Home > Comptia Security + (security Specialist)

CompTIA Security + (Security Specialist)  

Level 1 - Beginners

If you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ course is one of the most valuable courses available and so is the certification. Since its introduction in 2002, over a quarter million professionals have attended the Security+ course and took the certification, itself a springboard to prestigious certifications like the CASP, CISSP, and CISA. The CompTIA Security+ course and Study Guide: SY0-401 covers 100% of the Security+ exam objectives, with clear and concise information on crucial security topics.

You'll find everything you need to prepare for the 2014 version of the Security+ certification exam, including insight from industry experts on a wide range of IT security topics. Readers also get access to a robust set of learning tools, featuring electronic flashcards, assessment tests, robust practice test environment, with hundreds of practice questions, and electronic flashcards.

  • CompTIA authorized and endorsed
  • Includes updates covering the latest changes to the exam, including better preparation for real-world applications
  • Covers key topics like network security, compliance and operational security, threats and vulnerabilities, access control and identity management, and cryptography
  • Employs practical examples and insights to provide real-world context from two leading certification experts
  • Provides the necessary tools to take that first important step toward advanced security certs like CASP, CISSP, and CISA, in addition to satisfying the DoD's 8570 directive

If you're serious about jump-starting your security career, you need the kind of thorough preparation included in the CompTIA Security+ Study Guide: SY0-401.


Why CompTIA Security+?


Watch this video explaining how CompTIA Security + will give you the skills secure a network and deter hackers and you’re ready for the job.

 

Price:

R7400.00 per person incl. VAT (Full-Time & Part Time) LEARN MORE >
R4,500.00 per person excl. VAT (Distance Learning/Online Learning) LEARN MORE>

PLEASE NOTE: Learnfast serves a full lunch during break as well as coffee, tea and biscuits as part at no extra cost. We also cater for special meals. Your fee will include your full study guide, notepad, pen and USB with supporting video tutorials.

 

Duration:

4 Days (08:30 - 16:00)

Prerequisites:

CompTIA Network+ and/or two years of experience in IT administration with a security focus

Available Exams and Certifications:

This course will prepare you to write the CompTIA Security + Exam (SY0-401). The CompTIA Security + certification is globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

Course Accreditations:

Learnfast is a CompTIA Authorized Partner. CompTIA’s Authorised Partner Programme works collaboratively with organisations throughout the globe to increase market impact, customer satisfaction and revenue to enhance student career opportunities.

 


Did you know? Learnfast won the CompTIA award for the fastest growing partner in the past financial year. View the certificate HERE.


Who Should Attend:

IT Professional hoping to progress in your career.

  • Anyone looking for a career in:
    • Security Specialist/Administrator
    • Security ​Consultant
    • Security or ​Systems ​Administrator
    • Network ​Administrator

Delivery Method:

At Learnfast we understand that that each person prefers different learning styles and techniques influenced by circumstances, location, field of study and learning preference. We have therefore developed learning methods to suit all learners to ensure everyone has all the opportunity to achieve learning success. We deliver our qualifications via three modern and flexible methods.

Full Time (myWay Learning Method)
Students will spend a minimum of 6 hours per day at our campus based on pre-scheduled dates with the mentors. This is done via our myWay learning method.


LEARN MORE>

Part Time (myWay Learning Method)
Part Time class times are from 18:00 – 21:00 during weekdays, Monday to Thursday on pre-scheduled dates. This is done via our myWay learning method.


LEARN MORE>

Distance/Online Learning

Correspondence studies is based on self-study combined with Video Tutorials, student support and a dedicated tutor. Everything is managed online via the student portal.


