CompTIA Security+ SY0-301

CompTIA Security+ SY0-301
4 Day Instructor Led | Onsite Testing Available


The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. Security threats are increasing in number and severity, and the gap between the need for security professionals and qualified IT personnel is the largest of any IT specialty, according to a 2008 CompTIA study. Even in a troubled economy, most businesses plan to maintain or increase their investment in security.

CompTIA Security+ is an international, vendor-neutral certification that proves competency in system security, network infrastructure, access control and organizational security. Major organizations that employ CompTIA Security+ certified staff include Booz Allen Hamilton, Hewlett-Packard, IBM, Motorola, Symantec, Telstra, Hitachi, Ricoh, Lockheed Martin, Unisys, Hilton Hotels Corp., General Mills, the U.S. Navy, Army, Air Force and Marines.

Audience
CompTIA Security+ certification exam is targeted at professionals with at least two years of networking experience and possess a thorough knowledge of TCP/IP. Those holding the CompTIA Security+ certification have demonstrated the aptitude and ability to master such knowledge areas as: general security concepts, communications security, infrastructure security, basics of cryptography, and operational/organizational security. Government workers or contractors seeking directive 8570.1 compliance are excellent candidates.

CompTIA Security+ SY0-301 Prerequisites

Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years of technical networking experience, with an emphasis on security. The CompTIA Network+ certification is also recommended.

What You'll Learn in CompTIA Security+ SY0-301

Mitigating threats
Cryptography
Authentication systems
Messaging security
User and role-based security
Public key infrastructure
Access security
Ports and protocols
Network security
Wireless security
Remote access security
Auditing, logging, and monitoring
Vulnerability testing
Organizational security
Business continuity
CompTIA Security+ objectives map
CompTIA Security+ acronyms

