Menu
Menu
  • No products in the basket.

CompTIA Security

0( 0 REVIEWS )
103 STUDENTS
ACCREDITED BY

Overview:

If you are looking to climb up the career ladder in an IT enterprise, CompTIA Security+ is perfect for you. Become competent in CompTIA Security+ and succeed in your job role. Network security and risk management is an in-demand area of expertise who can apply CompTIA principles to boost their skills and knowledge and get certified in this course. With increased cyber threats from hackers and criminals constantly trying to steal information and harm infrastructure the demand for cyber security professionals in the industry have grown.

The course will provide you an overview of CompTIA Security+ and cover the technical aspects of the course including security fundamentals, identifying threats and vulnerabilities, managing data and host security, implementing access control and troubleshooting and managing security incidents.

The CompTIA Security+ course will help learners become established professionals in the industry. Learners will gain an overall understanding of installation and Linux systems. The course is internationally recognised and accredited to a training organisation and you will be issued an internationally recognised qualification following full completion of CompTIA Security+.

Why consider 1Training?

As improvements and advancements are made in technology, online courses are no longer just conventional means of studying at affordable costs. In many aspects online training offers superiority to traditional learning. There is an effectiveness and convenience that traditional learning cannot provide. The overall convenience and flexibility makes it a superior learning method.

1Training offers the most convenient path to gain an internationally recognised qualification that will give you the opportunity to put into practice your skill and expertise in an enterprise or corporate environment. You can study at your own pace at 1Training and you will be provided with all the necessary material, tutorials, qualified course instructor and multiple free resources which include Free CV writing pack, TOTUM extra Discount Card, Free career support and course demo to make your learning experience enriching and more rewarding.

Learning Outcomes

  • Learn how to identify threats, attacks and vulnerabilities and respond with appropriate measure.
  • Learn identity and access management.
  • Best practices to implement and summarise risk management.
  • Learn how to implement secure network architecture.
  • Learn how to install and configure wireless network settings.

Course Titles

  • Module 01: Security Fundamentals
  • Module 02: Security Threats and Vulnerabilities
  • Module 03: Data, Application, and Host Security
  • Module 04: Implementing Network Security
  • Module 05: Implementing Access Control, Authentication, and Account Management
  • Module 06: Managing Certificates
  • Module 07: Compliance and Op Security
  • Module 08: Risk Management
  • Module 09: Troubleshoot and Manage Incidents
  • Module 10: Business Continuity and Disaster Recovery Planning

Access Duration

The course will be directly delivered to you, and you have 12 months access to the online learning platform from the date you joined the course.  The course is self-paced and you can complete it in stages, revisiting the lectures at anytime.

Who is this Course aimed at?

The CompTIA Security+ course is aimed at Linux Administrators, Technical and IT staff, Linux Programmers, Linux Security Administrators and aspiring learners who want to gain CompTIA Security+.

Entry Requirements

Individuals who have CompTIA Network+ and 2 years experience in IT administration with focus on security.

Method of Assessment

This is a multiple choice, performance-based exam comprising of 90 questions to be completed in 90 minutes. Passing score 750 (on a scale 100-900)

As it is an official exam, learners will have to purchase it separately on the relevant website.

Certification

Those who successfully complete the exam will be awarded the certificate in CompTIA Security+.

Awarding Body

The certificate will be awarded by CompTIA. This internationally recognised qualification will make your CV standout and encourage employers to see your motivation at expanding your skills and knowledge in the IT enterprise.

Progression and Career Path

Once you successfully complete CompTIA Security+ you will be qualified to work in the following positions. The CompTIA Security+ qualification will also put you in line to demand a higher salary or job promotion. The average UK salary per annum according to https://www.payscale.com is given below.