LEARN MORE>

Chapter 1 Measuring and Weighing Risk

  • Risk Assessment
  • Computing Risk Assessment
  • Acting on Your Risk Assessment
  • Risks Associated with Cloud Computing 
  • Risks Associated with Virtualization
  • Developing Policies, Standards, and Guidelines
  • Implementing Policies
  • Understanding Control Types and False Positives/Negatives
  • Risk Management Best Practices
  • Disaster Recovery
  • Tabletop Exercise

Chapter 2 Monitoring and Diagnosing Networks

  • Monitoring Networks
  • Network Monitors
  • Understanding Hardening
  • Working with Services
  • Patches
  • User Account Control
  • Filesystems
  • Securing the Network
  • Security Posture
  • Continuous Security Monitoring
  • Setting a Remediation Policy
  • Reporting Security Issues
  • Alarms
  • Alerts
  • Trends
  • Differentiating between Detection Controls and Prevention Controls

Chapter 3 Understanding Devices and Infrastructure

  • Mastering TCP/IP
  • OSI Relevance
  • Working with the TCP/IP Suite
  • IPv4 and IPv6
  • Understanding Encapsulation
  • Working with Protocols and Services
  • Designing a Secure Network
  • Demilitarized Zones
  • Subnetting
  • Virtual Local Area Networks
  • Remote Access
  • Network Address Translation
  • Telephony
  • Network Access Control
  • Understanding the Various Network Infrastructure Devices
  • Firewalls
  • Routers
  • Switches
  • Load Balancers
  • Proxies
  • Web Security Gateway
  • VPNs and VPN Concentrators
  • Intrusion Detection Systems
  • Understanding Intrusion Detection Systems
  • IDS vs. IPS
  • Working with a Network-Based IDS
  • Working with a Host-Based IDS
  • Working with NIPSs
  • Protocol Analyzers
  • Spam Filters
  • UTM Security Appliances

Chapter 4 Access Control, Authentication, and Authorization

  • Understanding Access Control Basics
  • Identification vs. Authentication
  • Authentication (Single Factor) and Authorization
  • Multifactor Authentication
  • Layered Security and Defense in Depth
  • Network Access Control
  • Tokens
  • Federations
  • Potential Authentication and Access Problems
  • Authentication Issues to Consider
  • Authentication Protocols
  • Account Policy Enforcement
  • Users with Multiple Accounts/Roles
  • Generic Account Prohibition
  • Group-based and User-assigned Privileges
  • Understanding Remote Access Connectivity
  • Using the Point-to-Point Protocol
  • Working with Tunneling Protocols
  • Working with RADIUS
  • TACACS/TACACS+/XTACACS
  • VLAN Management
  • SAML 
  • Understanding Authentication Services
  • LDAP 
  • Kerberos
  • Single Sign-On Initiatives
  • Understanding Access Control
  • Mandatory Access Control
  • Discretionary Access Control
  • Role-Based Access Control
  • Rule-Based Access Control
  • Implementing Access Controlling Best Practices
  • Least Privileges
  • Separation of Duties
  • Time of Day Restrictions
  • User Access Review
  • Smart Cards
  • Access Control Lists
  • Port Security
  • Working with 802.1X
  • Flood Guards and Loop Protection
  • Preventing Network Bridging
  • Log Analysis
  • Trusted OS
  • Secure Router Configuration 

Chapter 5 Protecting Wireless Networks

  • Working with Wireless Systems
  • IEEE 802.11x Wireless Protocols 
  • WEP/WAP/WPA/WPA2 
  • Wireless Transport Layer Security
  • Understanding Wireless Devices
  • Wireless Access Points
  • Extensible Authentication Protocol
  • Lightweight Extensible Authentication Protocol
  • Protected Extensible Authentication Protocol
  • Wireless Vulnerabilities to Know
  • Wireless Attack Analogy

Chapter 6 Securing the Cloud

  • Working with Cloud Computing
  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)
  • Infrastructure as a Service (IaaS)
  • Private Cloud 
  • Public Cloud 
  • Community Cloud 
  • Hybrid Cloud 
  • Working with Virtualization 
  • Snapshots 
  • Patch Compatibility 
  • Host Availability/Elasticity
  • Security Control Testing 
  • Sandboxing 
  • Security and the Cloud 
  • Cloud Storage

