CompTIA Security+ Certification

Learn how to secure hardware and software of the system

ABOUT THE PROGRAM

A secure system is a major requirement of every organisation. Secure system help to keep the confidential information safe and free from threats. CompTIA Security+ Certification is designed to provide in-depth knowledge regarding network security, risk management and security threats. Our trainer will help the delegates to implement the learnt concepts within the organisation. During the training, the candidates will learn about the cryptography and access control which will take their knowledge to another level. The delegates will also get to know about managing the risk that comes across the way of any network.

  • Learn how to secure the system from threats

  • Gain better opportunities in the field of network security

  • Delivered by certified instructors in luxury venues

  • Key learning points and tutor support

  • Learn about various security techniques like data encryption, handling and wiping

WHAT'S INCLUDED ?

Find out what's included in the training programme.

Includes

Key Learning Points

Clear and concise objectives to guide delegates through the course.

Includes

Tutor Support

A dedicated tutor will be at your disposal throughout the training to guide you through any issues.

PREREQUISITES

  • CompTIA Security+ course doesn’t have any prerequisite but having knowledge of network components and windows system can be beneficial
  • It is recommended that the delegates have 2 years of experience in networking

TARGET AUDIENCE

Although this course is for everyone, who wishes to have a secure network at the workplace. CompTIA Security+ course is best for the following audience:

  • Information Assurance Technician
  • Network Administrator
  • Security Consultant
  • Security Administrator
  • Security Architect
  • Security Engineer
  • System Administrator
  • IT Professionals

WHAT WILL YOU LEARN?

During the training, the delegates will learn the following:

  • Various approaches to network attack and its solution
  • Identify policies for securing the operations within the organisation
  • Disaster recovery and fault tolerance
  • Requirement for securing the web so that maximum risk can be eliminated to ensure the high productivity
  • Get to know about different cryptographic principles
  • Achieve skills needed to give network and host-based security

Enquire Program

Fill in the form below & we'd get back to you.

PROGRAM OVERVIEW

CompTIA Security+ course provides essential knowledge of the security threats and control including identity, authentication and authorization risk within the organisation. The course covers network security and tools and applications to maintain it effectively. Learn about various security techniques like data encryption, data handling, data loss prevention, data wiping and much more.

We provide flexible training program including online, onsite and classroom training. Our trainer ensures that the delegates have gone through each and every concept thoroughly with the help of real-world examples. Our training programs are conducted in luxury venues with all the facilities to make the learning experience awesome. Our help and support team is available 24*7 to handle the queries of the delegates.


PROGRAM CONTENT

An Introduction to Security Threats and Controls

  • Define Security Threats
  • What is the need of IT Security?
  • Understand Security implementation
  • Identify, authenticate and authorize requirement in an organization
  • Describe attacks
  • Types of attacks
  • Define Mitigation and recognition of attacks
  • Identifying Assessment tools and methods

An Introduction to Cryptography and Access Control

  • Describe Cryptography
  • Cryptography usage
  • Distinguish between Symmetric and Asymmetric Encryption
  • Recognising Hash Functions
  • Classifying Steganography
  • Describe Public Key Infrastructure (PKI)
  • Understand the operation of PKI
  • Generating keys
  • Expanding and handling keys
  • Using Key Recovery Agents and Cancelations
  • Using password authentication
  • Protecting Passwords
  • What are PAP and CHAP?
  • How be verification safe?
  • Describe Authentication types
  • Define RADIUS and TACACS+
  • Account Management
  • Describe directory Services
  • Managing user and group accounts
  • Understand Privilege Policies

Overview of Network Security

  • A Summary of network topologies
  • Demilitarized Regions Investigation
  • How routers and Network Address Translation are used?
  • Describe Security Appliances and Applications
  • What are types of firewalls?
  • The summary of Switches
  • Describe Intrusion Detection Systems and Wireless Network Security
  • Using wireless LANs and wireless authentication
  • Analysis of WEP and WPA
  • Explain VPN and Remote Access Security
  • Describe Virtual Private Networks and IPsec
  • An overview of Network Application Security
  • Describe DHCP, DNS, and SNMP Security
  • Difference between IPv4 and IPv6

