Uploaded by sswetha2398

Edureka CompTIA Security+ Certification Training

advertisement
CompTIA Security+ Certification Training SY0-601
Course Curriculum : Your 10 module Learning Plan
About Edureka
https://www.edureka.co/comptia-security-plus-certification-training
Edureka is a leading e-learning platform providing live instructor-led interactive online training. We
cater to professionals and students across the globe in categories like Big Data & Hadoop, Business
Analytics, NoSQL Databases, Java & Mobile Technologies, System Engineering, Project Management
and Programming. We have an easy and affordable learning solution that is accessible to millions of
learners. With our students spread across countries like the US, India, UK, Canada, Singapore,
Australia, Middle East, Brazil and many others, we have built a community of over 1 million learners
across the globe.
About Course
This first-of-a-kind official partnership between Edureka & CompTIA Security+ offers you a chance to
earn a global certification that focuses on core cybersecurity skills which are indispensable for security
and network administrators. The training is ideal to validate your skill set in risk management, risk
mitigation, threat management, and intrusion detection. This CompTIA Security+ certification enables
you to handle security incidents, not just identify them. Edureka’s CompTIA Security+ training is
designed to meet the industry benchmarks and will help you master foundational skills that are
needed to pursue a career in IT security.
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
CompTIA Security+ Curriculum
Threats, Attacks, and Vulnerabilities
Learning Objective:
Compare and contrast different types of social engineering techniques
Given a scenario, analyze potential indicators to determine the type of attack
Analyze potential indicators associated with application and network attacks
Explain different threat actors, vectors, and intelligence sources
Explain the security concerns associated with various types of vulnerabilities
Explain the techniques used in penetration testing
Topics:
Security Policy
Threat Actors
Social Engineering
Phishing & Types of Malware
Trojans and Spyware
Security Control Types
Defence in Depth
Frameworks and Compliance
Vulnerability Scanning and Pen Tests
Security Assessment Techniques
Pen Testing Concepts
Vulnerability Scanning Concepts
Exploitation Frameworks
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Security Posture & Incident Response
Learning Objective:
Summarize the techniques used in security assessments
Explain the importance of security concepts in an enterprise environment.
Use the appropriate tool to assess organizational security
Summarize the importance of policies, processes, and procedures for incident response
Given an incident, utilize appropriate data sources to support an investigation
Apply mitigation techniques or controls to secure an environment
Topics:
Topology & Service Discovery
Packet Capture Tools
Remote Access Trojans
Honeypots and Honeynets
Incident Response Procedures
Preparation Phase
Identification Phase
Containment Phase
Eradication and Recovery Phases
Cryptography & PKI
Learning Objective:
Summarize the basics of cryptographic concepts
Implement Symmetric & Asymmetric Algorithms
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Understand Cryptographic Attacks & how to mitigate them
Implement public key infrastructure
Topics:
Cryptographic Terminology and Ciphers
Cryptographic Products
Hashing Algorithms
Symmetric Algorithms
Asymmetric Algorithms
Diffie-Hellman and Elliptic Curve
Transport Encryption
Cryptographic Attacks
PKI Standards
Digital Certificates
Certificate Authorities
Types of Certificate
Implementing PKI
Storing and Distributing Keys
Key Status and Revocation
PKI Trust Models
PGP / GPG
Identity and Access Management
Learning Objective:
Summarize authentication and authorization design concepts
Implement identity and account management controls
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Implement authentication and authorization solutions
Understand LDAP & Active Directory
Topics:
Access Control Systems
Identification & Authentication
LAN Manager / NTLM
Kerberos
PAP, CHAP, and MS-CHAP
Password Attacks
Token-based & Biometric Authentication
Common Access Card
Authorization
Directory Services
RADIUS and TACACS+
Federation and Trusts
Federated Identity Protocols
Formal Access Control Models
Account Types
Windows Active Directory
Creating and Managing Accounts
Account Policy Enforcement
Credential Management Policies
Account Restrictions
Accounting and Auditing
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Secure Network Architecture and Design
Learning Objective:
Understand how to make a network secure
Implement secure network designs
Install and Configure Security Appliances
Topics:
Network Zones and Segments
Subnetting
Switching Infrastructure
Switching Attacks and Hardening
Endpoint Security
Network Access Control
Routing Infrastructure
