CompTIA

CompTIA Security+

Brian Opalewski
Brian Opalewski
INE Instructor

Gain access to this course with an INE subscription!
Choose your plan!


Course Description
The CompTIA Security+ exam encompasses foundational information security principles for network security and enterprise risk management. This course, featuring over 15 hours of instruction, will help you develop the knowledge and skills necessary to identify and mitigate risk, apply security controls to protect confidentiality, integrity, and availability, gain an understanding of typical security technologies, identify and troubleshoot security events and incidents, and understand the roles of policies, laws, and regulations. Covering topics such as cryptography, access control, and identity management, this course also includes the recently added topics of cloud computing, bring-your-own-device, and SCADA system security. By the end of the course, students will have a firm grasp on application, information, infrastructure, and operational security principles.
  • Course
    • Network Security
      • Introduction to Security
      • Network Design and OSI Model
      • Network Devices
      • Server Security
      • Cloud Computing
      • Additional Concepts (LAN/WAN, NAC, DMZ, NAT, Subnetting)
      • Common Ports and Protocols
      • Network Attacks (DoS, DDos, Spoofing, Hijacking, etc.)
      • Common Configuration Vulnerabilities
      • Vulnerabilities in Cabled Devices
      • Securing Wireless Networks
      • Bluetooth Vulnerabilities
    • Compliance and Operational Security
      • Environmental Controls
      • Social Engineering
      • Organizational Policies and Legal Compliance
      • System Redundancy
      • Disaster Recovery
    • Threats and Vulnerabilities
      • Threats and Vulnerabilities Introduction
      • Threats to Computer Systems
      • Implementing Security :: Part 1
      • Implementing Security :: Part 2
      • The Basics of Risk Assessments
      • Qualitative and Quantitative Methods
      • Analysis Methodologies
      • Security Controls and Vulnerability Management :: Part 1
      • Security Controls and Vulnerability Management :: Part 2
      • Penetration Testing
      • Vulnerability Scanning & Sniffing Attacks
      • Password Auditing and Analysis
      • System and Network Monitoring
      • Auditing
    • Application, Data and Host Security
      • Introduction to Research Tools
      • Securing the Web Browser
      • Securing Appplications
      • Secure Programming
      • Programming Vulnerabilities and Attacks :: Part 1
      • Programming Vulnerabilities and Attacks :: Part 2
      • Securing the Operating System :: Part 1
      • Securing the Operating System :: Part 2
      • Virtualization Technologies :: Part 1
      • Virtualization Technologies :: Part 2
    • Access Controls and Identity Management
      • Access Control And Identity Management :: Introduction
      • Authentication Models :: Part 1
      • Access Control Models and Mechanisms :: Part 1
      • Access Control Models and Mechanisms :: Part 2
      • Physical Security
      • Authentication Models :: Part 2
      • Authentication Models :: Part 3
    • Cryptography
      • Introduction to Cryptography
      • Encryption and Hashing Concepts :: Part 1
      • Encryption and Hashing Concepts :: Part 2
      • Public Key Infrastructure
      • Security+ Review & Resources :: Part 1
      • Security+ Review & Resources :: Part 2
Course Outline:
  • Course
    • Network Security
      • Introduction to Security
      • Network Design and OSI Model
      • Network Devices
      • Server Security
      • Cloud Computing
      • Additional Concepts (LAN/WAN, NAC, DMZ, NAT, Subnetting)
      • Common Ports and Protocols
      • Network Attacks (DoS, DDos, Spoofing, Hijacking, etc.)
      • Common Configuration Vulnerabilities
      • Vulnerabilities in Cabled Devices
      • Securing Wireless Networks
      • Bluetooth Vulnerabilities
    • Compliance and Operational Security
      • Environmental Controls
      • Social Engineering
      • Organizational Policies and Legal Compliance
      • System Redundancy
      • Disaster Recovery
    • Threats and Vulnerabilities
      • Threats and Vulnerabilities Introduction
      • Threats to Computer Systems
      • Implementing Security :: Part 1
      • Implementing Security :: Part 2
      • The Basics of Risk Assessments
      • Qualitative and Quantitative Methods
      • Analysis Methodologies
      • Security Controls and Vulnerability Management :: Part 1
      • Security Controls and Vulnerability Management :: Part 2
      • Penetration Testing
      • Vulnerability Scanning & Sniffing Attacks
      • Password Auditing and Analysis
      • System and Network Monitoring
      • Auditing
    • Application, Data and Host Security
      • Introduction to Research Tools
      • Securing the Web Browser
      • Securing Appplications
      • Secure Programming
      • Programming Vulnerabilities and Attacks :: Part 1
      • Programming Vulnerabilities and Attacks :: Part 2
      • Securing the Operating System :: Part 1
      • Securing the Operating System :: Part 2
      • Virtualization Technologies :: Part 1
      • Virtualization Technologies :: Part 2
    • Access Controls and Identity Management
      • Access Control And Identity Management :: Introduction
      • Authentication Models :: Part 1
      • Access Control Models and Mechanisms :: Part 1
      • Access Control Models and Mechanisms :: Part 2
      • Physical Security
      • Authentication Models :: Part 2
      • Authentication Models :: Part 3
    • Cryptography
      • Introduction to Cryptography
      • Encryption and Hashing Concepts :: Part 1
      • Encryption and Hashing Concepts :: Part 2
      • Public Key Infrastructure
      • Security+ Review & Resources :: Part 1
      • Security+ Review & Resources :: Part 2

Net Orders Checkout

Item Price Qty Total
Subtotal $0.00
Shipping
Total

Shipping Address

Shipping Methods