Main: 01633 256482 info@nilc.co.uk

CompTIA Security+

✓  Exam perpetration courses to help you gain CompTIA qualifications

✓  Expert instructors with 5 Star customer ratings

✓  Onsite training courses available

✓  ReAct Government Funded Accepted

Course Type

Classroom

Duration

5 days

Accreditation

Available

Exam

Not Included

Course Information

This course is intended for those wishing to qualify with CompTIA Security+. CompTIA’s Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years’ experience whose job role is focused on system security.

This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

Module 1 / Threats, Attacks, and Vulnerabilities

  • Indicators of Compromise
  • Why is Security Important?
  • Security Policy
  • Threat Actor Types
  • The Kill Chain
  • Social Engineering
  • Phishing
  • Malware Types
  • Trojans and Spyware
  • Open Source Intelligence
  • Lab – VM Orientation
  • Lab – Malware Types
  • Critical Security Controls
  • Security Control Types
  • Defence in Depth
  • Frameworks and Compliance
  • Vulnerability Assessments and Pentests
  • Security Assessment Techniques
  • Pen Testing Concepts
  • Vulnerability Scanning Concepts
  • Exploit Frameworks
  • Lab – Using Vulnerability Assessment Tools
  • Security Posture Assessment Tools
  • Topology Discovery
  • Service Discovery
  • Packet Capture
  • Packet Capture Tools
  • Remote Access Trojans
  • Honeypots and Honeynets
  • Lab – Using Network Scanning Tools 1
  • Lab – Using Network Scanning Tools 2
  • Lab – Using Steganography Tools
  • Incident Response
  • Incident Response Procedures
  • Preparation Phase
  • Identification Phase
  • Containment Phase
  • Eradication and Recovery Phases

Module 2 / Identity and Access Management

  • Cryptography
  • Uses of Cryptography
  • Cryptographic Terminology and Ciphers
  • Cryptographic Products
  • Hashing Algorithms
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Diffie-Hellman and Elliptic Curve
  • Transport Encryption
  • Cryptographic Attacks
  • Lab – Implementing Public Key Infrastructure
  • Public Key Infrastructure
  • PKI Standards
  • Digital Certificates
  • Certificate Authorities
  • Types of Certificate
  • Implementing PKI
  • Storing and Distributing Keys
  • Key Status and Revocation
  • PKI Trust Models
  • PGP / GPG
  • Lab – Deploying Certificates and Implementing Key Recovery
  • Identification and Authentication
  • Access Control Systems
  • Identification
  • Authentication
  • LAN Manager / NTLM
  • Kerberos
  • PAP, CHAP, and MS-CHAP
  • Password Attacks
  • Token-based Authentication
  • Biometric Authentication
  • Common Access Card
  • Lab – Using Password Cracking Tools
  • Identity and Access Services
  • Authorization
  • Directory Services
  • RADIUS and TACACS+
  • Federation and Trusts
  • Federated Identity Protocols
  • Account Management
  • Formal Access Control Models
  • Account Types
  • Windows Active Directory
  • Creating and Managing Accounts
  • Account Policy Enforcement
  • Credential Management Policies
  • Account Restrictions
  • Accounting and Auditing
  • Lab – Using Account Management Tools

Module 3 / Architecture and Design (1)

  • Secure Network Design
  • Network Zones and Segments
  • Subnetting
  • Switching Infrastructure
  • Switching Attacks and Hardening
  • Endpoint Security
  • Network Access Control
  • Routing Infrastructure
  • Network Address Translation
  • Software Defined Networking
  • Lab – Implementing a Secure Network Design
  • Firewalls and Load Balancers
  • Basic Firewalls
  • Stateful Firewalls
  • Implementing a Firewall or Gateway
  • Web Application Firewalls
  • Proxies and Gateways
  • Denial of Service Attacks
  • Load Balancers
  • Lab – Implementing a Firewall
  • IDS and SIEM
  • Intrusion Detection Systems
  • Configuring IDS
  • Log Review and SIEM
  • Data Loss Prevention
  • Malware and Intrusion Response
  • Lab – Using an Intrusion Detection System
  • Secure Wireless Access
  • Wireless LANs
  • WEP and WPA
  • Wi-Fi Authentication
  • Extensible Authentication Protocols
  • Additional Wi-Fi Security Settings
  • Wi-Fi Site Security
  • Personal Area Networks
  • Physical Security Controls
  • Site Layout and Access
  • Gateways and Locks
  • Alarm Systems
  • Surveillance
  • Hardware Security
  • Environmental Controls

