CompTIA Security+ Virtual

CompTIA Security+ Virtual Live Course (Exam SY0-501)

CompTIA Security+ Attend from Anywhere Training utilising the latest in classroom learning

CompTIA Security+ (Security-Plus) Virtual Course for Exam SY0-501

Globally trusted certification to validate foundational, vendor-neutral IT security knowledge and skills - ANSI and ISO standard.

Autumn Deals - Exceptional Offers - VIEW NOW!

Topics ADDED DAILY include: Agile | PRINCE2 | .NET / C# | SQL | Train the Trainer

  • FREE Accommodation for Key Training Events! BOOK NOW!

VIEW VIDEO: Security+ Course »

Security+ Classroom Course »

Security+ Online Live Course ('Attend from Anywhere') Schedule

Date (DMY) *1DurationLocationQA Fee*Fee - Discounts Available
26/11/2018 5 Days Virtual Live Classroom N/A £1195
W/E 08/12/2018 2 Days
Part 1 of 2. Part 2 starting: 15/12/2018 (see below)
Virtual Live Classroom N/A £1195
W/E 15/12/2018 2 Days
Part 2 of 2. Part 1 starting: 08/12/2018 (see above)
Virtual Live Classroom N/A N/A
*1 Event Start 9:00 | End 17:00. Timezone Information: UK Local Time unless Timezone indicated for event. Part-time sessions typically 3 hours duration
Symbols: W/E = Weekend Course MORN = Morning Session AFT = Afternoon Session EVE = Evening Session

* QA pricing from their website 12/08/2018. QA class sizes up to 16 possibly mixed Virtual and In-Person attendees on the same event. Prices INCLUDE VAT.

Book now »

Subscribe for Security+ Online Course offers and updates

* indicates required

Virtual 'Attend from Anywhere' Security+ Course Introduction

Achieve your next career step by attaining this most sought after Cybersecurity certification!

TrainX's Security+ online course is CompTIA authorised and designed to achieve the learning objectives of the SY0-501 as efficiently as possible.

Our in-house trainer is a CompTIA Certified Technical Trainer (CTT+) which validates the trainer's skills in training delivery and has the relevant CompTIA technical certifications along with a broad experience with Microsoft and Cisco technologies.

The SY0-501 online course delivery includes discussions, presentations and a high level of hands-on in a comprehensive CompTIA authorised Security+ course delivery.

Security+ Certification and Related Examinations

To achieve Security+ certification, you'll need to pass the following exam:

  • CompTIA Security+ SY0-501 - foundation-level security skills and knowledge

Our live virtual Security+ course covers the examination syllabus and we provide additional preparation materials and guidance.

The CompTIA Security+ SY0-501

The certification meets ISO 17024 and is owned by CompTIA (Website): Security+ SY0-501

Audience

The Security+ is recognised worldwide as the foundational certification for security experts. Here's a list of just some of the job roles that the Security+ is a foundation for:

  • Security Specialist/Administrator
  • Security ​Consultant
  • Security or ​Systems ​Administrator
  • Network ​Administrator

Contact us for an informal chat about the value of the CompTIA Security+.

At Course Completion

After completing this course, students have covered the CompTIA Security+ exam syllabus (exam SY0-501) which is presented under the follow domains:

  • 1.0 Threats, Attacks and Vulnerabilities
  • 2.0 Technologies and Tools
  • 3.0 Architecture and Design
  • 4.0 Identity and Access Management
  • 5.0 Risk Management
  • 6.0 Cryptography and PKI

The learner will acquire the following skills (covered under one or more of the six domains), allowing them to:

  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them
  • Understand the principles of organizational security and the elements of effective security policies
  • Know the technologies and uses of cryptographic standards and products
  • Install and configure network- and host-based security technologies
  • Describe how wireless and remote access security is enforced
  • Describe the standards and products used to enforce security on web and communications technologies
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery
  • Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them

Contact us to discuss the course objectives.

Prerequisites

The course is suitable for learners who have core IT skills and the following is recommended as a prerequisite:

Please contact us for further information.

Security+ Course Materials

The courseware adheres to CompTIA's strict quality standards and is CompTIA Approved Quality Content (CAQC).

The Security+ requires understanding of Server, PC and Networking technologies and we provide a very comprehensive CompTIA authorised set of virtualised 'labs' during the course and for six months after to ensure that you've relevant 'hands-on' experience.

Course Outline

The public course duration is four or five days. Weekend events are typically delivered over two consecutive weekends. Onsite courses are by arrangement.

Lessons and Activities

Below is the overview of the 6 Domains (knowledge and skill areas). Contact us now for a comprehensive leaflet.

  • 1.0 Threats, Attacks and Vulnerabilities
  • 2.0 Technologies and Tools
  • 3.0 Architecture and Design
  • 4.0 Identity and Access Management
  • 5.0 Risk Management
  • 6.0 Cryptography and PKI

Module 1 / Threats, Attacks, and Vulnerabilities

Indicators of Compromise

  • Why is Security Important?
  • Security Policy
  • Threat Actor Types
  • The Kill Chain
  • Social Engineering
  • Phishing
  • Malware Types
  • Trojans and Spyware
  • Open Source Intelligence
  • Labs
  • VM Orientation
  • Malware Types

Critical Security Controls

  • Security Control Types
  • Defense in Depth
  • Frameworks and Compliance
  • Vulnerability Scanning and Pen Tests
  • Security Assessment Techniques
  • Pen Testing Concepts
  • Vulnerability Scanning Concepts
  • Exploit Frameworks
  • Lab
  • Using Vulnerability Assessment Tools

