• 291/A KIADB, Hebbal Industrial Area, Mysuru - 570016
  • info@technomatesolutions.com

Courses

COMPTIA SECURITY

 

Courses Images

Course Description

CompTIA or the Computing Technology Industry Association is a non-profit trade association based in America. It issues vendor-neutral professional certifications in more than 120 nations across the globe for the IT Industry.
CompTIA was created in 1982 and it releases more than 50 industry studies per year in order to keep a track of the industry trends and the corresponding changes. To date, over 2.2 million people have earned CompTIA certifications since the association was established.
As mentioned earlier, CompTIA provides a number of valuable certifications that range from entry-level to expert-level, out of which, the CompTIA Security+ certification is designed for the cybersecurity industry.

Course Syllabus

  • Introduction
  • The CIA of Security
  • Threat Actors
  • What is Risk
  • Managing Risk
  • Using Guides for Risk Assessment
  • Security Controls
  • Interesting Security Controls
  • Defense in Depth
  • IT Security Governance
  • Security Policies
  • Frameworks
  • Quantitative Risk Calculations
  • Business Impact Analysis
  • Organizing Data
  • Security Training
  • Third-Party Agreements
  • Cryptography Basics
  • Cryptographic Methods
  • Symmetric Cryptosystems
  • Symmetric Block Modes
  • RSA Cryptosystems
  • Diffie-Hellman
  • PGP GPG
  • Hashing
  • HMAC
  • Steganography
  • Certificates and Trust
  • Public Key Infrastructure
  • Cryptographic Attacks
  • Identification
  • Authorization Concepts
  • Access Control List
  • Password Security
  • Linux File Permissions
  • Windows File Permissions
  • User Account Management
  • AAA
  • Authentication Methods
  • Single Sign-On
  • OS Utilities
  • OS Utility ipconfig
  • Network Scanners
  • Protocol Analyzers
  • SNMP
  • Logs
  • Denial of Service
  • Host Threats
  • Man in the Middle
  • System Resiliency
  • RAID
  • NAS and SAN
  • Physical Hardening
  • RFI, EMI, and ESD
  • Host Hardening
  • Data and System Security
  • Disk Encryption
  • Hardware Firmware Security
  • Secure OS Types
  • Securing Peripherals
  • Malware
  • Analyzing Output
  • IDS and IPS
  • Automation Strategies
  • Data Destruction
  • LAN Review
  • Network Topologies Review
  • Network Zone Review
  • Network Access Controls
  • The Network Firewall
  • Proxy Servers
  • Honeypots
  • Virtual Private Networks
  • IPSec
  • NIDS NIPS
  • SIEM
  • Wireless Review
  • Living in Open Networks
  • Vulnerabilities with Wireless Access Points
  • Cracking WEP
  • Cracking WPA
  • Cracking WPS
  • Wireless Hardening
  • Wireless Access Points
  • Virtualization Basics
  • Virtual Security
  • Containers
  • IaaS
  • PaaS
  • SaaS
  • Deployment Models
  • Static Hosts
  • Mobile Connectivity
  • Deploying Mobile Devices
  • Mobile Enforcement
  • Mobile Device Management
  • Physical Controls
  • HVAC
  • Fire Suppression
  • Secure Applications and Protocols
  • Network Models
  • Know Your Protocols TCP IP
  • Know Your Protocols Applications
  • Transport Layer Security
  • Internet Service Hardening
  • Protecting Your Servers
  • Secure Code Development
  • Secure Deployment Concepts
  • Code Quality and Testing
  • Vulnerability Scanning Tools
  • Vulnerability Scanning Assessment
  • Social Engineering Principles
  • Social Engineering Attacks
  • Attacking Web Sites
  • Attacking Applications
  • Exploiting a Target
  • Vulnerability Impact
  • Incident Response
  • Digital Forensics
  • Contingency Planning
  • Backups