Security+ Exam Prep Course
5-day training seminar, $3195
5-day virtual session, $3195
RCCSP
  Professional
    Education
       Alliance

Overview

The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. During our hands-on Security+ Prep course, attendees will learn how to respond to security issues and proactively implement sound security protocols to curb security risks.They will learn to pinpoint areas of security breaches, and design a secure network. Using official CompTIA approved quality content this Security+ Prep Course prepares candidates for the Security+ certification exam based on the new and updated version released in 2011 - exam code SYO-301, which is included in the approved list of certifications to meet the requirements of Department of Defense directive 8570.1. CompTIA Security+ is an international, vendor-neutral certification that proves competency in system security, network infrastructure, access control and organizational security including

  • Network security
  • Compliance and operational security
  • Threats and vulnerabilities
  • Application, data and host security
  • Access control and identity management
  • Cryptography

Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years of technical networking experience, with an emphasis on security.

In addition, participants will learn about:

  • Mitigating threats
  • Cryptography
  • Authentication
  • User and role-based security
  • Peripheral security
  • Public key infrastructure
  • Application and messaging security
  • Ports and protocols
  • Network security
  • Wireless security
  • Remote access security
  • Auditing, logging, and monitoring
  • Vulnerability testing and monitoring
  • Organizational security
  • Business continuity
  • CompTIA Security+ objectives map
  • CompTIA Security+ acronyms

Course Deliverables

  • Security+ course manual
  • Security+ study guide
  • Security+ certification practice exams
  • Security+ extra practice exam questions
  • Comprehension exercises, study digest, and quick reference card
  • Security+ exam voucher

Certification Exam ( SYO-301)

  • Number of questions: 100
  • Length of test: 90 minutes
  • Passing score: 750 on a scale of 100-900

Who Should Participate

This Security+ course is ideal for security architects, security engineers, security consultants/specialists, information assurance technicians, security administrators, systems administrators, and network administrators. Two years of technical networking experience, with an emphasis on security is recommended.

Agenda

Mitigating Threats

  • System maintenance
  • Application security
  • Physical security
  • Malware
  • Social engineering

Cryptography

  • Symmetric cryptography
  • Public key cryptography

Authentication

  • Authentication factors and requirements
  • Authentication systems
  • Authentication system vulnerabilities

User- and Role-Based Security

  • Baseline security policies
  • Resource access

Peripheral Security

  • File and disk encryption
  • Peripheral and component security
  • Mobile device security

Public Key Infrastructure

  • Public key cryptography
  • Implementing public key infrastructure (PKI)
  • Web server security with PKI

Application and Messaging Security

  • Application security
  • E-mail security
  • Social networking and messaging

Ports and Protocols

  • TCP/IP basics
  • Protocol-based attacks

Network Security

  • Network devices
  • Secure network topologies
  • Secure networking
  • Virtualization and cloud computing

Wireless Security

  • Wireless network security
  • Mobile device security

Remote Access Security

  • Remote access
  • Virtual private networks

Vulnerability Testing

  • Risk and vulnerability assessment
  • Auditing and logging
  • Intrusion detection and prevention systems
  • Incident response

Organizational Security

  • Organizational policies
  • Education and training
  • Disposal and destruction

Business Continuity

  • Redundancy planning
  • Disaster recovery
  • Environmental controls

Dates, Locations and Registration

Recommended Follow-on Courses:

CISSP PrepCourse
Cybersecurity Essentials

Home

Training & Certification:
   w Call Center
   w IT Support Center
   w ITIL
   w Help Desk

   w Telecom

Call Center Operations
Technical Support
Call Center Technology
Online Support
Customer Satisfaction
Knock Your Socks Off
Help Desk Institute
Telecom Books
Communication Skills
Call Center Monitoring
Metrics / Benchmarking
CRM
Hiring & Retention
Outbound Telesales
Novelty Gifts & Humor
Half-Priced Books

Subject Index
Catalog Index

Shipping Options
About Us
Contact Us

Hands-on Excercises

Lab 1. Mitigating Threats

  • Identifying common security threats
  • Updating the operating system
  • Managing software patches
  • Checking for and installing service packs
  • Determining whether you need to update your computer's BIOS
  • Configuring Windows Firewall
  • Managing application security
  • ID-related security concerns
  • Plant security
  • Identifying and differentiating malware
  • Installing antivirus software
  • Scanning your system for spyware
  • Social engineering
  • Phishing
  • Comparing anti-spam measures
  • Evaluating the risks of social networking

