Processing...

Home > Comptia Security + (security Specialist)

Computer Courses

Computer Literacy, Technician and Networking Courses for each skill level.

Contact Request


South Africa's largest short course provider

CompTIA Security + (Security Specialist)  

Overview

If you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ course is one of the most valuable courses available and so is the certification. Since its introduction in 2002, over a quarter million professionals have attended the Security+ course and took the certification, itself a springboard to prestigious certifications like the CASP, CISSP, and CISA. The CompTIA Security+ course and Study Guide: SY0-401 covers 100% of the Security+ exam objectives, with clear and concise information on crucial security topics.

 

If you're serious about jump-starting your security career, you need the kind of thorough preparation included in the CompTIA Security+ Study Guide: SY0-401.

 

This course will prepare you to write the CompTIA Security + Exam (SY0-401). The CompTIA Security + certification is globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

 

Prerequisites

CompTIA Network+ and/or two years of experience in IT administration with a security focus

Course Accreditations

Learnfast is a CompTIA Authorized Partner. CompTIA’s Authorised Partner Programme works collaboratively with organisations throughout the globe to increase market impact, customer satisfaction and revenue to enhance student career opportunities.

 


Did you know? Learnfast won the CompTIA award for the fastest growing partner in the past financial year. View the certificate HERE.


Who Should Attend

IT Professional hoping to progress in your career.

  • Anyone looking for a career in:
    • Security Specialist/Administrator
    • Security ​Consultant
    • Security or ​Systems ​Administrator
    • Network ​Administrator

Price

 

R7400.00 per person incl. VAT (Full-Time & Part Time) LEARN MORE >
R6,500.00 per person excl. VAT (Distance Learning/Online Learning) LEARN MORE>

PLEASE NOTE: Learnfast serves a full lunch during break as well as coffee, tea and biscuits as part at no extra cost. We also cater for special meals. 

Your fee will include your full study guide, notepad, pen and USB with supporting video tutorials.

 

Duration

4 Days (08:30 - 16:00)

Skill Level

  • Beginners

Our myWay Learning Methods

Our innovative "myWay” learning methodology is built around the students individual learning requirement, allowing each student to learn in a style that is most suitable for their skills set, knowledge and schedule.

Instructor-Led Classes

Reach your full potential through our “myWay Instructor-Led” classes combined with interactive lessons, supporting video content, practical assignments and in field experience. We deliver instructor led classes full time, part-time, weekends and onsite.

Read More

Mentored Learning

The "myWay Mentored Learning” was created in response for more flexible learning schedules and focused content. It allows each student to progress in a manner that is most suitable for their skills set, knowledge and schedule that a fixed, lecture based approach does not allow for. You will be mentored on a one to one basis by a subject matter expert with continues practical exposure and focus on problem areas, allowing you to progress at your own pace and deciding what content requires more or less time.

Read More

Distance Learning

Do a course at your own pace via our “myWay Distance Learning”. We have re-defined studying via online by combining self-study with supported interactive online video lectures, extra resources, questionnaires and much more, all supported via out Online Student Portal. You will get a course coach and lecturer assigned to you so that you never feel alone and have support whenever you need. Your coach will look after you and your study health, encouraging you to progress constantly.

Read More

Why CompTIA Security+?


Watch this video explaining how CompTIA Security + will give you the skills secure a network and deter hackers and you’re ready for the job.

Important Notes

  • Students are to be at the training venue by 08h00 in preparation for a 08h30 start time.
  • Learnfast retains the right to change this calendar without any notification.
  • Bookings are only confirmed upon receipt of the proof of payment or an official company purchase order for the full amount of the training.
  • For full day courses Learnfast will supply you with the relevant training material. A desktop computer to use for the training (where applicable), tea/coffee and a full lunch for full day InClass training hosted at Learnfast only. Catering is not included for OnSite training and laptop is available for hire at an additional cost if required.
  • Cancellation or rescheduling requests must be in writing and reach us via fax or email at least 5 (five) working days prior to the course commencement date. Full course fees may be retained for no shows or requests within 5 working days prior to commencement.
  • Although we go to great lengths to ensure that all training proceeds as scheduled, Learnfast reserves the right to cancel or postpone dates if we require to do so and undertake to inform clients in writing and telephonically of these changes.
  • Learnfast suggests clients wait until a week prior to course commencement that a course has been confirmed to go ahead as scheduled before booking flight and accommodation. Learnfast is NOT responsible for cost associated with cancellation of classes such as flight and accommodation for clients.

