CompTIA Security+ with Practice Lab

Course

Online

Save 40%

Special Emagister price

£ 295 £ 495 VAT inc.

Call the centre

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

"Course Description

Employers worldwide are searching for IT professionals with validated skills, with a CompTIA certification in hand, you'll certainly stand out from the crowd. CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management - making it an important stepping stone of an IT security career.

IT security is paramount to organisations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it's essential to have effective security practices in place. That's where CompTIA Security+ comes in.

You will learn how to ensure a network is secure, how to detect and deal with security threats, identify vulnerabilities and cryptography (the writing and solving of codes). The acquisition of the Network+ certification will mean that you have a superior understanding of various security- and networking-related matters.

Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you're ready for the job.

As part of this course package, learners will also have access to an online Practice Lab to develop their practical skills whilst learning. Practice Labs makes studying for an exam or learning new technologies an engaging experience, as It offers:

Exam based practical tasks
Real equipment, absolutely no simulations
Access to the latest industry technologies
Available anytime, anywhere on any device
Break and Reset functionality
No hardware or licensing costs
.
After completing this course you will learn the skills and knowledge required to work effectively in a professional IT environment and prepared for your CompTIA Security+ exam"

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

"Who Is This Course For?

To earn your official Security+ certification from CompTIA, you will need to study the CompTIA Security+ training course and pass the compulsory CompTIA Security+ exam. 

Exam Code:

CompTIA SY0-501

To prepare you for your exam, we provide interactive quizzes after each module and a mock exam at the end of your course to ensure you’re fully prepared for the real thing. Once you’ve passed with at least 85%, you’ll be ready to book your exam as a private candidate. To make life easier, we can help you find an appropriate exam centre and give you all the information you need to secure your place.

Please note that the CompTIA exam fees aren’t included in the course price. To find the latest exam prices, visit:

CompTIA Latest Exam Prices.

Once you’re fully prepared and ready to sit your exam, all you’ll have to do is purchase your exam voucher and schedule your exam at a test centre near you. You can use the Pearson Vue Test Locator to find test centre locations near you. For more information on how to schedule your exams, please visit our schedule my exams page.

Got a question about exams? Contact our course advisors by email or by phone on 01707 828 751. We're happy to help!"

"Requirements

Our training works on all devices including Mobile phones, IPad’s, Android tablets, Macs and PC’s.

For the best viewing experience on our state-of-the-art eLearning platform we recommend an internet connection of 10Mbps or better. Please also use Google Chrome or Mozilla Firefox as your browser with Adobe Flash Player."

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Trusts
  • Access Control
  • Access
  • Networking
  • Windows
  • Server
  • Network
  • Protocol
  • Firewall
  • Perspective
  • Web
  • Social Networking
  • Public
  • Engineering
  • Network Training
  • Operating System

Course programme

"

Course Outline


Course Outline

Unit 01

Topic A: System Maintenance

  • Causes of Compromised Security
  • Technology Weaknesses
  • Configuration Weaknesses
  • Policy Weaknesses
  • Human Error and Malice
  • Securing the Operating System
  • Microsoft Update
  • Windows Update Categories
  • Demo - A-2: Updating the Operating System
  • Patch Management
  • Demo - A-3: Managing Software Patches
  • Service Packs
  • Demo - A-4: Checking for and Installing Service Packs
  • BIOS Version
  • BIOS Update
  • Demo - A-5: Determining Whether you Need to Update your Computer's BIOS
  • Windows Firewall
  • User Account Control
  • Demo - A-6: Configuring Windows Firewall

Topic B: Application Security

  • Application Vulnerabilities
  • Countermeasures
  • Demo - B-1: Managing Application Security

Topic C: Physical Security

  • Physical Access Control
  • Smart Card and Reader
  • Fingerprint Scanner
  • Biometric Devices
  • Plant Security
  • Cipher Lock
  • Man-trap

Topic D: Malware

  • Malware Varieties
  • Malware Effects Anti-malware
  • Antivirus Software
  • Anti-malware Products
  • Demo - D-2: Installing Antivirus Software
  • Windows Defender
  • Demo - D-3: Scanning your System for Spyware

