Online courses are accessible 24/7/365 and self-paced, allowing you to progress at your own pace on your own schedule. They can be taken from anywhere in the world from the comfort of your own home.
Classroom courses have a set schedule of the days and times the courses will be held, and you must attend during those specific times.
Find out if online learning is right for you by contacting our team of registration advisers. Our team is available to answer any of your questions about taking an online course before you commit to enrolling.
We will walk you through what to expect to ensure you are making the right decision.
You can contact a registration adviser today via online chat, our website contact form, or toll free at 1-855-201-6910.
No, you are not required to have a diploma or higher education degree to enroll in an online course.
However, some occupations may require minimum educational thresholds for employment or certification.
For more information on your desired career requirements, please contact us via online chat, our website contact form, or toll free at 1-855-201-6910.
To take an online course, you will need to have access to an internet connection and an internet ready device such as a laptop, PC, or tablet.
For course specific requirements, please visit the course page or contact a registration adviser today.
Our courses are developed with multiple formats including text, audio, video, and interactivity.
Our courses also include multiple resources and tools which can include flashcards, games, activities, and more.
We participate in several financial assistance options including third party funding, both military and non-military.
To request more information on the financial assistance options available and check your eligibility,
contact us via online chat, our website contact form, or toll free at 1-855-201-6910.
Duration is the amount of time you will receive access to your course.
Durations vary by course and range between 1 month and 12 months.
If you complete your course before your duration ends you will continue to have access to your course until the duration period ends.
Many of our career training programs include certification vouchers.
This means that at the successful completion of your course, at no additional charge, you will receive an exam voucher for the corresponding industry certification.
This voucher will allow you to register and sit for the appropriate certification exam to obtain your industry credential.
Our online courses are open enrollment, so you can start immediately.
If you are using any third-party funding to cover your course tuition, your start date may be a future date determined by your funding program.
Once enrolled, you will be assigned a client adviser who will provide you with customer and technical support.
Your client adviser will supply you with your course access information, any needed materials, and be available to answer any questions you have during your training experience.
They will regularly check-in with you to monitor your progress and assist you with staying on track.
You will also be assigned to a course mentor who will provide curriculum support throughout your training.
Your mentor is available to answer any questions you have on your course curriculum, will monitor your progress and understanding of the curriculum, and may give assignments or quizzes.
We strive to provide a fully online experience for students however some of our training courses include physical materials or equipment.
Courses that have materials shipped directly to students will be shipped within 7 business days of registration.
Some training courses have material for different sections and these courses may require multiple shipments as you completed stages of your course.
Our goal for students is to successfully complete their training course and achieve their career goals.
We understand that extenuating circumstances can interfere with your ability to complete your course in the duration given.
Because of this we have free or low-cost extensions available for our courses upon request.
To discuss or request an extension please contact your client adviser at firstname.lastname@example.org.
Upon successful completion of your course and fulfillment of any outstanding financial obligations, you will receive your certificate of completion.
Certificates are provided to you within 30 days of completion.
Your certificate will validate the training course you completed with a stamp of completion.
Students that successfully complete our career training programs are assigned a career development adviser who will coordinate placement at a local externship or hands on opportunity.
These opportunities are optional and may vary based on availability and occupation.
Your career development adviser will also provide job search services such as: resume building, mock interviews, job opportunity resources, and more.
Our professional enrichment courses do not come with a career adviser or career services.
Website Short Description
The Security+ exam covers the most important foundational principles for securing a network and managing risk. Access control, identity management and cryptography are important topics on the exam, as well as selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities. Security concerns associated with cloud computing, BYOD and SCADA are addressed in the SY0-501 exam.
This course includes all required materials.
