Security+ Sheffield Course

CompTIA Security+ Sheffield Course (Exam SY0-501)

Official CompTIA Security+ Yorkshire training utilising the latest in classroom learning

CompTIA Security+ (Security-Plus) Sheffield Course for Exam SY0-501

Worldwide recognised vendor-neutral essential IT networking certification - ANSI and ISO standard.

Autumn Deals - Exceptional Offers - VIEW NOW!

Topics ADDED DAILY include: Agile | PRINCE2 | .NET / C# | SQL | Train the Trainer

  • FREE Accommodation for Key Training Events! BOOK NOW!

VIEW VIDEO: Security+ Course »

Security+ Virtual Classroom Course »

Security+ Course Sheffield (Yorkshire) Schedule

Date (DMY) *1DurationLocationQA Fee*Fee - Discounts Available
26/11/2018 5 Days Central Sheffield N/A £1195
*1 Event Start 9:00 | End 17:00. Timezone Information: UK Local Time unless Timezone indicated for event. Part-time sessions typically 3 hours duration
Symbols: W/E = Weekend Course MORN = Morning Session AFT = Afternoon Session EVE = Evening Session

* QA pricing from their website 12/08/2018. QA class sizes up to 16 possibly mixed Virtual and In-Person attendees on the same event. Prices INCLUDE VAT.

Book now »


Subscribe for Security+ Sheffield offers and updates

* indicates required

Security+ Sheffield Course Introduction

Achieve your next career step by attaining this most sought after Cybersecurity certification!

TrainX's Security+ course in Sheffield, Yorkshire is CompTIA authorised and designed to achieve the learning objectives of the required examination as efficiently as possible.

Our in-house trainer is a CompTIA Certified Technical Trainer (CTT+) which validates the trainer's skills in classroom training delivery and has the relevant CompTIA technical certifications along with a broad experience with Microsoft and Cisco technologies.

The course delivery includes discussions, presentations and a high level of hands-on with real hardware including PCs, hubs, cabling and routers.

Security+ Certification and Related Examinations

To achieve Security+ certification, you'll need to pass the following exam:

  • CompTIA Security+ SY0-501 - foundation-level security skills and knowledge

The CompTIA Security+ Certification

The certification meets ISO 17024 and is owned by CompTIA (Website): CompTIA Security+

Our Sheffield Security+ course covers the SY0-501 examination syllabus (we've now closed off the the SY0-401 courses) and we provide additional preparation materials, including the MeasureUP Practice Test for SY0-501 and examination succcess guidance.

Audience

The Security+ is recognised worldwide as the foundational certification for security experts. Here's a list of just some of the job roles that the Security+ is a foundation for:

  • Security Specialist/Administrator
  • Security ​Consultant
  • Security or ​Systems ​Administrator
  • Network ​Administrator

Contact us for an informal chat about the value of the CompTIA Security+.

At Course Completion

After completing this course, students have covered the CompTIA Security+ exam syllabus (exam SY0-501) which is presented under the follow domains:

  • 1.0 Threats, Attacks and Vulnerabilities
  • 2.0 Technologies and Tools
  • 3.0 Architecture and Design
  • 4.0 Identity and Access Management
  • 5.0 Risk Management
  • 6.0 Cryptography and PKI

Contact us to discuss the course objectives.

Prerequisites

The course is suitable for learners who have core IT skills and the following is recommended as a prerequisite:

Please contact us for further information.

Security+ Course Materials

The courseware adheres to CompTIA's strict quality standards and is CompTIA Approved Quality Content (CAQC).

The Security+ requires understanding of Server, PC and Networking technologies and we provide a very comprehensive CompTIA authorised set of 'labs' during the course to ensure you've relevant 'hands-on' experience.

Course Outline - Days One through Five

The public course duration is five days - for onsite courses this may be varied.

Below is the overview of the 6 Domains (knowledge and skill areas). The course design is based on the listed domains and provides in-depth concepts and hands-on skill development for each.

  • 1.0 Threats, Attacks and Vulnerabilities
  • 2.0 Technologies and Tools
  • 3.0 Architecture and Design
  • 4.0 Identity and Access Management
  • 5.0 Risk Management
  • 6.0 Cryptography and PKI

Module 1 / Threats, Attacks, and Vulnerabilities

Indicators of Compromise

  • Why is Security Important?
  • Security Policy
  • Threat Actor Types
  • The Kill Chain
  • Social Engineering
  • Phishing
  • Malware Types
  • Trojans and Spyware
  • Open Source Intelligence
  • Labs
  • VM Orientation
  • Malware Types

Critical Security Controls

  • Security Control Types
  • Defense in Depth
  • Frameworks and Compliance
  • Vulnerability Scanning and Pen Tests
  • Security Assessment Techniques
  • Pen Testing Concepts
  • Vulnerability Scanning Concepts
  • Exploit Frameworks
  • Lab
  • Using Vulnerability Assessment Tools

Security Posture Assessment Tools

  • Topology Discovery
  • Service Discovery
  • Packet Capture
  • Packet Capture Tools
  • Remote Access Trojans
  • Honeypots and Honeynets
  • Labs
  • Using Network Scanning Tools 1
  • Using Network Scanning Tools 2
  • Using Steganography Tools

Incident Response

  • Incident Response Procedures
  • Preparation Phase
  • Identification Phase
  • Containment Phase
  • Eradication and Recovery Phases

