Alternate Text

Course Outline

CompTIA Security+ Intensive Tutoring

Course Code

CT02-Security+

Description

-

Period

7-9 sep

Duration

3

Price

39,000 Baht

Class

Online

Language

Thai

CORSE OVERVIEW:

This course is aimed towards IT professionals who install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

 

COURSE DURATION:

3 Days

 

AUDIENCE PROFILE:

The Official CompTIA Security+ Instructor and Student Guides (SY0-601) have been developed by CompTIA for the CompTIA certification candidate. Rigorously evaluated to validate coverage of the CompTIA Security+ (SY0601) exam objectives, The Official CompTIA Security+ Instructor and Student Guides teach students the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents.

 

COURSE OUTLINE:

Module 1:  Comparing Security Roles and Controls

  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types
  • Compare and Contrast Social Engineering Attack Types
  • Determine Malware Types

 

Module 2:  Explaining Threat Actors and Threat Intelligence

  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources

 

Module 3:  Performing Security Assessments

  • Assess Organizational Security with Network Reconnaissance Tools
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts

 

Module 4:  Identifying Social Engineering and Malware

  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-Based Attacks

 

Module 5:  Implementing Authentication Controls

  • Summarize Authentication Design Concepts
  • Implement Knowledge-Based Authentication
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts

 

Module 6:  Implementing Identity and Account Management Controls

  • Implement Identity and Account Types
  • Implement Account Policies
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies

 

Module 7:  Implementing Secure network Designs

  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancer

 

Module 8:  Implementing Network Security Appliances & Protocols

  • Implement Firewalls and Proxy Servers
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM

 

Module 9:  Implementing Host & Mobile Security Solutions

  • Implement Secure Firmware
  • Implement Endpoint Security
  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections

 

Module 10:  Summarizing Secure Application Concepts

  • Analyze Indicators of Application Attacks
  • Analyze Indicators of Web Application Attacks
  • Summarize Secure Coding Practices
  • Implement Secure Script Environments
  • Summarize Deployment and Automation Concepts

 

Module 11:  Implementing Secure Cloud Solutions

  • Summarize Secure Cloud and Virtualization Services
  • Apply Cloud Security Solutions
  • Summarize Infrastructure as Code Concepts

 

Module 12:  Explaining Data Privacy and Protection Concepts

  • Explain Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls

 

Module 13:  Explaining Incident Response & Digital Forensics

  • Summarize Incident Response Procedures
  • Utilize Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls
  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition

 

Module 14:  Summarizing Risk Management Concepts

  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts

 

Module 15:  Explaining Physical Security

  • Explain the Importance of Physical Site Security Controls
  • Explain the Importance of Physical Host Security Controls

 

 

PLEASE COME AND JOIN US.

Are you interested this course?

Let’s join with us to improve your skill

Alternate TextJOIN THIS CLASS
Alternate Text