Software Development & Education Center Security+ Certification

Similar documents
CompTIA Security+ (Exam SY0-401)

Security+ SY0-501 Study Guide Table of Contents

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CompTIA Security+ Certification

Software Development & Education Center. Microsoft Dynamics. Service Industries-AX 2012 R2

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

Software Development & Education Center C Programming

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

Security+ CompTIA Certification Boot Camp

Software Development & Education Center. Microsoft Dynamics

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

CompTIA Security+(2008 Edition) Exam

IT Foundations Networking Specialist Certification with Exam

E-guide Getting your CISSP Certification

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

CompTIA Security+ Study Guide (SY0-501)

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Software Development & Education Center. Microsoft Office (Microsoft Word 2010)

CompTIA Security+ (2008 Edition) Exam

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Software Development & Education Center PHP 5

Required Textbook and Materials. Course Objectives. Course Outline

SYLLABUS DATE OF LAST REVIEW: 012/2016 CIP CODE: Departmental Syllabus SEMESTER: Information Assurance COURSE TITLE: CIST0225 COURSE NUMBER:

Syllabus: The syllabus is broadly structured as follows:

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

CompTIA JK CompTIA Academic/E2C Security+ Certification. Download Full Version :

Course Outline. CISSP - Certified Information Systems Security Professional

Software Development & Education Center. Java Platform, Micro Edition. (Mobile Java)

Certified Ethical Hacker (CEH)


CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

Software Development & Education Center ANDROID. Application Development

Ethical Hacker Foundation and Security Analysts Course Semester 2

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Education Network Security

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

CCISO Blueprint v1. EC-Council

SY CompTIA Security+ Course Outline. SY CompTIA Security+ 31 Oct

ISTQB Training and Certifications. Automation Testing

Advanced Diploma on Information Security

Designing and Managing a Windows Public Key Infrastructure

Information Security in Corporation

Network Security

CompTIA E2C Security+ (2008 Edition) Exam Exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam.

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

CEH: CERTIFIED ETHICAL HACKER v9

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

Course 831 Certified Ethical Hacker v9

Question No: 1 After running a packet analyzer on the network, a security analyst has noticed the following output:

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

SY

Pearson CISSP Lab. Course Outline. Pearson CISSP Lab. 05 Apr

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Software Development & Education Center. Java Platform, Standard Edition 7 (JSE 7)

Oracle Data Cloud ( ODC ) Inbound Security Policies

Implementing Cisco Network Security (IINS) 3.0

Ethical Hacking and Prevention

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

PROTECTING INFORMATION ASSETS NETWORK SECURITY

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

CompTIA Cybersecurity Analyst+

CompTIA Network+ Study Guide Table of Contents

COMPUTER AND NETWORK SUPPORT TECHNICIAN PROGRAM

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Network Security and Cryptography. December Sample Exam Marking Scheme

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

Information Security Training Needs Assessment Study. Dr. Melissa Dark CERIAS Assistant Professor Continuing Education Director

Information Security Controls Policy

CND Exam Blueprint v2.0

SECURITY & PRIVACY DOCUMENTATION

Cloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Security Fundamentals for your Privileged Account Security Deployment

VerifiedDumps. Get the Valid and Verified Exam Questions & Answers Dump for 100% Pass

Certification Exam Outline Effective Date: November 2018

Most Common Security Threats (cont.)

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Software Development & Education Center

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

Cyber Criminal Methods & Prevention Techniques. By

EXAM - CAS-002. CompTIA Advanced Security Practitioner (CASP) Exam. Buy Full Product.

Networking Fundamentals Training

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

CompTIA Security+ E2C (2011 Edition) Exam.

