CompTIA

CompTIA Security+

Brian Opalewski
Brian Opalewski
INE Instructor

Course Description
The CompTIA Security+ exam encompasses foundational information security principles for network security and enterprise risk management. This course, featuring over 15 hours of instruction, will help you develop the knowledge and skills necessary to identify and mitigate risk, apply security controls to protect confidentiality, integrity, and availability, gain an understanding of typical security technologies, identify and troubleshoot security events and incidents, and understand the roles of policies, laws, and regulations. Covering topics such as cryptography, access control, and identity management, this course also includes the recently added topics of cloud computing, bring-your-own-device, and SCADA system security. By the end of the course, students will have a firm grasp on application, information, infrastructure, and operational security principles.
  • Course
    • Network Security
      • Introduction to Security
      • Network Design and OSI Model
      • Network Devices
      • Server Security
      • Cloud Computing
      • Additional Concepts (LAN/WAN, NAC, DMZ, NAT, Subnetting)
      • Common Ports and Protocols
      • Network Attacks (DoS, DDos, Spoofing, Hijacking, etc.)
      • Common Configuration Vulnerabilities
      • Vulnerabilities in Cabled Devices
      • Securing Wireless Networks
      • Bluetooth Vulnerabilities
    • Compliance and Operational Security
      • Environmental Controls
      • Social Engineering
      • Organizational Policies and Legal Compliance
      • System Redundancy
      • Disaster Recovery
    • Threats and Vulnerabilities
      • Threats and Vulnerabilities Introduction
      • Threats to Computer Systems
      • Implementing Security :: Part 1
      • Implementing Security :: Part 2
      • The Basics of Risk Assessments
      • Qualitative and Quantitative Methods
      • Analysis Methodologies
      • Security Controls and Vulnerability Management :: Part 1
      • Security Controls and Vulnerability Management :: Part 2
      • Penetration Testing
      • Vulnerability Scanning & Sniffing Attacks
      • Password Auditing and Analysis
      • System and Network Monitoring
      • Auditing
    • Application, Data and Host Security
      • Introduction to Research Tools
      • Securing the Web Browser
      • Securing Appplications
      • Secure Programming
      • Programming Vulnerabilities and Attacks :: Part 1
      • Programming Vulnerabilities and Attacks :: Part 2
      • Securing the Operating System :: Part 1
      • Securing the Operating System :: Part 2
      • Virtualization Technologies :: Part 1
      • Virtualization Technologies :: Part 2
    • Access Controls and Identity Management
      • Access Control And Identity Management :: Introduction
      • Authentication Models :: Part 1
      • Access Control Models and Mechanisms :: Part 1
      • Access Control Models and Mechanisms :: Part 2
      • Physical Security
      • Authentication Models :: Part 2
      • Authentication Models :: Part 3
    • Cryptography
      • Introduction to Cryptography
      • Encryption and Hashing Concepts :: Part 1
      • Encryption and Hashing Concepts :: Part 2
      • Public Key Infrastructure
      • Security+ Review & Resources :: Part 1
      • Security+ Review & Resources :: Part 2
This course is also included in a training bundle:
View Training Bundle
Course Outline:
  • Course
    • Network Security
      • Introduction to Security
      • Network Design and OSI Model
      • Network Devices
      • Server Security
      • Cloud Computing
      • Additional Concepts (LAN/WAN, NAC, DMZ, NAT, Subnetting)
      • Common Ports and Protocols
      • Network Attacks (DoS, DDos, Spoofing, Hijacking, etc.)
      • Common Configuration Vulnerabilities
      • Vulnerabilities in Cabled Devices
      • Securing Wireless Networks
      • Bluetooth Vulnerabilities
    • Compliance and Operational Security
      • Environmental Controls
      • Social Engineering
      • Organizational Policies and Legal Compliance
      • System Redundancy
      • Disaster Recovery
    • Threats and Vulnerabilities
      • Threats and Vulnerabilities Introduction
      • Threats to Computer Systems
      • Implementing Security :: Part 1
      • Implementing Security :: Part 2
      • The Basics of Risk Assessments
      • Qualitative and Quantitative Methods
      • Analysis Methodologies
      • Security Controls and Vulnerability Management :: Part 1
      • Security Controls and Vulnerability Management :: Part 2
      • Penetration Testing
      • Vulnerability Scanning & Sniffing Attacks
      • Password Auditing and Analysis
      • System and Network Monitoring
      • Auditing
    • Application, Data and Host Security
      • Introduction to Research Tools
      • Securing the Web Browser
      • Securing Appplications
      • Secure Programming
      • Programming Vulnerabilities and Attacks :: Part 1
      • Programming Vulnerabilities and Attacks :: Part 2
      • Securing the Operating System :: Part 1
      • Securing the Operating System :: Part 2
      • Virtualization Technologies :: Part 1
      • Virtualization Technologies :: Part 2
    • Access Controls and Identity Management
      • Access Control And Identity Management :: Introduction
      • Authentication Models :: Part 1
      • Access Control Models and Mechanisms :: Part 1
      • Access Control Models and Mechanisms :: Part 2
      • Physical Security
      • Authentication Models :: Part 2
      • Authentication Models :: Part 3
    • Cryptography
      • Introduction to Cryptography
      • Encryption and Hashing Concepts :: Part 1
      • Encryption and Hashing Concepts :: Part 2
      • Public Key Infrastructure
      • Security+ Review & Resources :: Part 1
      • Security+ Review & Resources :: Part 2

Course Format Options:

Online Streaming

Train anywhere with our web, iOS, Android and Apple TV apps! You'll also have access to any course updates and additions.

Video Download

Download the entire course in mobile, high and HD(1080p) resolutions.

  • Regular price $79.99
  • Save


15hr 30min
December 3, 2014