Class Schedule

LocationDaysStartEndTime
AshburnMon - Fri12/10/201812/14/20188:30am - 5pm
GreenbeltMon - Fri12/10/201812/14/20188:30am - 5pm
GreenbeltTues | Thurs12/11/201801/17/20196pm - 10pm
GreenbeltSaturday01/05/201902/02/20198:30am - 5pm
GreenbeltMon - Fri01/14/201901/18/20198:30am - 5pm
AshburnMon - Fri01/28/201902/01/20198:30am - 5pm
GreenbeltMon - Fri02/11/201902/15/20198:30am - 5pm
AshburnMon - Fri02/25/201903/01/20198:30am - 5pm
GreenbeltMon - Fri03/11/201903/15/20198:30am - 5pm
AshburnMon - Fri03/25/201903/29/20198:30am - 5pm
GreenbeltMon - Fri04/08/201904/12/20198:30am - 5pm
AshburnMon - Fri04/22/201904/26/20198:30am - 5pm
GreenbeltMon - Fri05/13/201905/17/20198:30am - 5pm
AshburnMon - Fri05/20/201905/24/20198:30am - 5pm
GreenbeltMon - Fri06/10/201906/14/20198:30am - 5pm
AshburnMon - Fri06/17/201906/21/20198:30am - 5pm

Why Take Security+ Training?

Security+ Certification is a baseline standard for assessing an individuals understanding of IT security. Created and administered by CompTIA this certification is recognized worldwide and is a starting point for anyone looking to build a cybersecurity-based career. TrainACE is a Platinum Partner to CompTIA and offers high-quality training for Security+, preparing students to pass the certification.

Businesses of all sizes know the importance of information and IT security and have continued to invest as such. This investment is evidenced by the fact that many government employees in Information Assurance (IA) positions, and any contractors who serve certain IA functions, are now required to have a CompTIA Security+ certification. This requirement was put into effect as part of the aforementioned DoD-8570 directive, and most directly applies to entry and mid-level IT personnel.

At TrainACE, our CompTIA Security+ training courses are taught by certified IT security professionals with a minimum of 3 years teaching experience. Our instructors are also required to have IT security and cyber security experience along with additional, supplementary certifications and continued education in the industry. All classes are 40 hours long and available as daytime, evening, or weekend schedules.

Prerequisites:

This vendor-neutral Security Plus training course is designed for network and security administrators and those with similar job functions which have two years of experience with general networking and basic security knowledge.

Previous certification training in courses such as CompTIA A+, Cisco CCNA or CompTIA Network+ will improve your chances of passing this mid-level exam.

It is appropriate for:

  • Network Administrators
  • Security Administrators
  • Information Assurance Professionals
  • DoD 8570 Compliance Skills & Concepts:

Exam and Certification Requirements:

Current exam number SY0-501

  • Maximum of 90 questions
  • Time Length 90 minutes
  • Passing Score 750
  • Format Multiple Choice and Performance Based Questions

Related Careers:

CompTIA Security+ Certification prepares you for roles in the following job types:

  • Network Administrator
  • Systems Administrator
  • Security Administrator
  • Junior IT Auditor/Penetration Tester
  • Security Specialist
  • Security Consultant
  • Security Engineer
  • Network Security Specialist
  • Information Security Analyst
  • Cyber Security Consultant
  • IT Risk Analyst

Skills and Concepts:

Module 1 / Threats, Attacks, and Vulnerabilities

Indicators of Compromise

  • Why is Security Important?
  • Security Policy
  • Threat Actor Types
  • The Kill Chain
  • Social Engineering
  • Phishing
  • Malware Types
  • Trojans and Spyware
  • Open Source Intelligence
  • Labs (VM Orientation, Malware Types)

Critical Security Controls

  • Security Control Types
  • Defense in Depth
  • Frameworks and Compliance
  • Vulnerability Scanning and Pen Tests
  • Security Assessment Techniques
  • Pen Testing Concepts
  • Vulnerability Scanning Concepts
  • Exploit Frameworks
  • Lab
    • Using Vulnerability Assessment Tools

