Audience
This course is designed for information technology (IT) professionals who have networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix®, or Linux®; and who want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles.
This course is also designed for students who are seeking the CompTIA Security+ certification and who want to prepare for the CompTIA Security+ SY0-601 Certification Exam.
Prerequisites
Before attending this course, students must have:
Basic understanding of network and network security
Understand the concepts covered by the Network+ and Security+ exams
• General understanding of Microsoft Azure and Microsoft 365.
Skills Gained
After completing this course, participants will be able to work with:
Attacks, Threats and Vulnerabilities
• Focusing on more threats, attacks, and vulnerabilities on the Internet from newer custom devices that must be mitigated, such as IoT and embedded devices, newer DDoS attacks, and social engineering attacks based on current events.
Architecture and Design
• Includes coverage of enterprise environments and reliance on the cloud, which is growing quickly as organizations transition to hybrid networks.
Implementation
• Expanded to focus on administering identity, access management, PKI, basic cryptography, wireless, and end-to-end security.
Operations and Incident Response
• Covering organizational security assessment and incident response procedures, such as basic threat detection, risk mitigation techniques, security controls, and basic digital forensics.
Governance, Risk and Compliance
• Expanded to support organizational risk management and compliance to regulations, such as PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST, and CCPA.
Course outline
Part 1: Threat Management
• Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
• Given a scenario, analyze the results of a network reconnaissance.
• Given a network-based threat, implement or recommend the appropriate response and countermeasure.
• Explain the purpose of practices used to secure a corporate environment.
Part 2: Vulnerability Management
• Given a scenario, implement an information security vulnerability management process.
• Given a scenario, analyze the output resulting from a vulnerability scan.
• Compare and contrast common vulnerabilities found in the following targets within an organization.
Part 3: Cyber Incident Response
• Given a scenario, distinguish threat data or behavior to determine the impact of an incident.
• Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
• Explain the importance of communication during the incident response process.
• Given a scenario, analyze common symptoms to select the best course of action to support incident response.
• Summarize the incident recovery and post-incident response process.
Part 4: Security Architecture and Tool Sets
• Explain the relationship between frameworks, common policies, controls, and procedures.
• Given a scenario, use data to recommend remediation of security issues related to identity and access management.
• Given a scenario, review security architecture and make recommendations to implement compensating controls.
• Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC).
• Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.
Schedule
Click on the following link to see the current Course Schedule
Our minimum class-size is 3 for this course.
If there are no scheduled dates for this course, it can be customized to suit the time and skill needs of clients and it can be held online, at a rented location or at your premises.
Click on the following link below to arrange for a custom course: Enquire about a course date
FAQs
CERTFICATE OF COMPLETION: Participants will receive a certificate of completion at the end of a course. This is not an official certification for the product and/or software. Our courses do indicate the appropriate certification exam(s) that the participant can sit. Data Vision Systems does not provide certification or deliver the certification exams. Participants are responsible for arranging and paying for the certification exams on the appropriate certification body.
CANCELLATION POLICY: There is never a fee for cancelling seven business days before a class for any reason. Data Vision Systems reserves the right to cancel any course due to insufficient registration or other extenuating circumstances. Participants will be advised prior to doing so.
Reviews
There are no reviews yet.