Module 4 / Architecture and Design (2)

  • Secure Protocols and Services
  • DHCP Security
  • DNS Security
  • Network Management Protocols
  • HTTP and Web Servers
  • SSL / TSL and HTTPS
  • Web Security Gateways
  • Email Services
  • S/MIME
  • File Transfer
  • Voice and Video Services (VoIP and VTC)
  • Lab – Implementing Secure Network Addressing Services
  • Lab – Configuring a Secure Email Service
  • Secure Remote Access
  • Remote Access Architecture
  • Virtual Private Networks
  • IPSec
  • Remote Access Servers
  • Remote Administration Tools
  • Hardening Remote Access Infrastructure
  • Lab – Implementing a Virtual Private Network
  • Secure Systems Design
  • Trusted Computing
  • Hardware / Firmware Security
  • Peripheral Device Security
  • Secure Configurations
  • OS Hardening
  • Patch Management
  • Embedded Systems
  • Security for Embedded Systems
  • Secure Mobile Device Services
  • Mobile Device Deployments
  • Mobile Connection Methods
  • Mobile Access Control Systems
  • Enforcement and Monitoring
  • Secure Virtualization and Cloud Services
  • Virtualization Technologies
  • Virtualization Security Best Practices
  • Cloud Computing
  • Cloud Security Best Practices

Module 5 / Risk Management

  • Forensics
  • Forensic Procedures
  • Collecting Evidence
  • Capturing System Images
  • Handling and Analyzing Evidence
  • Lab – Using Forensic Tools
  • Disaster Recovery and Resiliency
  • Continuity of Operations Plans
  • Disaster Recovery Planning
  • Resiliency Strategies
  • Recovery Sites
  • Backup Plans and Policies
  • Resiliency and Automation Strategies
  • Risk Management
  • Business Impact Analysis
  • Identification of Critical Systems
  • Risk Assessment
  • Risk Mitigation
  • Secure Application Development
  • Application Vulnerabilities
  • Application Exploits
  • Web Browser Exploits
  • Secure Application Design
  • Secure Coding Concepts
  • Auditing Applications
  • Secure DevOps
  • Lab – Identifying a Man-in-the-Browser Attack
  • Organizational Security
  • Corporate Security Policy
  • Personnel Management Policies
  • Interoperability Agreements
  • Data Roles
  • Data Sensitivity Labeling and Handling
  • Data Wiping and Disposal
  • Privacy and Employee Conduct Policies
  • Security Policy Training

This course prepares candidates to take the SY0-501 CompTIA Security+ exam.

Please note the exams are not included in the course and must be book separately through Pearson Vue.

  • Day 1 –  09:00am – 17:00pm 
  • Day 2 –  09:00am – 17:00pm 
  • Day 3 –  09:00am – 17:00pm 
  • Day 4 –   09:00am – 17:00pm 
  • Day 5 –   09:00am – 17:00pm 

This course includes:

  • Training from an certified CompTIA trainer
  • Computer / Laptop to use for the duration of the course
  • CompTIA training course materials
  • Online labs (if applicable)
  • Refreshments

Dates and Prices for CompTIA Security+

Choose your location

Cardiff
October 21, 2019 £1,795.00
Available
Enquire

Please note all published prices are exclusive of VAT for consumers who pay no VAT or can recover VAT. The current rate of VAT is 20% for consumers that are required to pay VAT. All public classroom course bookings are subject to availability and minimum course numbers.

Why Choose NILC For Your CompTIA Training?

 

Industry Expert Trainers

CompTIA certified trainers with real world experience

Highly Rated

We are highly rated with 5 stars from Trustpilot

i

Comprehensive Support

Materials and equipment supplied with every classroom based course

Multiple Locations

Courses available at our venues or your offices

Other Related Courses

Our registered office and postal address is 50 Commercial Road, Newport, Gwent, NP20 2PE

All quoted prices are exclusive of VAT for consumers who pay no VAT or can recover VAT. The current rate of VAT is 20% for consumers that are required to pay VAT.
All course bookings are subject to availability.