Comptia Security+, 5 days

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

All courses are available online Enquire

Select an option to show pricing

Take this course live online

£1899

Enquire
Attend this course at our centre

£2200

Enquire
Have this course at your venue

£POA

Enquire
Enterprise Learning Subscription

£POA

Enquire
On Demand Learning

£1999

Enquire

Course Dates

Mon, 1 Feb
Live Online
Enquire
Mon, 8 Feb
Live Online
Enquire
Mon, 15 Feb
Live Online
Enquire
Mon, 22 Feb
Live Online
Enquire
Download course details as a PDF

Key features

  • Fully certified trainer with real world experience
  • Get key skills and practical knowledge
  • This course is available live online, onsite, on demand, in person
  • Course materials included
  • Certificates for each participant

What will I learn?

Lesson 1

Threats, Attacks, and Vulnerabilities
Indicators of Compromise
Why is Security Important?
Security Policy
Threat Actor Types
The Kill Chain
Social Engineering
Phishing
Malware Types
Trojans and Spyware
Open Source Intelligence
Lab - VM Orientation
Lab - Malware Types
Critical Security Controls
Security Control Types
Defence in Depth
Frameworks and Compliance
Vulnerability Assessments and Pentests
Security Assessment Techniques
Pen Testing Concepts
Vulnerability Scanning Concepts
Exploit Frameworks
Lab - Using Vulnerability Assessment Tools
Security Posture Assessment Tools
Topology Discovery
Service Discovery
Packet Capture
Packet Capture Tools
Remote Access Trojans
Honeypots and Honeynets
Lab - Using Network Scanning Tools 1
Lab - Using Network Scanning Tools 2
Lab - Using Steganography Tools
Incident Response
Incident Response Procedures
Preparation Phase
Identification Phase
Containment Phase
Eradication and Recovery Phases

Lesson 2

Identity and Access Management
Cryptography
Uses of Cryptography
Cryptographic Terminology and Ciphers
Cryptographic Products
Hashing Algorithms
Symmetric Algorithms
Asymmetric Algorithms
Diffie-Hellman and Elliptic Curve
Transport Encryption
Cryptographic Attacks
Lab - Implementing Public Key Infrastructure
Public Key Infrastructure
PKI Standards
Digital Certificates
Certificate Authorities
Types of Certificate
Implementing PKI
Storing and Distributing Keys
Key Status and Revocation
PKI Trust Models
PGP / GPG
Lab - Deploying Certificates and Implementing Key Recovery
Identification and Authentication
Access Control Systems
Identification
Authentication
LAN Manager / NTLM
Kerberos
PAP, CHAP, and MS-CHAP
Password Attacks
Token-based Authentication
Biometric Authentication
Common Access Card
Lab - Using Password Cracking Tools
Identity and Access Services
Authorization
Directory Services
RADIUS and TACACS+
Federation and Trusts
Federated Identity Protocols
Account Management
Formal Access Control Models
Account Types
Windows Active Directory
Creating and Managing Accounts
Account Policy Enforcement
Credential Management Policies
Account Restrictions
Accounting and Auditing
Lab - Using Account Management Tools

Lesson 3

Architecture and Design (1)
Secure Network Design
Network Zones and Segments
Subnetting
Switching Infrastructure
Switching Attacks and Hardening
Endpoint Security
Network Access Control
Routing Infrastructure
Network Address Translation
Software Defined Networking
Lab - Implementing a Secure Network Design
Firewalls and Load Balancers
Basic Firewalls
Stateful Firewalls
Implementing a Firewall or Gateway
Web Application Firewalls
Proxies and Gateways
Denial of Service Attacks
Load Balancers
Lab - Implementing a Firewall
IDS and SIEM
Intrusion Detection Systems
Configuring IDS
Log Review and SIEM
Data Loss Prevention
Malware and Intrusion Response
Lab - Using an Intrusion Detection System
Secure Wireless Access
Wireless LANs
WEP and WPA
Wi-Fi Authentication
Extensible Authentication Protocols
Additional Wi-Fi Security Settings
Wi-Fi Site Security
Personal Area Networks
Physical Security Controls
Site Layout and Access
Gateways and Locks
Alarm Systems
Surveillance
Hardware Security
Environmental Controls


