1 - Comparing and Contrasting Attacks
Compare and Contrast Information Security RolesExplain Threat Actor TypesCompare and Contrast Social Engineering Attack TypesDetermine Malware Types
2 - Comparing and Contrasting Security Controls
Compare and Contrast Security Control and Framework TypesFollow Incident Response Procedures
3 - Assessing Security Posture with Software Tools
Explain Penetration Testing ConceptsAssess Security Posture with Topology Discovery Software ToolsAssess Security Posture with Fingerprinting and Sniffing Software ToolsAssess Security Posture with Vulnerability Scanning Software Tools
4 - Explaining Basic Cryptography Concepts
Compare and Contrast Basic Concepts of CryptographyExplain Hashing and Symmetric Cryptographic AlgorithmsExplain Asymmetric Cryptographic Algorithms
5 - Implementing a Public Key Infrastructure
Implement Certificates and Certificate AuthoritiesImplement PKI Management
6 - Implementing Identity and Access Management Controls
Compare and Contrast Identity and Authentication ConceptsInstall and Configure Authentication ProtocolsImplement Multifactor Authentication
7 - Managing Access Services and Accounts
Install and Configure Authorization and Directory ServicesImplement Access Management ControlsDifferentiate Account Management PracticesImplement Account Auditing and Recertification
8 - Implementing a Secure Network Architecture
Implement Secure Network Architecture ConceptsInstall and Configure a Secure Switching InfrastructureInstall and Configure Network Access ControlInstall and Configure a Secure Routing and NAT Infrastructure
9 - Installing and Configuring Security Appliances
Install and Configure Firewalls and ProxiesInstall and Configure Load BalancersInstall and Configure Intrusion Detection/Prevention SystemsInstall and Configure Data Loss Prevention (DLP) SystemsInstall and Configure Logging and SIEM Systems
10 - Installing and Configuring Wireless and Physical Access Security
Install and Configure a Wireless InfrastructureInstall and Configure Wireless Security SettingsExplain the Importance of Physical Security Controls
11 - Deploying Secure Host, Mobile, and Embedded Systems
Implement Secure Hardware Systems DesignImplement Secure Host Systems DesignImplement Secure Mobile Device Systems DesignImplement Secure Embedded Systems Design
12 - Implementing Secure Network Access Protocols
Implement Secure Network Operations ProtocolsImplement Secure Remote Access ProtocolsImplement Secure Remote Administration Protocols
13 - Implementing Secure Network Applications
Implement Secure Web ServicesImplement Secure Communications ServicesSummarize Secure Virtualization InfrastructureSummarize Secure Cloud Services
14 - Explaining Risk Management and Disaster Recovery Concepts
Explain Risk Management Processes and ConceptsExplain Resiliency and Automation StrategiesExplain Disaster Recovery and Continuity of Operation ConceptsSummarize Basic Concepts of Forensics
15 - Summarizing Secure Application Development Concepts
Explain the Impact of Vulnerability TypesSummarize Secure Application Development Concepts
16 - Explaining Organizational Security Concepts
Explain the Importance of Security PoliciesImplement Data Security and Privacy PracticesExplain the Importance of Personnel Management
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
This course is designed for information technology (IT) professionals who have networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix®, or Linux®; and who want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles.
This course is also designed for students who are seeking the CompTIA Security+ certification and who want to prepare for the CompTIA Security+ SY0-501 Certification Exam.
To ensure your success in this course, you should have basic Windows user skills and a fundamental understanding of computer and networking concepts.
CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months' experience in networking, including configuring security parameters, are strongly recommended.