Course Overview
CompTIA’s Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years’ experience whose job role is focused on system security. The attendees will gain the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.
Target Audience
- IT security professional
- Security engineer
- Security consultant/specialist
- Information assurance technician
- Junior auditor/penetration tester
- Security administrator
- Systems administrator
- Network administrator
Prerequisites
Attendees are recommended to have the following skill and knowledge before starting this course:
- Know the function and basic features of the components of a PC.
- Use Windows Server OS to create and manage files and use basic administrative features (Explorer, Control Panel, Server Manager, and Management Consoles).
- Operate the Linux OS using basic command-line tools.
- Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers).
- Understand TCP/IP addressing, core protocols, and troubleshooting tools.
Objectives
After completing this course you should be able to:
- Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
- Understand the principles of organizational security and the elements of effective security policies.
- Know the technologies and uses of cryptographic standards and products.
- Describe how wireless and remote access security is enforced.
- Describe the standards and products used to enforce security on web and communications technologies.
- Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
- Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.