Topic E: Social Engineering

  • Social Engineering
  • Types of Social Engineering
  • Social Engineering Countermeasures
  • Phishing
  • Demo - E-2: Examining Phishing
  • Spam
  • Social Networking
Unit 01 Review Unit 02 - Cryptography

Topic A: Symmetric Cryptography

  • ROT13 Cipher
  • Keys
  • Symmetric Encryption in Action
  • Common Symmetric Ciphers
  • Hashes
  • Uses for Hashes
  • MD5 Hash Algorithm
  • SHA
  • Hash Vulnerabilities
  • Demo - A-2: Calculating Hashes
  • Steganography
  • Demo - A-3: Sharing a Secret Message with Steganography

Topic B: Public Key Cryptography

  • Public Key Cryptography
  • Asymmetric Encryption in Action
  • Common Asymmetric Ciphers
  • Demo - B-1: Exploring Public Key Cryptography
  • Digital Signatures
  • Signature Process
  • Features of Signatures
  • Digital Certificates
  • Certificate Types
  • Demo - B-2: Examining Certificates
  • Public Key Infrastructure
  • Certificate Policy
  • Certificate Practice Statement
  • Trust Models
  • Single-authority Trust Model
  • Hierarchical Trust Model
  • Web of Trust Model
  • Demo - B-3: Examining Certificate Trusts Single- and Dual-key Certificates
  • Quantum Cryptography
Unit 02 Review Unit 03 - Authentication

Topic A: Authentication Factors and Requirements

  • Three Steps to Secure Resources
  • Authentication Factors
  • One-factor Authentication
  • Two-factor Authentication
  • Three-factor Authentication
  • Considerations
  • Identification and Authentication
  • Identity Proofing
  • Single Sign-on

Topic B: Authentication Systems

  • Authentication Protocols
  • NTLM
  • NTLM Challenge-response
  • NTLM Vulnerabilities
  • Kerberos
  • Kerberos System Composed of:
  • Kerberos Data Types:
  • Kerberos Authentication Process
  • Cross-realm Authentication
  • Kerberos Security Weaknesses
  • Null Sessions

Topic C: Authentication System Variables

  • Authentication Vulnerabilities
  • Secure Passwords
  • Password Realities
  • Least Privilege
  • Demo - C-1: Identifying Authentication Vulnerabilities
  • Wireshark
  • Demo - C-2: Capturing Passwords with a Protocol Analyzer
  • Password Cracking
  • Password Guessing
  • SAM and SYSTEM Files
  • Demo - C-3: Cracking Passwords
Unit 03 Review Unit 04 - User - and Role-based Security

Topic A: Baseline Security Policies

  • Security Baselines
  • Demo - A-1: Using MBSA to Analyze Security
  • Group Policy Settings
  • Local GPO Types
  • GPO Editor
  • Local Computer GPO Nodes
  • Demo - A-2: Creating a Console to Manage Local Security Policies
  • Policy Properties Dialog Box
  • Container Types
  • Types of Domain GPOs
  • GPOs Applied in this Order
  • Demo - A-3: Using the GPMC

Topic B: Resource Access

  • Groups
  • Demo - B-1: Creating Users and Groups Based on Security Needs
  • Permissions
  • File System Security
  • Access Control Models
  • Demo - B-2: Securing File Resources
Unit 04 Review Unit 05 - Peripheral Security

Topic A: File and Disk Encryption

  • File and Disk Encryption
  • File-level Encryption
  • Demo - A-1: Enabling File-based Encryption
  • Whole Disk Encryption
  • Windows BitLocker
  • BitLocker Life Cycle
  • Recovery
  • Other Disk Encryption Tools
  • Demo - A-2: Creating an Encrypted Volume
  • Demo - A-3: Mounting, Using, and Dismounting an Encrypted Volume

Topic B: Peripheral and Component Security

  • Peripherals and Components
  • USB Drives
  • Laptops
  • Shredding Standards
  • Demo - B-2: Using Windows Policies to Mitigate the Risks of Peripherals

