5 days of training
Hands-on labs using Windows Server 2012R2
1.Configure Bitlocker Security
2.Configure EFS File security
3.Build and Configure a Web Portal
4.Secure that Web Portal with Certificates
5.Secure internal Network Traffic with IPSEC
6.Secure Traffic between 2 Bank Servers
7.Implement Firewall Rules
8.Configure Mozilla Firefox Browser
9.Managing and Using Certificates
10.Use Network Monitor to check traffic to and from your Computer
Comptia Security+ Course
CompTIA® Security+® (Exam SY0-401)
CompTIA® Security+® (Exam SY0-401) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network.
This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-401) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role.
In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.
- Identify the fundamental concepts of computer security.
- Identify security threats and vulnerabilities.
- Manage data, application, and host security.
- Implement network security.
- Identify and implement access control and account management security measures.
- Manage certificates.
- Identify and implement compliance and operational security measures.
- Manage risk.
- Troubleshoot and manage security incidents.
- Plan for business continuity and disaster recovery.
Lesson 1: Security Fundamentals
Topic A: The Information Security Cycle
Topic B: Information Security Controls
Topic C: Authentication Methods
Topic D: Cryptography Fundamentals
Topic E: Security Policy Fundamentals
Lesson 2: Identifying Security Threats and Vulnerabilities
Topic A: Social Engineering
Topic B: Malware
Topic C: Software-Based Threats
Topic D: Network-Based Threats
Topic E: Wireless Threats and Vulnerabilities
Topic F: Physical Threats and Vulnerabilities
Lesson 3: Managing Data, Application, and Host Security
Topic A: Manage Data Security
Topic B: Manage Application Security
Topic C: Manage Device and Host Security
Topic D: Manage Mobile Security
Lesson 4: Implementing Network Security
Topic A: Configure Security Parameters on Network Devices and Technologies
Topic B: Network Design Elements and Components
Topic C: Implement Networking Protocols and Services
Topic D: Apply Secure Network Administration Principles
Topic E: Secure Wireless Traffic
Lesson 5: Implementing Access Control, Authentication, and Account Management
Topic A: Access Control and Authentication Services
Topic B: Implement Account Management Security Controls
Lesson 6: Managing Certificates
Topic A: Install a CA Hierarchy
Topic B: Enroll Certificates
Topic C: Secure Network Traffic by Using Certificates
Topic D: Renew Certificates
Topic E: Back Up and Restore Certificates and Private Keys
Topic F: Revoke Certificates
Lesson 7: Implementing Compliance and Operational Security
Topic A: Physical Security
Topic B: Legal Compliance
Topic C: Security Awareness and Training
Topic D: Integrate Systems and Data with Third Parties
Lesson 8: Risk Management
Topic A: Risk Analysis
Topic B: Implement Vulnerability Assessment Tools and Techniques
Topic C: Scan for Vulnerabilities
Topic D: Mitigation and Deterrent Techniques
Lesson 9: Troubleshooting and Managing Security Incidents
Topic A: Respond to Security Incidents
Topic B: Recover from a Security Incident
Lesson 10: Business Continuity and Disaster Recovery Planning
Topic A: Business Continuity
Topic B: Plan for Disaster Recovery
Topic C: Execute DRPs and Procedures