CompTIA Security+ Certification Prep

Training Architect
course instructor image
Justin Mitchell

Introduction

Introduction

1. Threats, Attacks and Vulnerabilities

1.1. Indicators of Compromise and Malware

1.2 Compare and Contrast Types of Attacks

1.3 Threat Actors

1.4 Penetration Testing

1.5 Vulnerability Scanning

1.6 Impact of Vulnerabilities

2. Technologies and Tools

2.1 Installation and configuration of network security devices

2.2 Assessing Security Posture of an Organization

2.3. Troubleshooting Common Security Issues

2.5 Securely deploying mobile devices

2.6. Implementing Secure Protocols

3. Architecture and Design

3.1. Frameworks, Best Practices, and Secure Configuration Guides

3.2. Secure Network Architecture Concepts

3.3. Secure System Design

3.4. Secure Staging Deployment Concepts

3.5. Embedded Systems

3.6. Secure Application Development

3.7. Cloud and Virtualization Concepts

3.8. Reducing risks through resiliency and automation

3.9. Physical Controls

4. Identity and Access Management

4.1. Identity and access management concepts

4.4. Common Account Management Practices

4.2. Installation and Configuration of Identity and Access Services

4.3. Identity and Access Management Controls

5.0. Risk Management

5.1. Organizational Security Policies, Plans and Policies

5.2. Concepts from a Business Impact Analysis

5.3. Risk Management Processes and Concepts

5.4. Incident Response

5.5. Digital Forensics

5.6. Disaster Recovery and Continuity of Operations

5.7. Control Types

5.8. Data Security and Privacy Practices

6. Cryptography and PKI

6.1. Basic Concepts of Cryptography

6.2. Basic Characteristics of Cryptographic Algorithms

6.3. Wireless Security Settings

6.4. Public Key Infrastructure (PKI)

Practice Exam

Details

This course is designed to prepare prospective students for the Security+ Certification Exam. In this course, we will cover the domains of the Security+ Certification Exam:



  • Threats, Attacks, and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI

After taking this course, the student will feel confident in their abilities to undertake the certification exam.


Study Guides

All Combined Presentations

This is a pdf of all slides used during the course videos.

Instructor Deck

Community

Looking For Team Training?

Learn More