Chapter 1 Measuring and Weighing Risk

  • Risk Assessment
  • Computing Risk Assessment
  • Acting on Your Risk Assessment
  • Risks Associated with Cloud Computing 
  • Risks Associated with Virtualization
  • Developing Policies, Standards, and Guidelines
  • Implementing Policies
  • Understanding Control Types and False Positives/Negatives
  • Risk Management Best Practices
  • Disaster Recovery
  • Tabletop Exercise

Chapter 2 Monitoring and Diagnosing Networks

  • Monitoring Networks
  • Network Monitors
  • Understanding Hardening
  • Working with Services
  • Patches
  • User Account Control
  • Filesystems
  • Securing the Network
  • Security Posture
  • Continuous Security Monitoring
  • Setting a Remediation Policy
  • Reporting Security Issues
  • Alarms
  • Alerts
  • Trends
  • Differentiating between Detection Controls and Prevention Controls

Chapter 3 Understanding Devices and Infrastructure

  • Mastering TCP/IP
  • OSI Relevance
  • Working with the TCP/IP Suite
  • IPv4 and IPv6
  • Understanding Encapsulation
  • Working with Protocols and Services
  • Designing a Secure Network
  • Demilitarized Zones
  • Subnetting
  • Virtual Local Area Networks
  • Remote Access
  • Network Address Translation
  • Telephony
  • Network Access Control
  • Understanding the Various Network Infrastructure Devices
  • Firewalls
  • Routers
  • Switches
  • Load Balancers
  • Proxies
  • Web Security Gateway
  • VPNs and VPN Concentrators
  • Intrusion Detection Systems
  • Understanding Intrusion Detection Systems
  • IDS vs. IPS
  • Working with a Network-Based IDS
  • Working with a Host-Based IDS
  • Working with NIPSs
  • Protocol Analyzers
  • Spam Filters
  • UTM Security Appliances

Chapter 4 Access Control, Authentication, and Authorization

  • Understanding Access Control Basics
  • Identification vs. Authentication
  • Authentication (Single Factor) and Authorization
  • Multifactor Authentication
  • Layered Security and Defense in Depth
  • Network Access Control
  • Tokens
  • Federations
  • Potential Authentication and Access Problems
  • Authentication Issues to Consider
  • Authentication Protocols
  • Account Policy Enforcement
  • Users with Multiple Accounts/Roles
  • Generic Account Prohibition
  • Group-based and User-assigned Privileges
  • Understanding Remote Access Connectivity
  • Using the Point-to-Point Protocol
  • Working with Tunneling Protocols
  • Working with RADIUS
  • TACACS/TACACS+/XTACACS
  • VLAN Management
  • SAML 
  • Understanding Authentication Services
  • LDAP 
  • Kerberos
  • Single Sign-On Initiatives
  • Understanding Access Control
  • Mandatory Access Control
  • Discretionary Access Control
  • Role-Based Access Control
  • Rule-Based Access Control
  • Implementing Access Controlling Best Practices
  • Least Privileges
  • Separation of Duties
  • Time of Day Restrictions
  • User Access Review
  • Smart Cards
  • Access Control Lists
  • Port Security
  • Working with 802.1X
  • Flood Guards and Loop Protection
  • Preventing Network Bridging
  • Log Analysis
  • Trusted OS
  • Secure Router Configuration 

Chapter 5 Protecting Wireless Networks

  • Working with Wireless Systems
  • IEEE 802.11x Wireless Protocols 
  • WEP/WAP/WPA/WPA2 
  • Wireless Transport Layer Security
  • Understanding Wireless Devices
  • Wireless Access Points
  • Extensible Authentication Protocol
  • Lightweight Extensible Authentication Protocol
  • Protected Extensible Authentication Protocol
  • Wireless Vulnerabilities to Know
  • Wireless Attack Analogy

Chapter 6 Securing the Cloud

  • Working with Cloud Computing
  • Software as a Service (SaaS)
  • Platform as a Service (PaaS)
  • Infrastructure as a Service (IaaS)
  • Private Cloud 
  • Public Cloud 
  • Community Cloud 
  • Hybrid Cloud 
  • Working with Virtualization 
  • Snapshots 
  • Patch Compatibility 
  • Host Availability/Elasticity
  • Security Control Testing 
  • Sandboxing 
  • Security and the Cloud 
  • Cloud Storage

