CompTIA Security+
5 days training event
6100-3074
Introduction
Introduction to CompTIA Security+
Risk Management
Threat Intelligence
Risk Management Concepts
Security Controls
Risk Assessments and Treatments
Quantitative Risk Assessments
Qualitative Risk Assessments
Business Impact Analysis
Data Types and Roles
Security and the Information Life Cycle
Data Destruction
Personnel Risk and Policies
Third-Party Risk Management
Agreement Types
Chapter 1 Exam Question Review
Wiping Disks with the dd Command Lab
Cryptography
Cryptography Basics
Data Protection
Cryptographic Methods
Symmetric Cryptosystems
Symmetric Block Modes
Asymmetric Cryptosystems
Diffie-Hellman
Hashing
Understanding Digital Certificates
Trust Models
Public Key Infrastructure
Certificate Types
Touring Certificates
Cryptographic Attacks
Password Cracking
Password Cracking Demo
Identity and Account Management
Identification, Authentication, and Authorization
Enabling Multifactor Authentication
Authorization
Accounting
Authentication Methods
Access Control Schemes
Account Management
Network Authentication
Identity Management Systems
Tools of the Trade
Touring the CLI
Shells
The Windows Command Line
Microsoft PowerShell
Linux Shells
Python Scripts
Windows Command-Line Tools
Linux Command-Line Tools
Network Scanners
Network Scanning with Nmap
Network Protocol Analyzers
Using Wireshark to Analyze Network Traffic
Using tcpdump to Analyze Network Traffic
Log Files
Centralized Logging
Configuring Linux Log Forwarding
Securing of Individual Systems
Malware
Weak Configurations
Common Attacks
Driver and Overflow Attacks
Password Attacks
Bots and Botnets
Disk RAID Levels
Securing Hardware
Securing Endpoints
The Basic LAN
The OSI Model
ARP Cache Poisoning
Other Layer 2 Attacks
Network Planning
Load Balancing
Securing Network Access
Honeypots
Firewalls
Proxy Servers
Network and Port Address Translation
IP Security (IPsec)
Virtual Private Networks (VPNs)
Intrusion Detection and Prevention Systems (IDS/IPS)
Securing Wireless LAN
Wi-Fi Encryption Standards
RFID, NFC, and Bluetooth
Wi-Fi Coverage and Performance
Wi-Fi Discovery and Attacks
Cracking WPA2
Wi-Fi Hardening
Securing Public Servers
Defining a Public Server
Common Attacks and Mitigations
Containers and Software-Defined Networking
Hypervisors and Virtual Machines
Cloud Deployment Models
Cloud Service Models
Securing the Cloud
Securing Dedicated Systems
Embedded Systems
Industrial Control System (ICS)
Internet of Things (IoT) Devices
Connecting to Dedicated and Mobile Systems
Security Constraints for Dedicated Systems
Mobile Device Deployment and Hardening
Physical Security
Physical Security Overview
Physical Security
Keylogger Demo
Environmental Controls
Secure Protocols and Applications
DNS Security
FTP Packet Capture
Secure Web and E-mail
Request Forgery Attacks
Cross-Site Scripting Attacks
Web Application Security
Web App Vulnerability Scanning
Testing Infrastructure
Testing Infrastructure Overview
Social Engineering
Social Engineering Attacks
Vulnerability Assessments
Penetration Testing
Security Assessment Tools
The Metasploit Framework
Dealing with Incidents
Incident Response Overview
Incident Response Plans (IRPs)
Threat Analysis and Mitigating Actions
Digital Forensics
Gathering Digital Evidence
Business Continuity and Alternate Sites
Data Backup
TRAINING LOCATIONS
أماكن ومقرات التدريب حول العالم
Dubai
Kuala Lumpur
Tunis
Istanbul
Amman
Sharm El Sheikh
Ottawa
Paris