Lesson 4

Architecture and Design (2)
Secure Protocols and Services
DHCP Security
DNS Security
Network Management Protocols
HTTP and Web Servers
SSL / TSL and HTTPS
Web Security Gateways
Email Services
S/MIME
File Transfer
Voice and Video Services (VoIP and VTC)
Lab - Implementing Secure Network Addressing Services
Lab - Configuring a Secure Email Service
Secure Remote Access
Remote Access Architecture
Virtual Private Networks
IPSec
Remote Access Servers
Remote Administration Tools
Hardening Remote Access Infrastructure
Lab - Implementing a Virtual Private Network
Secure Systems Design
Trusted Computing
Hardware / Firmware Security
Peripheral Device Security
Secure Configurations
OS Hardening
Patch Management
Embedded Systems
Security for Embedded Systems
Secure Mobile Device Services
Mobile Device Deployments
Mobile Connection Methods
Mobile Access Control Systems
Enforcement and Monitoring
Secure Virtualization and Cloud Services
Virtualization Technologies
Virtualization Security Best Practices
Cloud Computing
Cloud Security Best Practices


Lesson 5

Risk Management
Forensics
Forensic Procedures
Collecting Evidence
Capturing System Images
Handling and Analyzing Evidence
Lab - Using Forensic Tools
Disaster Recovery and Resiliency
Continuity of Operations Plans
Disaster Recovery Planning
Resiliency Strategies
Recovery Sites
Backup Plans and Policies
Resiliency and Automation Strategies
Risk Management
Business Impact Analysis
Identification of Critical Systems
Risk Assessment
Risk Mitigation
Secure Application Development
Application Vulnerabilities
Application Exploits
Web Browser Exploits
Secure Application Design
Secure Coding Concepts
Auditing Applications
Secure DevOps
Lab - Identifying a Man-in-the-Browser Attack
Organizational Security
Corporate Security Policy
Personnel Management Policies
Interoperability Agreements
Data Roles
Data Sensitivity Labeling and Handling
Data Wiping and Disposal
Privacy and Employee Conduct Policies
Security Policy Training

 

Download course details as a PDF


Interested in this course? Get in touch...

Call:
01225 308979

Email:
info@go.courses

Find us at:
Go Courses Ltd.
Kemp House
152 - 160 City Road
London
United Kingdom
EC1V 2NX

Registered Office:
Go Courses Ltd.
10 Laura Place
Bath
United Kingdom
BA2 4BL

View on a map

Blog

6 challenges of being a CISO - and which training courses will help?

Security breaches are a business owner’s worst nightmare and each year it’s becoming more important to protect data against cyber threats. As we move into 2020 there are a number of challenges that a CISO will likely face. Here are the top 5 challenges facing a CISO and the training options available.

Blog

General security training - what type of cyber security training do you need? Part 3

Cyber security training can help you respond and resolve problems quickly and easily. Read on for a brief overview of 5 cyber security courses, so you can choose the right training course for you or your team members.

Blog

General security training - what type of cyber security training do you need? Part 2

Cyber security training can help you respond and resolve problems quickly and easily. Read on for a brief overview of 5 cyber security courses, so you can choose the right training course for you or your team members.

Blog

General security training - what type of cyber security training do you need? Part 1

No business is safe from cybercrime, and cyberattacks can happen when you least expect it. But having the right training can prevent or fix all kinds of nightmare issues. Read on for a brief overview of 5 different cyber security courses available, so you can choose the right training course for you or your team members.

Blog

What type of cyber security training do you need? An overview of 10 types of cyber security training

Go.Courses have sourced dozens of the best cyber security training to help you if you’re an IT manager, the network infrastructure manager and everything in between. Read on for a brief overview of ten of our cyber security training course options.

Blog

Is Microsoft Azure Certification worth it?

With Microsoft Azure Certification, technology professionals are more likely to get hired, demonstrate clear business impact, and advance their careers. Microsoft Azure courses are available in locations all over the UK. Here’s an overview of the Microsoft Azure Solutions Architect Technologies AZ-300 course which will help you achieve Azure Certification.

Delighted satisfaction rating