CompTIA: Security+ (CyberSecurity)

Kurs-ID CompTIA_Security+_UL1_OT
Dauer 5 Tag bzw. 40 Tage (über Bildungsgutschein mit Prüfungsvorbereitung)
Unterrichtszeiten Vollzeit 09:00 bis 16:30 Uhr bzw. 17:00 Uhr Teilzeit 09:00 bis 12:30 Uhr oder 13:00 bis 16:30 Uhr
Kosten 2.713,00 €
Zielgruppe Arbeitssuchende, Personen mit IT-Erfahrung bzw. IT-Ausbildung, förderfähige Arbeitnehmer/in im Programm Qualifizierungschancengesetz und in Verbindung mit Kurzarbeit und/oder Transfergesellschaften. Systemadministratoren. Netzwerkmanager. IT-Consultants
Bildungsart Fortbildung/Qualifizierung
Unterrichtsform Combined Learning
Voraussetzung IT - Berufserfahrung oder Praktikum oder technische IT - Ausbildung. Vor Seminarbeginn findet ein Beratungsgespräch statt. Wir erstellen für Sie einen individuellen Lernplan je nach Ihren Vorkenntnissen und beruflichen Perspektiven und unterstützen Sie bei der Überarbeitung Ihrer Bewerbungsunterlagen und bei der Jobsuche während der Schulung. Kenntnisse im System- und Netzwerksupport
Abschluss CompTIA Zertifikat + New Horizons Teilnahme Zertifikat
Förderung Bildungsgutschein, Geförderte Weiterbildung, Qualifizierung-Chancen-Gesetzt, Kurzarbeit
Präsenzkurs Dies ist keine Anwesenheitsveranstaltung.
mind. Teilnehmerzahl 3
max. Teilnehmerzahl 12
URL des Kurses Details beim Anbieter
Anmelde URL des Kurses Direkte Anmeldung beim Anbieter
spezielles Angebot für Dozenten Nein.
Veranstaltungsort
 
New Horizons Stuttgart (Ulm)
Friedrich-Ebert-Straße 8
89073 Ulm (Donau)

 

AbendkursBildungsgutscheinFörderfähig nach Fachkursprogramm des ESFBarierrefreier Zugang
NeinJak. A.Nein

 

Beschreibung
Dieses Seminar vermittelt den Teilnehmern die Fähigkeiten, die IT-Sicherheit (CyberSecurity) im Unternehmen zu analysieren, zu planen und das Netzwerk gegenüber vielfältigen
Bedrohungen (CyberSecurity) abzusichern. Die vermittelten Kenntnisse sind produkt- und herstellerneutral.

Hinweis: Die Unterrichtssprache, Unterlagen und ggf. Examen sind in englischer Sprache.
________________
CompTIA Security+ Certification (Exam SY0-601) (CyberSecurity)
This course maps to the CompTIA Security+ certification exam (SK0-601) and establishes the core knowledge required of any cybersecurity role, as well as providing a springboard to intermediate-level cybersecurity jobs. This course emphasizes both the practical and hands-on ability to identify and address security threats, attacks and vulnerabilities. CompTIA Security+ is a globally trusted, vendor-neutral certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career. CompTIA Security+ is also a DoD Approved 8570 Baseline Certification and this course meets DoD 8140/8570 Training requirements

VORAUSSETZUNGEN
A+, Network+

ZIELGRUPPE
This course is designed for information technology (IT) professionals who have networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix®, or Linux®; and who want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles.

This course is also designed for students who are seeking the CompTIA Security+ certification and who want to prepare for the CompTIA Security+ SY0-601 Certification Exam.

LERNZIELE
In this course you will:
Prepare for the CompTIA Security+ exam (CyberSecurity)
Confidently explain and define an array of security vulnerabilities
Navigate the complexities of secure system and network design
Explore the defensive measures like PKI, firewalls and IDS
Implement robust identity management and access control

AGENDA
1 - COMPARING SECURITY ROLES AND CONTROLS
Topic 1A: Compare and Contrast Information Security Roles
Topic 1B: Compare and Contrast Security Control and Framework Types

2 - EXPLAINING THREAT ACTORS AND THREAT INTELLIGENCE
Topic 2A: Explain Threat Actor Types and Attack Vectors

3 - PERFORMING SECURITY ASSESSMENTS
Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
Topic 3B: Explain Security Concerns with General Vulnerability Types
Topic 3C: Summarize Vulnerability Scanning Techniques
Topic 3D: Explain Penetration Testing Concepts

