CompTIA Security+ (2017 Objectives) Course

Available: Live Online or Onsite. Private Training For Groups.

Attend Our Classes From Home - No Software Needed - Learn More...

Security+ TrainingCompTIA Security+ (2017 Objectives)

by Certstaffix® Training

Length: 5 day(s)      Public Class Price: $2800/person (USD)      Group Class Price: Request Quote      Course Category: CompTIA Security+ Certification


Security+ Training
This course offers invaluable preparation for Exam SY0-501 and covers 100% of the exam objectives with clear, concise explanation. You'll learn how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while understanding the role of architecture and design. From everyday tasks like identity and access management to complex topics like risk management and cryptography, this course helps you consolidate your knowledge base in preparation for the Security+ exam. Practical examples illustrate how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application. Students also get access to a robust toolkit for more thorough prep: flashcards, glossary of key terms, practice questions, and a pre-assessment exam equip you with everything you need to enter the exam confident in your skill set.
  • Master essential security technologies, tools, and tasks
  • Understand how Security+ concepts are applied in the real world
  • Study on the go with electronic flashcards and more
  • Test your knowledge along the way with hundreds of practice questions

To an employer, the CompTIA Security+ certification proves that you have the knowledge base and skill set to secure applications, devices, and networks; analyze and respond to threats; participate in risk mitigation, and so much more. As data threats loom larger every day, the demand for qualified security professionals will only continue to grow.

Certification exams are administered by third party testing companies such as Pearson Vue or Prometric. Our courses prepare you for the certification exam, which is an additional fee paid to the testing provider. You must contact Prometric, Pearson Vue or the corresponding testing provider to take a certification exam.
Course Description: Print It | Download PDF | Email It

  Public Classes - Live Online at Your Location or OursHow It Works

Certstaffix® Training public classes are instructor-led, live online training you attend from your home or work or in one of our local computer labs. Our live online instructors teach you from a remote location while being able to interact with students as in a traditional classroom setting.

  • A real, live instructor teaching you from another location
  • Hands-on learning with the software/skills you are being taught
  • Interaction with all students in the class at other locations
  • Any needed software for class provided in online lab environment
  • Easy assistance from the instructor

* All Public Classes are Running Live Online as Scheduled *

Click a class date below to register & view location/attendance options.
Registrations received less than 15 days before start will be provided an eBook while print book ships.

 Register ➥   May 11, 2020     
 Register ➥   July 6, 2020     

  Group Classes for Organizations - Onsite or Online How It Works

Have a group of employees needing the same training? Onsite training at your office or group live online classes are great solutions.  

  • An expert Instructor will either come to your office or deliver a private live online class to your students
  • Course can be customized to your training needs
  • Course is scheduled based on dates you provide (Subject to instructor availability)
  • We usually require about 4 weeks lead time to arrange a training session

  Detailed Course Topics

Course Description: Print It | Download PDF | Email It

Related Certifications

CompTIA Security+ Certification


Knowledge Pre-Requisites


Course Topics

Chapter 1 Managing Risk
Risk Terminology
Threat Assessment
Risk Assessment
Computing Risk Assessment
Assessing Privacy
Acting on Your Risk Assessment
Risks Associated with Cloud Computing
Risks Associated with Virtualization
Developing Policies, Standards, and Guidelines
Implementing Policies
Understanding Control Types and False Positives/Negatives
Risk Management Best Practices
Change Management

Chapter 2 Monitoring and Diagnosing Networks
Monitoring and Diagnosing Networks Terminology
Frameworks, Best Practices, and Configuration Guides
Industry-Standard Frameworks and Reference Architectures
National Institute of Standards and Technology (NIST)
Benchmarks/Secure Configuration Guides
Secure Network Architecture Concepts
Zones
Tunneling/VPN
Placing Security Devices
SDN
IDS vs. IPS
Secure Systems Design
Hardware and Firmware Security
Operating Systems
Peripherals
Secure Staging Deployment Concepts

Chapter 3 Understanding Devices and Infrastructure
Infrastructure Terminology
Designing with Security in Mind
Firewalls
VPNs and VPN Concentrators
Intrusion Detection Systems
Router
Switch
Proxy
Load Balancer
Access Point
SIEM
DLP
Network Access Control (NAC)
Mail Gateway
Bridge
SSL/TLS Accelerators
SSL Decryptors
Media Gateway
Hardware Security Module

