CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents - it ensures that security personnel are anticipating security risks and guarding against them.
12 Months Unlimited Online Access to Expert Instructor-Led Training
Get trained by the very finest instructors in the IT industry today. With a minimum of 15 years real-world experience, they're all experts in their respective fields. Unlike live classes, you can fast-forward, repeat or rewind any part of your lecture. This creates a truly personal learning experience, and provides all the benefits of hands-on training - along with the unique flexibility of 24x7 access so you can fit everything around your schedule.
Visual Demonstrations & Multimedia Presentations
All courseware includes instructor-led demonstrations and visual presentations, allowing students to focus their skills development around real-world scenarios.
Quizzes & Exam Simulators
Customised practice exams help prepare you more effectively for your final examinations. And by utilising practice quizzes after each module, you ensure confidence and gauge your effectiveness on each topic before proceeding.
The included practice exams are also purposely designed to replicate & mirror the testing centre exam environment. With an average of 100 questions, you can ensure you're 100% prepared.
Social Learning & Networking
A world class Learning Management System (LMS) allows you to effectively interact & collaborate with other students, form individual study-groups, engage in forum discussions, rate different courses, and keep up with the latest industry knowledge. This is unmatched in the training industry, and makes your learning process far more fun and enjoyable.
Flash Cards & Educational Games
Education is not a one-size-fits-all activity, as students learn in many different ways - often preferring a variety of different tools. This is why we also provide Flash Cards & Educational Games throughout... All designed to ensure the maximum retention level, while keeping you more engaged and focused.
Navigation & Controls
The modular fashion of these self-paced training programs allows you a great deal of flexibility, with access to expert-level instruction anytime of the day or night. Full navigation controls allow you to pace your training throughout tightly defined sections & modules.
CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in:
Compliance and operational security
Threats and vulnerabilities
Application, data and host security
Access control and identity management
CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents; it ensures that security personnel are anticipating security risks and guarding against them.
Candidate job roles include security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator. Organizations that employ CompTIA Security+ certified staff include Hitachi Information Systems (Japan), Trendmicro (Philippines), Lockheed Martin, General Dynamics and Northrop Grumman. CompTIA Security+ is one of the options for certifications required by the U.S. Department of Defense 8570.1, for military personnel or military contractors engaged in information assurance activities. With Network Security being the fast growing sector within IT having your Security+ will put you or your team ahead of the competition!
Topic A: System Maintenance Causes of Compromised Security Technology Weaknesses Configuration Weaknesses Policy Weaknesses Human Error and Malice Securing the Operating System Microsoft Update Windows Update Categories Demo – A-2: Updating the Operating System Patch Management Demo – A-3: Managing Software Patches Service Packs Demo – A-4: Checking for and Installing Service Packs BIOS Version BIOS Update Demo – A-5: Determining Whether you Need to Update your Computer’s BIOS Windows Firewall User Account Control Demo – A-6: Configuring Windows Firewall
Topic B: Application Security Application Vulnerabilities Countermeasures Demo – B-1: Managing Application Security Topic C: Physical Security Physical Access Control Smart Card and Reader Fingerprint Scanner Biometric Devices Plant Security Cipher Lock Man-trap Topic D: Malware Malware Varieties Malware Effects Anti-malware Antivirus Software Anti-malware Products Demo – D-2: Installing Antivirus Software Windows Defender Demo – D-3: Scanning your System for Spyware Course Syllabus Topic E: Social Engineering Social Engineering Types of Social Engineering Social Engineering Countermeasures Phishing Demo – E-2: Examining Phishing Spam Social Networking Unit 01 Review
UNIT 02 – Cryptography
Topic A: Symmetric Cryptography ROT13 Cipher Keys Symmetric Encryption in Action Common Symmetric Ciphers Hashes Uses for Hashes MD5 Hash Algorithm SHA Hash Vulnerabilities Demo – A-2: Calculating Hashes Steganography Demo – A-3: Sharing a Secret Message with Steganography