Chapter 7 Host, Data, and Application Security

  • Application Hardening
  • Databases and Technologies
  • Fuzzing
  • Secure Coding
  • Application Configuration Baselining
  • Operating System Patch Management
  • Application Patch Management
  • Host Security
  • Permissions
  • Access Control Lists
  • Antimalware 
  • Host Software Baselining 
  • Hardening Web Servers 
  • Hardening Email Servers 
  • Hardening FTP Servers 
  • Hardening DNS Servers 
  • Hardening DHCP Services 
  • Protecting Data Through Fault Tolerance
  • Backups 
  • RAID
  • Clustering and Load Balancing 
  • Application Security 
  • Best Practices for Security 
  • Data Loss Prevention
  • Hardware-Based Encryption Devices 

Chapter 8 Cryptography 

  • An Overview of Cryptography
  • Historical Cryptography
  • Modern Cryptography
  • Working with Symmetric Algorithms
  • Working with Asymmetric Algorithms
  • What Cryptography Should You Use?
  • Hashing Algorithms
  • Rainbow Tables and Salt
  • Key Stretching 
  • Understanding Quantum Cryptography 
  • Cryptanalysis Methods 
  • Wi-Fi Encryption
  • Using Cryptographic Systems 
  • Confidentiality and Strength
  • Integrity 
  • Digital Signatures 
  • Authentication
  • Nonrepudiation 
  • Key Features 
  • Understanding Cryptography Standards and Protocols 
  • The Origins of Encryption Standards 
  • Public-Key Infrastructure X.509/Public-Key Cryptography Standards 
  • X.509 
  • SSL and TLS 
  • Certificate Management Protocols 
  • Secure Multipurpose Internet Mail Extensions 
  • Secure Electronic Transaction 
  • Secure Shell 
  • Pretty Good Privacy 
  • HTTP Secure 
  • Secure HTTP 
  • IP Security 
  • Tunneling Protocols 
  • Federal Information Processing Standard 
  • Using Public-Key Infrastructure 
  • Using a Certificate Authority 
  • Working with Registration Authorities and Local Registration Authorities 
  • Implementing Certificates 
  • Understanding Certificate Revocation 
  • Implementing Trust Models 
  • Hardware-Based Encryption Devices 
  • Data Encryption 

Chapter 9 Malware, Vulnerabilities, and Threats

  • Understanding Malware
  • Surviving Viruses
  • Symptoms of a Virus Infection
  • How Viruses Work 
  • Types of Viruses 
  • Managing Spam to Avoid Viruses 
  • Antivirus Software 
  • Understanding Various Types of Attacks 
  • Identifying Denial-of-Service and Distributed Denial-of-Service Attacks 
  • Spoofing Attacks 
  • Pharming Attacks 
  • Phishing, Spear Phishing, and Vishing 
  • Xmas Attack 
  • Man-in-the-Middle Attacks 
  • Replay Attacks 
  • Smurf Attacks 
  • Password Attacks 
  • Privilege Escalation 
  • Malicious Insider Threats 
  • Transitive Access 
  • Client-Side Attacks 
  • Typo Squatting and URL Hijacking 
  • Watering Hole Attack 
  • Identifying Types of Application Attacks 
  • Cross-Site Scripting and Forgery 
  • SQL Injection 
  • LDAP Injection 
  • XML Injection 
  • Directory Traversal/Command Injection 
  • Buffer Overflow 
  • Integer Overflow 
  • Zero-Day Exploits 
  • Cookies and Attachments 
  • Locally Shared Objects and Flash Cookies 
  • Malicious Add-Ons 
  • Session Hijacking 
  • Header Manipulation 
  • Arbitrary Code and Remote Code Execution 
  • Tools for Finding Threats 
  • Interpreting Assessment Results 
  • Tools to Know 
  • Risk Calculations and Assessment Types 

Chapter 10 Social Engineering and Other Foes

  • Understanding Social Engineering 
  • Types of Social Engineering Attacks 
  • What Motivates an Attack? 
  • The Principles Behind Social Engineering 
  • Social Engineering Attack Examples 
  • Understanding Physical Security 
  • Hardware Locks and Security 
  • Mantraps 
  • Video Surveillance 
  • Fencing 
  • Access List 
  • Proper Lighting 
  • Signs 
  • Guards 
  • Barricades 
  • Biometrics 
  • Protected Distribution 
  • Alarms 
  • Motion Detection 
  • Environmental Controls 
  • HVAC 
  • Fire Suppression 
  • EMI Shielding 
  • Hot and Cold Aisles 
  • Environmental Monitoring 
  • Temperature and Humidity Controls 
  • Control Types 
  • A Control Type Analogy 
  • Data Policies 
  • Destroying a Flash Drive 
  • Some Considerations 
  • Optical Discs 

