you should have successfully passed the CompTIA Network certification exam and have acquired 24 months of experience in networking support and IT administration
OR the following skills and knowledge before starting this course:
Know the function and basic features of the components of a PC.
Use Windows Server OS to create and manage files and use basic administrative features (Explorer,Control Panel, Server Manager, and Management Consoles).
Operate the Linux OS using basic command-line tools.
Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi,switches, routers).
Understand TCP/IP addressing, core protocols, and troubleshooting tools.
This course will teach you the fundamental principles of installing and configuring cyber security controls and participating in incident response and risk mitigation. It will prepare you to take the CompTIA Security SY0-501 exam by providing 100% coverage of the objectives and content examples listed on the syllabus. Study of the course can also help to build the prerequisites to study more advanced IT security qualifications, such as CompTIA Cyber security Analyst (CSA) , CompTIA Advanced Security Practitioner (CASP), and ISC’s CISSP (Certified Information Systems Security Professional).
On course completion, you will be able to:
Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
Understand the principles of organizational security and the elements of effective security policies.
Know the technologies and uses of cryptographic standards and products.
Install and configure network- and host-based security technologies.
Describe how wireless and remote access security is enforced.
Describe the standards and products used to enforce security on web and communications technologies.
Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
Threats, Attacks, and Vulnerabilities
- Indicators of Compromise
- Critical Security Controls
- Security Posture Assessment Tools
- Incident Response
Identity and Access Management
- Public Key Infrastructure
- Identification and Authentication
- Identity and Access Services
- Account Management
Architecture and Design (1)
- Secure Network Design
- Firewalls and Load Balancers
- IDS and SIEM
- Secure Wireless Access
- Physical Security Controls
Architecture and Design (2)
- Secure Protocols and Services
- Secure Remote Access
- Secure Systems Design
- Secure Mobile Device Services
- Secure Virtualization and Cloud Services
- Disaster Recovery and Resiliency
- Risk Management
- Secure Application Development
- Organizational Security