course

Home / Courses / CompTIA Security+ (SY0-601) – ML

Agenda

  • Instructor Introduction
  • Course Introduction
  • Understanding Threats, Attacks, and Vulnerabilities
  • Topic A: Introduction to Security Concepts
  • Security Fundamentals
  • Security Terms
  • Topic B: Identifying Threat Actors and Vectors
  • Actors and Threats
  • Hackers
  • Actor Attributes
  • Attack Vectors
  • Information Gathering
  • Intelligence Sources
  • Research Sources
  • Demo – Research Sources
  • Topic C: Understanding Vulnerabilities
  • Vulnerability Fundamentals
  • Security Impacts
  • Vulnerability Types
  • Vulnerability Types (cont.)
  • Topic D: Understanding Attack Types
  • Attack Types
  • Understanding Malware Types
  • Attacking Passwords and User Credentials
  • Physical Attacks
  • Other Attack Types
  • Topic E: Identifying Social Engineering Techniques
  • Social Engineering Principles
  • Phishing
  • Other Social Engineering Types
  • Other Social Engineering Types (cont.)
  • Chapter 1 Review

  • Analyzing Attacks
  • Topic A: Security Assessment Tools and Techniques
  • Understanding Assessments
  • Threat Hunting
  • Vulnerability Scanning
  • Syslog and SIEM
  • SIEM Components
  • Topic B: Application Attacks
  • Application Attacks
  • Privilege Escalation
  • Cross
  • -Site Scripting
  • Injections
  • Application Attack Issues
  • Session Attacks
  • Additional Attacks
  • Topic C: Network Attacks
  • Introduction to Network Attacks
  • Wireless Network Attacks
  • Layer 2 Attacks
  • Service Attacks
  • Demo
  • – DNS Poisoning
  • Malicious Code Topic D: Penetration Testing
  • Penetration Testing
  • Environment Types
  • Pentesting Concepts
  • Network Reconnaissance
  • Exercise Types
  • Chapter 2 Review

  • Architecture and Design
  • Topic A: Enterprise Security Architecture
  • Enterprise Standardization Needs
  • Configuration Management
  • Data Protection
  • Additional Security Concepts
  • Disaster Recovery
  • Deception and Disruption
  • Topic B: Designing Authentication and Authorization
  • Authentication and Authorization
  • Authentication Methods
  • Authentication Technologies
  • Biometrics
  • Multifactor Authentication
  • Demo
  • – Multifactor Authentication
  • Topic C: Designing Resiliency
  • Resiliency and Cybersecurity
  • Redundancy Concepts
  • Replication Concepts
  • Backup Concepts
  • Additional Resiliency Options
  • Topic D: Cloud and Virtualization Concepts
  • Cloud Models
  • Cloud Types
  • Cloud Service Providers
  • Additional Cloud Concepts
  • Additional Cloud Concepts (cont.)
  • Demo
  • – Cloud Computing Security
  • Topic E: Securing Application Development and Deployment
  • Application Development Environments
  • Secure Coding Techniques
  • Automation Techniques
  • Application Design Concepts
  • Chapter 3 Review

  • Physical and System Security
  • Topic A: Physical Security Controls
  • Importance of Physical Controls
  • Standard Controls
  • Security Monitoring
  • Security Personnel
  • Secure Areas
  • Secure Data Destruction
  • Demo
  • – Data Destruction Software
  • Topic B: Securing Embedded and Specialized Systems
  • Embedded Systems
  • Specialized Systems
  • Additional System Types
  • Communication Considerations
  • Constraints
  • Chapter 4 Review

  • Cryptography
  • Topic A: Cryptographic Concepts
  • Introduction to Cryptography
  • Common Use Cases
  • Integrity Verification
  • Understanding Keys
  • Crypto Limitations
  • Quantum
  • Additional Cryptographic Types
  • Topic B: Public Key Infrastructures
  • Introduction to PKIs
  • Certificate Authorities
  • Certificates
  • Certificate Verification
  • Certificate Formats
  • Demo
  • – Implementing PKI
  • Additional Concepts
  • Chapter 5 Review

