What about this course?
The CompTIA Security+ exam encompasses foundational information security principles for network security and enterprise risk management. This course, featuring over 15 hours of instruction, will help you develop the knowledge and skills necessary to identify and mitigate risk, apply security controls to protect confidentiality, integrity, and availability, gain an understanding of typical security technologies, identify and troubleshoot security events and incidents, and understand the roles of policies, laws, and regulations. Covering topics such as cryptography, access control, and identity management, this course also includes the recently added topics of cloud computing, bring-your-own-device, and SCADA system security. By the end of the course, students will have a firm grasp on application, information, infrastructure, and operational security principles.
Instructor for this course
This course is composed by the following modules
Introduction to Security
Network Design and OSI Model
Additional Concepts (LAN/WAN, NAC, DMZ, NAT, Subnetting)
Common Ports and Protocols
Network Attacks (DoS, DDos, Spoofing, Hijacking, etc.)
Common Configuration Vulnerabilities
Vulnerabilities in Cabled Devices
Securing Wireless Networks
Organizational Policies and Legal Compliance
Threats and Vulnerabilities Introduction
Threats to Computer Systems
Implementing Security :: Part 1
Implementing Security :: Part 2
The Basics of Risk Assessments
Qualitative and Quantitative Methods
Security Controls and Vulnerability Management :: Part 1
Security Controls and Vulnerability Management :: Part 2
Vulnerability Scanning & Sniffing Attacks
Password Auditing and Analysis
System and Network Monitoring
Introduction to Research Tools
Securing the Web Browser
Programming Vulnerabilities and Attacks :: Part 1
Programming Vulnerabilities and Attacks :: Part 2
Securing the Operating System :: Part 1
Securing the Operating System :: Part 2
Virtualization Technologies :: Part 1
Virtualization Technologies :: Part 2
Access Control And Identity Management :: Introduction
Authentication Models :: Part 1
Access Control Models and Mechanisms :: Part 1
Access Control Models and Mechanisms :: Part 2
Authentication Models :: Part 2
Authentication Models :: Part 3
Introduction to Cryptography
Encryption and Hashing Concepts :: Part 1
Encryption and Hashing Concepts :: Part 2
Public Key Infrastructure
Security+ Review & Resources :: Part 1
Security+ Review & Resources :: Part 2
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?
Are the training videos downloadable?
I only want to purchase access to one training course, not all of them, is this possible?
Are there any fees or penalties if I want to cancel my subscription?