Associated Certifications
CompTIA Security+ Certification
Required Exam(s)
Instructorctclc admin
TypeOnsite Course
5 Days
Methods of Delivery
Buy NowBook Now

This course you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-401) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today’s job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.

Who Should Attend



Course Content

Download Outline

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

To ensure your success in your course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts. You can obtain this level of skills and knowledge by taking one of the following courses:

  • Using Microsoft® Windows® 8.1
  • CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including configuring security parameters, are strongly recommended.
  • Additional introductory courses or work experience in application development and programming, or in network and operating system administration for any software platform or system are helpful but not required.

Upon successful completion of this course, students will be able to:

  • Identify the fundamental concepts of computer security
  • Identify security threats and vulnerabilities
  • Manage data, application, and host security
  • Implement network security
  • Identify, implement access control and account management security measures
  • Manage certificates
  • Identify and implement compliance and operational security measures
  • Manage risk
  • Troubleshoot and manage security incidents
  • Plan for business continuity and disaster recovery

Lesson 1: Security Fundamentals

  • Topic 1A: The Information Security Cycle
  • Topic 1B: Information Security Controls
  • Topic 1C: Authentication Methods
  • Topic 1D: Cryptography Fundamentals
  • Topic 1E: Security Policy Fundamentals

Lesson 2: Identifying Security Threats and Vulnerabilities

  • Topic 2A: Social Engineering
  • Topic 2B: Malware
  • Topic 2C: Software-Based Threats
  • Topic 2D: Network-Based Threats
  • Topic 2E: Wireless Threats and Vulnerabilities
  • Topic 2F: Physical Threats and Vulnerabilities

Lesson 3: Managing Application, Data, and Host Security

  • Topic 3A: Manage Data Security
  • Topic 3B: Manage Application Security
  • Topic 3C: Manage Device and Host Security
  • Topic 3D: Mobile Security

Lesson 4: Implementing Network Security

  • Topic 4A: Configure Security Parameters on Network Devices and Technologies
  • Topic 4B: Network Design Elements and Components
  • Topic 4C: Implement Networking Protocols and Services
  • Topic 4D: Apply Secure Network Administration Principles
  • Topic 4E: Secure Wireless Traffic

Lesson 5: Access Control, Authentication, and Account Management

  • Topic 5A: Access Control and Authentication Services
  • Topic 5B: Implement Account Management Security Controls

Lesson 6: Managing Certificates

  • Topic 6A: Install a CA Hierarchy
  • Topic 6B: Enroll Certificates
  • Topic 6C: Secure Network Traffic by Using Certificates
  • Topic 6D: Renew Certificates
  • Topic 6E: Revoke Certificates
  • Topic 6F: Back Up and Restore Certificates and Private Keys

Lesson 7: Implementing Compliance and Operational Security

  • Topic 7A: Physical Security
  • Topic 7B: Legal Compliance
  • Topic 7C: Security Awareness and Training
  • Topic 7D: Integrate Systems and Data with Third Parties

Lesson 8: Risk Management

  • Topic 8A: Risk Analysis
  • Topic 8B: Implement Vulnerability Assessment Tools and Techniques
  • Topic 8C: Scan for Vulnerabilities
  • Topic 8D: Mitigation and Deterrent Techniques

Lesson 9: Troubleshooting and Managing Security Incidents

  • Topic 9A: Respond to Security Incidents
  • Topic 9B: Recover from a Security Incident

Lesson 10: Business Continuity and Disaster Recovery Planning

  • Topic 10A: Business Continuity
  • Topic 10B: Plan for Disaster Recovery
  • Topic 10C: Execute DRPs and Procedures