CompTIA® Security+ (SY0-401)

In this instructor-led, online training course, you will be prepared for the CompTIA Security+ certification exam.

The Security+ certification is an international, vendor-neutral certification. The certification is proof of a person’s competence in system security, network infrastructure, cryptography, assessments and audits. Read More


This certification is designed for IT professionals who already have Network+ certification and two years of technical networking experience, with an emphasis on security.
CompTIA’s Security+ certification certifies professionals in the field of information security, one of the fastest-growing fields in IT. CompTIA Security+ demonstrates competency in various domains such as:

    • Network Security
    • Compliance and Operational Security
    • Threats and Vulnerabilities
    • Application, Data and Host Security
    • Access Control and Identity Management
    • Cryptography

With the threat of data security becoming a rapidly growing issue, the need for trained information security personnel has increased multi-fold. Information Security is one of the fastest growing areas. Candidates who earn this certification will be able to prove their ability to anticipate information security risks and apply their knowledge of security concepts, and tools to safeguard organizational data, as well as know the procedures to react to security incidents, should they occur.

Exam: SY0-401

desiree-lindfield

Instructor: Mike Vasquez

Skills Learned

  • Mitigating threats
  • Cryptography
  • Authentication systems
  • Messaging security
  • User and role-based security
  • Public key infrastructure
  • Access security
  • Ports and protocols
  • Network security
  • Wireless security
  • Remote access security
  • Auditing, logging, and monitoring
  • Vulnerability testing
  • Organizational security
  • Business continuity
  • CompTIA Security+ objectives map
  • CompTIA Security+ acronyms

Who Should Attend This Course

Network Administrators, System Administrators, Help Desk professionals looking to move into networking, or anyone interested in CompTIA Security+ certification.

Course Outline

  1. Mitigating Threats
  2. Cryptography
  3. Authentication Systems
  4. Messaging Security
  5. User and Role-Based Security
  6. Public Key Infrastructure (PKI)
  7. Access Security
  8. Ports and Protocols
  9. Network Security
  10. Wireless Security
  11. Remote Access Security
  12. Auditing, Logging, and Monitoring
  13. Vulnerability Testing
  14. Organizational Security
  15. Business Continuity

Hands-On Labs

  • Threats-Trojans and Malware Protection
    • Introduction
    • Activating a Trojan
    • Testing Network Services with netcat
    • Deploying Malware Protection
    • Summary
  • Application Data – Establish Host Security
    • Introduction
    • Anti-virus Programs
    • Summary
  • Network Security – Protocol Analyzers
    • Introduction
    • Investigating the ARP Cache Table
    • Using Wireshark to Capture Packets
    • ARP Problems
    • Summary
  • Threats – Network Vulnerabilities
    • Introduction
    • Network Footprinting
    • Packet Sniffing
    • MitM with ARP Spoofing
    • Denial of Service
    • Summary
  • Threats – Vulnerability Scanning
    • Introduction
    • Setting Up OpenVAS
    • Summary
  • Cryptography – PKI Concepts
    • Introduction
    • Install and Configure Active Directory Certificate Services
    • Configure Certificate Revocation Lists (CRLs)
    • Summary
  • Cryptography – Certificate Management
    • Introduction
    • Manage Certificate Templates
    • Manage Certificate Enrolment
    • Configure and Manage Key Archival and Recovery
    • Summary
  • Application Data – Application Security
    • Introduction
    • Authentication Methods
    • Encryption
    • Summary
  • Access Control – RADIUS
    • Introduction
    • Install Network Policy Server – Microsoft RADIUS
    • Configure the VPN Ports
    • Viewing the NPS Logs
    • Summary
  • Application Data – Transitive Trust and Authentication
    • Introduction
    • Create Transitive Trusts between Domains
    • Summary
  • Compliance – User Rights and Permissions
    • Introduction
    • File System Security using Permissions
    • Perform Routine Audits
    • Ensure Network Policies and Procedures
    • Summary
  • Network Security – Routers
    • Introduction
    • Static Routing
    • Dynamic Routing
    • Summary
  • Network Security – Routing Protocols
    • Introduction
    • Configuring a Network
    • Sniffing Routing Traffic
    • Injecting Poison Routes
    • Configuring Authentication for RIP Packets
    • Summary
  • Network Security – Firewall Rule Based Management
    • Introduction
    • Create Firewall Rules
    • Summary
  • Network Security – Firewalls
    • Introduction
    • Configuring NAT Firewall
    • Configuring Port Forwarding
    • Summary
  • Network Security – Spam Filter
    • Introduction
    • Configuring an Email Service
    • Configuring a Mail Client
    • Using Telnet to Spoof a Sender
    • Summary
  • Protocols and Services – IPSec
    • Introduction
    • Internet Protocol Security (IPSec)
    • Summary
  • Protocols and Services – DNS
    • Introduction
    • Working with Host Names
    • Working with the HOSTS File
    • Testing Name Resolution
    • Examining DNS Configuration
    • Configuring a DNS Server
    • Testing DNS
    • Summary
  • Threats – DNS Poisoning
    • Introduction
    • Spoofing a DNS Server
    • Exploring DNS Server Vulnerabilities
    • Summary
  • Protocols and Services – SNMP
    • Introduction
    • Installing the Monitoring Software
    • Installing and Configuring SNMP
    • Performing a Network Inventory
    • Summary
  • Protocols and Services – iSCSI
    • Introduction
    • Install and Configure Shared Storage using iSCSI
    • Summary
  • Threats – Mitigation and Deterrent Techniques
    • Introduction
    • Disabling Unnecessary Services
    • Protecting Management Interfaces and Applications
    • Renaming Unnecessary Accounts for Security
    • Summary
  • Compliance – Patching
    • Introduction
    • Install and Configure WSUS
    • Create Computer Groups for WSUS
    • Configure GPO Policy for WSUS
    • Summary
  • Application Data – Data Encryption
    • Introduction
    • Full Disk Encryption using BitLocker
    • Manage Security for Removable Media
    • Summary
  • Compliance – Backup Execution and Frequency
    • Introduction
    • Perform Server Backup
    • Perform a Role-Specific Backups
    • Summary
  • Cryptography – Transport Encryption
    • Introduction
    • Configuring FTP
    • Configuring FTP Authentication
    • Configuring Certificate Security
    • Testing Certificate Security
    • Configuring Secure FTP
    • Summary
  • Network Security – Load Balancers
    • Introduction
    • Install Network Load Balancing Nodes
    • Create the NLB Cluster
    • Configure Resource for NLB
    • Summary
  • Network Security – Cloud Computing
    • Introduction
    • Software as a Service (SaaS) – Office 365
    • Setting up OneDrive
    • Infrastructure as a Service (IaaS) – Windows Azure
    • Summary
  • Compliance – RAID
    • Introduction
    • Configure Software RAID
    • Summary
  • Compliance – Clustering
    • Introduction
    • Install and Configure Failover Clustering
    • Install File Server Application to the Failover Cluster
    • Manage Failover Clustering
    • Summary