CompTIA Security+ SY0-301 Outline

1. Mitigating threats

1)       Core system maintenance

a)       Identifying common security threats

b)       Updating the operating system

c)       Managing software patches

d)       Installing service packs

e)       Determining whether you need to update your computer's BIOS

f)        Configuring Windows Firewall

2)       Virus and spyware management

a)       Installing antivirus software

b)       Scanning your system for spyware

c)       Configuring Windows Mail to prevent spam

3)       Browser security

a)       Managing pop-ups

b)       Managing cookies

c)       Managing scripting, Java, and ActiveX components

d)       Examining input validation, buffer overflows, and XSS

4)       Social engineering threats

a)       Discussing social engineering

b)       Examining phishing

2. Cryptography

1)       Symmetric cryptography

a)       Encrypting and decrypting data

b)       Calculating hashes

c)       Sharing a secret message with steganography

2)       Public key cryptography

a)       Exploring public key cryptography

b)       Examining certificates

c)       Examining certificate trusts

d)       Comparing single- and dual-sided certificates

e)       Mapping algorithms to applications

3. Authentication systems

1)       Authentication

a)       Identifying the components of authentication

b)       Comparing one-, two-, and three-factor authentication

c)       Capturing passwords with a protocol analyzer

d)       Installing Active Directory Services

e)       Joining a domain

2)       Hashing

a)       Hashing data

b)       Cracking passwords

c)       Authentication systems

d)       Identifying the requirements of a secure authentication system

e)       Examining the components of Kerberos

f)        Examining null sessions

g)       Comparing authentication systems

4. Messaging security

1)       E-mail security

a)       Identifying the security risks of an e-mail system

b)       Configuring security on an e-mail server

c)       Digitally signing a message

d)       Sending an encrypted message

2)       Messaging and peer-to-peer security

a)       Identifying the security risks of messaging systems

b)       Configuring security on an IM server

c)       Configuring IM client security

5. User and role-based security

1)       Security policies

a)       Creating a console to manage local security policies

b)       Using the GPMC

c)       Implementing domain GPOs

d)       Analyzing a Windows Vista computer's security

2)       Securing file and print resources

a)       Creating users and groups based on security needs

b)       Securing file resources

c)       Securing printer resources

6. Public key infrastructure

1)       Key management and life cycle

a)       Understanding certificate life cycle and management

2)       Setting up a certificate server

a)       Installing a stand-alone root certificate authority

b)       Installing an enterprise subordinate CA

c)       Implementing a file-based certificate request

d)       Managing your certificate server

e)       Side trip: Granting the log on locally right

f)        Requesting a user certificate

g)       Revoking a certificate

h)       Enabling the EFS recovery agent template

i)         Enrolling for a recovery agent certificate

j)         Enabling key archival

k)       Re-enrolling all certificates

3)       Web server security with PKI

a)       Requesting and installing a Web server certificate

b)       Enabling SSL for the certificate server Web site

c)       Making a secure connection

d)       Requesting a client certificate via the Web

7. Access security

1)       Biometric systems

a)       Identifying biometric authentication systems

b)       Installing a fingerprint reader

2)       Physical access security

a)       Identifying the risks associated with physical access to systems

b)       Examining logging and surveillance best practices

3)       Peripheral and component security

a)       Identifying the risks associated with common peripherals

b)       Mitigating security risks of peripherals

4)       Storage device security

a)       Enabling file-based encryption

b)       Enabling whole disk encryption systems (optional)

8. Ports and protocols

1)       TCP/IP review

a)       Examining protocols in the TCP/IP suite

b)       Comparing IPv4 and IPv6 packets

2)       Protocol-based attacks

a)       Preventing common protocol-based attacks

b)       Assessing your vulnerability to DDoS attacks

c)       Port scanning

d)       Checking ARP cache

e)       Examining spoofing attacks

f)        Examining replay and hijacking attacks

g)       Examining antiquated protocols

9. Network security

1)       Common network devices

a)       Examining switches and bridges

b)       Examining routers

c)       Examining NAT/PAT devices

d)       Examining firewalls and proxy servers

e)       Identifying inherent weaknesses in network devices

f)        Examining the ways to overcome device threats

2)       Secure network topologies

a)       Comparing firewall-based secure topologies

b)       Identifying the benefits of NAC

c)       Examining the security enabled by VPNs

3)       Browser-related network security

a)       Configuring the Phishing Filter

b)       Setting security zones

c)       Setting privacy options

4)       Virtualization

a)       Exploring the benefits of virtualization technologies

10. Wireless security

1)       Wi-Fi network security

a)       Identifying wireless networking vulnerabilities

b)       Scanning for insecure access points

c)       Installing third-party router firmware

d)       Configuring basic router security

e)       Enabling transmission encryption

2)       Non-PC wireless devices

a)       Identifying cell phone and PDA-related threats

11. Remote access security

1)       Remote access

a)       Examining RADIUS and Diameter authentication

b)       Examining the role of LDAP in a remote access environment

c)       Examining TACACS+ authentication

d)       Examining how 802.1x adds security to your network

e)       Installing Network Policy and Access Services

f)        Configuring an NPS network policy

g)       Configuring NPS accounting

2)       Virtual private networks

a)       Comparing VPN protocols

b)       Installing Routing and Remote Access Services

c)       Enabling a VPN

d)       Configuring NPS to provide RADIUS authentication for your VPN

e)       Making a VPN connection

12. Auditing, logging, and monitoring

1)       System logging

a)       Viewing event logs

b)       Discussing device and application logging

2)       Server monitoring

a)       Monitoring with Performance Monitor

b)       Running a Data Collector Set

c)       Viewing a Data Collector Set report

d)       Considering auditing policies and practices

13. Vulnerability testing

1)       Risk and vulnerability assessment

a)       Analyzing risks

b)       Installing the MBSA

c)       Analyzing your system with the MBSA

d)       Downloading and installing OVAL

e)       Downloading an OVAL XML file

f)        Scanning with OVAL

g)       Downloading and installing Nessus

h)       Scanning with Nessus

2)       IDS and IPS

a)       Discussing IDS characteristics

b)       Installing and monitoring with the Snort IDS

c)       Comparing HIDS and NIDS

d)       Examining the role and use of honeypots

3)       Forensics

a)       Examining the forensics process

14. Organizational security

1)       Organizational policies

a)       Creating a security policy

b)       Creating a human resources policy

c)       Creating an incidence response and reporting policy

d)       Implementing change management

2)       Education and training

a)       Identifying the need for user education and training

b)       Identifying education opportunities and methods

3)       Disposal and destruction

a)       Deciding whether to destroy or dispose of IT equipment

15. Business continuity

1)       Redundancy planning

a)       Identifying the need for and appropriate use of redundancy

b)       Creating a disaster recovery plan

2)       Backups

a)       Selecting backup schemes

b)       Backing up data

c)       Restoring data

d)       Identifying appropriate media rotation and storage plans

3)       Environmental controls

a)       Examining environmental controls

 


Get More Information
* Denotes a required field.

