CLASSROOM ON DEMAND

Get the most value with On Demand Courses for technical and business professionals.

4.85

average rating

183,406 Learner reviews

On Demand Courses

Select the modules and topics that meet the needs of your organization.

Expert Instructors

Every course delivered by experts in their field.

Tailored Options

Create a customized schedule that fits your team's busy schedule.

Master the Microsoft 365 Platform

OUR COURSES

Explore Courses

0
/0 ratings
$595.00
  • 50 Students
  • 22 Lessons
0
/0 ratings
$595.00
  • 51 Students
  • 25 Lessons
0
/0 ratings
$995.00
  • 258 Students
  • 77 Lessons

CHOOSE FROM ANY THESE

Courses categories

CompTIA-Security+

SKU CT-Sec
$995.00
1
Share this product with your friends
CompTIA-Security+
Product Details

CompTIA-Security+

Overview

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

Target Audience

CompTIA Security+ is aimed at IT professionals with job roles such as security architect, security engineer, security consultant/specialist, information assurance technician, security administrator, systems administrator and network administrator.

Course Prerequisites

Students should meet the following criteria prior to taking the course:

Recommended that students have taken CompTIA Network+ certification course and exam, together with 24 months experience of networking support/IT administration

Know the function and basic features of the components of a PC

Use Windows Server to create and manage files and use basic administrative features (Explorer, Control Panel, Management Consoles)

Operate the Linux OS using basic command-line tools

Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers)

Understand TCP/IP addressing, core protocols, and troubleshooting tools

Course Outline

Module 1 / Threats, Attacks, and Vulnerabilities

Indicators of Compromise • Why is Security Important? • Security Policy • Threat Actor Types • The Kill Chain • Social Engineering • Phishing • Malware Types • Trojans and Spyware • Open Source Intelligence • Labs • VM Orientation • Malware Types

Critical Security Controls • Security Control Types • Defense in Depth • Frameworks and Compliance • Vulnerability Scanning and Pen Tests • Security Assessment Techniques • Pen Testing Concepts • Vulnerability Scanning Concepts • Exploit Frameworks • Lab • Using Vulnerability Assessment Tools

Security Posture Assessment Tools • Topology Discovery • Service Discovery • Packet Capture • Packet Capture Tools • Remote Access Trojans • Honeypots and Honeynets • Labs • Using Network Scanning Tools 1 • Using Network Scanning Tools 2 • Using Steganography Tools

Incident Response • Incident Response Procedures • Preparation Phase • Identification Phase • Containment Phase • Eradication and Recovery Phases

Module 2 / Identity and Access Management

Cryptography • Uses of Cryptography • Cryptographic Terminology and Ciphers • Cryptographic Products • Hashing Algorithms • Symmetric Algorithms • Asymmetric Algorithms • Diffie-Hellman and Elliptic Curve • Transport Encryption • Cryptographic Attacks • Lab • Implementing Public Key Infrastructure

Public Key Infrastructure • PKI Standards • Digital Certificates • Certificate Authorities • Types of Certificate • Implementing PKI • Storing and Distributing Keys • Key Status and Revocation • PKI Trust Models • PGP / GPG • Lab • Deploying Certificates and Implementing Key Recovery

Identification and Authentication • Access Control Systems • Identification • Authentication • LAN Manager / NTLM • Kerberos • PAP, CHAP, and MS-CHAP • Password Attacks • Token-based Authentication • Biometric Authentication • Common Access Card • Lab • Using Password Cracking Tools

Identity and Access Services • Authorization • Directory Services • RADIUS and TACACS+ • Federation and Trusts • Federated Identity Protocols

Account Management • Formal Access Control Models • Account Types • Windows Active Directory • Creating and Managing Accounts • Account Policy Enforcement • Credential Management Policies • Account Restrictions • Accounting and Auditing • Lab • Using Account Management Tools

Module 3 / Architecture and Design (1)

Secure Network Design • Network Zones and Segments • Subnetting • Switching Infrastructure • Switching Attacks and Hardening • Endpoint Security • Network Access Control • Routing Infrastructure • Network Address Translation • Software Defined Networking • Lab • Implementing a Secure Network Design