Lab 2. Cryptography

  • Encrypting and decrypting data with a one-time pad
  • Calculating hashes
  • Sharing a secret message with steganography
  • Public key cyptography
  • Certificates
  • Certificate trusts
  • Comparing single- and dual-sided certificates
  • Quantum cryptography

Lab 3. Authentication

  • Evaluating authentication factors
  • Requirements of a secure authentication system
  • Comparing authentication protocols
  • NTLM authentication
  • Components of Kerberos
  • Null sessions
  • Identifying authentication vulnerabilities
  • Capturing passwords with a protocol analyzer
  • Cracking passwords

Lab 4. User and Role-Based Security

  • Using MBSA to analyze security
  • Creating a console to manage local security policies
  • Using the GPMC
  • Creating users and groups based on security needs
  • Securing file resources

Lab 5. Peripheral Security

  • Enabling file-based encryption
  • Creating an encrypted volume
  • Mounting, using, and dismounting an encrypted volume
  • Risks associated with common peripherals
  • Using Windows Policies to mitigate the security risks of peripherals
  • Vulnerabilities of mobile devices
  • Mobile device security

Lab 6. PKI

  • Life cycle and management of certificates
  • Installing a stand-alone root certificate authority (CA)
  • Installing an enterprise subordinate CA
  • Implementing a file-based certificate request
  • Managing your certificate server
  • Requesting a user certificate
  • Revoking a certificate
  • Enabling the EFS recovery agent template
  • Enrolling for a recovery agent certificate
  • Enabling key archival
  • Re-enrolling all certificates
  • Requesting and installing a web server certificate
  • Enabling SSL for the certificate server web site
  • Making a secure connection
  • Requesting a client certificate via the web

Lab 7. Application and Messaging Security

  • Analyzing application risks
  • Distinguishing between application attacks
  • Identifying the security risks of an e-mail system
  • Configuring an e-mail client to use secure authentication
  • S/MIME features
  • Installing Gnu Privacy Guard and Enigmail
  • Creating an Open PGP certificate and key pair
  • Sending a signed message
  • Evaluating the risks of social networking
  • Considering IM security

Lab 8. Ports and Protocols

  • TCP/IP architecture
  • Protocols in the TCP/IP suite
  • Using port numbers
  • Comparing IPv4 and IPv6 packets
  • Preventing common protocol-based attacks
  • Assessing your vulnerability to DDoS attacks
  • Scanning ports
  • Checking ARP cache
  • Spoofing attacks
  • Replay and hijacking attacks

Lab 9. Network Security

  • Low-layer networking devices
  • Routers
  • NAT and PAT devices
  • Firewalls and proxy servers
  • Identifying inherent weaknesses in network devices
  • Overcoming device threats
  • Comparing firewall-based secure topologies
  • Disabling connection bridging
  • VLANs
  • Benefits of NAC
  • Security enabled by VPNs
  • Configuring firewall rules
  • Blocking ports with a firewall
  • VLAN security
  • Router security
  • Benefits and risks of virtualization
  • Benefits and risks of cloud computing

Lab 10. Wireless Security

  • Comparing wireless network protocols
  • Configuring a wireless access point
  • Configuring a wireless client
  • Wireless networking vulnerabilities
  • Scanning for insecure access points
  • Enabling transmission encryption
  • Identifying threats related to cell phones and PDAs

Lab 11. Remote Access Security

  • RADIUS authentication
  • Role of LDAP in a remote access environment
  • TACACS+ authentication
  • How 802.1x adds security to your network
  • Installing Network Policy and Access Services
  • Configuring an NPS network policy
  • Configuring NPS accounting
  • Comparing VPN protocols
  • Installing Routing and Remote Access Services
  • Enabling a VPN
  • Configuring NPS to provide RADIUS authentication for your VPN

Lab 12. Vulnerability Testing

  • Vulnerability and penetration testing
  • Scanning the network
  • Viewing event logs
  • Device and application logging
  • IDS characteristics
  • Comparing host-based and network intrusion detection systems
  • Role and use of honeypots and honeynets
  • Examining the forensics process

Lab 13. Organizational Security

  • CIA, controls, and risk assessment
  • Creating a security policy
  • Creating a human resource policy
  • Incidence response and reporting policies
  • Change management software options
  • Need for user education and training
  • Education opportunities and methods
  • Deciding whether to destroy or dispose of IT equipment

Lab 14. Business Continuity

  • Creating a business continuity plan
  • RAID levels
  • Selecting backup schemes
  • Identifying appropriate media rotation and storage plans

Registration Fees

The per student registration fee for the hands-on classroom session is $3195, and includes the seminar, course materials, and morning and afternoon refreshments.

