Security (CompTIA Security+) - Certificate

Pre-requirements:

English proficiency
Basic computer skills

Description:

CompTIA Security+ is an international vendor-neutral certification that demonstrates competency in network security, compliance and operational security, threats and vulnerabilities, application, data and host security, access control and identity management, cryptography. CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents, it ensures that security personnel are anticipating security risks and guarding against them.

Candidate job roles include security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator.

Objectives:

1. Network Security

• Explain the security function and purpose of network devices and technologies
• Apply and implement secure network administration principles
• Distinguish and differentiate network design elements and compounds
• Implement and use common protocols
• Identify commonly used default network ports
• Implement wireless network in a secure manner

2. Compliance and Operational Security

• Explain risk related concepts
• Carry out appropriate risk mitigation strategies
• Execute appropriate incident response procedures
• Explain the importance of security related awareness and training
• Compare and contrast aspects of business continuity
• Explain the impact and proper use of environmental controls
• Execute disaster recovery plans and procedures
• Exemplify the concepts of confidentiality, integrity and availability (CIA)

3. Threats and Vulnerabilities

• Analyse and differentiate among types of malware
• Analyse and differentiate among types of attacks
• Analyse and differentiate among types of social engineering attacks
• Analyse and differentiate among types of wireless attacks
• Analyse and differentiate among types of application attacks
• Analyse and differentiate among types of mitigation and deterrent techniques
• Implement assessment tools and techniques to discover security threats and vulnerabilities
• Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning

4. Application, Data and Host Security

• Explain the importance of application security
• Carry out appropriate procedures to establish host security
• Explain the importance of data security

5. Access Control and Identity Management

• Explain the function and purpose of authentication services
• Explain the fundamental concepts and best practices related to authentication, authorisation and access control
• Implement appropriate security controls when performing account management

6. Cryptography

• Summarise general cryptography concepts
• Use and apply appropriate cryptographic tools and products

Contact Details

Contact Person: 

Retha/Marzahn
Course Details

Course Delivery Method: 

Blended Blended

In Class In Class

Presented Presented Courses

Course Duration: 

5 months

Cost: 

On Request