Chapter 11 Security Administration

  • Third-Party Integration
  • Transitioning 
  • Ongoing Operations 
  • Understanding Security Awareness and Training 
  • Communicating with Users to Raise Awareness 
  • Providing Education and Training 
  • Safety Topics 
  • Training Topics 
  • Classifying Information 
  • Public Information 
  • Private Information 
  • Information Access Controls 
  • Security Concepts 
  • Complying with Privacy and Security Regulations
  • The Health Insurance Portability and Accountability Act
  • The Gramm-Leach-Bliley Act
  • The Computer Fraud and Abuse Act
  • The Family Educational Rights and Privacy Act
  • The Computer Security Act of 1987
  • The Cyberspace Electronic Security Act
  • The Cyber Security Enhancement Act
  • The Patriot Act
  • Familiarizing Yourself with International Efforts
  • Mobile Devices
  • BYOD Issues
  • Alternative Methods to Mitigate Security Risks

Chapter 12 Disaster Recovery and Incident Response

  • Issues Associated with Business Continuity
  • Types of Storage Mechanisms
  • Crafting a Disaster-Recovery Plan
  • Incident Response Policies
  • Understanding Incident Response
  • Succession Planning
  • Tabletop Exercises
  • Reinforcing Vendor Support
  • Service-Level Agreements
  • Code Escrow Agreements
  • Penetration Testing
  • What Should You Test?
  • Vulnerability Scanning
Campus
Book Now
Type
End Date
Start Date

Cape Town, Pinelands
myWay Mentored Learning
29 Jun 2017
26 Jun 2017

Cape Town, Pinelands
Evenings
29 Jun 2017
26 Jun 2017

Cape Town, Pinelands
Evenings
27 Jul 2017
24 Jul 2017

Cape Town, Pinelands
myWay Mentored Learning
27 Jul 2017
24 Jul 2017

Cape Town, Pinelands
myWay Mentored Learning
07 Sep 2017
04 Sep 2017

Cape Town, Pinelands
Evenings
07 Sep 2017
04 Sep 2017

Cape Town, Pinelands
Evenings
12 Oct 2017
09 Oct 2017

Cape Town, Pinelands
myWay Mentored Learning
12 Oct 2017
09 Oct 2017

Cape Town, Pinelands
myWay Mentored Learning
23 Nov 2017
20 Nov 2017

Cape Town, Pinelands
Evenings
23 Nov 2017
20 Nov 2017

Campus
Book Now
Type
End Date
Start Date

Centurion, Pretoria
Evenings
20 Jul 2017
17 Jul 2017

Centurion, Pretoria
myWay Mentored Learning
20 Jul 2017
17 Jul 2017

Centurion, Pretoria
Evenings
03 Aug 2017
31 Jul 2017

Centurion, Pretoria
In-Class
17 Aug 2017
14 Aug 2017

Centurion, Pretoria
Evenings
17 Aug 2017
14 Aug 2017

Centurion, Pretoria
Evenings
14 Sep 2017
11 Sep 2017

Centurion, Pretoria
myWay Mentored Learning
14 Sep 2017
11 Sep 2017

Centurion, Pretoria
myWay Mentored Learning
19 Oct 2017
16 Oct 2017

Centurion, Pretoria
Evenings
19 Oct 2017
16 Oct 2017

Centurion, Pretoria
Evenings
16 Nov 2017
13 Nov 2017

Campus
Book Now
Type
End Date
Start Date

Sandton, Johannesburg
myWay Mentored Learning
06 Jul 2017
03 Jul 2017

Sandton, Johannesburg
Evenings
06 Jul 2017
03 Jul 2017

Campus
Book Now
Type
End Date
Start Date

Midrand, Johannesburg
Evenings
03 Aug 2017
31 Jul 2017

Midrand, Johannesburg
myWay Mentored Learning
03 Aug 2017
31 Jul 2017

Midrand, Johannesburg
myWay Mentored Learning
31 Aug 2017
28 Aug 2017

Midrand, Johannesburg
Evenings
31 Aug 2017
28 Aug 2017

Midrand, Johannesburg
Evenings
05 Oct 2017
02 Oct 2017

Midrand, Johannesburg
myWay Mentored Learning
05 Oct 2017
02 Oct 2017

Midrand, Johannesburg
myWay Mentored Learning
02 Nov 2017
30 Oct 2017

Midrand, Johannesburg
Evenings
02 Nov 2017
30 Oct 2017

Midrand, Johannesburg
Evenings
30 Nov 2017
27 Nov 2017

Midrand, Johannesburg
myWay Mentored Learning
30 Nov 2017
27 Nov 2017


 In-Class    Onsite    Distance Learning