Topic B: Public Key Cryptography Public Key Cryptography Asymmetric Encryption in Action Common Asymmetric Ciphers Demo – B-1: Exploring Public Key Cryptography Digital Signatures Signature Process Features of Signatures Digital Certificates Certificate Types Demo – B-2: Examining Certificates Public Key Infrastructure Certificate Policy Certificate Practice Statement Trust Models Single-authority Trust Model Hierarchical Trust Model Web of Trust Model Demo – B-3: Examining Certificate Trusts Single- and Dual-key Certificates Quantum Cryptography Unit 02 Review
UNIT 03 – Authentication
Topic A: Authentication Factors and Requirements Three Steps to Secure Resources Authentication Factors One-factor Authentication Two-factor Authentication Three-factor Authentication Considerations Identification and Authentication Identity Proofing Single Sign-on
Topic B: Authentication Systems Authentication Protocols NTLM NTLM Challenge-response NTLM Vulnerabilities Kerberos Kerberos System Composed of: Kerberos Data Types: Kerberos Authentication Process Cross-realm Authentication Kerberos Security Weaknesses Null Sessions
Topic C: Authentication System Variables Authentication Vulnerabilities Secure Passwords Password Realities Least Privilege Demo – C-1: Identifying Authentication Vulnerabilities Wireshark Demo – C-2: Capturing Passwords with a Protocol Analyzer Password Cracking Password Guessing SAM and SYSTEM Files Demo – C-3: Cracking Passwords Unit 03 Review
UNIT 04 – User & Role-based Security
Topic A: Baseline Security Policies Security Baselines Demo – A-1: Using MBSA to Analyze Security Group Policy Settings Local GPO Types GPO Editor Local Computer GPO Nodes Demo – A-2: Creating a Console to Manage Local Security Policies Policy Properties Dialog Box Container Types Types of Domain GPOs GPOs Applied in this Order Demo – A-3: Using the GPMC
Topic B: Resource Access Groups Demo – B-1: Creating Users and Groups Based on Security Needs Permissions File System Security Access Control Models Demo – B-2: Securing File Resources Unit 04 Review
UNIT 05 – Peripheral Security
Topic A: File and Disk Encryption File and Disk Encryption File-level Encryption Demo – A-1: Enabling File-based Encryption Whole Disk Encryption Windows BitLocker BitLocker Life Cycle Recovery Other Disk Encryption Tools Demo – A-2: Creating an Encrypted Volume Demo – A-3: Mounting, Using, and Dismounting an Encrypted Volume
Topic B: Peripheral and Component Security Peripherals and Components USB Drives Laptops Shredding Standards Demo – B-2: Using Windows Policies to Mitigate the Risks of Peripherals
Topic C: Mobile Device Security Mobile Device Risks Additional Concerns Mitigating Risks Screen Lock Android Security Settings WaveSecure Risks and Threats Unit 05 Review
UNIT 06 – Public Key Infrastructure
Topic A: Public Key Cryptography Management Setup and Initialization Phase Administration Phase Cancellation and Key History Administrative Responsibilities
Topic B: Implementing Public Key Infrastructure Microsoft Certificate Services AD Integration Options Demo – B-1: Installing a Standalone Root Certificate Authority Demo – B-2: Installing an Enterprise Subordinate CA Demo – B-3: Implementing a File-based Certificate Request Demo – B-4: Managing your Certificate Server User Certificates Demo – B-5: Requesting a User Certificate Certificate Revocation Demo – B-6: Revoking a Certificate Key Escrow and Recovery Key Recovery Agent Demo – B-7: Enabling the EFS Recovery Agent Template Demo – B-8: Enrolling for a Recovery Agent Certificate Demo – B-9: Enabling Key Archival Demo – B-10: Re-enrolling All Certificates
Topic C: Web Server Security with PKI Securing Web Servers Commercial Certificate Demo – C-1: Requesting and Installing a Web Server Certificate Demo – C-2: Enabling SSL for the Certificate Server Website HTTPS Connections Demo – C-3: Making a Secure Connection Demo – C-4: Requesting a Client Certificate via the Web Unit 06 Review
Topic B: E-mail Security E-mail Security E-mail Application Security Demo – B-2: Configuring an E-mail Client to Use Secure Authentication Signed and Encrypted Mail PGP PGP Certificates S/MIME X.509 Certificates PGP vs. S/MIME Demo – B-3: Examining S/MIME Features Using PGP Demo – B-4: Installing Gnu Privacy Guard and Enigmail Demo – B-5: Creating an OpenPGP Certificate and Key Pair Signed Message Demo – B-6: Sending a Signed Message
Topic C: Social Networking and Messaging Social Networking Instant Messaging IM Ports Unit 07 Review
UNIT 08 – Ports and Protocols
Topic A: TCP/IP Basics TCP/IP Architecture Application-layer Protocols HTTP HTTPS Connections FTP Trivial File Transfer Protocol SFTP Telnet DNS Additional Protocols Transport-layer Protocols Port Numbers Service Port Numbers Demo – A-3: Using Port Numbers IPv4 Classes IPv4 Header CIDR and NAT IPv6 Header IPv6 Scopes IPv6 Address Types Demo – A-4: Comparing IPv4 and IPv6 Packets