Chapter 01 - Identifying Security Fundamentals
Topic A: Identify Information Security Concepts
Goals of Information Security
Types of Controls
The Security Management Process
Demo - Identifying Information Security Basics
Topic B: Identify Basic Security Controls
The CIA Triad
Accounting and Auditing
Principle of Least Privilege
Demo - Identifying Basic Security
Topic C: Identify Basic Authentication and Authorization Concepts
Demo - Identifying Basic Authentication and Authorization Concepts
Topic D: Identify Basic Cryptography Concepts
Encryption and Decryption
Encryption and Security Goals
Demo - Identifying Basic Cryptography Concepts
Chapter 01 Review
Chapter 02 - Analyzing Risk
Topic A: Analyze Organizational Risk
Components of Risk Analysis
Phases of Risk Analysis
Categories of Threat Types
Risk Analysis Methods
Risk Response Techniques
Risk Mitigation and Control Types
Guidelines for Analyzing Risk
Demo - Analyzing Risks to the Organization
Topic B: Analyze the Business Impact of Risk
Critical Systems and Functions
Maximum Tolerable Downtime
Recovery Point Objective
Recovery Time Objective
Mean Time to Failure
Mean Time to Repair
Mean Time Between Failures
Guidelines for Performing a Business Impact Analysis
Demo - Performing a Business Impact Analysis
Chapter 02 Review
Chapter 03 - Identifying Security Threats
Topic A: Identify Types of Attackers
Hackers and Attackers
Threat Actor Attributes
Demo - Identifying Types of Attackers
Topic B: Identify Social Engineering Attacks
Phishing and Related Attacks
Watering Hole Attacks
Demo - Identifying Social Engineering Attacks
Topic C: Identify Malware
Remote Access Trojans
Advance Persistent Threats
Demo - Identifying Types of Malware
Topic D: Identify Software-Based Threats
Types of Password Attacks
Types of Cryptographic Attacks
Types of Application Attacks
Demo - Identifying Password Attacks
Topic E: Identify Network-Based Threats
IP and MAC Address Spoofing
Port Scanning Attacks
Pass the Hash Attacks
Demo - Identifying Threats to DNS
Demo - Identifying Port Scanning Threats
Topic F: Identify Wireless Threats
Rogue Access Points
Near Field Communication Attacks
RFID System Attacks
War Driving, War Walking, and War Chalking
Wireless Replay Attacks
WEP and WPA Attacks
Demo - Identifying Wireless Threats
Topic G: Identify Physical Threats
Physical Threats and Vulnerabilities
Environmental Threats and Vulnerabilities
Demo - Identifying Physical Threats
Chapter 03 Review
Chapter 04 - Conducting Security Assessments
Topic A: Identify Vulnerabilities
Network Architecture Vulnerabilities
Demo - Identifying Vulnerabilities
Topic B: Assess Vulnerabilities
Security Assessment Techniques
Vulnerability Assessment Tools
Types of Vulnerability Scans
Guidelines for Assessing Vulnerabilities
Demo - Capturing Network Data with Wireshark
Demo - Scanning for General Vulnerabilities
Topic C: Implement Penetration Testing
Penetration Testing Techniques
Box Testing Methods
Penetration Testing Tools
Guidelines for Implementing Penetration Testing
Demo - Implementing Penetration Testing
Chapter 04 Review
Chapter 05 - Implementing Host and Software Security
Topic A: Implement Host Security
Operating System Security
Operating System Hardening Techniques
Trusted Computing Base
Hardware and Firmware Security
Application Blacklisting and Whitelisting
Types of Anti-malware Software
Hardware Peripheral Security
Security Implications for Embedded Systems
Guidelines for Securing Hosts
Demo - Implementing Auditing
Demo - Hardening a Server
Topic B: Implement Cloud and Virtualization Security
Virtual Desktop Infrastructure
Cloud Deployment Models
Cloud Service Types
Guidelines for Securing Virtualized and Cloud
- Securing Virtual Machine Networking
Topic C: Implement Mobile Device Security
Mobile Device Connection Methods
Mobile Device Management
Mobile Device Security Controls
Mobile Device Monitoring and Enforcement
Mobile Deployment Models
BYOD Security Controls
Guidelines for Implementing Mobile Device Security
Demo - Implementing Mobile Device Security
Topic D: Incorporate Security in the Software Development Lifecycle
Software Development Lifecycle
Software Development Models
Secure Coding Techniques
Code Testing Methods
Guidelines for Incorporating Security in the Software Development Lifecycle
Demo - Performing Static Code Analysis
Chapter 05 Review
Chapter 06 - Implementing Network Security
Topic A: Configure Network Security Technologies
Network Scanners and Analysis Tools
Intrusion Detection Systems
Intrusion Prevention Systems
Types of Network Monitoring Systems
Security Information and Event Management
Data Loss/Leak Prevention
Virtual Private Networks
Unified Threat Management
Guidelines for Configuring Network Security Technologies
Demo - Configuring a Network IDS
Topic B: Secure Network Design Elements
Network Access Control
Virtual Local Area Networks
Network Security Device Placement
Network Address Translation
Guidelines for Securing Network Design Elements
Demo - Securing Network Design Elements
Topic C: Implement Secure Networking Protocols and Services
The Open Systems Interconnection Model
OSI Model and Security
Internet Protocol Suite
Domain Name System
Hypertext Transfer Protocol
Secure Sockets Layer/Transport Layer Security
Simple Network Management Protocol
Real-Time Transport Protocol
Internet Control Message Protocol
Internet Protocol Security
Network Basic Input/Output System
File Transfer Protocols
Additional Networking Protocols and Services
Ports and Port Ranges
Demo - Installing an Internet Information Services Web Server with Basic Security