  • Network Administrator – £20,338 per annum
  • Systems Administrator – £25,422 per annum
  • Security Engineer – £25,467 per annum
  • Linux System Administrator – £35,047 per annum

Other Benefits

  • Written and designed by the industry’s finest expert instructors with over 15 years of experience
  • Repeat and rewind all your lectures and enjoy a personalised learning experience
  • Gain access to quality video tutorials
  • Unlimited 12 months access from anywhere, anytime
  • Save time and money on travel
  • Learn at your convenience and leisure
  • Quizzes, tests mock exams, practice exams to ensure you are 100% ready
  • The benefit of applying for TOTUM extra Discount Card.
  • Free Career Support Service
  • 25% Discount on personal Statement and covering letter writing service
  • Free Access to Over 150 courses for 2 days (48 hours)
  • Free access to course before you purchase (For selected courses only)

Key Features

Gain an accredited UK qualification

Access to excellent quality study materials

Learners will be eligible for TOTUM Discount Card

Personalized learning experience

One year’s access to the course

Support by phone, live chat, and email

Course Curriculum Total Units : 396
➤ Module 01: Security Fundamentals
Lesson A: The Information Security Cycle
Course Introduction
1.1 What Is Information Security?
1.2 What to Protect
1.3 Goals of Security
1.4 Risk
1.5 Threats
1.6 A Vulnerability
1.7 Intrusions
1.8 Attacks
1.9 Controls
1.10 Types of Controls
1.11 The Security Management Process
Lesson B: Information Security Controls
2.1 The CIA Triad
2.2 Non-repudiation
2.3 Identification
2.4 Authentication
2.5 Authentication Factors
2.6 Authorization
2.7 Access Control
2.8 Access Control Models
2.9 Accounting and Auditing
2.10 Common Security Practices
2.11 Implicit Deny
2.12 Least Privilege
2.13 Separation of Duties
2.14 Job Rotation
2.15 Mandatory Vacation
2.16 Time of Day Restrictions
2.17 Privilege Management
Lesson C: Authentication Methods
3.1 User Name/Password Authentication
3.2 Tokens
3.3 Biometrics
3.4 Geolocation
3.5 Keystroke Authentication
3.6 Multi-factor Authentication
3.7 Mutual Authentication
Lesson D: Cryptography Fundamentals
4.1 Cryptography
4.2 Encryption and Decryption
4.3 Ciphers
4.4 Cipher Types
4.5 Encryption and Security Goals
4.6 Demo – Exploring Public Key Cryptography
4.7 Steganography
4.8 Demo – Sharing a Secret Message with Steganography
4.9 A Key
4.10 Hashing Encryption
4.11 Hashing Encryption Algorithms
4.12 Demo – Calculating Hashes
4.13 Symmetric Encryption
4.14 Symmetric Encryption Algorithms
4.15 Asymmetric Encryption
4.16 Asymmetric Encryption Techniques
4.17 Key Exchange
4.18 Digital Signatures
4.19 Cipher Suites
4.20 Session Keys
4.21 Key Stretching
Lesson E: Security Policy Fundamentals
5.1 A Security Policy
5.2 Security Policy Components
5.3 Common Security Policy Types
5.4 Group Policy
5.5 Security Document Categories
5.6 Change Management
5.7 Documentation Handling Measures
5.8 Lesson 01 Review
➤ Module 02: Security Threats And Vulnerabilities
Lesson A: Social Engineering
1.1 Social Engineering Attacks
1.2 Social Engineering Effectiveness
1.3 Types of Social Engineering
1.4 Hackers and Attackers
1.5 Categories of Attackers
Lesson B: Malware
2.1 Malicious Code Attacks
2.2 Viruses
2.3 Demo – Installing Antivirus Software
2.4 Worms
2.5 Adware
2.6 Spyware
2.7 Demo – Scanning Your System for Spyware