Firewalls and Load Balancers • Basic Firewalls • Stateful Firewalls • Implementing a Firewall or Gateway • Web Application Firewalls • Proxies and Gateways • Denial of Service Attacks • Load Balancers • Lab • Implementing a Firewall

IDS and SIEM • Intrusion Detection Systems • Configuring IDS • Log Review and SIEM • Data Loss Prevention • Malware and Intrusion Response • Lab • Using an Intrusion Detection System

Secure Wireless Access • Wireless LANs • WEP and WPA • Wi-Fi Authentication • Extensible Authentication Protocol • Additional Wi-Fi Security Settings • Wi-Fi Site Security • Personal Area Networks

Physical Security Controls • Site Layout and Access • Gateways and Locks • Alarm Systems • Surveillance • Hardware Security • Environmental Controls

Module 4 / Architecture and Design (2)

Secure Protocols and Services • DHCP Security • DNS Security • Network Management Protocols • HTTP and Web Servers • SSL / TSL and HTTPS • Web Security Gateways • Email Services • S/MIME • File Transfer • Voice and Video Services • VoIP • Labs • Implementing Secure Network Addressing Services • Configuring a Secure Email Service

Secure Remote Access • Remote Access Architecture • Virtual Private Networks • IPSec • Remote Access Servers • Remote Administration Tools • Hardening Remote Access Infrastructure • Lab • Implementing a Virtual Private Network

Secure Systems Design • Trusted Computing • Hardware / Firmware Security • Peripheral Device Security • Secure Configurations • OS Hardening • Patch Management • Embedded Systems • Security for Embedded Systems

Secure Mobile Device Services • Mobile Device Deployments • Mobile Connection Methods • Mobile Access Control Systems • Enforcement and Monitoring

Secure Virtualization and Cloud Services • Virtualization Technologies • Virtualization Security Best Practices • Cloud Computing • Cloud Security Best Practices

Module 5 / Risk Management

Forensics • Forensic Procedures • Collecting Evidence • Capturing System Images • Handling and Analyzing Evidence • Lab • Using Forensic Tools

Disaster Recovery and Resiliency • Continuity of Operations Plans • Disaster Recovery Planning • Resiliency Strategies • Recovery Sites • Backup Plans and Policies • Resiliency and Automation Strategies

Risk Management • Business Impact Analysis • Identification of Critical Systems • Risk Assessment • Risk Mitigation

Secure Application Development • Application Vulnerabilities • Application Exploits • Web Browser Exploits • Secure Application Design • Secure Coding Concepts • Auditing Applications • Secure DevOps • Lab • Identifying a Man-in-the-Browser Attack

Organizational Security • Corporate Security Policy • Personnel Management Policies • Interoperability Agreements • Data Roles • Data Sensitivity Labeling and Handling • Data Wiping and Disposal • Privacy and Employee Conduct Policies • Security Policy Training

ON DEMAND LEARNING

Classroom experience in the cloud

Hours of Video Demonstrations & Lectures

Step by step video demonstrations and explanations from our professional certified instructors.

Work through each topic step by step with our downloadable lab exercises.

Quizzes help students retain what they have learned during the module.

Stay connected for continuous anywhere learning with our native mobile app.

Our team of instructors are available to assist with questions as you work through the training.

Our AI Learning Assistant is always available to help answer questions from anywhere in the learning platform.

Our instructors conduct live workshops covering specific topics and areas of interest related to our course offerings.

Student enrolled
50 K
Class completed
30 K
Satisfaction rate
90 %
Top instructors
200 K

STUDENTS SAY

Satisfaction is their top priority

testimonial-01
Craig Winters
MS 365 Students

Very interesting course. I loved the module-topic approach. I learned a a lot about Microsoft 365 and all of it's capabilities. I'm looking forward to taking me new knowledge back to my company.  Thank you!

testimonial-02
Sandra Li
MS Project Student

"I recommend Classroom On Demand to anyone looking to learn and upskill...If you are in the job market, you might want to add a new skill or improve your existing knowledge."

testimonial-03

Cindy McCarthy

Copilot Student

"COD courses are always covering the latest software and technologies.  I appreciated the live workshops and that the instructors were available to answer questions."

100's of students trust and study at COD