CompTIA Security Plus Training Course
Learn from the Best, Learn from TopD
Features of This Course
Why Choose CompTIA Security Plus Certification Training?
With TopD Learning’s CompTIA Security+ training course you can earn a global CompTIA Security+ certification that focuses on core cybersecurity skills that are indispensable for security and network administrators.
This course is ideal to help validate your skillset in risk management, risk mitigation, threat management too. This will enable you to handle security incidents should there be any, not just identify them.
The CompTIA Security Plus training that we provide at our organization is designed to meet industry benchmarks and will help you master foundational skills that are needed to pursue a career in IT Security.
Course Curriculum
- Compare and contrast different types of social engineering techniques
- Given a scenario, analyze potential indicators to determine the type of attack
- Analyze potential indicators associated with application and network attacks
- Explain different threat actors, vectors, and intelligence sources
- Explain the security concerns associated with various types of vulnerabilities
- Explain the techniques used in penetration testing
- Security Policy
- Threat Actors
- Social Engineering
- Phishing & Types of Malware
- Trojans and Spyware
- Security Control Types
- Defence in Depth
- Frameworks and Compliance
- Vulnerability Scanning and Pen Tests
- Security Assessment Techniques
- Pen Testing Concepts
- Vulnerability Scanning Concepts
- Exploitation Frameworks
Objective:
- Summarize the techniques used in security assessments
- Explain the importance of security concepts in an enterprise environment.
- Use the appropriate tool to assess organizational security
- Summarize the importance of policies, processes, and procedures for incident response
- Given an incident, utilize appropriate data sources to support an investigation
- Apply mitigation techniques or controls to secure an environment
Topics:
In this course module, you will learn the followings topics:
- Topology & Service Discovery
- Packet Capture Tools
- Remote Access Trojans
- Honeypots and Honeynets
- Incident Response Procedures
- Preparation Phase
- Identification Phase
- Containment Phase
- Eradication and Recovery Phases
- Summarize the basics of cryptographic concepts
- Implement Symmetric & Asymmetric Algorithms
- Understand Cryptographic Attacks & how to mitigate them
- Implement public key infrastructure
- Cryptographic Terminology and Ciphers
- Cryptographic Products
- Hashing Algorithms
- Symmetric Algorithms
- Asymmetric Algorithms
- Diffie-Hellman and Elliptic Curve
- Transport Encryption
- Cryptographic Attacks
- PKI Standards
- Digital Certificates
- Certificate Authorities
- Types of Certificate
- Implementing PKI
- Storing and Distributing Keys
- Key Status and Revocation
- PKI Trust Models
- PGP / GPG
- Summarize authentication and authorization design concepts
- Implement identity and account management controls
- Implement authentication and authorization solutions
- Understand LDAP & Active Directory
- Access Control Systems
- Identification & Authentication
- LAN Manager / NTLM
- Kerberos
- PAP, CHAP, and MS-CHAP
- Password Attacks
- Token-based & Biometric Authentication
- Common Access Card
- Authorization
- Directory Services
- RADIUS and TACACS+
- Federation and Trusts
- Federated Identity Protocols
- Formal Access Control Models
- Account Types
- Windows Active Directory
- Creating and Managing Accounts
- Account Policy Enforcement
- Credential Management Policies
- Account Restrictions
- Accounting and Auditing
- Understand how to make a network secure
- Implement secure network designs
- Install and Configure Security Appliances
- Network Zones and Segments
- Subnetting
- Switching Infrastructure
- Switching Attacks and Hardening
- Endpoint Security
- Network Access Control
- Routing Infrastructure
- Network Address Translation
- Software Defined Networking
- Basic & Stateful Firewalls
- Implementing a Firewall or Gateway
- Web Application Firewalls
- Proxies and Gateways
- Denial of Service Attacks
- Load Balancers
Objective:
- Explain the security implications of embedded and specialized systems
- Implement host or application security solutions
- Install and configure wireless security settings
- Understand various hardening concepts
- Deploying Secure Host Embedded Systems
- Wireless LANs
- WEP and WPA
- Wi-Fi Authentication
- Extensible Authentication Protocol
- Wi-Fi Site Security
- Personal Area Networks
- Trusted Computing
- Hardware / Firmware Security
