CompTIA Security+ Certification

Overview

TCCIT Solutions provides high quality, affordably priced, training classes in CompTIA Security+. With experienced instructors and a convenient midtown NYC location, we offer CompTIA Security+ courses for the corporate community. TCCIT Solutions offers group classes and private tutoring to beginner and more advanced corporate clients in CompTIA Security+. We offer onsite training or classes at our facility on 34th Street and Madison in New York City.

Description

Security+ A CompTIA Certification is the primary course you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It is also the main course you will take to prepare for the CompTIA Security+ examination (exam number SY0-301, JK0-018 ). In this course, you'll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.

This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as NetWare, Macintosh, UNIX/Linux, and OS/2, who wants to: further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles. In this course you will implement and monitor security on networks and computer systems, and respond to security breaches.

CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in:

  • network security
  • compliance and operational security
  • threats and vulnerabilities
  • application, data and host security
  • access control and identity management
  • cryptography

CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents, it ensures that security personnel are anticipating security risks and guarding against them.

Candidate job roles include security architect, security engineer, security consultant/specialist, information assurance technician, security administrator systems administrator, and network administrator. Organizations that employ CompTIA Security+ certified staff include Hitachi Information Systems (Japan), Trendmicro (Philippines), Lockheed Martin, the U.S. State Department, Prestariang Systems Sdn. Bhd. (Malaysia) and U.S. government contractors such as EDS, General Dynamics and Northrop Grumman. CompTIA Security+ is one of the options for certifications required by the U.S. Department of Defense, for military personnel or military contractors engaged in information assurance activities.

Upon successful completion of this course, students will be able to:

  • harden internal systems and services
  • harden internetwork devices and services
  • secure network communications. manage a PKI
  • manage certificates. enforce an organizational security policy
  • monitor the security infrastructure. respond to network attacks
  • respond to software-based attacks

Prerequisites:

To register for this course students must either take, or have the equivalent working knowledge of, the following courses, Basic Windows skills and fundamental understanding of computer and networking concepts are required. Students can obtain this level of skill and knowledge by taking the following courses and six to nine months experience in networking, including experience configuring and managing TCP/IP, are strongly recommended.

Related Classe:

TCCIT Solutions Course Curriculum for CompTIA Security + Certification:

Lesson 1: Identify Security Threats

  • Topic 1A: Classify Network Attacks
  • Topic 1B: Classify Software-Based Attacks

Lesson 2: Harden Internal Systems and Services

  • Topic 2A: Harden Base Operating Systems
  • Topic 2B: Harden Directory Services
  • Topic 2C: Harden DHCP Servers
  • Topic 2D: Harden Network File and Print Servers
  • Topic 2E: Harden Application Servers

Lesson 3: Harden Internetwork Devices and Services

  • Topic 3A: Harden Internetwork Connection Devices
  • Topic 3B: Harden DNS and BIND Servers
  • Topic 3C: Harden Web Servers
  • Topic 3D: Harden FTP Servers
  • Topic 3E: Harden NNTP Servers
  • Topic 3F: Harden Email Servers
  • Topic 3G: Harden Collaboration-based Servers

Lesson 4: Secure Network Communications

  • Topic 4A: Secure Network Traffic Using IP Security (IPSec)
  • Topic 4B: Secure Directory Services Communications
  • Topic 4C: Secure Wireless Traffic
  • Topic 4D: Secure Client Internet Access
  • Topic 4E: Secure the Remote Access Channel

Lesson 5: Manage Public Key Infrastructure (PKI)

  • Topic 5A: Implement a CA Hierarchy
  • Topic 5B: Harden a Certificate Authority
  • Topic 5C: Back Up CAs Topic 5D: Recover the CAs
  • Topic 5E: Restore Lost Keys

Lesson 6: Manage Certificates

  • Topic 6A: Enroll Certificates
  • Topic 6B: Secure Network Traffic Using Certificates
  • Topic 6C: Renew Certificates
  • Topic 6D: Suspend Certificates
  • Topic 6E: Revoke Certificates
  • Topic 6F: Destroy Certificates
  • Topic 6G: Publish a Certificate Revocation List (CRL)

Lesson 7: Enforce Organizational Security Policy

  • Topic 7A: Enforce Corporate Security Policy Compliance
  • Topic 7B: Enforce Legal Compliance
  • Topic 7C: Enforce Physical Security Compliance
  • Topic 7D: Educate Users
  • Topic 7E: Implement a Change-Management Plan

Lesson 8: Monitor the Security Infrastructure

  • Topic 8A: Configure Auditing
  • Topic 8B: Configure Security Alerts
  • Topic 8C: Install Intrusion-Detection Software
  • Topic 8D: Set Up a Honeypot
  • Topic 8E: Monitor Port Usage
  • Topic 8F: Monitor Resource and Service Access
  • Topic 8G: Analyze Resource and Service Permissions
  • Topic 8H: Run Vulnerability Scans

Lesson 9: Respond to Network Attacks

  • Topic 9A: Diagnose the Cause of a Security Breach
  • Topic 9B: Respond to Port Scanning Attacks
  • Topic 9C: Respond to Eavesdropping Attacks
  • Topic 9D: Respond to Denial of Service/Distributed Denial of Service Attacks
  • Topic 9E: Respond to IP Spoofing/Hijacking Attacks
  • Topic 9F: Respond to Replay Attacks
  • Topic 9G: Respond to Man-in-the-Middle Attacks

Lesson 10: Respond to Software-based Attacks

  • Topic 10A: Respond to Malicious Code Attacks
  • Topic 10B: Respond to Attacks Against the Default Security Configuration
  • Topic 10C: Respond to Misuse of Privilege Attacks
  • Topic 10D: Respond to Password Attacks
  • Topic 10E: Respond to Software-Exploitation Attacks
  • Topic 10F: Respond to Backdoor Attacks
  • Topic 10G: Respond to Auditing Attacks
  • Topic 10H: Respond to Takeover Attacks

 

For more information about Corporate Training, please either call us at your convenience at 212-684-5151 or email us at info@TCCITSolutions.com.

You can always view our Complete Course List and our Complete Schedule.

www.tccitsolutions.com will take you to our sister site www.careercenters.com