Topic C: Mobile Device Security

  • Mobile Device Risks
  • Additional Concerns
  • Mitigating Risks
  • Screen Lock
  • Android Security Settings
  • WaveSecure
  • Risks and Threats
Unit 05 Review Unit 06 - Public Key Infrastructure

Topic A: Public Key Cryptography

  • Management
  • Setup and Initialization Phase
  • Administration Phase
  • Cancellation and Key History
  • Administrative Responsibilities

Topic B: Implementing Public Key Infrastructure

  • Microsoft Certificate Services
  • AD Integration Options
  • Demo - B-1: Installing a Standalone Root Certificate Authority
  • Demo - B-2: Installing an Enterprise Subordinate CA
  • Demo - B-3: Implementing a File-based Certificate Request
  • Demo - B-4: Managing your Certificate Server
  • User Certificates
  • Demo - B-5: Requesting a User Certificate
  • Certificate Revocation
  • Demo - B-6: Revoking a Certificate
  • Key Escrow and Recovery
  • Key Recovery Agent
  • Demo - B-7: Enabling the EFS Recovery Agent Template
  • Demo - B-8: Enrolling for a Recovery Agent Certificate
  • Demo - B-9: Enabling Key Archival
  • Demo - B-10: Re-enrolling All Certificates

Topic C: Web Server Security with PKI

  • Securing Web Servers
  • Commercial Certificate
  • Demo - C-1: Requesting and Installing a Web Server Certificate
  • Demo - C-2: Enabling SSL for the Certificate Server Website
  • HTTPS Connections
  • Demo - C-3: Making a Secure Connection
  • Demo - C-4: Requesting a Client Certificate via the Web
Unit 06 Review Unit 07 - Application and Messaging Security

Topic A: Application Security

  • Application Security
  • Programmer's Perspective
  • Administrator's Perspective
  • User's Perspective
  • Application Attacks

Topic B: E-mail Security

  • E-mail Security
  • E-mail Application Security
  • Demo - B-2: Configuring an E-mail Client to Use Secure Authentication
  • Signed and Encrypted Mail
  • PGP
  • PGP Certificates
  • S/MIME
  • X.509 Certificates
  • PGP vs. S/MIME
  • Demo - B-3: Examining S/MIME Features
  • Using PGP
  • Demo - B-4: Installing Gnu Privacy Guard and Enigmail
  • Demo - B-5: Creating an OpenPGP Certificate and Key Pair
  • Signed Message
  • Demo - B-6: Sending a Signed Message

Topic C: Social Networking and Messaging

  • Social Networking
  • Instant Messaging
  • IM Ports
Unit 07 Review


Unit 01

Topic A: System Maintenance


Topic A: System Maintenance
  • Causes of Compromised Security
  • Technology Weaknesses
  • Configuration Weaknesses
  • Policy Weaknesses
  • Human Error and Malice
  • Securing the Operating System
  • Microsoft Update
  • Windows Update Categories
  • Demo - A-2: Updating the Operating System
  • Patch Management
  • Demo - A-3: Managing Software Patches
  • Service Packs
  • Demo - A-4: Checking for and Installing Service Packs
  • BIOS Version
  • BIOS Update
  • Demo - A-5: Determining Whether you Need to Update your Computer's BIOS
  • Windows Firewall
  • User Account Control
  • Demo - A-6: Configuring Windows Firewall

  • Causes of Compromised Security

  • Technology Weaknesses

  • Configuration Weaknesses

  • Policy Weaknesses

  • Human Error and Malice

  • Securing the Operating System

  • Microsoft Update

  • Windows Update Categories

  • Demo - A-2: Updating the Operating System

  • Patch Management

  • Demo - A-3: Managing Software Patches

  • Service Packs

  • Demo - A-4: Checking for and Installing Service Packs

  • BIOS Version

  • BIOS Update

  • Demo - A-5: Determining Whether you Need to Update your Computer's BIOS

  • Windows Firewall

  • User Account Control

  • Demo - A-6: Configuring Windows Firewall

  • Topic B: Application Security


    Topic B: Application Security
    • Application Vulnerabilities
    • Countermeasures
    • Demo - B-1: Managing Application Security