Chapter 7 Host, Data, and Application Security

  • Application Hardening
  • Databases and Technologies
  • Fuzzing
  • Secure Coding
  • Application Configuration Baselining
  • Operating System Patch Management
  • Application Patch Management
  • Host Security
  • Permissions
  • Access Control Lists
  • Antimalware 
  • Host Software Baselining 
  • Hardening Web Servers 
  • Hardening Email Servers 
  • Hardening FTP Servers 
  • Hardening DNS Servers 
  • Hardening DHCP Services 
  • Protecting Data Through Fault Tolerance
  • Backups 
  • RAID
  • Clustering and Load Balancing 
  • Application Security 
  • Best Practices for Security 
  • Data Loss Prevention
  • Hardware-Based Encryption Devices 

Chapter 8 Cryptography 

  • An Overview of Cryptography
  • Historical Cryptography
  • Modern Cryptography
  • Working with Symmetric Algorithms
  • Working with Asymmetric Algorithms
  • What Cryptography Should You Use?
  • Hashing Algorithms
  • Rainbow Tables and Salt
  • Key Stretching 
  • Understanding Quantum Cryptography 
  • Cryptanalysis Methods 
  • Wi-Fi Encryption
  • Using Cryptographic Systems 
  • Confidentiality and Strength
  • Integrity 
  • Digital Signatures 
  • Authentication
  • Nonrepudiation 
  • Key Features 
  • Understanding Cryptography Standards and Protocols 
  • The Origins of Encryption Standards 
  • Public-Key Infrastructure X.509/Public-Key Cryptography Standards 
  • X.509 
  • SSL and TLS 
  • Certificate Management Protocols 
  • Secure Multipurpose Internet Mail Extensions 
  • Secure Electronic Transaction 
  • Secure Shell 
  • Pretty Good Privacy 
  • HTTP Secure 
  • Secure HTTP 
  • IP Security 
  • Tunneling Protocols 
  • Federal Information Processing Standard 
  • Using Public-Key Infrastructure 
  • Using a Certificate Authority 
  • Working with Registration Authorities and Local Registration Authorities 
  • Implementing Certificates 
  • Understanding Certificate Revocation 
  • Implementing Trust Models 
  • Hardware-Based Encryption Devices 
  • Data Encryption 

Chapter 9 Malware, Vulnerabilities, and Threats

  • Understanding Malware
  • Surviving Viruses
  • Symptoms of a Virus Infection
  • How Viruses Work 
  • Types of Viruses 
  • Managing Spam to Avoid Viruses 
  • Antivirus Software 
  • Understanding Various Types of Attacks 
  • Identifying Denial-of-Service and Distributed Denial-of-Service Attacks 
  • Spoofing Attacks 
  • Pharming Attacks 
  • Phishing, Spear Phishing, and Vishing 
  • Xmas Attack 
  • Man-in-the-Middle Attacks 
  • Replay Attacks 
  • Smurf Attacks 
  • Password Attacks 
  • Privilege Escalation 
  • Malicious Insider Threats 
  • Transitive Access 
  • Client-Side Attacks 
  • Typo Squatting and URL Hijacking 
  • Watering Hole Attack 
  • Identifying Types of Application Attacks 
  • Cross-Site Scripting and Forgery 
  • SQL Injection 
  • LDAP Injection 
  • XML Injection 
  • Directory Traversal/Command Injection 
  • Buffer Overflow 
  • Integer Overflow 
  • Zero-Day Exploits 
  • Cookies and Attachments 
  • Locally Shared Objects and Flash Cookies 
  • Malicious Add-Ons 
  • Session Hijacking 
  • Header Manipulation 
  • Arbitrary Code and Remote Code Execution 
  • Tools for Finding Threats 
  • Interpreting Assessment Results 
  • Tools to Know 
  • Risk Calculations and Assessment Types 

