device Updates
  • 5.17  Configuring Network Devices
  • 5.18  Application Hardening

Module 6: Working with a Secure Network Physical Security

  • 6.1  Access Control
  • 6.2  Social Engineering
  • 6.3  Environment
  • 6.4  Business Continuity Planning
  • 6.5  Business Impact Analysis
  • 6.6  Risk Assessment
  • 6.7  Policies
  • 6.8   Standards
  • 6.9   and Guidelines
  • 6.10  Policies
  • 6.11  Standards
  • 6.12  Guidelines
  • 6.13  Security Standards and ISO 17799
  • 6.14  Information Classification
  • 6.15  Public Information
  • 6.16  Private Information
  • 6.17  Government and Military Classifications
  • 6.18  Roles in the Security Process
  • 6.19  Information Access Controls

Module 7: Cryptography Basics and Methods Overview of Cryptography

  • 7.1  Physical Cryptography
  • 7.2  Mathematical Cryptography
  • 7.3  Quantum Cryptography
  • 7.4  The Myth of Unbreakable Codes
  • 7.5  Cryptographic Algorithms
  • 7.6  Hashing
  • 7.7  Symmetric Algorithms
  • 7.8  Asymmetric Algorithms
  • 7.9  Using Cryptographic Systems
  • 7.10  Confidentiality
  • 7.11  Integrity
  • 7.12  Authentication
  • 7.13  Non-Repudiation
  • 7.14  Access Control
  • 7.15  Public Key Infrastructure
  • 7.16  Certificate Authority
  • 7.17  RAs and LRAs
  • 7.18  Certificates
  • 7.19  Certificate Revocation
  • 7.20  Trust Models
  • 7.21  Cryptographic Attacks

Module 8: Cryptography Standards Cryptography Standards and Protocols

  • 8.1  Origins of Encryption Standards
  • 8.2  PKIX/PKCS
  • 8.3  X.509
  • 8.4  SSL
  • 8.5  TLS
  • 8.6  ISAKMP
  • 8.7  CMP
  • 8.8  S/MIME
  • 8.9  SET
  • 8.10  SSH
  • 8.11  PGP
  • 8.12  HTTPS
  • 8.13  S-HTTP
  • 8.14  IPSec
  • 8.15  FIPS
  • 8.16  Common Criteria
  • 8.17  WTLS
  • 8.18  WEP
  • 8.19  ISO 17799

Module 9: Security Policies and Procedures Business Continuity

  • 9.1  Utilities
  • 9.2  High Availability
  • 9.3  Disaster Recovery
  • 9.4  Vendor Support
  • 9.5  Service Level Agreements
  • 9.6  Code Escrow
  • 9.7  Policies and Procedures
  • 9.8  Personnel Policies
  • 9.9  Business Policies
  • 9.10  Certificate Policies
  • 9.11  Incident Response Policies
  • 9.12  Privilege Management
  • 9.13  User and Group Role Management
  • 9.14  Single Sign-On
  • 9.15  Privilege Decision Making
  • 9.16  Auditing
  • 9.17  Access Control

Module 10: Security Management Computer Forensics

  • 10.1  Methodology of a Forensic Investigation
  • 10.2  Chain of Custody
  • 10.3  Preservation of Evidence
  • 10.4  Collection of Evidence
  • 10.5  Security Management
  • 10.6  Best Practices and Documentation
  • 10.7  Change Management
  • 10.8  Systemic Change
  • 10.9  Understanding the Roles in a Change Process
  • 10.10  Justifying the Need for Change
  • 10.11  Scheduling Changes
  • 10.12  Change Staging
  • 10.13  Change Documentation
  • 10.14  Change Notification
  • 10.15  Security Awareness and Education
Request a detailed syllabus.

Get Answers (Answering their questions)

What kind of learning does ITlearn360.com provide?

ITlearn360.com offers instructor-led online live sessions and classroom-based corporate trainings and bootcamps for various courses and certifications to the learners.

Who are the instructors @ITlearn360.com?

@ITlearn360.com, we have an instructor community of industry professionals who are working in leading organizations and are veterans in their respective fields. These experts belong to various industries and are willing to share their talent with learners like you.

Are classes @ITlearn360.com conducted through online video streaming?

Yes, the classes @ITlearn360.com are conducted through online video streaming where there is two-way communication between users and instructors. The users can speak by using a microphone, chat by sending a message through a chat window and share their screens with an instructor. For better understanding, users also get recorded video of the class.

Sign for next demo class