Courses
Social Media Security Training
Schedule
Get a quote

Training
Training Effectiveness Assurance
Compliance Management Framework
Mentoring & Student Support Process
Department of Defense Training and 8570.1 Compliance


Testimonials
About Us

UKI Recognized as 2013
IT Training Mover & Shaker

2013 IT Training Mover & Shaker

Upcoming Public Course Dates

Nothing Scheduled
please check back soon

This class has been a great experience...mind opening. I was enlightened as to where my knowledge level really is and (instructor) definitely added to it. (Instructor had a wealth of knowledge, was able to answer any question in depth, with detail and enthusiasm. Paul Johnson ALIMS


The class is all relevant, valuable, well tailored and logically presented. Mr. Fricke DoN/MSE


Place in top third based on relevancy to my assigned job and supervisory duties. One of the most thoroughly knowledgeable instructors I've seen in 20+ years of communications training. Spot on! LtCol F. Hopewell MARSOC G-6




UKI Twitter Feed

We Provide Expert Instruction in the Following Courses:
Certified Information Systems Security Professional (CISSP) Certification Training | CCNA v3.0 - CCNA Routing and Switching Boot Camp Certification Training | REDHAT Linux Essentials - RH033 Certification Training | Fiber Optic Installer Certification Training | CompTIA A+ Certification Training | CompTIA Linux+ Certification Training | Interconnecting Cisco Network Devices Part 1 (ICND1) Certification Training | Interconnecting Cisco Networking Devices, Part 2 (ICND2) Certification Training | Enterprise Wi-Fi Fundamentals (CWTS) Certification Training | Certified Information Security Manager (CISM) Certification Training | Systems Security Certified Practitioner (SSCP) Certification Training | Architecting on AWS Certification Training | UKI Social Media Security Professional (SMSP) - Online Only Certification Training | Certified Ethical Hacker (CEH) Certification Training | ITIL® Foundation Certification Training | Installing and Configuring Windows Server 2012 (M20410) Certification Training | Certified Authorization Professional (CAP) Certification Training | UKI Social Media Engineering & Forensics Professional (SMEFP) Certification Training | RedHat Linux System Administration Foundations Certification Training | CCNP Voice Certification Training | Certified Information Systems Auditor (CISA) Certification Training | CCNA Voice Certification Training | Computer Hacking Forensic Investigator (CHFI) Certification Training | Certified Security Analyst/LPT (ECSA) Certification Training | CISSP - Information Systems Security Engineering Professional (ISSEP) Certification Training | MCITP: Enterprise and Server Administrator Certification Training | MCTS: Windows 7 Desktop Administrator 70-680 Certification Training | UKI Social Media Security Professional (SMSP) Certification Training | CCNP Certification Training | Administering Microsoft Windows Server 2012 (M20411) Certification Training | Implementing Desktop Application Environments (M20416) Certification Training | Configuring Advanced Windows Server 2012 Services (M20412) Certification Training | Designing and Implementing a Server Infrastructure on Windows 2012 (M20413) Certification Training | CCNA Security Certification Training | Certified Wireless Network Administrator Certification Training | UKI Social Media Management & Governance Professional (SMMGP) Certification Training | UKI Social Media Governance Certification Training | Core Solutions of Microsoft Exchange Server 2013 (20341B) Certification Training | TSHOOT - Troubleshooting and Maintaining Cisco IP Networks v2.0 Certification Training | Oracle 12c Database Administration I Certification Training | Oracle 12c Security Administration Certification Training | Core Solutions of Microsoft SharePoint Server 2013 (20331B) Certification Training | CompTIA Project+ Certification Training | Certified Incident Handler (ECIH) Certification Training | CompTIA Security+ SY0-401 Certification Training | UKI Social Media Security Hybrid Training Course Certification Training | Deploying and Managing Windows 10 Using Enterprise Services (20697-2B) Certification Training | Implementing an Advanced Server Infrastructure (M20414) Certification Training | MCSA: Windows Server 2012 Boot Camp Certification Training | Advanced Solutions of Microsoft SharePoint Server 2013 (20332B) Certification Training | Server Virtualization with Windows Server Hyper-V and System Center (20409B) Certification Training | Planning and Deploying System Center 2012 Configuration Manager (10748C) Certification Training | FireEye Enterprise Incident Response with MIR Certification Training | Security Operations on