CompTIA Security+

Vocational qualification

Online

Save 60%

Special Emagister price

£ 195 £ 495 VAT inc.

Call the centre

Description

  • Type

    Vocational qualification

  • Methodology

    Online

  • Start date

    Different dates available

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management Ð making it an important stepping stone of an IT security career.

IT security is paramount to organisations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it's essential to have effective security practices in place. That's where CompTIA Security+ comes in.

You will learn how to ensure a network is secure, how to detect and deal with security threats, identify vulnerabilities and cryptography (the writing and solving of codes). The acquisition of the Network+ certification will mean that you have a superior understanding of various security- and networking-related matters.

Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you're ready for the job.

After completing this course, you will learn the skills and knowledge required to work effectively in a professional IT environment and prepared for your CompTIA Security+ exam. Once certified, you'll be qualified for jobs such as Internet Security Specialist and IT Security Consultant, earning an average salary of about £32,500.00 per year, as well as ready to build on these fundamentals and specialise in your preferred area with further CompTIA certifications.

The great thing about our CompTIA Security+ course is that you are in charge of your start and finish date, with no deadline pressures!

We train our students to the very best standards, offering expert instructor-led training via our state of the art eLearning platform.

By achieving the CompTIA Security+ certification you will create more career opportunities and...

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Access
  • Networking
  • Windows
  • Server
  • Network
  • Hacking
  • Data Protection
  • Computer Engineering
  • Perspective
  • Web
  • Public
  • Engineering
  • IT Security
  • Network Training
  • Data security
  • Computer Systems
  • IT Systems
  • Computer Science
  • Network Engineering
  • Computering