Demo - Securing Network Traffic Using IPSec
Topic D: Secure Wireless Traffic
Wireless Antenna Types
Wireless Cryptographic Protocols
Wireless Authentication Protocols
VPNs and Open Wireless
Wireless Client Authentication Methods
Wireless Access Point Security
Guidelines for Securing Wireless Traffic
Demo - Securing Wireless Traffic
Chapter 06 Review
Chapter 07 - Managing Identity and Access
Topic A: Implement Identity and Access Management
Identity and Access Management
Access Control Models
Physical Access Control Devices
File System and Database Access
Guidelines for Implementing IAM
Demo - Implementing DAC for a File Share
Topic B: Configure Directory Services
Lightweight Directory Access Protocol
Common Directory Services
Demo - Backing Up Active Directory
Topic C: Configure Access Services
Remote Access Methods
Remote Access Protocols
HMAC-Based One-Time Password
Password Authentication Protocol Challenge
-Handshake Authentication Protocol
NT LAN Manager
Authentication, Authorization, and Accounting
Remote Authentication Dial-In User Service
Terminal Access Controller Access-Control System
Demo - Configuring a Remote Access Server
Demo - Setting Up Remote Access Authentication
Topic D: Manage Accounts
Account Management Security Controls
Identity Federation Methods
Guidelines for Managing Accounts
Demo - Managing Accounts
Chapter 07 Review
Chapter 08 - Implementing Cryptography
Topic A: Identify Advanced Cryptography Concepts
Special Considerations for Cryptography
Demo - Identifying Advanced Cryptographic Concepts
Topic B: Select Cryptographic Algorithms
Types of Ciphers
Types of Hashing Algorithms
Types of Symmetric Encryption Algorithms
Types of Asymmetric Encryption Techniques
Types of Key Stretching Algorithms
Exclusive Or Cryptographic Modules
Demo - Selecting Cryptographic Algorithms
Topic C: Configure a Public Key Infrastructure
Public Key Infrastructure
The Root CA
Offline Root CAs
Types of Certificates
Certificate File Formats
CA Hierarchy Design Options
Demo - Installing a CA
Demo - Securing a Windows Server 2016 CA
Topic D: Enroll Certificates
The Certificate Enrollment Process
The Certificate Lifecycle
Certificate Lifecycle Management
The SSL/TLS Connection Process
Demo - Enrolling Certificates
Demo - Securing Network Traffic with Certificates
Topic E: Back Up and Restore Certificates and Private Keys
Private Key Protection Methods
Private Key Restoration Methods
Private Key Replacement
Demo - Backing Up a Certificate and Private Key
Demo - Restoring a Certificate and Private Key
Topic F: Revoke Certificates
Certificate Revocation List
Online Certificate Status Protocol
Demo - Revoking Certificates
Chapter 08 Review
Chapter 09 - Implementing Operational Security
Topic A: Evaluate Security Frameworks and Guidelines
Security Framework Examples
Security Configuration Guides
Defense in Depth
Demo - Evaluating Security Frameworks and Guidelines
Topic B: Incorporate Documentation in Operational Security
Common Security Policy Types
Separation of Duties
Additional Personnel Management Tasks
Training and Awareness
Guidelines for Incorporating Documentation in Operational Security
Demo - Incorporating Documentation in Operational Security
Topic C: Implement Security Strategies
Redundant Array of Independent Disks
Guidelines for Implementing Security Strategies
Demo - Implementing Virtual Machine Snapshots
Topic D: Manage Data Security Processes
Data Security Vulnerabilities
Data Storage Methods
Data Encryption Methods
Data Management Roles
Guidelines for Managing Data Security
Demo - Destroying Data Securely
Demo - Encrypting a Storage Device
Topic E: Implement Physical Controls
Physical Security Controls
Physical Security Control Types
Guidelines for Implementing Physical Controls
Demo - Implementing Physical Controls
Chapter 09 Review
Chapter 10 - Addressing Security Issues
Topic A: Troubleshoot Common Security Issues
Access Control Issues Encryption Issues
Anomalies in Event Logs
Security Configuration Issues
Asset Management Issues
Demo - Identifying Event Log Anomalies
Topic B: Respond to Security Incidents Incident Response
Incident Detection and Analysis
Incident Response Plans
An Incident Report
Guidelines for Responding to Security Incidents
Demo - Responding to a Security Incident
Topic C: Investigate Security Incidents
The Basic Forensic Process
Preservation of Forensic Data
Basic Forensic Response Procedures
Order of Volatility
Chain of Custody
Guidelines for Investigating Security Incidents
Demo - Implementing Forensic Procedures
Chapter 10 Review
Chapter 11 - Ensuring Business Continuity
Topic A: Select Business Continuity and Disaster Recovery Processes
Business Continuity and Disaster Recovery
The Disaster Recovery Process
Order of Restoration
Backup Types (Full)
Backup Types (Differential vs. Incremental)
Guidelines for Selecting Business Continuity and Disaster Recovery Processes
Demo - Selecting Business Continuity and Disaster Recovery Processes
Topic B: Develop a Business Continuity Plan
Business Continuity Plans
Disaster Recovery Plans
IT Contingency Plans
Alternate Business Practices
Guidelines for Developing a BCP
Demo - Developing a BCP
Chapter 11 Review
Recommended: CompTIA Network+ and two years of experience in IT administration with a security focus.
This course includes all required materials.
CompTIA Security+ certification covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security. Also included are access control, identity management, and cryptography.
Write your review
The following email wasn't used for buying this product