  • Implementing Secure Networks
  • Topic A: Implement Secure Protocols
  • Network Protocols
  • Use Cases
  • Application Layer Protocols
  • IP Security
  • Topic B: Implement Secure Network Designs
  • Network Segmentation
  • High Availability
  • Virtual Private Networks
  • Secure Network Appliances
  • Firewalls
  • Demo- Configuring a Host -Based Firewall
  • Additional Network Security Concepts
  • Topic C: Implementing Security in the Cloud
  • Cloud Security Controls
  • Cloud Storage Security
  • Cloud Network Security
  • Compute Security
  • Additional Cloud Solutions
  • Topic D: Implement Wireless Security
  • Cryptographic Protocols
  • Authentication Protocols
  • Authentication Methods
  • Installation Considerations
  • Topic E: Implement Secure Mobile Solutions
  • Deployment Models
  • Connection Methods and Receivers
  • Mobile Device Management (MDM)
  • Mobile Devices
  • Enforcement and Monitoring
  • Additional Controls
  • Chapter 6 Review

  • Implementing Secure Hosts and Identities
  • Topic A: Implement Authentication and Authorization Systems
  • Understanding Identity
  • Access Control Methods
  • Demo
  • – Role
  • -Based Access Control
  • Authentication Management
  • Remote Access Authentication
  • Authentication and Authorization Protocols
  • Topic B: Implement Identity and Account Management Controls
  • Account Types
  • Account Policies
  • Demo
  • – Configuring Account Policies
  • Additional Identity Terms
  • Topic C: Implement Host and Application Security Solutions
  • Endpoint Protection
  • Client Level Protections
  • Network Level Protections
  • Boot Integrity
  • Database Security
  • System Hardening
  • Application Security
  • Chapter 7 Review

  • Operational Procedures
  • Topic A: Using Tools to Assess Security
  • Network Reconnaissance and Discovery
  • Network Tools
  • Network Tools (cont.)
  • Demo
  • – Using Network Tools
  • File Manipulation Tools
  • Packet Capture and Relay
  • Shell and Script Environments
  • Forensics Tools
  • Topic B: Utilizing Data Sources for Investigation
  • Vulnerability Scan Output
  • SIEM Dashboards
  • Log Files
  • Additional Monitoring
  • Topic C: Applying Mitigation Techniques
  • Reconfiguring Endpoint Solutions
  • Configuration Changes
  • Additional Mitigation Techniques
  • Chapter 8 Review

  • Incident Response and Forensics
  • Topic A: Incident Response Policies and Procedures
  • Incident Response Plans
  • Incident Response Process
  • Exercises
  • Attack Frameworks
  • Additional Plans
  • Demo
  • – Examining IRPs
  • Topic B: Understanding Digital Forensics
  • Introduction to Forensics
  • Evidence Categories
  • Documentation and Evidence
  • Acquisition Concepts
  • Integrity
  • Additional Concepts
  • Chapter 9 Review

  • Governance, Risk, and Compliance
  • Topic A: Introduction to Control Types
  • Security Controls
  • Control Categories
  • Control Types
  • Topic B: Understanding Governance
  • Introduction to Governance
  • Regulations and Standards
  • Key Frameworks
  • Benchmarks
  • Demo – Data Loss Prevention (DLP)
  • Topic C: Implementing Security Policies
  • Personnel-Based Policies
  • Personnel-Based Policies (cont.)
  • Third-Party Risk Management
  • Data
  • Credential Policies
  • Topic D: Implementing Risk Management
  • Risk Types
  • Risk Management Strategies
  • Risk Analysis
  • Risk Analysis (cont.)
  • Disasters
  • Business Impact Analysis
  • Topic E: Compliance with Privacy and Sensitive Data
  • Organizational Consequences
  • Data Types
  • Privacy Enhancing Technologies
  • Roles and Responsibilities
  • Chapter 10 Review
  • Course Closure
Tags
Technical Vendor: Career Academy Product Line: CompTIA LoD Tier: 4 Core Type: Core 6
FREE

Interested in course?


Course Type: Self Paced