We use cookies to provide you with the best possible experience. Please carry on browsing if you're happy with this or click here to find out more about how we use cookies and how to manage your preferences.

Contact us online or call us on 0191 377 8377

  • Name*:*
  • Organisation:
  • Telephone:
  • Email:*
  • Message*:*
  • Send me a copy of this email
  • Send me course updates from time to time via email

    Your subscription will naturally terminate after your chosen time limit. We will get in touch just before the end so that you can subscribe again if you would like to continue receiving information after that point.

* Required Fields
Course CompTIA Security+
  • Course Duration5 Days
  • Course Options
    Public Scheduled
    Public Scheduled
    Fixed content, fixed date, fixed location, fixed length, multiple organisations - All you need to do is choose which course you would like to attend and contact us to book!
Overview
This course will to prepare delegates for CompTIA's Security+ exam. CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts.
Prerequisites
    • Ideally, delegates should have successfully completed CompTIA Network+ certification and have around 24 months' experience of networking support. It is not necessary that delegates pass the CompTIA Network+ exam before completing CompTIA Security+, but this is recommended. Regardless of whether delegates have passed CompTIA Network+, it is recommended that they have the following skills and knowledge before starting this course: Know the function and basic features of the components of a PC.

      Use Windows to create and manage files and use basic administrative features (Explorer, Control Panel and Management Consoles).

      Basic network terminology (such as OSI Model, Topology, Ethernet, TCP/IP). TCP/IP addressing, core protocols, and troubleshooting tools.
Objectives
    • Identify network attack strategies and defences.
    • Understand the principles of organizational security and the elements of effective security policies.
    • Know the technologies and uses of encryption standards and products.
    • Identify network- and host-based security technologies and practices.
    • Describe how remote access security is enforced.
    • Describe the standards and products used to enforce security on web and communications technologies.
    • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Target Audience
    • This course is intended for delegates wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing.
What's included
    • For courses held on our premises, complimentary tea, coffee and biscuits are available. Lunch is not provided, however, there is a wide variety of eateries within a short walk of the centre.
    • Comprehensive course materials and exercises
Course Content
    • Security Fundamentals
      Security Concepts - Why is Security Important? - Security Fundamentals - Access Control - Identification and Authentication - Accounting - Training Threats - Types and Sources of Threats - What Makes a Network Secure? - Social Engineering - Malware - Network Attack Strategies
    • Operational Security
      Corporate Security Policy - Risk Management - Privilege Policies - Disposal / Destruction Policy - HR Policy - Incident Response Policy
    • Cryptography
      Cryptography - What is Cryptography? - Encryption Technologies - Cryptographic Attacks - Steganography

      Public Key Infrastructure - What is PKI? - Implementing PKI - Cryptographic Standards
    • Implementing Local Security
      Operating System Security - Computer Hardening - Hardening Windows - Hardening Other OS - Virtualization Technologies - Services and Protocols - Hardware and Software Updates - Authentication Technologies - Directory Services

      Application Security - File and Print Services - Storage Security - Databases - DHCP Security - DNS Security

      Auditing and Intrusion Detection Systems - Systems and Performance Monitoring - Audit Logs - Vulnerability Assessments - Intrusion Detection Systems - Honeypots
    • Implementing Remote Security
      Remote Access Security - What is Remote Access? - Remote Access Infrastructure - Remote Connectivity Protocols - Remote Access Server - Enterprise Remote Access Authentication - Remote Authentication Protocols - Hardening Remote Access Infrastructure

      Securing Email and Messaging Communications - Email Standards - Email Application Security - Email Authentication and Confidentiality - Instant Messaging and VoIP - File Transfer

      Securing Web Services - HTTP - SSL / TLS - Web Servers - Web Browsers - Desktop Security Applications
    • Disaster Recovery and Business Continuity
      Disaster Recovery and Business Continuity - Disaster Recovery Planning - Business Continuity - Secure Recovery - Backup Strategies

 

Course Dates Please contact us to discuss dates for this course, thank you

 

 

 

 

 

Contact us

  • Name*:*
  • Organisation:
  • Telephone:
  • Email:*
  • Message*:*
  • Send me a copy of this email
  • Send me course updates from time to time via email

    Your subscription will naturally terminate after your chosen time limit. We will get in touch just before the end so that you can subscribe again if you would like to continue receiving information after that point.

* Required Fields