2.8 Trojan Horses
2.9 Rootkits
2.10 Logic Bombs
2.11 Botnets
2.12 Ransomware
2.13 Polymorphic Malware
2.14 Armored Viruses
Lesson C: Software-based Threats
3.1 Software Attacks
3.2 Password Attacks
3.3 Types of Password Attacks
3.4 Backdoor Attacks
3.5 Application Attacks
3.6 Types of Application Attacks
3.7 Demo – Managing Application Security
Lesson D: Network-based Threats
4.1 TCP/IP Basics
4.2 Port Scanning Attacks
4.3 Eavesdropping Attacks
4.4 Man-in-the-Middle Attacks
4.5 Replay Attacks
4.6 Social Network Attacks
4.7 DoS Attacks
4.8 DDoS Attacks
4.9 Types of DoS Attacks
4.10 Session Hijacking
4.11 P2P Attacks
4.12 ARP Poisoning
4.13 Transitive Access Attacks
4.14 DNS Vulnerabilities
Lesson E: Wireless Threats And Vulnerabilities
5.1 Wireless Security
5.2 Demo – Configuring a Wireless Access Point
5.3 Demo – Configuring a Wireless Client
5.4 Rogue Access Points
5.5 Evil Twins
5.6 Jamming
5.7 Bluejacking
5.8 Bluesnarfing
5.9 Near Field Communication
5.10 War Driving and War Chalking
5.11 IV Attacks
5.12 Packet Sniffing
5.13 Wireless Replay Attacks
5.14 Sinkhole Attacks
5.15 WEP and WPA Attacks
5.16 WPS Attacks
Lesson F: Physical Threats And Vulnerabilities
6.1 Physical Security
6.2 Physical Security Threats and Vulnerabilities
6.3 Hardware Attacks
6.4 Environmental Threats and Vulnerabilities
6.5 Lesson 02 Review
➤ Module 03 : Data, Application, And Host Security
Lesson A: Manage Data Security
1.1 Layered Security
1.2 Defense in Depth
1.3 What Is Data Security?
1.4 Data Security Vulnerabilities
1.5 Data Storage Methods
1.6 Data Encryption Methods
1.7 Hardware-Based Encryption Devices
1.8 Types of Hardware-Based Encryption Devices
1.9 Data States
1.10 Permissions and Access Control Lists
1.11 Handling Big Data
1.12 Data Policies
1.13 Guidelines for Managing Data Security
1.14 Demo – Managing Data Security
Lesson B: Manage Application Security
2.1 What Is Application Security?
2.2 Patch Management
2.3 Application Security Methods
2.4 Input Validation
2.5 Input Validation Vulnerabilities
2.6 Client-Side and Server-Side Validation
2.7 Error and Exception Handling
2.8 XSS
2.9 XSRF
2.10 Cross-Site Attack Prevention Methods
2.11 Fuzzing
2.12 Web Browser Security
2.13 Demo – Configuring a Web Browser
2.14 Guidelines for Establishing Web Browser Security
2.15 NoSQL Databases
2.16 Database Security
2.17 Guidelines for Managing Application Security
Lesson C: Manage Device And Host Security
3.1 Hardening
3.2 Demo – Hardening a Server
3.4 Operating System Security
3.4 Operating System Security
3.5 TCB
3.6 Security Baselines
3.7 Software Updates
3.8 Application Blacklisting and Whitelisting
3.9 Logging
3.10 Auditing
3.11 Demo – Implementing Auditing
3.12 Anti-malware Software
3.13 Types of Anti-malware Software
3.14 Virtualization Security Techniques
3.15 Hardware Security Controls
3.16 Non-standard Hosts
3.17 Security Controls for Non-standard Hosts
3.18 Strong Passwords
3.19 Guidelines for Establishing Device and Host Security
Lesson D: Manage Mobile Security
4.1 Mobile Device Types
4.2 Mobile Device Vulnerabilities
4.3 Mobile Device Security Controls
4.4 Mobile Application Security Controls
4.5 BYOD Controls
4.6 Guidelines for Managing Mobile Security
4.7 Lesson 03 Review
➤ Module 04 : Implementing Network Security
Lesson A: Configure Security Parameters On Network Devices And Technologies
1.1 Network Components
1.2 Network Devices
1.3 Demo – Configuring Firewall Parameters
