¿Qué quieres aprender?

CompTIA Security+ (SY0-401)

CompTIA Security+ (SY0-401)

Sicap

Curso presencial

Miguel Hidalgo (México)


1.405
+ IVA

Duración : 5 Días

The CompTIA Security+ Certification is a vendor neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

The CompTIA Security+ exam will certify that the successful candidate has the knowledge and skills required to identify risk and participate in risk mitigation activities, provide infrastructure, application, operational and information security, apply security controls to maintain confidentiality, integrity and availability, identify appropriate.

¿Quieres hablar con un asesor sobre este curso?

Sedes

Localización

Fecha inicio

Miguel Hidalgo
Mayo 2017

Objetivos

After completing this course, you will konw: Mitigate threts to network security through core system maintenance Identify threats to application security, identify methods to increase physical security access controls. Identify crypthography concepts including algorithms, public keys, security certificates and single-and dual key certificates

A quién va dirigido

Studentes are interested in network security and its relationship to other areas will be most interested in this course. This course provides a broad introduction to computer and network security

Requisitos

The CompTIA Security+ Certification is aimed at an IT security professional who has: • A minimum of 2 years of experience in IT administration with a focus on security • Day to day technical information security experience

Temario completo de este curso

1.0 Networking Security

1.1 Explain the security function and purpose of network devices and technologies

1.2 Apply and implement secure network administration principles

1.3 Distinguish and differentiate network design elements and compounds

1.4 Implement and use common protocols

1.5 Identify commonly used default network ports

1.6 Implement wireless network in a secure manner

2.0 Compliance and Operational Security

2.1 Explain risk related concepts

2.2 Carry out appropriate risk mitigation strategies

2.3 Execute appropriate incident response procedures

2.4 Explain the importance of security related awareness and training

2.5 Compare and contrast aspects of business continuity

2.6 Explain the impact and proper use of environmental controls

2.7 Execute disaster recovery plans and procedures

2.8 Exemplify the concepts of confidentiality, integrity and availability (CIA)

3.0 Threats and Vulnerabilities

3.1 Analyze and differentiate among types of malware

3.2 Analyze and differentiate among types of attacks

3.3 Analyze and differentiate among types of social engineering attacks

3.4 Analyze and differentiate among types of wireless attacks

3.5 Analyze and differentiate among types of application attacks

3.6 Analyze and differentiate among types of mitigation and deterrent techniques

3.7 Implement assessment tools and techniques to discover security threats and vulnerabilities

3.8 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.

4.0 Application, Data and Host Security

4.1 Explain the importance of application security

4.2 Carry out appropriate procedures to establish host security

4.3 Explain the importance of data security

5.0 Access Control and Identity Management

5.1 Explain the function and purpose of authentication services

5.2 Explain the fundamental concepts and best practices related to authentication, authorization and access control

5.3 Implement appropriate security controls when performing account management

Ver más