- Peripheral Device Security
- Secure Configurations
- OS Hardening
- Patch Management
- Embedded Systems
- Security for Embedded System
- Understand all the important security protocols & where they are used
- Implementing Secure Network Access Protocols
- Given a scenario, implement secure protocols
- Implementing Secure Network Applications
- DHCP Security
- DNS Security
- Network Management Protocols
- HTTP and Web Servers
- SSL / TLS and HTTPS
- Web Security Gateways
- Email Services
- S/MIME
- File Transfer
- Voice and Video Services
- Voice over IP (VoIP)
- Remote Access Architecture
- Virtual Private Networks
- IPsec and IKE
- Remote Access Servers
- Remote Administration Tools
- Hardening Remote Access Infrastructure
- Summarize mobile and cloud computing concepts
- Explain the importance of physical security controls
- Implement secure mobile solutions
- Apply cybersecurity solutions to the cloud
- Mobile Device Deployments
- Mobile Connection Methods
- Mobile Access Control Systems
- Enforcement and Monitoring
- Virtualization Technologies
- Virtualization Security Best Practices
- Cloud Computing
- Cloud Security Best Practices
- Site Layout and Access
- Gateways and Locks
- Alarm Systems
- Surveillance
- Hardware Security
- Environmental Controls
- Summarize secure application development, deployment, and automation concepts
- Summarize risk management processes and concepts
- Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture
- Business Impact Analysis
- Identification of Critical Systems
- Risk Assessment
- Risk Mitigation
- Application Vulnerabilities
- Application Exploits
- Web Browser Exploits
- Secure Application Design
- Secure Coding Concepts
- Auditing Applications
- Secure DevOps
- Implement cybersecurity resilience
- Explain the key aspects of digital forensics
- Explaining Disaster Recovery Concepts
- Explain the importance of policies to organizational security
- Explain privacy and sensitive data concepts in relation to security
- Continuity of Operations Planning
- Disaster Recovery Planning
- Resiliency Strategies
- Recovery Sites
- Backup Plans and Policies
- Resiliency and Automation Strategies
- Corporate Security Policy
- Personnel Management Policies
- Interoperability Agreements
- Data Roles
- Data Sensitivity Labeling and Handling
- Data Wiping and Disposal
- Privacy and Employee Conduct Policies
- Security Policy Training
- Forensic Procedures
- Collecting Evidence
- Capturing System Images
- Handling and Analyzing Evidence
CompTIA Security Plus Training Course Features
Instructor-led Live Sessions
We use only the finest instructors in the IT industry with good experience. Learn from our instructor and interact live at your desired place via virtual learning programs scheduled to run at specific times.
E-Learning Self-Paced Training
We offer self-paced training programs, which are structured in modules so as to offer maximum flexibility to those who wish to work around their already hectic schedules.
One to One Training
We offer is one to one training as a mode of educational training where you can Interact one to one with the instructor to get a fully focused training experience. It is preferred by students who prefer a personalized approach.
24 x 7 Expert Support
We have a lifetime 24x7 online support team to resolve all your technical queries, through a ticket based tracking system.
Certification
After successfully completing your course & projects, TopD Learning will provide a professional certification for you.
Lifetime Access
You will get lifetime access to our LMS where quizzes, presentations & class recordings are available.
Course Completion Certification
Give your resume a BOOST, and join Top Companies with a good package.
You will receive a course completion certificate post completing all assignments & tasks certifying that you have learned the skills and completed the course successfully.
Frequently Asked Questions
FAQs
The CompTIA Security+ Certification is a global certification exam that validates your core security skills and allows you to pursue a career in IT security. The exam emphasizes hands-on skills and ensures that security professionals are better equipped to solve more problems throughout the organization.
- Systems administrator
- Security administrator
- Security specialist
- Security engineer
- Network administrator
- Junior IT auditor/penetration tester
- Security consultant
You will never miss a lecture at TopD Learning! We’ve got you covered:
- View the recorded session of the class available in your LMS.
- You can attend the missed session, in any other live batch.