Network Address Translation
Software Defined Networking
Basic & Stateful Firewalls
Implementing a Firewall or Gateway
Web Application Firewalls
Proxies and Gateways
Denial of Service Attacks
Load Balancers
Secure Wireless Access & System Design
Learning Objective:
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Explain the security implications of embedded and specialized systems
Implement host or application security solutions
Install and configure wireless security settings
Understand various hardening concepts
Deploying Secure Host Embedded Systems
Topics:
Wireless LANs
WEP and WPA
Wi-Fi Authentication
Extensible Authentication Protocol
Wi-Fi Site Security
Personal Area Networks
Trusted Computing
Hardware / Firmware Security
Peripheral Device Security
Secure Configurations
OS Hardening
Patch Management
Embedded Systems
Security for Embedded System
Secure Protocols and Services
Learning Objective:
Understand all the important security protocols & where they are used
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Implementing Secure Network Access Protocols
Given a scenario, implement secure protocols
Implementing Secure Network Applications
Topics:
DHCP Security
DNS Security
Network Management Protocols
HTTP and Web Servers
SSL / TLS and HTTPS
Web Security Gateways
Email Services
S/MIME
File Transfer
Voice and Video Services
Voice over IP (VoIP)
Remote Access Architecture
Virtual Private Networks
IPsec and IKE
Remote Access Servers
Remote Administration Tools
Hardening Remote Access Infrastructure
Mobile & Cloud Security
Learning Objective:
Summarize mobile and cloud computing concepts
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Explain the importance of physical security controls
Implement secure mobile solutions
Apply cybersecurity solutions to the cloud
Topics:
Mobile Device Deployments
Mobile Connection Methods
Mobile Access Control Systems
Enforcement and Monitoring
Virtualization Technologies
Virtualization Security Best Practices
Cloud Computing
Cloud Security Best Practices
Site Layout and Access
Gateways and Locks
Alarm Systems
Surveillance
Hardware Security
Environmental Controls
Risk Management & Secure Application Development
Learning Objective:
Summarize secure application development, deployment, and automation concepts
Summarize risk management processes and concepts
Explain the importance of applicable regulations, standards, or frameworks that impact
organizational security posture
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Topics:
Business Impact Analysis
Identification of Critical Systems
Risk Assessment
Risk Mitigation
Application Vulnerabilities
Application Exploits
Web Browser Exploits
Secure Application Design
Secure Coding Concepts
Auditing Applications
Secure DevOps
Organisational Security & Digital Forensics
Learning Objective:
Implement cybersecurity resilience
Explain the key aspects of digital forensics
Explaining Disaster Recovery Concepts
Explain the importance of policies to organizational security
Explain privacy and sensitive data concepts in relation to security
Topics:
Continuity of Operations Planning
Disaster Recovery Planning
Resiliency Strategies
Recovery Sites
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Backup Plans and Policies
Resiliency and Automation Strategies
Corporate Security Policy
Personnel Management Policies
Interoperability Agreements
Data Roles
Data Sensitivity Labeling and Handling
Data Wiping and Disposal
Privacy and Employee Conduct Policies
Security Policy Training
Forensic Procedures
Collecting Evidence
Capturing System Images
Handling and Analyzing Evidence
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
CompTIA Security+ Project
What are the system requirements for this CompTIA Security+
Online Training?
Hardware Requirements:
Memory – Minimum 4 GB RAM
Processor – Intel Core i3 CPU @2.00 GHz or
later
Storage – 250 GB HDD/SDD or later
How will I execute the practicals?
You will be provided with CompTIA Labs licenses. The licenses will be valid for one year and
can be used for Web, iOS, and Android apps.
What practical/hands-on will be part of this CompTIA Security+
Online Training?
Determining Malware Types
Performing Network scanning with Software tools
Analyzing Network Traffic with Packet Sniffing Software Tools
Concealing Data with Steganography Tools
Identifying vulnerabilities with Scanning Software Tools
Implementing Certificate Services
Deploying Certificates and Implementing Key Recovery
Cracking Password using Software Tools
Managing Accounts in a Windows Domain
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Implementing a Secure Network Design
Installing & Configuring a Firewall
Installing & Configuring an Intrusion Detection System
Implementing Secure Network Addressing Services
Implementing a Virtual Private Network
Installing & Configuring a Secure Email Service
Using Forensics Tools
Identifying a Man-in-the-Browser Attack
www.edureka.co
© 2021 Brain4ce Education Solutions Pvt. Ltd. All rights Reserved.
Download