Topic B: Protocol-based Attacks DoS Attacks TCP Three-way Handshake Smurf Attack Ping-of-Death Attacks Xmas Attacks Demo – B-1: Preventing Common Protocol-based Attacks DDoS Attacks DDoS Attack Protection Demo – B-2: Assessing your Vulnerability to DDoS Attacks Man-in-the-Middle Attacks Spoofing IP Address Spoofing Demo – B-3: Scanning Ports ARP Poisoning Demo – B-4: Checking the ARP Cache Spoofing Attacks Replay Attacks TCP/IP Hijacking Unit 08 Review
UNIT 09 – Network Security
Topic A: Network Devices OSI Reference Model Networking Devices Repeaters, Hubs, Switches Switch Security Routers Router State Management NAT and PAT Port Address Translation Firewalls and Proxies Firewall Categories Security Issues Overcoming Weaknesses
Topic B: Secure Network Topologies Security Zones Intranet Zone Perimeter Network DMZ Options Screened Host Bastion Host Three-homed Firewall Back-to-back Firewalls Dead Zone Traffic Filtering Network Bridging VLAN Network Access Control VPN IPSec Encryption
Topic C: Secure Networking Firewall Administration Rule Planning Demo – C-1: Configuring Firewall Rules Port Security Demo – C-2: Blocking Ports with the Windows Firewall VLAN Security Secure Router Configuration
Topic D: Virtualization and Cloud Computing Virtual Computers Citrix XenServer Virtualization Concerns and Risks Cloud Computing Cloud Deployment Cloud Categories Risks and Concerns Unit 09 Review
UNIT 10 – Wireless Security
Topic A: Wireless Network Security 802.11 Standard 802.11 Family 802.11 Networking Wireless Security Threats Wireless Security Transmission Encryption Configuration Options Demo – A-2: Configuring a Wireless Access Point Configuring Wireless Clients RADIUS Demo – A-3: Configuring a Wireless Client Wireless Network Vulnerabilities Wi-Fi Scanners War Chalking Symbols
Topic B: Mobile Device Security Infrastructure Issues Protecting Against Attacks Unit 10 Review
Topic B: Auditing and Logging Event Viewer Windows Server 2008 Event Viewer Events Event Types Event Details Demo – B-1: Viewing Event Logs Device and Application Logging
Topic C: Intrusion Detection and Prevention Systems Intrusion Detection Events NIDS IDScenter for Snort Example Snort Rule HIDS HIDS Advantages Over NIDS Honeypots and Honeynets Honeypot Examples Honeypot Deployment
Topic D: Incident Response Computer Forensics Evidence-Gathering Principles Chain of Custody Remediation Unit 12 Review
UNIT 13 – Organizational Security
Topic A: Organizational Policies CIA Triad Control Types Risk Assessment Security Policy Contents Acceptable-Use Policy Due Care Privacy Separation of Duties Need to Know Password Management Service-level Agreement Disposal and Destruction Human Resources Policies Incident Response Policy Incident Response Policy Contents Preparation Detection Containment Eradication Recovery Follow-up Hiring Employee Review and Maintenance Post-employment Code of Ethics Change Management Change Documentation
Topic B: Education and Training Education Communication User Awareness Types of Training
Topic C: Disposal and Destruction Disposal Data Security and Destruction Disposal of Electronics Disposal of Computer Equipment Unit 13 Review
UNIT 14 – Business Continuity
Topic A: Business Continuity Planning Business Impact Assessment Threats Business Continuity Teams Contingency Plan Documentation Disaster or Service Failure Utility Services Redundant Locations Disaster Recovery Exercises
Really informative & very positive... They cut out all the nonsense and just gave it to me in plain terms: This is what you're going to get - and this is where you'll end up. That's all I wanted really.
David : UK
My advisor told me absolutely everything I needed to know. If I needed to know the specifics of a certain subject, he told me everything about that. He was friendly and really helpful.
Leroy : UK
They seemed very knowledgeable about the course... I made a decision quite easily, based on what they said.
Donna : UK
The advice was good. It wasn't overly complicated, so I wasn't bogged down with words that were unnecessary - and I understood where they were coming from. It was very professional.
Hayley : UK
I'd definitely recommend them. I think the price was very competitive - some of the courses out there were three times the price of what they were offering. To me, it's ideal.
Clive : UK
I feel I got good value for money. If you're a practically minded person, the course is perfect. I've also passed your details onto some other people I work with, because they're also interested in that field.
Lee : UK
I'd give the course 10/10. I've already convinced someone else to do one. I just think it's awesome to be quite honest - as long as you're prepared to put the effort in.
Leroy : UK
The advisor was absolutely brilliant. I felt like he was honest... I just can't fault it really.
Shelley : UK
The advisor was very friendly. He came across as very competent with his knowledge of the industry. He gave me a lot of confidence from that point of view.
Tim : UK
The advisor was fantastic I have to say - the way he described everything and helped me to find the right course. Everything he said made sense.