Skip to content
Technology

Security Essentials


Class
Jeffrey Jusino
Access code required
Enroll

CompTIA Security+ certification covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security. Also included are access control, identity management, and cryptography.

IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place. That’s where CompTIA Security+ comes in. Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you’re ready for the job.

Security+ is government approved

CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Here is the class outline:

1. Introduction

Nov 26

The tremendous growth in the use of information technology and Internet has brought us great convenience. However, it also creates a great potential for abuse by criminals. With the cross-border, open-platform, highly-interconnected nature of this virtual dimension, the impacts of cyber crimes are far-reaching, and would require integral effort from all parties involved in order to effectively combat cyber crimes.

2. Security Basics & Control Types

Nov 26

One of the basic goals of implementing IT security is to reduce risk. Because risk is so important and so many chapters refer to elements of risk.

3. Basic Network Security

Jan 28

This section includes a very brief review of many of the different protocols and networking devices that have a relevance to security. If any of these concepts are completely unfamiliar to you, you may need to pick up a networking book to review them.

4. Virtualization, Methodology and implementation

Feb 11

5. Malware, Social Engineering and Countermeasures

Feb 25

6. Managing Risk and Business Continuity

Mar 11

A risk is a situation that involves exposure to some type of danger. Yet, not all events that first appear to be a risk may actually result in a risk.Business continuity can be defined as the ability of an organization to maintain its operations and services in the face of a disruptive event

7. Cryptography & Operational Security

Mar 25

8. Course wrap up

Mar 25

This section is created to help you reach your exam goals, here you will find review and material that will help you even more.

Back to top