Course programme

Unit 01 Topic A: System Maintenance
Causes of Compromised Security
Technology Weaknesses
Configuration Weaknesses
Policy Weaknesses
Human Error and Malice
Securing the Operating System
Microsoft Update
Windows Update Categories
Demo Ð A-2: Updating the Operating System
Patch Management
Demo Ð A-3: Managing Software Patches
Service Packs
Demo Ð A-4: Checking for and Installing Service Packs
BIOS Version
BIOS Update
Demo Ð A-5: Determining Whether You Need to Update your Computer's BIOS
Windows Firewall
User Account Control
Demo Ð A-6: Configuring Windows FirewallTopic B: Application Security
Application Vulnerabilities
Countermeasures
Demo Ð B-1: Managing Application SecurityTopic C: Physical Security
Physical Access Control
Smart Card and Reader
Fingerprint Scanner
Biometric Devices
Plant Security
Cipher Lock
Man-trap Topic D: Malware
Malware Varieties
Malware Effects Anti-malware
Antivirus Software
Anti-malware Products
Demo Ð D-2: Installing Antivirus Software
Windows Defender
Demo Ð D-3: Scanning your System for Spyware Topic E: Social Engineering
Social Engineering
Types of Social Engineering
Social Engineering Countermeasures
Phishing
Demo Ð E-2: Examining Phishing
Spam
Social NetworkingUnit 01 ReviewUnit 02 Ð Cryptography Topic A: Symmetric Cryptography
ROT13 Cipher
Keys
Symmetric Encryption in Action
Common Symmetric Ciphers
Hashes
Uses for Hashes
MD5 Hash Algorithm
SHA
Hash Vulnerabilities
Demo Ð A-2: Calculating Hashes
Steganography
Demo Ð A-3: Sharing a Secret Message with SteganographyTopic B: Public Key Cryptography
Public Key Cryptography
Asymmetric Encryption in Action
Common Asymmetric Ciphers
Demo Ð B-1: Exploring Public Key Cryptography
Digital Signatures
Signature Process
Features of Signatures
Digital Certificates
Certificate Types
Demo Ð B-2: Examining Certificates
Public Key Infrastructure
Certificate Policy
Certificate Practice Statement
Trust Models
Single-authority Trust Model
Hierarchical Trust Model
Web of Trust Model
Demo Ð B-3: Examining Certificate Trusts Single- and Dual-key Certificates
Quantum CryptographyUnit 02 Review Unit 03 Ð Authentication Topic A: Authentication Factors and Requirements
Three Steps to Secure Resources
Authentication Factors
One-factor Authentication
Two-factor Authentication
Three-factor Authentication
Considerations
Identification and Authentication
Identity Proofing
Single Sign-onTopic B: Authentication Systems
Authentication Protocols
NTLM
NTLM Challenge-response
NTLM Vulnerabilities
Kerberos
Kerberos System Composed of:
Kerberos Data Types:
Kerberos Authentication Process
Cross-realm Authentication
Kerberos Security Weaknesses
Null SessionsTopic C: Authentication System Variables
Authentication Vulnerabilities
Secure Passwords
Password Realities
Least Privilege
Demo Ð C-1: Identifying Authentication Vulnerabilities
Wireshark
Demo Ð C-2: Capturing Passwords with a Protocol Analyzer
Password Cracking
Password Guessing
SAM and SYSTEM Files
Demo Ð C-3: Cracking PasswordsUnit 03 ReviewUnit 04 Ð User Ð and Role-based Security Topic A: Baseline Security Policies
Security Baselines
Demo Ð A-1: Using MBSA to Analyse Security
Group Policy Settings
Local GPO Types
GPO Editor
Local Computer GPO Nodes
Demo Ð A-2: Creating a Console to Manage Local Security Policies
Policy Properties Dialog Box
Container Types
Types of Domain GPOs
GPOs Applied in this Order
Demo Ð A-3: Using the GPMCTopic B: Resource Access
Groups
Demo Ð B-1: Creating Users and Groups Based on Security Needs
Permissions
File System Security
Access Control Models
Demo Ð B-2: Securing File ResourcesUnit 04 ReviewUnit 05 Ð Peripheral Security Topic A: File and Disk Encryption
File and Disk Encryption
File-level Encryption
Demo Ð A-1: Enabling File-based Encryption
Whole Disk Encryption
Windows BitLocker
BitLocker Life Cycle
Recovery
Other Disk Encryption Tools
Demo Ð A-2: Creating an Encrypted Volume
Demo Ð A-3: Mounting, Using, and Dismounting an Encrypted VolumeTopic B: Peripheral and Component Security
Peripherals and Components
USB Drives
Laptops
Shredding Standards
Demo Ð B-2: Using Windows Policies to Mitigate the Risks of PeripheralsTopic C: Mobile Device Security
Mobile Device Risks
Additional Concerns
Mitigating Risks
Screen Lock
Android Security Settings
WaveSecure
Risks and ThreatsUnit 05 ReviewUnit 06 Ð Public Key Infrastructure Topic A: Public Key Cryptography
Management
Setup and Initialization Phase
Administration Phase
Cancellation and Key History
Administrative ResponsibilitiesTopic B: Implementing Public Key Infrastructure
Microsoft Certificate Services
AD Integration Options
Demo Ð B-1: Installing a Standalone Root Certificate Authority
Demo Ð B-2: Installing an Enterprise Subordinate CA
Demo Ð B-3: Implementing a File-based Certificate Request
Demo Ð B-4: Managing your Certificate Server
User Certificates
Demo Ð B-5: Requesting a User Certificate
Certificate Revocation
Demo Ð B-6: Revoking a Certificate
Key Escrow and Recovery
Key Recovery Agent
Demo Ð B-7: Enabling the EFS Recovery Agent Template
Demo Ð B-8: Enrolling for a Recovery Agent Certificate
Demo Ð B-9: Enabling Key Archival
Demo Ð B-10: Re-enrolling All CertificatesTopic C: Web Server Security with PKI
Securing Web Servers
Commercial Certificate
Demo Ð C-1: Requesting and Installing a Web Server Certificate
Demo Ð C-2: Enabling SSL for the Certificate Server Website
HTTPS Connections
Demo Ð C-3: Making a Secure Connection
Demo Ð C-4: Requesting a Client Certificate via the WebUnit 06 ReviewUnit 07 Ð Application and Messaging Security Topic A: Application Security
Application Security
Programmer's Perspective
Administrator's Perspective
User's Perspective
Application AttacksTopic B: E-mail Security
E-mail Security
E-mail Application Security
Demo Ð B-2: Configuring an E-mail Client to Use Secure Authentication
Signed and Encrypted Mail
PGP
PGP Certificates
S/MIME
X.509 Certificates
PGP vs. S/MIME
Demo Ð B-3: Examining S/MIME Features
Using PGP
Demo Ð B-4: Installing Gnu Privacy Guard and Enigmail
Demo Ð B-5: Creating an OpenPGP Certificate and Key Pair
Signed Message
Demo Ð B-6: Sending a Signed MessageTopic C: Social Networking and Messaging
Social Networking
Instant Messaging
IM PortsUnit 07 ReviewENTRY REQUIREMENTSAlthough there are no formal prerequisites, it is recommended that you earn the CompTIA Network+ certification before studying the CompTIA Security+ course.MULTI-USER TRAINING PACKAGESThis online course can be integrated in your professional training plan. M.T.A. can provide you with a tailored learning solution, that can be customised to meet each team member's requirements. Choosing a multi-user training package, you can get significant discounts for 5+ users and even further discounts for 10+ users Ð and an excellent return on your investment.

Call the centre

CompTIA Security+

Special Emagister price

£ 195 £ 495 VAT inc.