Module 2 / Identity and Access Management

Cryptography

  • Uses of Cryptography
  • Cryptographic Terminology and Ciphers
  • Cryptographic Products
  • Hashing Algorithms
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Diffie-Hellman and Elliptic Curve
  • Transport Encryption
  • Cryptographic Attacks
  • Lab
  • Implementing Public Key Infrastructure

Public Key Infrastructure

  • PKI Standards
  • Digital Certificates
  • Certificate Authorities
  • Types of Certificate
  • Implementing PKI
  • Storing and Distributing Keys
  • Key Status and Revocation
  • PKI Trust Models
  • PGP / GPG
  • Lab
  • Deploying Certificates and Implementing Key Recovery

Identification and Authentication

  • Access Control Systems
  • Identification
  • Authentication
  • LAN Manager / NTLM
  • Kerberos
  • PAP, CHAP, and MS-CHAP
  • Password Attacks
  • Token-based Authentication
  • Biometric Authentication
  • Common Access Card
  • Lab
  • Using Password Cracking Tools

Identity and Access Services

  • Authorization
  • Directory Services
  • RADIUS and TACACS+
  • Federation and Trusts
  • Federated Identity Protocols

Account Management

  • Formal Access Control Models
  • Account Types
  • Windows Active Directory
  • Creating and Managing Accounts
  • Account Policy Enforcement
  • Credential Management Policies
  • Account Restrictions
  • Accounting and Auditing
  • Lab
  • Using Account Management Tools

Module 3 / Architecture and Design (1)

Secure Network Design

  • Network Zones and Segments
  • Subnetting
  • Switching Infrastructure
  • Switching Attacks and Hardening
  • Endpoint Security
  • Network Access Control
  • Routing Infrastructure
  • Network Address Translation
  • Software Defined Networking
  • Lab
  • Implementing a Secure Network Design

Firewalls and Load Balancers

  • Basic Firewalls
  • Stateful Firewalls
  • Implementing a Firewall or Gateway
  • Web Application Firewalls
  • Proxies and Gateways
  • Denial of Service Attacks
  • Load Balancers
  • Lab
  • Implementing a Firewall

IDS and SIEM

  • Intrusion Detection Systems
  • Configuring IDS
  • Log Review and SIEM
  • Data Loss Prevention
  • Malware and Intrusion Response
  • Lab
  • Using an Intrusion Detection System

Secure Wireless Access

  • Wireless LANs
  • WEP and WPA
  • Wi-Fi Authentication
  • Extensible Authentication Protocol
  • Additional Wi-Fi Security Settings
  • Wi-Fi Site Security
  • Personal Area Networks

Physical Security Controls

  • Site Layout and Access
  • Gateways and Locks
  • Alarm Systems
  • Surveillance
  • Hardware Security
  • Environmental Controls

Module 4 / Architecture and Design (2)

Secure Protocols and Services

  • DHCP Security
  • DNS Security
  • Network Management Protocols
  • HTTP and Web Servers
  • SSL / TSL and HTTPS
  • Web Security Gateways
  • Email Services
  • S/MIME
  • File Transfer
  • Voice and Video Services
  • VoIP
  • Labs
  • Implementing Secure Network Addressing Services
  • Configuring a Secure Email Service

Secure Remote Access

  • Remote Access Architecture
  • Virtual Private Networks
  • IPSec
  • Remote Access Servers
  • Remote Administration Tools
  • Hardening Remote Access Infrastructure
  • Lab
  • Implementing a Virtual Private Network

Secure Systems Design

  • Trusted Computing
  • Hardware / Firmware Security
  • Peripheral Device Security
  • Secure Configurations
  • OS Hardening
  • Patch Management
  • Embedded Systems
  • Security for Embedded Systems

Secure Mobile Device Services

  • Mobile Device Deployments
  • Mobile Connection Methods
  • Mobile Access Control Systems
  • Enforcement and Monitoring

Secure Virtualization and Cloud Services

  • Virtualization Technologies
  • Virtualization Security Best Practices
  • Cloud Computing
  • Cloud Security Best Practices

Module 5 / Risk Management

Forensics

  • Forensic Procedures
  • Collecting Evidence
  • Capturing System Images
  • Handling and Analyzing Evidence
  • Lab
  • Using Forensic Tools

Disaster Recovery and Resiliency

  • Continuity of Operations Plans
  • Disaster Recovery Planning
  • Resiliency Strategies
  • Recovery Sites
  • Backup Plans and Policies
  • Resiliency and Automation Strategies

Risk Management

  • Business Impact Analysis
  • Identification of Critical Systems
  • Risk Assessment
  • Risk Mitigation

Secure Application Development

  • Application Vulnerabilities
  • Application Exploits
  • Web Browser Exploits
  • Secure Application Design
  • Secure Coding Concepts
  • Auditing Applications
  • Secure DevOps
  • Lab
  • Identifying a Man-in-the-Browser Attack

Organizational Security

  • Corporate Security Policy
  • Personnel Management Policies
  • Interoperability Agreements
  • Data Roles
  • Data Sensitivity Labeling and Handling
  • Data Wiping and Disposal
  • Privacy and Employee Conduct Policies
  • Security Policy Training

© 2018 TrainX Limited | Privacy Policy | Security+ Sheffield Training | Security Plus Course Yorkshire