Embedded Robotics. Software Development & Education Center

Certified Cyber Security Analyst VS-1160

Certified Information Systems Auditor (CISA)

CompTIA CSA+ Cybersecurity Analyst

the SWIFT Customer Security

Fundamentals of Network Security v1.1 Scope and Sequence

Monfort College of Business Semester Course Syllabus ( ) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

QuickBooks Online Security White Paper July 2017

Transcription:

Software Development & Education Center Security+ Certification

CompTIA Security+ Certification CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in: Network security Compliance and operational security Threats and vulnerabilities Application, data and host security Access control and identity management Cryptography CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents; it ensures that security personnel are anticipating security risks and guarding against them. Candidate job roles include security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator, and network administrator. The CompTIA Security+ certification is accredited by the International Organization for Standardization (ISO) and the American National Standards Institute (ANSI).The CompTIA Security+ certification may be kept current through the CompTIA Continuing Education program. Course Objectives Upon successful completion of this course, students will be able to: Identify the fundamental concepts of computer security. Identify security threats and vulnerabilities. Examine network security. Manage application, data and host security. Identify access control and account management security measures. Manage public key infrastructure (PKI).

Manage certificates. Identify compliance and operational security measures. Manage risk. Establish key components of the security infrastructure. Manage security incidents. Develop business continuity and disaster recovery plans. Rationale A vendor and product neutral course which will earn the student an established industry credential that validates their network and server expertise; will serve as a jumping off point for higher level certifications Evaluation Those who participate in class discussions, complete class labs and miss no more than three class meetings will be awarded 4.0 continuing education units. Ultimate evaluation of the student will be their successfully passing the CompTIA Security + (2011 edition) (SY0-201) examination. Test Details Number of questions Maximum of 100 questions Length of test 90 minutes Passing score 750 (on a scale of 100-900) Recommended experience CompTIA Network+ certification and two years of technical networking experience, with an emphasis on security. Exam codes SY0-301, JK0-018

Course Outline Lesson 1: Security Fundamentals Topic 1A: Information Security Cycle What Is Information Security? What to Protect Goals of Security Vulnerabilities Threats Attacks Intrusions Risk Controls Types of Controls Security Management Objectives Topic 1B: Information Security Controls The CIA Triad Non-repudiation Authentication Identification The Five A s Access Control Methods Implicit Deny Least Privilege Separation of Duties Job Rotation Mandatory Vacation Time of Day Restrictions

Privilege Management Topic 1C: Authentication Methods Authentication Factors User Name/Password Authentication Tokens Trusted OS Biometrics Multi-Factor Authentication Mutual Authentication Topic 1D: Cryptography Fundamentals Cryptography Encryption Ciphers Cipher Types Encryption and Security Goals Encryption Algorithms Steganography Keys Hashing Encryption Hashing Encryption Algorithms Symmetric Encryption Symmetric Encryption Algorithms Asymmetric Encryption Asymmetric Encryption Algorithms Digital Signatures Quantum Cryptography Hardware-Based Encryption Devices

Topic 1E: Security Policy Fundamentals Security Policies Security Policy Components Security Policy Issues Common Security Policy Types Security Document Categories Change Management Documentation Handling Measures Lesson 2: Security Threats and Vulnerabilities Topic 2A: Social Engineering Social Engineering Attacks Types of Social Engineering Hackers and Attackers Categories of Attackers Topic 2B: Physical Threats and Vulnerabilities Physical Security Physical Security Threats and Vulnerabilities Hardware Attacks Environmental Threats and Vulnerabilities Topic 2C: Network-Based Threats TCP/IP Basics Port Scanning Attacks Eavesdropping Attacks Replay Attacks Social Network Attacks Man-in-the-Middle Attacks Denial of Service (DoS) Attacks

Distributed Denial of Service (DDoS) Attacks Types of DoS Attacks Session Hijacking P2P Attacks ARP Poisoning DNS Vulnerabilities Topic 2D: Wireless Threats and Vulnerabilities Wireless Security Wireless Threats and Vulnerabilities Topic 2E: Software Based Threats Software Attacks Malicious Code Attacks Types of Malicious Code Attacks Password Attacks Types of Password Attacks Backdoor Attacks Application Attacks Types of Application Attacks Lesson 3: Network Security Topic 3A: Network Devices and Technologies Network Components Network Devices Network Technologies Intrusion Detection Systems (IDSs) NIDS NIPS Types of Network Monitoring Systems