Security Posture Assessment Tools

  • Topology Discovery
  • Service Discovery
  • Packet Capture
  • Packet Capture Tools
  • Remote Access Trojans
  • Honeypots and Honeynets
  • Labs
  • Using Network Scanning Tools 1
  • Using Network Scanning Tools 2
  • Using Steganography Tools

Incident Response

  • Incident Response Procedures
  • Preparation Phase
  • Identification Phase
  • Containment Phase
  • Eradication and Recovery Phases

Module 2 / Identity and Access Management

Cryptography

  • Uses of Cryptography
  • Cryptographic Terminology and Ciphers
  • Cryptographic Products
  • Hashing Algorithms
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Diffie-Hellman and Elliptic Curve
  • Transport Encryption
  • Cryptographic Attacks
  • Lab
  • Implementing Public Key Infrastructure

Public Key Infrastructure

  • PKI Standards
  • Digital Certificates
  • Certificate Authorities
  • Types of Certificate
  • Implementing PKI
  • Storing and Distributing Keys
  • Key Status and Revocation
  • PKI Trust Models
  • PGP / GPG
  • Lab
  • Deploying Certificates and Implementing Key Recovery

Identification and Authentication

  • Access Control Systems
  • Identification
  • Authentication
  • LAN Manager / NTLM
  • Kerberos
  • PAP, CHAP, and MS-CHAP
  • Password Attacks
  • Token-based Authentication
  • Biometric Authentication
  • Common Access Card
  • Lab
  • Using Password Cracking Tools

Identity and Access Services

  • Authorization
  • Directory Services
  • RADIUS and TACACS+
  • Federation and Trusts
  • Federated Identity Protocols

Account Management

  • Formal Access Control Models
  • Account Types
  • Windows Active Directory
  • Creating and Managing Accounts
  • Account Policy Enforcement
  • Credential Management Policies
  • Account Restrictions
  • Accounting and Auditing
  • Lab
  • Using Account Management Tools

Module 3 / Architecture and Design (1)

Secure Network Design

  • Network Zones and Segments
  • Subnetting
  • Switching Infrastructure
  • Switching Attacks and Hardening
  • Endpoint Security
  • Network Access Control
  • Routing Infrastructure
  • Network Address Translation
  • Software Defined Networking
  • Lab
  • Implementing a Secure Network Design

Firewalls and Load Balancers

  • Basic Firewalls
  • Stateful Firewalls
  • Implementing a Firewall or Gateway
  • Web Application Firewalls
  • Proxies and Gateways
  • Denial of Service Attacks
  • Load Balancers
  • Lab
  • Implementing a Firewall

IDS and SIEM

  • Intrusion Detection Systems
  • Configuring IDS
  • Log Review and SIEM
  • Data Loss Prevention
  • Malware and Intrusion Response
  • Lab
  • Using an Intrusion Detection System

Secure Wireless Access

  • Wireless LANs
  • WEP and WPA
  • Wi-Fi Authentication
  • Extensible Authentication Protocol
  • Additional Wi-Fi Security Settings
  • Wi-Fi Site Security
  • Personal Area Networks

Physical Security Controls

  • Site Layout and Access
  • Gateways and Locks
  • Alarm Systems
  • Surveillance
  • Hardware Security
  • Environmental Controls

Module 4 / Architecture and Design (2)

Secure Protocols and Services

  • DHCP Security
  • DNS Security
  • Network Management Protocols
  • HTTP and Web Servers
  • SSL / TSL and HTTPS
  • Web Security Gateways
  • Email Services
  • S/MIME
  • File Transfer
  • Voice and Video Services
  • VoIP
  • Labs
  • Implementing Secure Network Addressing Services
  • Configuring a Secure Email Service

Secure Remote Access

  • Remote Access Architecture
  • Virtual Private Networks
  • IPSec
  • Remote Access Servers
  • Remote Administration Tools
  • Hardening Remote Access Infrastructure
  • Lab
  • Implementing a Virtual Private Network

Secure Systems Design

  • Trusted Computing
  • Hardware / Firmware Security
  • Peripheral Device Security
  • Secure Configurations
  • OS Hardening
  • Patch Management
  • Embedded Systems
  • Security for Embedded Systems

Secure Mobile Device Services

  • Mobile Device Deployments
  • Mobile Connection Methods
  • Mobile Access Control Systems
  • Enforcement and Monitoring

Secure Virtualization and Cloud Services

  • Virtualization Technologies
  • Virtualization Security Best Practices
  • Cloud Computing
  • Cloud Security Best Practices

Module 5 / Risk Management

Forensics

  • Forensic Procedures
  • Collecting Evidence
  • Capturing System Images
  • Handling and Analyzing Evidence
  • Lab
  • Using Forensic Tools

Disaster Recovery and Resiliency

  • Continuity of Operations Plans
  • Disaster Recovery Planning
  • Resiliency Strategies
  • Recovery Sites
  • Backup Plans and Policies
  • Resiliency and Automation Strategies

Risk Management

  • Business Impact Analysis
  • Identification of Critical Systems
  • Risk Assessment
  • Risk Mitigation

Secure Application Development

  • Application Vulnerabilities
  • Application Exploits
  • Web Browser Exploits
  • Secure Application Design
  • Secure Coding Concepts
  • Auditing Applications
  • Secure DevOps
  • Lab
  • Identifying a Man-in-the-Browser Attack

Organizational Security

  • Corporate Security Policy
  • Personnel Management Policies
  • Interoperability Agreements
  • Data Roles
  • Data Sensitivity Labeling and Handling
  • Data Wiping and Disposal
  • Privacy and Employee Conduct Policies
  • Security Policy Training

© 2018 TrainX Limited | Privacy Policy | Attend Anywhere Security+ Online | Virtual Security Plus Course