Chapter 4 Identity and Access Management
Using Tools to Assess Your Network
Protocol Analyzer
Network Scanners
Password Cracker
Vulnerability Scanners
Command-Line Tools
Additional Tools
Troubleshooting Common Security Issues
Access Issues
Configuration Issues
Security Technologies
Intrusion Detection Systems
Antimalware
Firewalls and Related Devices
Other Systems 150
Identity and Access Management Concepts
Identification vs. Authentication
Authentication (Single Factor) and Authorization
Multifactor Authentication
Biometrics
Federations
Potential Authentication and Access Problems
LDAP
PAP, SPAP, and CHAP
Kerberos
Working with RADIUS
TACACS, TACACS+, XTACACS
OATH
One-Time Passwords
SAML
Install and Configure Identity and Access Services
Mandatory Access Control
Discretionary Access Control
Role-Based Access Control
Rule-Based Access Control
ABAC
Smartcards
Tokens
File and Database Security

Chapter 5 Wireless Network Threats
Wireless Threat Terminology
Wireless Vulnerabilities to Know
Replay
Rogue APs and Evil Twins
Jamming
WPS
Bluejacking
Bluesnarfing
NFC and RFID
Disassociation
Wireless Commonsense
Wireless Attack Analogy

Chapter 6 Securing the Cloud
Cloud-Related Terminology
Working with Cloud Computing
Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Private Cloud
Public Cloud
Community Cloud
Hybrid Cloud
Working with Virtualization
Understanding Hypervisors
Understanding Containers and Application Cells
VDI/VDE
On-Premise vs. Hosted vs. Cloud
VM Escape Protection
VM Sprawl Avoidance
Security and the Cloud
Cloud Access Security Brokers
Cloud Storage
Security as a Service

Chapter 7 Host, Data, and Application Security
Threat Actors and Attributes
Script Kiddies
Hacktivist
Organized Crime
Nation-States/APT
Insiders
Competitors
Use of Open Source Intelligence
Types of Vulnerabilities
Configuration Issues
User Issues
Zero-Day Exploits
Other Issues
Embedded Systems Security
Application Vulnerabilities
Input Vulnerabilities
Memory Vulnerabilities
Secure Programming
Programming Models
Software Testing
Specific Types of Testing
Secure Coding Standards
Application Configuration Baselining
Operating System Patch Management
Application Patch Management
Other Application Security Issues
Databases and Technologies
Database Security
Secure Configurations
Code Issues

Chapter 8 Cryptography
An Overview of Cryptography
Historical Cryptography
Modern Cryptography
Working with Symmetric Algorithms
Working with Asymmetric Algorithms
Cryptography Concepts
Hashing Algorithms
Rainbow Tables and Salt
Key Stretching
Cryptanalysis Methods
Wi-Fi Encryption
Using Cryptographic Systems
Confidentiality and Strength
Integrity
When to Encrypt
Digital Signatures
Authentication
Nonrepudiation
Key Features
Understanding Cryptography Standards and Protocols
The Origins of Encryption Standards
Public Key Infrastructure X.509/Public Key Cryptography Standards
X.509
Public Key Infrastructure
Pretty Good Privacy
SSL and TLS
Using Public Key Infrastructure
Hardware-Based Encryption Devices
Data Encryption
Authentication

Chapter 9 Threats, Attacks, and Vulnerabilities
Threat and Attack Terminology
Living in a World of Viruses
Symptoms of a Virus Infection
How Viruses Work
Types of Viruses
Managing Spam to Avoid Viruses
Antivirus Software
Malware
Understanding Various Types of Application/Service Attacks
Identifying Denial-of-Service and Distributed Denial-of-Service Attacks
Man-in-the-Middle Attacks
Buffer Overflow
Injection
Cross-Site Scripting and Request Forgery
Privilege Escalation
ARP Poisoning
Amplification
DNS Poisoning
Domain Hijacking
Man-in-the-Browser
Zero-Day Exploits
Replay Attacks
Pass the Hash
Hijacking and Related Attacks
Driver Manipulation
MAC and IP Spoofing Attacks