Virtual Private Networks (VPNs) VPN Concentrator Web Security Gateways Topic 3B: Network Design Elements and Components NAC VLANs Subnetting NAT Remote Access Remote Access Methods Telephony Components Virtualization Cloud Computing Cloud Computing Service Types Topic 3C: Implement Networking Protocols Internet Protocols DNS HTTP SSL Transport Layer Security (TLS) HTTPS SSH SNMP ICMP IPSec File Transfer Protocols Ports

MMC How to Implement Networking Protocols Topic 3D: Apply Network Security Administration Principles Rule-Based Management Network Administration Security Methods How to How to Apply Network Security Administration Principles Topic 3E: Secure Wireless Traffic The 802.11 Protocol 802.11 Standards The WAP Protocol Wireless Security Protocols Wireless Security Methods How to Secure Wireless Traffic Lesson 4: Managing Application, Data and Host Security Topic 4A: Establish Device/Host Security Hardening Operating System Security Operating System Security Settings Security Baselines Software Updates Patch Management Logging Auditing Anti-Malware Software Types of Anti-Malware Software Virtualization Security Techniques Hardware Security Controls

Strong Passwords How to Establish Device/Host Security Topic 4B: Application Security What is Application Security? Application Security Methods Input Validation Input Validation Vulnerabilities Error and Exception Handling Cross-Site Scripting Cross-Site Request Forgery (XSRF) Cross-Site Attack Prevention Methods Fuzzing Web Browser Security Topic 4C: Data Security What is Data Security? Data Security Vulnerabilities Data Encryption Methods Hardware-Based Encryption Devices How to Topic 4D: Mobile Security Mobile Device Types Mobile Device Vulnerabilities Mobile Device Security Controls Lesson 5: Access Control, Authentication, and Account Management Topic 5A: Access Control and Authentication Services Directory Services LDAP

Common Directory Services Remote Access Methods Tunneling VPN Layer Two Tunneling Protocol (L2TP) Point-to-Point Tunneling Protocol (PPTP) CHAP PAP PGP RADIUS TACACS Kerberos The Kerberos Process Topic 5B: Implement Account Management Security Controls Identity Management Account Management Account Privileges Account Policy Multiple Accounts Multiple User Account Issues Account Management Security Controls Group Policy How to Implement Account Management Security Controls Lesson 6: Managing Public Key Infrastructure (PKI) Topic 6A: Install a Certificate Authority (CA) Hierarchy Digital Certificates Certificate Authentication

Single vs. Dual Sided Certificate Authentication Public Key Infrastructure (PKI) PKI Components CA Hierarchies (Trust Models) The Root CA Public and Private Roots Subordinate CAs Offline Root CAs CA Hierarchy Design Options How to Install a Certificate Authority (CA) Hierarchy Topic 6B: Back Up a CA How to Back Up a CA Topic 6C: Restore a CA How to Restore a CA Lesson 7: Managing Certificates Topic 7A: Enroll Certificates The Certificate Enrolment Process The Certificate Life Cycle Certificate Life Cycle Management How to Enroll Certificates Topic 7B: Secure Network Traffic by Using Certificates SSL Enrolment Process How to Secure Network Traffic by Using Certificates Topic 7C: Renew Certificates How to Renew Certificates Topic 7D: Revoke Certificates Certificate Revocation The Certificate Revocation List (CRL)

How to Revoke Certificates Topic 7E: Back Up Certificates and Private Keys Private Key Protection Methods Key Escrow How to Back Up Certificates and Private Keys Topic 7F: Restore Certificates and Private Keys Private Key Restoration Methods Private Key Replacement How to Restore Certificates and Private Keys Lesson 8: Compliance and Operational Security Topic 8A: Physical Security Physical Security Controls Physical Security Control Types Environmental Exposures Environmental Controls Environmental Monitoring Topic 8B: Legal Compliance Compliance Laws and Regulations Legal Requirements Types of Legal Requirements Due Care Due Diligence Due Process Forensic Requirements Topic 8C: Security Awareness and Training Security Policy Awareness Employee Education

