Comptia Security+
Choose your attendance option:
Choose your attendance option:
Threats, Attacks, and Vulnerabilities: Indicators of Compromise - Why is Security Important? - Security Policy - Threat Actor Types - The Kill Chain - Social Engineering - Phishing - Malware Types - Trojans and Spyware
Open Source Intelligence - Lab - VM Orientation - Lab - Malware Types - Critical Security Controls - Security Control Types - Defence in Depth - Frameworks and Compliance - Vulnerability Assessments and Pentests
Security Assessment Techniques - Pen Testing Concepts - Vulnerability Scanning Concepts - Exploit Frameworks - Lab - Using Vulnerability Assessment Tools - Security Posture Assessment Tools - Topology Discovery
Service Discovery - Packet Capture - Packet Capture Tools - Remote Access Trojans - Honeypots and Honeynets - Lab - Using Network Scanning Tools 1 - Lab - Using Network Scanning Tools 2 - Lab - Using Steganography Tools - Incident Response - Incident Response Procedures - Preparation Phase - Identification Phase - Containment Phase - Eradication and Recovery Phases
Identity and Access Management: Cryptography - Uses of Cryptography - Cryptographic Terminology and Ciphers - Cryptographic Products - Hashing Algorithms - Symmetric Algorithms - Asymmetric Algorithms
Diffie-Hellman and Elliptic Curve - Transport Encryption - Cryptographic Attacks - Lab - Implementing Public Key Infrastructure - Public Key Infrastructure - PKI Standards - Digital Certificates - Certificate Authorities
Types of Certificate - Implementing PKI - Storing and Distributing Keys - Key Status and Revocation - PKI Trust Models - PGP / GPG - Lab - Deploying Certificates and Implementing Key Recovery - Identification and Authentication - Access Control Systems - Identification - Authentication - LAN Manager / NTLM - Kerberos - PAP, CHAP, and MS-CHAP - Password Attacks - Token-based Authentication - Biometric Authentication
Common Access Card - Lab - Using Password Cracking Tools - Identity and Access Services - Authorization - Directory Services - RADIUS and TACACS+ - Federation and Trusts - Federated Identity Protocols - Account Management - Formal Access Control Models - Account Types - Windows Active Directory - Creating and Managing Accounts - Account Policy Enforcement - Credential Management Policies - Account Restrictions -
Accounting and Auditing - Lab - Using Account Management Tools
3Architecture and Design (1): Secure Network Design - Network Zones and Segments - Subnetting - Switching Infrastructure - Switching Attacks and Hardening - Endpoint Security - Network Access Control - Routing Infrastructure - Network Address Translation - Software Defined Networking - Lab - Implementing a Secure Network Design - Firewalls and Load Balancers - Basic Firewalls - Stateful Firewalls - Implementing a Firewall or Gateway - Web Application Firewalls - Proxies and Gateways - Denial of Service Attacks - Load Balancers - Lab - Implementing a Firewall - IDS and SIEM - Intrusion Detection Systems - Configuring IDS - Log Review and SIEM - Data Loss Prevention - Malware and Intrusion Response - Lab - Using an Intrusion Detection System - Secure Wireless Access - Wireless LANs - WEP and WPA - Wi-Fi Authentication - Extensible Authentication Protocols - Additional Wi-Fi Security Settings - Wi-Fi Site Security - Personal Area Networks - Physical Security Controls - Site Layout and Access - Gateways and Locks - Alarm Systems - Surveillance Hardware Security
Environmental Controls
Architecture and Design (2): Secure Protocols and Services - DHCP Security - DNS Security - Network Management Protocols - HTTP and Web Servers - SSL / TSL and HTTPS - Web Security Gateways - Email Services
S/MIME - File Transfer - Voice and Video Services (VoIP and VTC) - Lab - Implementing Secure Network Addressing Services - Lab - Configuring a Secure Email Service - Secure Remote Access - Remote Access - Architecture - Virtual Private Networks - IPSec - Remote Access Servers - Remote Administration Tools - Hardening Remote Access Infrastructure - Lab - Implementing a Virtual Private Network - Secure Systems Design
Trusted Computing - Hardware / Firmware Security - Peripheral Device Security - Secure Configurations - OS Hardening - Patch Management - Embedded Systems - Security for Embedded Systems - Secure Mobile Device Services - Mobile Device Deployments - Mobile Connection Methods - Mobile Access Control Systems - Enforcement and Monitoring - Secure Virtualization and Cloud Services - Virtualization Technologies - Virtualization Security Best Practices - Cloud Computing - Cloud Security Best Practices
Risk Management: Forensics - Forensic Procedures - Collecting Evidence - Capturing System Images - Handling and Analyzing Evidence - Lab - Using Forensic Tools - Disaster Recovery and Resiliency - Continuity of Operations Plans - Disaster Recovery Planning - Resiliency Strategies - Recovery Sites - Backup Plans and Policies - Resiliency and Automation Strategies - Risk Management - Business Impact Analysis - Identification of Critical Systems - Risk Assessment - Risk Mitigation - Secure Application Development - Application Vulnerabilities - Application Exploits - Web Browser Exploits - Secure Application Design - Secure Coding Concepts
Auditing Applications - Secure DevOps - Lab - Identifying a Man-in-the-Browser Attack - Organizational Security - Corporate Security Policy - Personnel Management Policies - Interoperability Agreements - Data Roles
Data Sensitivity Labeling and Handling - Data Wiping and Disposal - Privacy and Employee Conduct Policies - Security Policy Training
Shareable on LinkedIn
You can share your Course Certificates in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.
Call:
01225 308979
Email:
info@go.courses
Find us at:
Go Courses Ltd.
Kemp House
152 - 160 City Road
London
United Kingdom
EC1V 2NX
Registered Office:
Go Courses Ltd.
10 Laura Place
Bath
United Kingdom
BA2 4BL