Classroom training begins at 8:30 AM each day and concludes at 4:30 PM unless otherwise directed. Please arrive early on the first day to sign-in and meet fellow attendees. If you register less than one week in advance of a class, please bring your confirmation letter. Business casual attire is appropriate.

Register securely online with confidence or please call (708) 246-0320.

Seminar Schedule
Apr 7-11, 2014 11:30 AM-7:30 PM ET Virtual Classroom
Apr 14-18, 2014 Dallas, TX Irving Training Center
Apr 14-18, 2014 9:30 AM-5:30 PM ET Virtual Classroom
Apr 21-25, 2014 New York, NY New York Offices
Apr 21-25, 2014 8:30 AM-4:30 PM ET Virtual Classroom
Apr 28-May 2, 2014 Atlanta, GA Atlanta Offices
Apr 28-May 2, 2014 8:30 AM-4:30 PM ET Virtual Classroom
May 5-9, 2014 Morristown, NJ Morristown Offices
May 5-9, 2014 8:30 AM-4:30 PM ET Virtual Classroom
May 12-16, 2014 Boston, MA Microtek Boston
May 12-16, 2014 8:30 AM-4:30 PM ET Virtual Classroom
May 19-23, 2014 San Jose, CA Santa Clara Offices
May 19-23, 2014 11:30 AM-7:30 PM ET Virtual Classroom
Jun 2-6, 2014 Chicago, IL Schaumburg Offices
Jun 2-6, 2014 8:30 AM-4:30 PM ET Virtual Classroom
Jun 9-13, 2014 Washington, DC Arlington Offices
Jun 9-13, 2014 8:30 AM-4:30 PM ET Virtual Classroom
Jun 16-20, 2014 Dulles, VA Microtek Dulles
Jun 16-20, 2014 Raleigh, NC Cary Training Center
Jun 16-20, 2014 8:30 AM-4:30 PM ET Virtual Classroom
Jun 23-27, 2014 8:30 AM-4:30 PM ET Virtual Classroom
Jun 7-11, 2014 10:30 AM-6:30 PM ET Virtual Classroom
Jul 21-25, 2014 Morristown, NJ Morristown Offices
Jul 21-25, 2014 8:30 AM-4:30 PM ET Virtual Classroom
Jul 28-Aug 1, 2014 New York, NY New York Offices
Jul 28-Aug 1, 2014 8:30 AM-4:30 PM ET Virtual Classroom
Aug 4-8, 2014 Denver, CO Microtek Denver
Aug 11-15, 2014 Columbia, MD System Source Training
Aug 11-15, 2014 Dallas, TX Irving Training Center
Aug 11-15, 2014 9:30 AM-5:30 PM ET Virtual Classroom
Aug 18-22, 2014 Los Angeles, CA Microtek Los Angeles
Aug 18-22, 2014 11:30 AM-7:30 PM ET Virtual Classroom
Aug 25-29, 2014 8:30 AM-4:30 PM ET Virtual Classroom
Sep 8-12, 2014 Washington, DC Arlington Offices
Sep 8-12, 2014 8:30 AM-4:30 PM ET Virtual Classroom
Sep 15-19, 2014 Orlando, FL Microtek Orlando
Sep 22-26, 2014 Chicago, IL Schaumburg Offices
Sep 22-26, 2014 9:30 AM-5:30 PM ET Virtual Classroom
Sep 29-Oct 3, 2014 San Antonio, TX Norris Conference Center
Sep 29-Oct 3, 2014 8:30 AM-4:30 PM ET Virtual Classroom

More Training and Certification Courses


Terms & Conditions

Seminar provider is not responsible for losses due to cancellation. In all circumstances, seminar provider's liability shall be limited to fees received.

Seminar agenda and assigned instructors are subject to change.

Public Training Terms & Conditions

Payment is due prior to the seminar.

Public seminar cancellation policy.  Registrants may cancel up to fourteen days in advance of the seminar start date for a full refund, less administrative fees of $400.  Or, you may transfer your registration to another member of your company at no additional charge.  Registrants canceling within fourteen days of the seminar will receive training credit, less administrative fees of $400 toward any other Resource Center seminar.

In the unlikely event that a seminar must be cancelled by seminar provider due to unavoidable circumstances, you will be notified at least two weeks prior to the seminar date, and your payment will be refunded.  Seminar provider is not responsible for losses due to cancellation including losses on advanced purchase airfares.  We strongly recommend that attendees traveling by air to attend the seminar purchase only refundable tickets.Become a certified callcenter manager