Chapter 10 Social Engineering and Other Foes
Social Engineering and Physical Security Terminology
Understanding Social Engineering
Types of Social Engineering Attacks
What Motivates an Attack?
The Principles Behind Social Engineering
Social Engineering Attack Examples
Understanding Physical Security
Lighting
Signs
Fencing, Gates, and Cages
Security Guards
Alarms
Safe
Secure Cabinets and Enclosures
Protected Distribution
Protected Cabling
Airgap
Mantrap
Faraday Cage
Lock Types
Biometrics
Barricades/Bollards
Tokens/Cards
Environmental Controls
Cable Locks
Screen Filters
Cameras
Motion Detection
Logs
Infrared Detection
Key Management
Various Control Types
An Analogy of Control Types
Data Security and Privacy Practices
Data Destruction and Media Sanitation
Data Sensitivity Labeling and Handling
Data Roles
Data Retention
Legal and Compliance

Chapter 11 Security Administration
Connection Types
Cellular
Bluetooth
Wi-Fi
Infrared
SATCOM
Mobile Devices
BYOD Issues
Enforcement
Account Management Concepts
Account Types
General Concepts

Chapter 12 Disaster Recovery and Incident Response
Disaster and Incident Related Terminology
Penetration Testing
What Should You Test?
Vulnerability Scanning
Issues Associated with Business Continuity
Types of Storage Mechanisms
Crafting a Disaster-Recovery Plan
Incident Response Procedures
Understanding Incident Response
Tabletop Exercises
Course Description: Print It | Download PDF | Email It

Public Class Format

Certstaffix® Training public classes are instructor-led live online training you attend either from your home/work location or in one of our computer labs. Our live online instructors teach you from a remote location while being able to interact with you like in a traditional classroom.


Quality Instructors

Our instructors have many years of experience teaching adult learners in person and online.

Complete Lab Environment

Access to software required is provided in a lab environment during class.

Hands-on Learning

Most classes are not all lecture - you can learn by actually doing.


Small Classes

You get more attention from the instructor and classes flow more smoothly.

Post-Class Lab Access*

Access practice lab environment for 180 days after most classes*.


Low Cancellation Rate

Most classes run as scheduled.



*These courses do not have post-class lab environment access: Adobe, Salesforce, QuickBooks Online Edition, Google, HTML, WordPress, ITIL, Six Sigma, CompTIA, Project Management, SEO, Social Media.


Group Training

Have a group of employees needing the same training? Onsite training at your office or group live online classes are great solutions.

How Group Training Works





  • An expert Instructor will either come to your office or deliver a private live online class to your students
  • Course can be fully customized to your training needs
  • Each student receives a Course Manual with Practice Files (Materials provided before the class date)
  • If a course has a hands‐on lab, we provide access to the configured course software and files.
    (Requires a high‐speed internet connection and certain open ports on your firewall. You can perform a Connection Assessment Test here)
  • Course is scheduled based on dates you provide (Subject to instructor availability)
  • We usually require about 4 weeks lead time to arrange a training session
  • Training is completed in a convenient session(s) of your choosing
  • Two 15 minute breaks and one hour long break for lunch daily

Request a Free Quote

CompTIA Security+ (2017 Objectives) Class Reviews

Here are a sample of CompTIA Security+ Certification class reviews from past students that have attended our CompTIA Security+ Certification training courses.



This course offers invaluable preparation for Exam SY0-501 and covers 100% of the exam objectives with clear, concise explanation. You'll learn how to handle threats, attacks, and vulnerabilities using industry-standard tools and technologies, while understanding the role of architecture and design. From everyday tasks like identity and access management to complex topics like risk management and cryptography, this course helps you consolidate your knowledge base in preparation for the Security+ exam. Practical examples illustrate how these processes play out in real-world scenarios, allowing you to immediately translate essential concepts to on-the-job application. Students also get access to a robust toolkit for more thorough prep: flashcards, glossary of key terms, practice questions, and a pre-assessment exam equip you with everything you need to enter the exam confident in your skill set.
  • Master essential security technologies, tools, and tasks
  • Understand how Security+ concepts are applied in the real world
  • Study on the go with electronic flashcards and more
  • Test your knowledge along the way with hundreds of practice questions

To an employer, the CompTIA Security+ certification proves that you have the knowledge base and skill set to secure applications, devices, and networks; analyze and respond to threats; participate in risk mitigation, and so much more. As data threats loom larger every day, the demand for qualified security professionals will only continue to grow.

Certification exams are administered by third party testing companies such as Pearson Vue or Prometric. Our courses prepare you for the certification exam, which is an additional fee paid to the testing provider. You must contact Prometric, Pearson Vue or the corresponding testing provider to take a certification exam.