Understand Host, Data, and Application Security

  • Define Host security
  • What is OS hardening?
  • Managing Patch
  • Describe Network Access Control
  • Define Data Security
  • What is the need of Data encryption and Handling
  • Describe Data Loss Prevention and Data Wiping
  • Using Web Services Security
  • Analysis of SSL and TLS
  • Understand concept of Web Servers and Load Balancers
  • Describe Web Application Security
  • The databases of Web Application
  • Define Exploits
  • Concept of Virtualization and its approaches
  • What is Cloud Security?
  • Using cloud computing
  • Types of risks involved in cloud computing

Understand Operational Security

  • Describe Site Layout and Access
  • An overview of Gateways and Locks
  • Explain the concept of hardware security
  • What is the need of Environmental Control
  • Describe Mobile and Embedded Device Security
  • What is BYOD?
  • Define risk management
  • Executing risk calculation and mitigation
  • Describe Mobile Device Security and Mobile Device Management
  • Handling configurations
  • Planning of Disaster Recovery
  • Formation of Clusters
  • Describe Incident Responses procedure

CompTIA Security+ Certification Enquiry

 

Enquire Now


----- OR -------

Reach us at 0121 368 7851 or info@msptraining.com for more information.

ABOUT Windsor Town

Windsor is a historic market town based in the country of Berkshire, England UK. It is popularly known as the site of Windsor Castle, which is the official residence of the British Royal Family among various residences. It is located on the River Thames which is 20 miles west of London. Windsor is one of the Berkshire prettiest towns. Windsor has a population nearly about 31,000. Windsor is located 34 km west of Charing Cross, London, 1sss1 km south-east of Maidenhead and 34 km east of the Reading county town. It is famed for its royal connections and history of the royal family. The delightful countryside of Royal Berkshire has surrounded the Windsor town which offers a great trip from the capital. The village of Old Windsor is 3 km to the south which is now known as Windsor; previously it is known as New Windsor to differentiate between both.

Transport

Windsor can be reached without any difficulty by car from several locations in the UK through M4 which is connected to the M5, M25 and M40. Car parks and various other attractions of the town are very well sign-posted. The famous landmark of the Windsor town which is Windsor Castle can be seen while approaching via M4 by car.

Windsor has two railway stations which were constructed in the 19th century namely Windsor and Elton Riverside station which can be reached by London Waterloo station and the other is Windsor and Elton Central railway station which leads to the heart of Windsor.

Windsor town can be reached by air as well from Heathrow, Luton, Stanstead and Gatwick which are the closest airport to Windsor.

Famous Destinations

Windsor town is one of the England’s premier tourist destinations. Windsor has several attractions such as historic buildings, shops, restaurants, etc. Following are some famous tourist attractions:

  1. Windsor Castle: It is truly wonderful and a grand castle built atop a chalk hill. William built this medieval castle after the Norman invasion in 1066. More than 900 years, Castle has served as the British Royals residence.
  2. Legoland Windsor Resort: It is a fun family resort. Legoland Windsor Resort set in the parkland 150 acres. It is a very popular destination that more than two million visitors visit this destination every year. The prominent things of the Legoland resort is a knight-inspired fireworks show, Halloween and Christmas festivals and special events for toddlers.
  3. Windsor Royal Shopping: This shopping place is situated opposite to the Windsor Castle. In 1997, Axa Sun Life purchased the Windsor railway station site, remodelled and enlarged the building of station to become the Shopping Centre. This Windsor Royal Shopping has over 40 exciting shops, restaurants, art and craft market and cafes.
  4. Thames Boat Trips: The Thames River is like a heart of the Windsor. Through boat trips, you can enjoy the several charm sightseeing trips along the river Thames. It takes the passengers to the interesting places like Kingston-upon-Thames.

Education

A three-tier school system is followed in Windsor which renders the state schooling by Royal Borough of Windsor and Maidenhead. For children under the age of 13 three famous schools are Dedworth Middle School, St. Edward’s Royal Free Ecumenical Middle School and Trevelyan Middle School. Two single gender secondary schools are The Windsor Boys School and Windsor Girls School; various independent schools are also operating namely Brigidine School and St. George’s School, Windsor Castle.

Constitution

Windsor and Maidenhead Royal Borough arrange out the operations of the council, and an elected unitary authority manages it. Adam Afriyie who is notable for being the first black Conservative in the House of Commons elected in 2005 General Election is the present Member of Parliament for the Windsor constituency.

CompTIA Certifications