1.4 Network Analysis Tools
1.5 IDS
1.6 NIDS
1.7 Demo – Configuring a Network Intrusion Detection System
1.8 Wireless IDS
1.9 IPS
1.10 NIPS
1.11 WIPS
1.12 Types of Network Monitoring Systems
1.13 VPN
1.14 VPN Concentrator
1.15 Web Security Gateways
Lesson B: Network Design Elements And Components
2.1 NAC
2.2 DMZ
2.3 VLAN
2.4 Subnet
2.5 NAT
2.6 Remote Access
2.7 Telephony Components
2.8 Virtualization
2.9 Cloud Computing
2.10 Cloud Computing Deployment Models
2.11 Cloud Computing Service Types
Lesson C: Implement Networking Protocols And Services
3.1 OSI Model
3.2 OSI Model and Security
3.3 TCP/IP
3.4 DNS
3.5 HTTP
3.6 SSL/TLS
3.7 HTTPS
3.8 SSH
3.9 SNMP
3.10 ICMP
3.11 IPSec
3.12 Demo – Securing Network Traffic Using IP Security
3.13 iSCSI
3.14 Fibre Channel
3.15 FCoE
3.16 Telnet
3.17 NetBIOS
3.18 File Transfer Protocols
3.19 Ports and Port Ranges
3.20 Demo – Installing an IIS Web Server
Lesson D: Apply Secure Network Administration Principles
4.1 Rule-Based Management
4.2 Network Administration Security Methods
4.3 Unified Threat Management
4.4 Guidelines for Applying Network Security Administration Principles
Lesson E: Secure Wireless Traffic
5.1 Wireless Networks
5.2 Wireless Antenna Types
5.3 802.11 Standards
5.4 Wireless Security Protocols
5.5 VPNs and Open Wireless
5.6 Wireless Security Methods
5.7 Captive Portals
5.8 Site Surveys
5.9 Guidelines for Securing Wireless Traffic
5.10 Demo – Securing Wireless Traffic
5.11 Lesson 04 Review
➤ Module 05 : Implementing Access Control, Authentication, And Account Management
Lesson A: Access Control And Authentication Services
1.1 Directory Services
1.2 LDAP
1.3 LDAPS
1.4 Common Directory Services
1.5 Demo – Backing Up Active Directory
1.6 Remote Access Methods
1.7 Tunneling
1.8 Remote Access Protocols
1.9 HOTP
1.10 TOTP
1.11 PAP
1.12 CHAP
1.13 Guidelines for Securing Remote Access
1.14 PGP
1.15 RADIUS
1.16 TACACS
1.17 Kerberos
1.18 SAML
Lesson B: Implement Account Management Security Controls
2.1 Identity Management
2.2 Account Management
2.3 Account Privileges
2.4 Account Policy
2.5 Multiple Accounts
2.6 Shared Accounts
2.7 Account Federation
2.8 Account Management Security Controls
2.9 Demo – Account Management Security Controls
2.10 Credential Management
2.11 Group Policy
2.12 Guidelines for Implementing Account Management Security Controls
2.13 Lesson 05 Review
➤ Module 06 : Managing Certificates
Lesson A: Install A Ca Hierarchy
1.1 Digital Certificates
1.2 Certificate Authentication
1.3 PKI
1.4 PKI Components
1.5 CA Hierarchies
1.6 The Root CA
1.7 Public and Private Roots
1.8 Subordinate CAs
1.9 Offline Root CAs
1.10 CA Hierarchy Design Options
1.11 Demo – Installing a Certificate Authority
Lesson B: Enroll Certificates
2.1 The Certificate Enrollment Process
2.2 Demo – Enrolling for Certificates
2.3 The Certificate Life Cycle
2.4 Certificate Life Cycle Management
Lesson C: Secure Network Traffic By Using Certificates
3.1 The SSL Enrollment Process
Lesson D: Renew Certificates
4.1 Certificate Renewal
Lesson E: Back Up And Restore Certificates And Private Keys
5.1 Private Key Protection Methods
5.2 Key Escrow
5.3 Private Key Restoration Methods
5.4 The Private Key Replacement Process
Lesson F: Revoke Certificates
6.1 Certificate Revocation
6.2 Demo – Revoking Certificates
6.3 A CRL
6.4 OCSP
6.5 Lesson 06 Review
➤ Module 07 : Compliance And Op Security
Lesson A: Physical Security
1.1 Physical Security Controls