Certstaffix® Class Reviews

Student Average:
4.97 out of 5 from 3 students

5.00 out of 5

Excellent instruction.


- attended our CompTIA Security+ (2014 Objectives) class

4.96 out of 5


- attended our CompTIA Security+ (SY0-501) class

4.94 out of 5


- attended our CompTIA Security+ (2014 Objectives) class



Please contact us if we do not yet have any reviews or you would like more.


View all CompTIA Security+ Certification training reviews

CompTIA Security+ Certification Courses By City:

BC - Vancouver       HI - Honolulu       NC - Winston-Salem       QC - Montreal      
CA - Bakersfield       IA - Des Moines       ND - Bismarck       RI - Providence      
CA - Fresno       IA - Iowa City       ND - Fargo       SC - Greenville      
CA - Los Angeles       ID - Boise       NE - Lincoln       SC - Myrtle Beach      
CA - Merced       IL - Chicago       NE - Omaha       SC - North Charleston      
CA - Modesto       IL - Rockford       NH - Bedford       SD - Sioux Falls      
CA - Napa       IN - Bloomington       NJ - Bridgewater       SK - Regina      
CA - Oakland       IN - Evansville       NM - Albuquerque       SK - Saskatoon      
CA - Oxnard       IN - Fort Wayne       NM - Las Cruces       TN - Chattanooga      
CA - Rancho Cucamonga       IN - Indianapolis       NM - Santa Fe       TN - Knoxville      
CA - Sacramento       IN - South Bend       NS - Halifax       TN - Memphis      
CA - Salinas       KS - Overland Park       NV - Henderson       TN - Nashville      
CA - San Diego       KS - Topeka       NV - Reno       TX - Amarillo      
CA - San Jose       KY - Lexington       NY - Albany       TX - Austin      
CA - Santa Maria       KY - Louisville       NY - Buffalo       TX - Beaumont      
CA - Santa Rosa       LA - Baton Rouge       NY - New York City       TX - Corpus Christi      
CA - Stockton       LA - Lafayette       NY - Rochester       TX - Dallas      
CB - Caribbean       LA - New Orleans       NY - Syracuse       TX - El Paso      
CB - Kingston       LA - Shreveport       OH - Beaver Creek       TX - Fort Worth      
CB - Nassau       MA - Burlington       OH - Cincinnati       TX - Houston      
CO - Boulder       MA - Springfield       OH - Cleveland Heights       TX - Killeen      
CO - Colorado Springs       MA - Westborough       OH - Columbus       TX - Laredo      
CO - Denver       MB - Winnipeg       OH - Toledo       TX - Longview      
CT - Cheshire       MD - Largo       OH - Youngstown       TX - Lubbock      
CT - New Haven       MD - Laurel       OK - Oklahoma City       TX - McAllen      
CT - Stamford       ME - Portland       OK - Tulsa       TX - Midland      
DE - Wilmington       MI - Ann Arbor       ON - Ottawa       TX - San Antonio      
FL - Daytona Beach       MI - Flint       ON - Toronto       TX - Tyler      
FL - Fort Lauderdale       MI - Grand Rapids       OR - Beaverton       TX - Waco      
FL - Fort Myers       MI - Lansing       OR - Bend       UT - Ogden      
FL - Gainesville       MI - Livonia       OR - Eugene       UT - Salt Lake City      
FL - Jacksonville       MN - Minnetonka       OR - Medford       VA - Charlottesville      
FL - Lakeland       MO - Columbia       OR - Salem       VA - Glen Allen      
FL - Miami       MO - St. Louis       PA - Allentown       VA - Harrisonburg      
FL - Naples       MS - Biloxi       PA - Erie       VA - Roanoke      
FL - Pensacola       MS - Jackson       PA - Harrisburg       VA - Virginia Beach      
FL - Sarasota       MT - Billings       PA - Malvern       VT - Burlington      
FL - Tallahassee       MT - Montana       PA - Philadelphia       WA - Seattle      
FL - Tampa       NB - Moncton       PA - Pittsburgh       WA - Spokane      
FL - Winter Park       NB - Saint John       PA - Reading       WI - Eau Claire      
GA - Augusta       NC - Asheville       PA - Scranton-Wilkes Barre       WI - Green Bay      
GA - Columbus       NC - Charlotte       PA - York       WI - Madison      
GA - Peachtree Corners       NC - Greensboro       PR - Puerto Rico       WI - Milwaukee      
GA - Savannah       NC - Raleigh