4 - IDENTIFYING SOCIAL ENGINEERING AND MALWARE
Topic 4A: Compare and Contrast Social Engineering Techniques
Topic 4B: Analyze Indicators of Malware-Based Attacks

5 - SUMMARIZING BASIC CRYPTOGRAPHIC CONCEPTS
Topic 5A: Compare and Contrast Cryptographic Ciphers
Topic 5B: Summarize Cryptographic Modes of Operation
Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
Topic 5D: Summarize Other Cryptographic Technologies

6 - IMPLEMENTING PUBLIC KEY INFRASTRUCTURE
Topic 6A: Implement Certificates and Certificate Authorities
Topic 6B: Implement PKI Management

7 - IMPLEMENTING AUTHENTICATION CONTROLS
Topic 7A: Summarize Authentication Design Concepts
Topic 7B: Implement Knowledge-Based Authentication
Topic 7C: Implement Authentication Technologies
Topic 7D: Summarize Biometrics Authentication Concepts

8 - IMPLEMENTING IDENTITY AND ACCOUNT MANAGEMENT CONTROLS
Topic 8A: Implement Identity and Account Types
Topic 8B: Implement Account Policies
Topic 8C: Implement Authorization Solutions
Topic 8D: Explain the Importance of Personnel Policies

9 - IMPLEMENTING SECURE NETWORK DESIGNS
Topic 9A: Implement Secure Network Designs
Topic 9B: Implement Secure Switching and Routing
Topic 9C: Implement Secure Wireless Infrastructure
Topic 9D: Implement Load Balancers

10 - IMPLEMENTING NETWORK SECURITY APPLIANCES
Topic 10A: Implement Firewalls and Proxy Servers
Topic 10B: Implement Network Security Monitoring
Topic 10C: Summarize the Use of SIEM

11 - IMPLEMENTING SECURE NETWORK PROTOCOLS
Topic 11A: Implement Secure Network Operations Protocols
Topic 11B: Implement Secure Application Protocols
Topic 11C: Implement Secure Remote Access Protocols

12 - IMPLEMENTING HOST SECURITY SOLUTIONS
Topic 12A: Implement Secure Firmware
Topic 12B: Implement Endpoint Security
Topic 12C: Explain Embedded System Security Implications

13 - IMPLEMENTING SECURE MOBILE SOLUTIONS
Topic 13A: Implement Mobile Device Management
Topic 13B: Implement Secure Mobile Device Connections

14 - SUMMARIZING SECURE APPLICATION CONCEPTS
Topic 14A: Analyze Indicators of Application Attacks
Topic 14B: Analyze Indicators of Web Application Attacks
Topic 14C: Summarize Secure Coding Practices
Topic 14D: Implement Secure Script Environments
Topic 14E: Summarize Deployment and Automation Concepts

15 - IMPLEMENTING SECURE CLOUD SOLUTIONS
Topic 15A: Summarize Secure Cloud and Virtualization Services
Topic 15B: Apply Cloud Security Solutions
Topic 15C: Summarize Infrastructure as Code Concepts

16 - EXPLAINING DATA PRIVACY AND PROTECTION CONCEPTS
Topic 16A: Explain Privacy and Data Sensitivity Concepts
Topic 16B: Explain Privacy and Data Protection Controls

17 - PERFORMING INCIDENT RESPONSE
Topic 17A: Summarize Incident Response Procedures
Topic 17B: Utilize Appropriate Data Sources for Incident Response
Topic 17C: Apply Mitigation Controls

18 - EXPLAINING DIGITAL FORENSICS
Topic 18A: Explain Key Aspects of Digital Forensics Documentation
Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition

19 - SUMMARIZING RISK MANAGEMENT CONCEPTS
Topic 19A: Explain Risk Management Processes and Concepts

20 - IMPLEMENTING CYBERSECURITY RESILIENCE
Topic 20A: Implement Redundancy Strategies
Topic 20B: Implement Backup Strategies
Topic 20C: Implement Cybersecurity Resiliency Strategies

21 - EXPLAINING PHYSICAL SECURITY
Topic 21A: Explain the Importance of Physical Site Security Controls
Topic 21B: Explain the Importance of Physical Host Security Controls

 

Schlagworte
datensicherheit, windows, datenbank, linux, fehlervermeidung, security, sicherheitskonzept, sicherheitsanalyse, gefahren im internet, internet der dinge

 

Gelistet in folgenden Rubriken: