
Course Outline
CompTIA IT Fundamentals (ITF+)
Course Code
Description
Period
Duration
3
Price
Class
Language
CORSE OVERVIEW:
This course is aimed towards IT professionals who install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.
COURSE DURATION:
3 Days
AUDIENCE PROFILE:
The Official CompTIA Security+ Instructor and Student Guides (SY0-601) have been developed by CompTIA for the CompTIA certification candidate. Rigorously evaluated to validate coverage of the CompTIA Security+ (SY0601) exam objectives, The Official CompTIA Security+ Instructor and Student Guides teach students the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents.
COURSE OUTLINE:
Module 1: Comparing Security Roles and Controls
- Compare and Contrast Information Security Roles
- Compare and Contrast Security Control and Framework Types
- Compare and Contrast Social Engineering Attack Types
- Determine Malware Types
Module 2: Explaining Threat Actors and Threat Intelligence
- Explain Threat Actor Types and Attack Vectors
- Explain Threat Intelligence Sources
Module 3: Performing Security Assessments
- Assess Organizational Security with Network Reconnaissance Tools
- Explain Security Concerns with General Vulnerability Types
- Summarize Vulnerability Scanning Techniques
- Explain Penetration Testing Concepts
Module 4: Identifying Social Engineering and Malware
- Compare and Contrast Social Engineering Techniques
- Analyze Indicators of Malware-Based Attacks
Module 5: Implementing Authentication Controls
- Summarize Authentication Design Concepts
- Implement Knowledge-Based Authentication
- Implement Authentication Technologies
- Summarize Biometrics Authentication Concepts
Module 6: Implementing Identity and Account Management Controls
- Implement Identity and Account Types
- Implement Account Policies
- Implement Authorization Solutions
- Explain the Importance of Personnel Policies
Module 7: Implementing Secure network Designs
- Implement Secure Network Designs
- Implement Secure Switching and Routing
- Implement Secure Wireless Infrastructure
- Implement Load Balancer
Module 8: Implementing Network Security Appliances & Protocols
- Implement Firewalls and Proxy Servers
- Implement Network Security Monitoring
- Summarize the Use of SIEM
Module 9: Implementing Host & Mobile Security Solutions
- Implement Secure Firmware
- Implement Endpoint Security
- Implement Mobile Device Management
- Implement Secure Mobile Device Connections
Module 10: Summarizing Secure Application Concepts
- Analyze Indicators of Application Attacks
- Analyze Indicators of Web Application Attacks
- Summarize Secure Coding Practices
- Implement Secure Script Environments
- Summarize Deployment and Automation Concepts
Module 11: Implementing Secure Cloud Solutions
- Summarize Secure Cloud and Virtualization Services
- Apply Cloud Security Solutions
- Summarize Infrastructure as Code Concepts
Module 12: Explaining Data Privacy and Protection Concepts
- Explain Privacy and Data Sensitivity Concepts
- Explain Privacy and Data Protection Controls
Module 13: Explaining Incident Response & Digital Forensics
- Summarize Incident Response Procedures
- Utilize Appropriate Data Sources for Incident Response
- Apply Mitigation Controls
- Explain Key Aspects of Digital Forensics Documentation
- Explain Key Aspects of Digital Forensics Evidence Acquisition
Module 14: Summarizing Risk Management Concepts
- Explain Risk Management Processes and Concepts
- Explain Business Impact Analysis Concepts
Module 15: Explaining Physical Security
- Explain the Importance of Physical Site Security Controls
- Explain the Importance of Physical Host Security Controls