  • Application Vulnerabilities

  • Countermeasures

  • Demo - B-1: Managing Application Security

  • Topic C: Physical Security


    Topic C: Physical Security
    • Physical Access Control
    • Smart Card and Reader
    • Fingerprint Scanner
    • Biometric Devices
    • Plant Security
    • Cipher Lock
    • Man-trap

  • Physical Access Control

  • Smart Card and Reader

  • Fingerprint Scanner

  • Biometric Devices

  • Plant Security

  • Cipher Lock

  • Man-trap

  • Topic D: Malware


    Topic D: Malware
    • Malware Varieties
    • Malware Effects Anti-malware
    • Antivirus Software
    • Anti-malware Products
    • Demo - D-2: Installing Antivirus Software
    • Windows Defender
    • Demo - D-3: Scanning your System for Spyware

  • Malware Varieties

  • Malware Effects Anti-malware

  • Antivirus Software

  • Anti-malware Products

  • Demo - D-2: Installing Antivirus Software

  • Windows Defender

  • Demo - D-3: Scanning your System for Spyware

  • Topic E: Social Engineering


    Topic E: Social Engineering
    • Social Engineering
    • Types of Social Engineering
    • Social Engineering Countermeasures
    • Phishing
    • Demo - E-2: Examining Phishing
    • Spam
    • Social Networking

  • Social Engineering

  • Types of Social Engineering

  • Social Engineering Countermeasures

  • Phishing

  • Demo - E-2: Examining Phishing

  • Spam

  • Social Networking

  • Unit 01 Review
    Unit 02 - Cryptography

    Topic A: Symmetric Cryptography


    Topic A: Symmetric Cryptography
    • ROT13 Cipher
    • Keys
    • Symmetric Encryption in Action
    • Common Symmetric Ciphers
    • Hashes
    • Uses for Hashes
    • MD5 Hash Algorithm
    • SHA
    • Hash Vulnerabilities
    • Demo - A-2: Calculating Hashes
    • Steganography
    • Demo - A-3: Sharing a Secret Message with Steganography

  • ROT13 Cipher

  • Keys

  • Symmetric Encryption in Action

  • Common Symmetric Ciphers

  • Hashes

  • Uses for Hashes

  • MD5 Hash Algorithm

  • SHA

  • Hash Vulnerabilities

  • Demo - A-2: Calculating Hashes

  • Steganography

  • Demo - A-3: Sharing a Secret Message with Steganography

  • Topic B: Public Key Cryptography


    Topic B: Public Key Cryptography
    • Public Key Cryptography
    • Asymmetric Encryption in Action
    • Common Asymmetric Ciphers
    • Demo - B-1: Exploring Public Key Cryptography
    • Digital Signatures
    • Signature Process
    • Features of Signatures
    • Digital Certificates
    • Certificate Types
    • Demo - B-2: Examining Certificates
    • Public Key Infrastructure
    • Certificate Policy
    • Certificate Practice Statement
    • Trust Models
    • Single-authority Trust Model
    • Hierarchical Trust Model
    • Web of Trust Model
    • Demo - B-3: Examining Certificate Trusts Single- and Dual-key Certificates
    • Quantum Cryptography

  • Public Key Cryptography

  • Asymmetric Encryption in Action

  • Common Asymmetric Ciphers

  • Demo - B-1: Exploring Public Key Cryptography

  • Digital Signatures

  • Signature Process

  • Features of Signatures

  • Digital Certificates

  • Certificate Types

  • Demo - B-2: Examining Certificates

  • Public Key Infrastructure

  • Certificate Policy

  • Certificate Practice Statement

  • Trust Models

  • Single-authority Trust Model

  • Hierarchical Trust Model

  • Web of Trust Model

  • Demo - B-3: Examining Certificate Trusts Single- and Dual-key Certificates

  • Quantum Cryptography

  • Unit 02 Review
    Unit 03 - Authentication

    Topic A: Authentication Factors and Requirements


    Topic A: Authentication Factors and Requirements
    • Three Steps to Secure Resources
    • Authentication Factors
    • One-factor Authentication
    • Two-factor Authentication
    • Three-factor Authentication
    • Considerations
    • Identification and Authentication
    • Identity Proofing
    • Single Sign-on