User Security Responsibilities Lesson 9: Managing Risk Topic 9A: Risk Analysis Risk Management Types of Risk Components of Risk Analysis Phases of Risk Analysis Risk Analysis Methods Risk Calculation Risk Response Strategies Topic 9B: Implement Risk Mitigation Strategies Risk Control Types Security Incident Management Risk Mitigation Techniques How to Implement Risk Mitigation Strategies Lesson 10: The Security Infrastructure Topic 10A: Implement Vulnerability Assessment Tools and Techniques Security Assessment Types Security Assessment Techniques Security Assessment Tools Honeypots How to Implement Vulnerability Assessment Tools and Techniques Topic 10B: Scan for Vulnerabilities The Hacking Process Ethical Hacking Penetration Testing and Vulnerability Scanning Types of Vulnerability Scans

Box Testing Methods Security Utilities Vulnerable Port Ranges How to Scan for Vulnerabilities Topic 10C: Mitigation and Deterrent Techniques Security Posture Detection vs. Prevention Controls Types of Mitigation and Deterrent Techniques Lesson 11: Managing Security Incidents Topic 11A: Respond to Security Incidents Computer Crime First Responders Chain of Custody Incident Response Policies Computer Forensics Order of Volatility Basic Forensic Response Procedures for IT Basic Forensic Process How to Respond to Security Incidents Topic 11B: Recover from a Security Incident Damage Assessment and Loss Control Guidelines Organizational Security Reporting Structures Security Incident Reporting Options How to Recover from a Security Incident Lesson 12: Business Continuity and Disaster Recovery Topic 12A: Business Continuity Business Continuity Plans

Business Impact Analysis Continuity of Operations Plan IT Contingency Planning Succession Planning Business Continuity Testing Topic 12B: Plan for Disaster Recovery Disaster Recovery Plans Fault Tolerance Redundancy Measures High Availability Alternate Sites Disaster Recovery Testing Disaster Recovery Evaluation and Maintenance How to Plan for Disaster Recovery Topic 12C: Execute Disaster Recovery Plans and Procedures The Recovery Team The Salvage Team The Disaster Recovery Process Secure Recovery Backup Types and Recovery Plans Backout Contingency Plans Secure Backups Backup Storage Locations How to Execute Disaster Recovery Plans and Procedures

Industry Interface Program Projects Modular Assignments Mini Projects 1 Major Project Domains / Industry Retail Industry Banking & Finance Service E-Commerce Manufacturing & Production Web Application Development Research & Analytics HR & Consultancy FMCG Consumer Electronics Event Management Industry Telecom

Training & Performance Tracking Knowledge related to current technology aspects and corporate level deliverable & Continuous training and assessment to make you industry ready. Throughout the Training Curriculum Candidate will go through a Scheduled Assessment Process as below: Continues Assessments Practical Workshops Modular Assignments Case Studies & Analysis Presentations (Latest Trends & Technologies) Tech Seminars Technical Viva Observing live Models of various projects Domain Specific Industry Projects

Skills Development Workshop Communication is something which all of us do from the very first day of our life, yet there is a question that haunts us most of the time Did I express myself correctly in such and such situation? The answer to this question is really tricky, because in some cases we leave our signatures and good impression but in some others we even fail to get our idea clearly. It happens mostly because we don t know how to act in certain situations. Every time we fail we don t lose completely, we do learn something, but prior knowledge of the same thing could be more beneficial because then we could have turned that failure into success. The course / workshop would focus at many aspects of personality, like: Building positive relationships with peers & seniors Building self-confidence & Developing clear communication skills Exploring and working on factors that help or hinder effective interpersonal communication Learning impacts of non-verbal behavior & Dealing with difficult situations and difficult people Workshops Consists of Following Activities: Personality Development Group Discussions & Debates Seminars & Presentations Case Studies & Analysis Corporate Communication Development HR & Interview Skills Management Games & Simulations Aptitude, Logical & Reasoning Assessments & Development