Online CompTIA® Security+™ (SY0-401) Training Course | Southwestern College Professional Studies

Bachelor and Master Degrees from Southwestern College - Professional Studies

Spring Session 1 classes begin January 8th, 2018 Apply Today!

Call Now 1.888.684.5335

Online CompTIA® Security+™ (SY0-401) Training Course

CompTIA® Security+ (SY0-401)

Course Overview

In this instructor-led, online training course, you will be prepared for the CompTIA Security+ certification exam. The Security+ certification is an international, vendor-neutral certification. The certification is proof of a person’s competence in system security, network infrastructure, cryptography, assessments and audits. This certification is designed for IT professionals who already have Network+ certification and two years of technical networking experience, with an emphasis on security. CompTIA’s Security+ certification certifies professionals in the field of information security, one of the fastest-growing fields in IT. CompTIA Security+ demonstrates competency in various domains such as:

  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography

With the threat of data security becoming a rapidly growing issue, the need for trained information security personnel has increased multi-fold. Information Security is one of the fastest growing areas. Candidates who earn this certification will be able to prove their ability to anticipate information security risks and apply their knowledge of security concepts, and tools to safeguard organizational data, as well as know the procedures to react to security incidents, should they occur. Exam: SY0-401

Skills Learned

  • Mitigating threats
  • Cryptography
  • Authentication systems
  • Messaging security
  • User and role-based security
  • Public key infrastructure
  • Access security
  • Ports and protocols
  • Network security
  • Wireless security
  • Remote access security
  • Auditing, logging, and monitoring
  • Vulnerability testing
  • Organizational security
  • Business continuity
  • CompTIA Security+ objectives map
  • CompTIA Security+ acronyms

Who Should Attend This Course

Network Administrators, System Administrators, Help Desk professionals looking to move into networking, or anyone interested in CompTIA Security+ certification.

Prerequisites

CompTIA A+ certification and CompTIA Network+ certification or equivalent experience.

Course Outline

  • Mitigating Threats
  • Cryptography
  • Authentication Systems
  • Messaging Security
  • User and Role-Based Security
  • Public Key Infrastructure (PKI)
  • Access Security
  • Ports and Protocols
  • Network Security
  • Wireless Security
  • Remote Access Security
  • Auditing, Logging, and Monitoring
  • Vulnerability Testing
  • Organizational Security
  • Business Continuity

Hands-On Labs

Threats-Trojans and Malware Protection

  • Introduction
  • Activating a Trojan
  • Testing Network Services with netcat
  • Deploying Malware Protection
  • Summary

Application Data – Establish Host Security

  • Introduction
  • Anti-virus Programs
  • Summary

Network Security – Protocol Analyzers

  • Introduction
  • Investigating the ARP Cache Table
  • Using Wireshark to Capture Packets
  • ARP Problems
  • Summary

Threats – Network Vulnerabilities

  • Introduction
  • Network Footprinting
  • Packet Sniffing
  • MitM with ARP Spoofing
  • Denial of Service
  • Summary

Threats – Vulnerability Scanning

  • Introduction
  • Setting Up OpenVAS
  • Summary

Cryptography – PKI Concepts

  • Introduction
  • Install and Configure Active Directory Certificate Services
  • Configure Certificate Revocation Lists (CRLs)
  • Summary

Cryptography – Certificate Management

  • Introduction
  • Manage Certificate Templates
  • Manage Certificate Enrolment
  • Configure and Manage Key Archival and Recovery
  • Summary

Application Data – Application Security

  • Introduction
  • Authentication Methods
  • Encryption
  • Summary

Access Control – RADIUS

  • Introduction
  • Install Network Policy Server – Microsoft RADIUS
  • Configure the VPN Ports
  • Viewing the NPS Logs
  • Summary

Application Data – Transitive Trust and Authentication

  • Introduction
  • Create Transitive Trusts between Domains
  • Summary

Compliance – User Rights and Permissions

  • Introduction
  • File System Security using Permissions
  • Perform Routine Audits
  • Ensure Network Policies and Procedures
  • Summary

Network Security – Routers Introduction

  • Introduction
  • Static Routing
  • Dynamic Routing
  • Summary

Network Security – Routing Protocols

  • Introduction
  • Configuring a Network
  • Sniffing Routing Traffic
  • Injecting Poison Routes
  • Configuring Authentication for RIP Packets
  • Summary

Network Security – Firewall Rule Based Management

  • Introduction
  • Create Firewall Rules
  • Summary

Network Security – Firewalls

  • Introduction
  • Configuring NAT Firewall
  • Configuring Port Forwarding
  • Summary

Network Security – Spam Filter

  • Introduction
  • Configuring an Email Service
  • Configuring a Mail Client
  • Using Telnet to Spoof a Sender
  • Summary

Protocols and Services – IPSec

  • Introduction
  • Internet Protocol Security (IPSec)
  • Summary

Protocols and Services – DNS

  • Introduction
  • Working with Host Names
  • Working with the HOSTS File
  • Testing Name Resolution
  • Examining DNS Configuration
  • Configuring a DNS Server
  • Testing DNS
  • Summary

Threats – DNS Poisoning

  • Introduction
  • Spoofing a DNS Server
  • Exploring DNS Server Vulnerabilities
  • Summary

Protocols and Services – SNMP

  • Introduction
  • Installing the Monitoring Software
  • Installing and Configuring SNMP
  • Performing a Network Inventory
  • Summary

Protocols and Services – iSCSI

  • Introduction
  • Install and Configure Shared Storage using iSCSI
  • Summary

Threats – Mitigation and Deterrent Techniques

  • Introduction
  • Disabling Unnecessary Services
  • Protecting Management Interfaces and Applications
  • Renaming Unnecessary Accounts for Security
  • Summary

Compliance – Patching

  • Introduction
  • Install and Configure WSUS
  • Create Computer Groups for WSUS
  • Configure GPO Policy for WSUS
  • Summary

Application Data – Data Encryption

  • Introduction
  • Full Disk Encryption using BitLocker
  • Manage Security for Removable Media
  • Summary

Compliance – Backup Execution and Frequency

  • Introduction
  • Perform Server Backup
  • Perform a Role-Specific Backups
  • Summary

Cryptography – Transport Encryption

  • Introduction
  • Configuring FTP
  • Configuring FTP Authentication
  • Configuring Certificate Security
  • Testing Certificate Security
  • Configuring Secure FTP
  • Summary

Network Security – Load Balancers

  • Introduction
  • Install Network Load Balancing Nodes
  • Create the NLB Cluster
  • Configure Resource for NLB
  • Summary

Network Security – Cloud Computing

  • Introduction
  • Software as a Service (SaaS) – Office 365
  • Setting up OneDrive
  • Infrastructure as a Service (IaaS) – Windows Azure
  • Summary

Compliance – RAID

  • Introduction
  • Configure Software RAID
  • Summary

Compliance – Clustering

  • Introduction
  • Install and Configure Failover Clustering
  • Install File Server Application to the Failover Cluster
  • Install File Server Application to the Failover Cluster
  • Summary

Cost

  • Expert-facilitated Virtual Live Online Classroom: $1,490.00
  • Expert-facilitated Virtual Recorded Online Classroom: $1,490.00

Contact us for group and bundle pricing