  • Three Steps to Secure Resources

  • Authentication Factors

  • One-factor Authentication

  • Two-factor Authentication

  • Three-factor Authentication

  • Considerations

  • Identification and Authentication

  • Identity Proofing

  • Single Sign-on

  • Topic B: Authentication Systems


    Topic B: Authentication Systems
    • Authentication Protocols
    • NTLM
    • NTLM Challenge-response
    • NTLM Vulnerabilities
    • Kerberos
    • Kerberos System Composed of:
    • Kerberos Data Types:
    • Kerberos Authentication Process
    • Cross-realm Authentication
    • Kerberos Security Weaknesses
    • Null Sessions

  • Authentication Protocols

  • NTLM

  • NTLM Challenge-response

  • NTLM Vulnerabilities

  • Kerberos

  • Kerberos System Composed of:

  • Kerberos Data Types:

  • Kerberos Authentication Process

  • Cross-realm Authentication

  • Kerberos Security Weaknesses

  • Null Sessions

  • Topic C: Authentication System Variables


    Topic C: Authentication System Variables
    • Authentication Vulnerabilities
    • Secure Passwords
    • Password Realities
    • Least Privilege
    • Demo - C-1: Identifying Authentication Vulnerabilities
    • Wireshark
    • Demo - C-2: Capturing Passwords with a Protocol Analyzer
    • Password Cracking
    • Password Guessing
    • SAM and SYSTEM Files
    • Demo - C-3: Cracking Passwords

  • Authentication Vulnerabilities

  • Secure Passwords

  • Password Realities

  • Least Privilege

  • Demo - C-1: Identifying Authentication Vulnerabilities

  • Wireshark

  • Demo - C-2: Capturing Passwords with a Protocol Analyzer

  • Password Cracking

  • Password Guessing

  • SAM and SYSTEM Files

  • Demo - C-3: Cracking Passwords

  • Unit 03 Review
    Unit 04 - User - and Role-based Security

    Topic A: Baseline Security Policies


    Topic A: Baseline Security Policies
    • Security Baselines
    • Demo - A-1: Using MBSA to Analyze Security
    • Group Policy Settings
    • Local GPO Types
    • GPO Editor
    • Local Computer GPO Nodes
    • Demo - A-2: Creating a Console to Manage Local Security Policies
    • Policy Properties Dialog Box
    • Container Types
    • Types of Domain GPOs
    • GPOs Applied in this Order
    • Demo - A-3: Using the GPMC

  • Security Baselines

  • Demo - A-1: Using MBSA to Analyze Security

  • Group Policy Settings

  • Local GPO Types

  • GPO Editor

  • Local Computer GPO Nodes

  • Demo - A-2: Creating a Console to Manage Local Security Policies

  • Policy Properties Dialog Box

  • Container Types

  • Types of Domain GPOs

  • GPOs Applied in this Order

  • Demo - A-3: Using the GPMC

  • Topic B: Resource Access


    Topic B: Resource Access
    • Groups
    • Demo - B-1: Creating Users and Groups Based on Security Needs
    • Permissions
    • File System Security
    • Access Control Models
    • Demo - B-2: Securing File Resources

  • Groups

  • Demo - B-1: Creating Users and Groups Based on Security Needs

  • Permissions

  • File System Security

  • Access Control Models

  • Demo - B-2: Securing File Resources

  • Unit 04 Review
    Unit 05 - Peripheral Security

    Topic A: File and Disk Encryption


    Topic A: File and Disk Encryption
    • File and Disk Encryption
    • File-level Encryption
    • Demo - A-1: Enabling File-based Encryption
    • Whole Disk Encryption
    • Windows BitLocker
    • BitLocker Life Cycle
    • Recovery
    • "

    Call the centre

    CompTIA Security+ with Practice Lab

    Special Emagister price

    £ 295 £ 495 VAT inc.