AWS Certification Training | Advanced VMware vSphere Design, Optimize, & Manage Certification Training | Project Management Professional (PMP) Certification Training | Avaya Aura® Communication Manager Administration Certification Training | CompTIA Advanced Security Practitioner (CASP) CAS 002 Certification Training | Implementing Cisco IOS Network Security 3.0 (IINS) Certification Training | Quick SharePoint 2013 Maintenance for the Part-Time Administrator Certification Training | CompTIA Network+ (N10-006) Certification Training | Security Design and Solutions, Network Security Design, Conduct a Security Assessment and Host Security Certification Training | Cyber Vanguard Series-Cyber Strike Certification Training | Cyber Vanguard Series- Enterprise Guardian Certification Training | CompTIA Cloud+ Certification Training | ITIL ® Service Strategy Certification Training | CISSP - Information Systems Security Architecture Professional (ISSAP) Certification Training | Certified Cloud Security Professional (CCSP) Certification Training | Cyber Vanguard Series- Cyber Storm Assault Tactics Certification Training | Risk Management Framework for DoD - Fundamentals Certification Training | SharePoint 2013 Site Collection and Site Administration (55033A) Certification Training | Programming in HTML5 with JavaScript and CSS3 Certification Training | Risk Management Framework for DoD - Deep Dive Certification Training | Developing Websites Using IBM Web Content Manager 8.5 Certification Training | FireEye Advanced MIR Certification Training | Splunk 6 Knowledge Objects Certification Training | Advanced Dashboards and Visualizations Certification Training | ITIL® Service Lifecycle: Service Design Certification Training | ITIL® Service Lifecycle: Service Transition Certification Training | Splunk Cloud Administration Certification Training | Oracle 12c Database Administration II Certification Training | Oracle 12c Advanced SQL Certification Training | Troubleshooting TCP/IP Networks with Wireshark Certification Training | VMware Horizon 7: Install, Configure, Manage v7 Certification Training | CompTIA Cybersecurity Analyst (CSA+) Certification Training | CISSP - Information Systems Security Management Professional (ISSMP) Certification Training | AWS Technical Essentials Certification Training | Big Data on AWS Certification Training | FireEye Forensics Fundamentals Certification Training | Oracle 12c Foundations: SQL & SQL*PLUS Certification Training | Avaya Aura Messaging Implementation, Administration, and Support Certification Training | Migrating to AWS Certification Training | Avaya Aura® Communication Manager Administration and Call Center Elite Fast Track Certification Training | Data Warehousing on AWS Certification Training | Avaya Aura® Communication Manager Administration, Maintenance, and Troubleshooting Fast Track Certification Training | Avaya Aura® Session Manager and System Manager Implementation (R6.3) Certification Training | Red Hat System Administration II (RH134) Certification Training | Red Hat System Administration III (RH254) Certification Training | Red Hat System Administration I (RH124) Certification Training | IBM Cognos Framework Manager: Design Metadata Models (v11.0) Certification Training | IBM Cognos Framework Manager: Design Metadata Models (V10.2) Certification Training | ITIL® Service Lifecycle: Service Operation Certification Training | ITIL® Service Lifecycle: Continual Service Improvement Certification Training | ITIL® Expert Qualification: Managing Across the Lifecycle Certification Training | VMware vSphere: Install, Configure, Manage V6.5 Certification Training | ROUTE - Implementing Cisco IP Routing v2.0 Certification Training | IBM InfoSphere DataStage Essentials (v11.5) Certification Training | Power Systems for AIX - Virtualization I: Implementing Virtualization Certification Training | WebSphere Application Server V8.5.5 Administration Certification Training | Enterprise Wi-Fi Security (CWSP) Certification Training | SWITCH - Implementing Cisco IP Switched Networks v2.0 Certification Training | Advanced Solutions of Microsoft Exchange Server 2013 (20342B) Certification Training | Installing and Configuring Windows 10 (20697-1B) Certification Training | VMware vSphere: Optimize and Scale v6.5 Certification Training | VMware vRealize Automation: Install, Configure, Manage v7.0 Certification Training |
Copyright © 2017 Ultimate Knowledge Institute | Privacy Policy
ITIL® is a registered trade mark of AXELOS® Limited.
IT Infrastructure Library® is a registered trade mark of AXELOS® Limited.
The Swirl logo™; is a trade mark of AXELOS® Limited.

All other trademarks mentioned in this web site are the property of their respective owners.