Chapter 10 Social Engineering and Other Foes

  • Understanding Social Engineering 
  • Types of Social Engineering Attacks 
  • What Motivates an Attack? 
  • The Principles Behind Social Engineering 
  • Social Engineering Attack Examples 
  • Understanding Physical Security 
  • Hardware Locks and Security 
  • Mantraps 
  • Video Surveillance 
  • Fencing 
  • Access List 
  • Proper Lighting 
  • Signs 
  • Guards 
  • Barricades 
  • Biometrics 
  • Protected Distribution 
  • Alarms 
  • Motion Detection 
  • Environmental Controls 
  • HVAC 
  • Fire Suppression 
  • EMI Shielding 
  • Hot and Cold Aisles 
  • Environmental Monitoring 
  • Temperature and Humidity Controls 
  • Control Types 
  • A Control Type Analogy 
  • Data Policies 
  • Destroying a Flash Drive 
  • Some Considerations 
  • Optical Discs 

Chapter 11 Security Administration

  • Third-Party Integration
  • Transitioning 
  • Ongoing Operations 
  • Understanding Security Awareness and Training 
  • Communicating with Users to Raise Awareness 
  • Providing Education and Training 
  • Safety Topics 
  • Training Topics 
  • Classifying Information 
  • Public Information 
  • Private Information 
  • Information Access Controls 
  • Security Concepts 
  • Complying with Privacy and Security Regulations
  • The Health Insurance Portability and Accountability Act
  • The Gramm-Leach-Bliley Act
  • The Computer Fraud and Abuse Act
  • The Family Educational Rights and Privacy Act
  • The Computer Security Act of 1987
  • The Cyberspace Electronic Security Act
  • The Cyber Security Enhancement Act
  • The Patriot Act
  • Familiarizing Yourself with International Efforts
  • Mobile Devices
  • BYOD Issues
  • Alternative Methods to Mitigate Security Risks

Chapter 12 Disaster Recovery and Incident Response

  • Issues Associated with Business Continuity
  • Types of Storage Mechanisms
  • Crafting a Disaster-Recovery Plan
  • Incident Response Policies
  • Understanding Incident Response
  • Succession Planning
  • Tabletop Exercises
  • Reinforcing Vendor Support
  • Service-Level Agreements
  • Code Escrow Agreements
  • Penetration Testing
  • What Should You Test?
  • Vulnerability Scanning
Campus
Book Now
Type
End Date
Start Date

Cape Town, Pinelands
myWay Mentored Learning
06 Apr 2017
03 Apr 2017

Cape Town, Pinelands
Evenings
06 Apr 2017
03 Apr 2017

Cape Town, Pinelands
Evenings
18 May 2017
15 May 2017

Cape Town, Pinelands
myWay Mentored Learning
18 May 2017
15 May 2017

Cape Town, Pinelands
Evenings
29 Jun 2017
26 Jun 2017

Cape Town, Pinelands
myWay Mentored Learning
29 Jun 2017
26 Jun 2017

Campus
Book Now
Type
End Date
Start Date

Sandton, Johannesburg
Evenings
09 Mar 2017
06 Mar 2017

Sandton, Johannesburg
myWay Mentored Learning
09 Mar 2017
06 Mar 2017

Sandton, Johannesburg
Evenings
11 May 2017
08 May 2017

Sandton, Johannesburg
myWay Mentored Learning
11 May 2017
08 May 2017

Sandton, Johannesburg
myWay Mentored Learning
08 Jun 2017
05 Jun 2017

Sandton, Johannesburg
Evenings
08 Jun 2017
05 Jun 2017

Campus
Book Now
Type
End Date
Start Date

Centurion, Pretoria
Evenings
30 Mar 2017
27 Mar 2017

Centurion, Pretoria
myWay Mentored Learning
30 Mar 2017
27 Mar 2017

Centurion, Pretoria
Evenings
25 May 2017
22 May 2017

Centurion, Pretoria
myWay Mentored Learning
25 May 2017
22 May 2017

Centurion, Pretoria
myWay Mentored Learning
22 Jun 2017
19 Jun 2017

Centurion, Pretoria
Evenings
22 Jun 2017
19 Jun 2017



     Number of Attendees:  
     Number of Attendees: