Search in
Courses Providers, List Your Courses for FREE
Menu
Subjects Covered & Categories
Basic Details
Medium of instruction:English
Overview, Content & Syllabus

Introduction

The skills and knowledge measured by the Security+ examination were derived and validated though input from a committee and over 1,000 subject matter experts representative of industry. A job task analysis (JTA), global survey, beta examination and beta results review were each milestones in the development process. The results of these milestones were used in weighing the domains and ensuring that the weighting assigned to each domain is representative of the relative importance of the content.
The Security+ certification is an internationally recognized validation of the technical knowledge required of foundation-level security practitioners. A Security+ certified individual has successfully proven holding a foundation-level of skill and knowledge in General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography and Operational / Organizational Security. Candidates are ecommended to have two years experience in a networking role with preexisting knowledge of TCP/IP, experience in a security related role, Network+ or equivalent certification, and adequate training and self-study materials.
All candidates are encouraged to review the Security+ objectives thoroughly prior to attempting the exam. This examination includes blueprint weighting, test objectives and example content. Example concepts are included to clarify the test objectives and should not be construed as a comprehensive listing of the content of the examination.

The table below lists the domains measured by this examination and the extent to which they are represented in the
examination.

 

CompTIA Security+ Certification Domains

% of Exam

1.0 General Security Concepts

30.00%

2.0 Communication Security

20.00%

3.0 Infrastructure Security

20.00%

4.0 Basics of Cryptography

15.00%

5.0 Operational / Organizational Security

15.00%

 

Chapter 1. General Security Concepts

  • Understanding Information Security

  • Securing the Physical Environment

  • Examining Operational Security

  • Working with Management and Policies

  • Understanding the Goals of Information Security

  • Comprehending the Security Process

  • Appreciating Antivirus Software

  • Implementing Access Control

  • Understanding Authentication

  • Understanding Networking Services and Protocols

  • Distinguishing Between Security Topologies

  • Setting Design Goals

  • Creating Security Zones

  • Working with Newer Technologies

  • Business Concerns to Be Aware Of Summary

 

Exam Essentials

Hands – On Labs

Lab 1.1: Update a Linux System

Lab 1.2: Update a Windows – Based System

Review Questions

Answers to Review Questions

 

Chapter 2. Identifying Potential Risks

  • Calculating Attack Strategies

  • Types of Access Attacks

  • Recognizing Modification and Repudiation Attacks

  • Identifying Denial – of – Service (DoS) and Distributed DoS

  • (DDoS) Attacks

  • Recognizing Common Attacks

  • Back Door Attacks

  • Spoofing Attacks

  • Man-in-the-Middle Attacks

  • Replay Attacks

  • Password-Guessing Attacks dentifying TCP/IP Security Concerns

  • Working with the TCP/IP Protocol Suite Encapsulation

  • Working with Protocols and Services

  • Recognizing TCP/IP Attacks Understanding Software Exploitation

  • Surviving Malicious Code

  • Viruses

  • Trojan Horses

  • Logic Bombs

  • Worms

  • Antivirus Software

  • Understanding Social Engineering

  • An Introduction to Auditing Processes and Files

  • Summary

 

Exam Essentials

Hands-on Labs

Lab 2.1: Identify Running Processes

On a Windows-Based Machine

Lab 2.2: Identify Running Processes

On a Linux-Based Machine

Review Questions

Answers to Review Questions

 

Chapter 3. Infrastructure and Connectivity

  • Understanding Infrastructure Security

  • Working with Hardware Components

  • Working with Software Components

  • Understanding the Different Network Infrastructure Devices Firewalls

  • Hubs

  • Routers

  • Switches

  • Wireless Access Points

  • Modems

  • Remote Access Services

  • Telecom/PBX System

  • Virtual Private Networks

  • Monitoring and Diagnosing Networks

  • Network Monitors

  • Securing Workstations and Servers

  • Understanding Mobile Devices

  • Understanding Remote Access Using the Point –to –Point Protocol

  • Tunneling Protocols

  • 802.1x Wireless Protocols

  • RADIUS

  • TACACS/+

  • Securing Internet Connections

  • Working with Ports and Sockets

  • Working with E-mail

  • Working with the Web

  • Working with the File Transfer Protocol

  • Understanding SNMP and Other TCP/IP Protocols

  • The Basics of Cabling, Wires, and Communications

  • Coax

  • Unshielded Twisted Pair and Shielded Twisted Pair Fiber Optic

  • Infrared

  • Radio Frequencies

  • Microwave Systems

  • Employing Removable Media

  • Tape

  • CD-R

  • Hard Drives

  • Diskettes

  • Flash Cards

  • Smart Cards

  • Summary

 

Exam Essentials< Hands-on Labs

Lab 3.1: Examine the Windows Routing Table

Lab 3.2: Examine the Linux Routing Table

Review Questions

Answers to Review Questions

 

Chapter 4. Monitoring Activity and Intrusion Detection

  • Monitoring the Network

  • Recognizing the Different Types of Network Traffic

  • Monitoring Network Systems

  • Understanding Intrusion Detection Systems

  • Working with a Network-Based IDS

  • Working with a Host-Based IDS

  • Utilizing Honey Pots

  • Understanding Incident Response

  • Working with Wireless Systems

  • Wireless Transport Layer Security

  • IEEE 802.11x Wireless Protocols

  • WEP/WAP

  • Wireless Vulnerabilities to Know

  • Understanding Instant Messaging’s Features

  • IM Vulnerabilities

  • Controlling Privacy

  • Working with 8.3 File Naming

  • Understanding Packet Sniffing

  • Understanding Signal Analysis and Intelligence

  • Footprinting

  • Scanning

  • Summary

 

Exam Essentials

Hands-On-Labs

Lab 4.1: View the Active TCP and UCP Ports

Lab 4.2: Run Windows Network Monitor

Lab 4.3: Install snort in Linux

Lab 4.4: Make File Extensions Visible in Windows XP

Lab 4.5: Monitor Network Traffic in Linux

Review Questions

Answers to Review Questions

 

Chapter 5. Implementing and Maintaining a Secure Network

  • Overview of Network Security Threats

  • Defining Security Baselines

  • Hardening the OS and NOS

  • Configuring Network Protocols

  • Hardening Microsoft Windows 2000

  • Hardening Microsoft Windows XP

  • Hardening Microsoft Windows 2003

  • Hardening Unix/Linux

  • Hardening Novell NetWare

  • Hardening Apple Macintosh

  • Hardening Filesystems

  • Updating Your Operating System

  • Hardening Network Devices

  • Updating Network Devices

  • Configuring Routers and Firewalls

  • Hardening Applications

  • Hardening Web Servers

  • Hardening E-mail Servers

  • Hardening FTP Servers

  • Hardening DNS Servers

  • Hardening NNTP Servers

  • Hardening File and Print Servers and Services

  • Hardening DHCP Services

  • Working with Data Repositories

  • Summary

 

Exam Essentials

Hands-On Labs

Lab 5.1: Install OpenLDAP On a SuSE Server

Lab 5.2: Work with Performance Monitor and Windows

Lab 5.3: Work with Unix/Linux Networking

Lab 5.4: Install and Configure the E-mail Service on a SuSE Server

Review Questions

Answers to Review Questions

 

Chapter 6. Securing the Network Environment

  • Understanding Physical and Network Security

  • Implementing Access Control

  • Understanding Social Engineering

  • Scanning the Environment

  • Understanding Business Continuity Planning

  • Understanding Business Impact Analysis

  • Assessing Risk

  • Developing Policies, Standards, and Guidelines

  • Implementing Policies

  • Incorporating Standards

  • Following Guidelines

  • Working with Security Standards and ISO 17799

  • Classifying Information

  • Public Information

  • Private Information

  • Roles in the Security Process

  • Information Access Controls

  • .Summary

 

Exam Essentials

Hands-On Lab

Lab 6.1: Test Social Engineering

Review Questions

Answers to Review Questions

 

Chapter 7. Cryptography Basics, Methods, and Standards

  • An Overview of Cryptography

  • Understanding Physical Cryptography

  • Understanding Mathematical Cryptography

  • Understanding Quantum Cryptography

  • Uncovering the Myth of Unbreakable Codes

  • Understanding Cryptographic Algorithms

  • The Science of Hashing

  • Working with Symmetric Algorithms

  • Working with Asymmetric Algorithms

  • Using Cryptographic Systems

  • Confidentiality

  • Integrity

  • Authentication

  • Nonrepudiation

  • Access Control

  • Using Public Key Infrastructure

  • Using a Certificate Authority

  • Working with Registration Authorities and Local

  • Registration Authorities

  • Implementing Certificates

  • Understanding Certificate Revocation

  • Implementing Trust Models

  • Preparing for Cryptographic Attacks

  • Understanding Cryptography Standards and Protocols

  • The Origins of Encryption Standards

  • PKIX/PKCS

  • X.509

  • SSL and TLS

  • CMP

  • S/MIME

  • SET

  • SSH

  • PGP

  • HTTPS

  • S-HTTP

  • IPSec

  • FIPS

  • Common Criteria

  • WTLS

  • WEP

  • ISO 17799

  • Understanding Key Management and the Key Life Cycle

  • Comparing Centralized and Decentralized Key Generation

  • Storing and Distributing Keys

  • Using Key Escrow

  • Key Expiration

  • Revoking Keys

  • Suspending Keys

  • Recovering and Archiving Keys

  • Renewing Keys

  • Destroying Keys

  • Key Usage

  • Summary

 

Exam Essentials

Hands-On Labs

Lab 7.1: Hash Rules in Windows Server

Lab 7.2: SSL Settings in Windows Server

Lab 7.3: Encrypting a File System in Linux

Lab 7.4: Look for Errors in IPSec Performance Statistics

Review Questions

Answers to Review Questions

 

Chapter 8. Security Policies Procedures

  • Understanding Business Continuity

  • Utilities

  • High Availability

  • Disaster Recovery

  • Reinforcing Vendor Support

  • Service-Level Agreements (SLAs)

  • Code Escrow

  • Generating Policies and Procedures

  • Human Recource Policies

  • Business Policies

  • Certificate Policies

  • Incident-Response Policies

  • Enforcing Privilege Management

  • User and Group Role Management

  • Privilege Escalation

  • Single Sign –On Privilege Decision Making

  • Auditing

  • Access Control

  • Summary

 

Exam Essential

Hand-On Labs

Lab 8.1: Use Automated System Recovery in Windows Server

Lab 8.2: Create a Rescue Disk in Linux

Lab 8.3: Create a Backup with SuSE Linux

Review Questions

Answers to Review Questions

 

Chapter 9. Security Management

  • Understanding Computer Forensics

  • Methodology of a Forensic Investigation

  • Enforcing the Chain of Custody

  • Preserving Evidence

  • Collecting Evidence

  • Understanding Security Management

  • Drafting Best Practices and Documentation

  • Understanding Security Awareness and Education

  • Using Communication and Awareness

  • Providing Education

  • Staying on Top of Security

  • Websites

  • Trade Publications

  • Regulating Privacy and Security

  • Health Insurance Portability and Accountability Act

  • Gramm-Leach-Bliley Act of 1999

  • Computer Fraud and Abuse Act

  • Family Educational Rights and Privacy Act

  • Computer Security Act of 1987

  • Cyberspace Electronic Security Act

  • Cyber Security Enhancement Act

  • Patriot Act

  • Familiarizing Yourself with International Efforts

  • Summary

 

Exam Essential

Hand-On Labs

Lab 9.1: Configure Windows Automatic Updates

Lab 9.2: Configure Linux Automatic Updates

Review Questions

Answers to Review Questions

 

Glossary

  • Appendix Security + Practical Application Getting Started General Security Concepts

  • Access Control

  • Accountability

  • Authentication

  • Basic System Hardening

  • Recognition and Prevention of Common Malicious Events

  • Auditing

  • Communication Security

  • Dial-up

  • Virtual Private Networks

  • Remote Control/Remote Shell

  • E-mail

  • Internet Communications

  • Directory Services

  • File Sharing

  • Wireless

  • Infrastructure Security

  • Security Zones

  • IDSs and Honey Pots

  • Security Baselines

  • Basics of Cryptography

  • Certificates

  • Key Managements

  • Operational /Organizational Security

  • Physical Security

  • Backups

  • Disaster Planning

  • Personnel Management

  • Incident Handling

  • Documentation


Course Schedule & Price
Classroom - Regular
When Duration Where Remarks Price
Not Specified 50 Sessions
All Venues 1 session is of 1hr. Price On Request

Venues (Locations)
Mumbai, Warden Road (Head Office):- Chinoy Mansion, First Floor, Block #2 Opp. St.Stephen's Church Warden Road, Mumbai - 400036, Maharashtra, India


Mumbai, Bandra West (Branch):- 1st Floor. O'Priya Building, Near Mehboob Studio Peter Dias Road Bandra West, Mumbai - 400050, Maharashtra, India


Mumbai, Andheri West (Branch):- Wembley Society, Shop No 3 Shastri Nagar, Lane no2, Lokhandwala Andheri West, Mumbai - 400053, Maharashtra, India


About Course Provider

Compufield Computer Institute


COMPUFIELD® Computer Institute was started in 1985 by Mr. M. E. Khairaz to impart training in Internet, Digital Art, Multimedia, Software and Network Engineering. Today we offer many different courses covering the latest and most widely used software worldwide.

  • Creative courses, Designing and Digital Video courses

  • Multimedia and Internet courses

  • Programming courses

  • Network Engineering, MCSE, CCNA, CCNP

  • Office Automation & Financial Application

  • Kids courses

 

Our Training

  • Our courses are upgraded frequently to meet the ever changing standards of the Industry.

  • Our Students design galleries substantiate our claim of providing our students a creative and informative learning environment directed at all round growth.

  • Our faculty are highly experienced in the respective software and help the students in the best possible manner.

  • We have state of the art Hardware and Software facilities.

  • We offer Crash courses of 6-10 hours per day to students who wish to complete their learning in a short period.

  • Professional Job Assignments and Tutorials have been devised to help students practically apply what they learn.

  • After successful completion of the course, job assistance is provided by us.;

 

We offer a unique style of learning -

  • One computer : One student : One Instructor

  • Maximum Instructor to Student Ratio 1:4

  • Sessions : Each session will be of 1 hour

  • Fees is for one course and it includes instructions, practicals,practice, project, preparation for exam (if any)

  • Overseas / local Students take 5 to 10 hours per day to complete their courses earlier.

  • The timing can be fixed based on our mutual convenience,
    between 9.00 a.m. to 7.00 p.m.

  • Course duration in working days = Total sessions divided by number of sessions (hours) per day.

  • No extra charges/refund for more/less time taken to complete the course.

  • Lodging, boarding and travelling not included in the fees.

  • Management has full right to change courses, contents, tuition fees without prior notice.

 



Browse similar courses by category


Courses by Compufield Computer Institute
IT Certification
Networking
Operating Systems
IT Security and Ethical Hacking


AllRefer.com - Browse and Share Photos
Browse & Share Photos
Subscribe & get details about interesting courses & events free in your mail