1.2 Physical Security Control Types
1.3 Environmental Exposures
1.4 Environmental Controls
1.5 Environmental Monitoring
1.6 Safety
Lesson B: Legal Compliance
2.1 Compliance Laws and Regulations
2.2 Legal Requirements
2.3 Types of Legal Requirements
2.4 Forensic Requirements
Lesson C: Security Awareness And Training
3.1 Security Policy Awareness
3.2 Role-Based Training
3.3 PII
3.4 Classification of Information
3.5 The Employee Education Process
3.6 User Security Responsibilities
3.7 Validation of Training Effectiveness
Lesson D: Integrate Systems And Data With Third Parties
4.1 Business Partners
4.2 Social Media Networks and Applications
4.3 Interoperability Agreements
4.4 Risk Awareness
4.5 Data Sharing and Backups
4.6 Guidelines for Securely Integrating Systems and Data with Third Parties
4.7 Lesson 07 Review
➤ Module 08 : Risk Management
Lesson A: Risk Analysis
1.1 Risk Management
1.2 Security Assessment Types
1.3 Risk Types
1.4 Components of Risk Analysis
1.5 Phases of Risk Analysis
1.6 Risk Analysis Methods
1.7 Risk Calculation
1.8 Risk Response Strategies
1.9 Risk Mitigation and Control Types
Lesson B: Implement Vulnerability Assessment Tools And Techniques
2.1 Vulnerability Assessment Techniques
2.2 Vulnerability Assessment Tools
Lesson C: Scan For Vulnerabilities
3.1 The Hacking Process
3.2 Ethical Hacking
3.3 Vulnerability Scanning and Penetration Testing
3.4 Types of Vulnerability Scans
3.5 Demo – Scanning for Port Vulnerabilities
3.6 Demo – Scanning for Password Vulnerabilities
3.7 Box Testing Methods
3.8 Security Utilities
Lesson D: Mitigation And Deterrent Techniques
4.1 Security Posture
4.2 DLP
4.3 Demo – Capturing Network Data
4.4 Detection Controls and Prevention Controls
4.5 Risk Mitigation Strategies
4.6 Types of Mitigation and Deterrent Techniques
4.7 Failsafe, Failsecure, and Failopen
4.8 Lesson 08 Review
➤ Module 09 : Troubleshoot And Manage Incidents
Lesson A: Respond To Security Incidents
1.1 Security Incident Management
1.2 Computer Crime
1.3 An IRP
1.4 First Responders
1.5 Chain of Custody
1.6 Computer Forensics
1.7 Order of Volatility
1.8 Basic Forensic Process
1.9 Basic Forensic Response Procedures for IT
1.10 Big Data Analysis
1.11 Guidelines for Responding to Security Incidents
Lesson B: Recover From A Security Incident
2.1 Basic Incident Recovery Process
2.2 Damage Assessment
2.3 Recovery Methods
2.4 An Incident Report
2.5 Guidelines for Recovering from a Security Incident
2.6 Lesson 09 Review
➤ Module 10 : Business Continuity And Disaster Recovery Planning
Lesson A: Business Continuity
1.1 A BCP
1.2 BIA
1.3 MTD
1.4 RPO
1.5 RTO
1.6 Continuity of Operations Plan
1.7 Alternate Sites
1.8 IT Contingency Planning
1.9 Succession Planning
1.10 Business Continuity Testing Methods
Lesson B: Plan For Disaster Recovery
2.1 A DRP
2.2 Fault Tolerance
2.3 Redundancy Measures
2.4 Demo – Creating a RAID Array Through Software
2.5 High Availability
2.6 Disaster Recovery Testing and Maintenance
2.7 Guidelines for Planning for Disaster Recovery
Lesson C: Execute Drps And Procedures
3.1 The Disaster Recovery Process
3.2 Recovery Team
3.3 Secure Recovery
3.4 Backup Types and Recovery Plans
3.5 A Backout Contingency Plan
3.6 Secure Backups
3.7 Backup Storage Locations
3.8 Guidelines for Executing DRPs and Procedures
3.9 Lesson 10 Review
3.10 Course Closure
WhatsApp chat
Offer Extended – Up to 95% OFF !!
Use code SAVE95 | SAVE90 or SAVE80 at checkout
x