CompTIA Security+

This course is already delivered, please contact us for the next available session tel:+357 22 44 14 92
Course Outline in PDF


In this course, students will build on their knowledge and professional experience with computer hardware, operating systems, and networks as they acquire the specific skills required to implement basic security services on any type of computer network.

Who Should Attend:

This course is intended for individuals who are employed as a Systems Administrator, Systems Engineer and IT Manager

At course completion:

Upon successful completion of this course, students will be able to:
•identify fundamental concepts of computer security
•identify security threats
•harden internal systems and services
•harden internetwork devices and services
•secure network communications
•manage public key infrastructure (PKI)
•manage certificates
•enforce organizational security policies
•monitor the security infrastructure

Module 1:  Security Fundamentals

•Security Building Blocks
•Authentication Methods
•Cryptography Fundamentals
•Security Policy Fundamental

Module 2:  Security Threats

•Social Engineering
•Software-Based Threats
•Hardware-Based Threats

Module 3:  Hardening Internal Systems and Services  

•Harden Operating Systems
•Harden Directory Services
•Harden File and Print Servers
•Harden DHCP Servers

Module 4: Hardening Internetwork Devices and Services

•Harden Internetwork Connection Devices
•Harden DNS and BIND Servers
•Harden WEB servers
•Harden File Transfer Protocol (FTP) Servers
•Harden Network News Transfer Protocol (NNTP) Servers
•Harden EMAIL servers
•Harden Conferencing and Messaging Servers

Module 5: Securing Network Communications

•Protect Network Traffic with IP Security (IPSec)
•Secure Wireless Traffic
•Harden a Web Browser
•Secure the Remote Access Channel

Module 6:  Managing Public Key Infrastructure (PKI)

•Install a Certificate Authority (CA) Hierarchy
•Harden a Certificate Authority
•Back Up a CA
•Restore a CA

Module 7:  Managing Certificates

•Enroll Certificates
•Secure Network Traffic by Using Certificates
•Renew Certificates
•Revoke Certificates
•Back Up Certificates and Private Keys
•Restore Certificates and Private Keys

Module 8:  Enforcing Organizational Security Policies

•Enforce Corporate Security Policy Compliance
•Enforce Legal Compliance
•Enforce Physical Security Compliance
•Educate users

Module 9:  Monitoring the Security infrastructure

•Scan for Vulnerabilities
•Monitor for Intruders
•Set up a Honey pot
•Respond to Security Incidents

sd sd sd sd sd sd sd sd sd sd sd sd