ComPTIA Security+ is a vendor-neutral certification course that covers the organizations of information security across number of technology platforms. The course covers industry-wide concepts including cryptography, authentication, communication security, access control, external attack, infrastructure security and organization and operational security. The demand for skilled security professionals is growing significantly. The technology community identifies this course as the perfect way to validate your knowledge of information security. The recommended pre-requisite to join Certificate in IT Security course is to have basic knowledge of Computer Networking.

Audience:

Those who have work experience of Hardware and Networking and is interested to learn about Vendor-neutral Networking security.

Prerequisites:

The recommended pre-requisite to join Certificate in IT Security course is to have prior knowledge of Computer Networking.

Duration of the course: Part Time : 2 Months (2 hrs/day)
Full Time : 1 Month ( 4 hrs/day)

Course outline:

Mitigating threats:

  • System maintenance.
  • Application security.
  • Physical security.
  • Malware.
  • Social engineering.

Cryptography:

  • Symmetric cryptography.
  • Public key cryptography.

Authentication:

  • Authentication factors and requirements.
  • Authentication systems.
  • Authentication system vulnerabilities.

User- and role-based security:

  • Baseline security policies.
  • Resource access.
  • Peripheral security.

File and disk encryption:

  • Peripheral and component security.
  • Mobile device security.

Public key infrastructure:

  • Public key cryptography.
  • Implementing public key infrastructure.
  • Web server security with PKI.

Application and messaging security:

  • Application security.
  • E-mail security.
  • Social networking and messaging.

Ports and protocols:

  • TCP/IP basics.
  • Protocol-based attacks.

Network security:

  • Network devices.
  • Secure network topologies.

Secure networking:

  • Virtualization and cloud computing.
  • Wireless security.
  • Wireless network security.
  • Mobile device security.

Remote access security:

  • Remote access.
  • Virtual private networks.
  • Vulnerability testing and monitoring.
  • Risk and vulnerability assessment.

Auditing and logging:

  • Intrusion detection and prevention systems.
  • Incident response.

Organizational security:

  • Organizational policies.
  • Education and training.
  • Disposal and destruction.

Business continuity:

  • Business continuity planning.
  • Disaster recovery.
  • Environmental controls.