Security Posture Assessment Tools

  • Topology Discovery
  • Service Discovery
  • Packet Capture
  • Packet Capture Tools
  • Remote Access Trojans
  • Honeypots and Honeynets
  • Labs
  • Using Network Scanning Tools 1
  • Using Network Scanning Tools 2
  • Using Steganography Tools

Incident Response

  • Incident Response Procedures
  • Preparation Phase
  • Identification Phase
  • Containment Phase
  • Eradication and Recovery Phases

Module 2 / Identity and Access Management

Cryptography

  • Uses of Cryptography
  • Cryptographic Terminology and Ciphers
  • Cryptographic Products
  • Hashing Algorithms
  • Symmetric Algorithms
  • Asymmetric Algorithms
  • Diffie-Hellman and Elliptic Curve
  • Transport Encryption
  • Cryptographic Attacks
  • Lab
    • Implementing Public Key Infrastructure

Public Key Infrastructure

  • PKI Standards
  • Digital Certificates
  • Certificate Authorities
  • Types of Certificate
  • Implementing PKI
  • Storing and Distributing Keys
  • Key Status and Revocation
  • PKI Trust Models
  • PGP / GPG
  • Lab
    • Deploying Certificates and Implementing Key Recovery

Identification and Authentication

  • Access Control Systems
  • Identification
  • Authentication
  • LAN Manager / NTLM
  • Kerberos
  • PAP, CHAP, and MS-CHAP
  • Password Attacks
  • Token-based Authentication
  • Biometric Authentication
  • Common Access Card
  • Lab
    • Using Password Cracking Tools

Identity and Access Services

  • Authorization
  • Directory Services
  • RADIUS and TACACS+
  • Federation and Trusts
  • Federated Identity Protocols

Account Management

  • Formal Access Control Models
  • Account Types
  • Windows Active Directory
  • Creating and Managing Accounts
  • Account Policy Enforcement
  • Credential Management Policies
  • Account Restrictions
  • Accounting and Auditing
  • Lab
    • Using Account Management Tools

Module 3 / Architecture and Design (1)

Secure Network Design

  • Network Zones and Segments
  • Subnetting
  • Switching Infrastructure
  • Switching Attacks and Hardening
  • Endpoint Security
  • Network Access Control
  • Routing Infrastructure
  • Network Address Translation
  • Software Defined Networking
  • Lab
    • Implementing a Secure Network Design

Firewalls and Load Balancers

  • Basic Firewalls
  • Stateful Firewalls
  • Implementing a Firewall or Gateway
  • Web Application Firewalls
  • Proxies and Gateways
  • Denial of Service Attacks
  • Load Balancers
  • Lab
    • Implementing a Firewall

IDS and SIEM

  • Intrusion Detection Systems
  • Configuring IDS
  • Log Review and SIEM
  • Data Loss Prevention
  • Malware and Intrusion Response
  • Lab
    • Using an Intrusion Detection System

Secure Wireless Access

  • Wireless LANs
  • WEP and WPA
  • Wi-Fi Authentication
  • Extensible Authentication Protocol
  • Additional Wi-Fi Security Settings
  • Wi-Fi Site Security
  • Personal Area Networks

Physical Security Controls

  • Site Layout and Access
  • Gateways and Locks
  • Alarm Systems
  • Surveillance
  • Hardware Security
  • Environmental Controls

Module 4 / Architecture and Design (2)

Secure Protocols and Services

  • DHCP Security
  • DNS Security
  • Network Management Protocols
  • HTTP and Web Servers
  • SSL / TSL and HTTPS
  • Web Security Gateways
  • Email Services
  • S/MIME
  • File Transfer
  • Voice and Video Services
  • VoIP
  • Labs
    • Implementing Secure Network Addressing Services
    • Configuring a Secure Email Service

Secure Remote Access

  • Remote Access Architecture
  • Virtual Private Networks
  • IPSec
  • Remote Access Servers
  • Remote Administration Tools
  • Hardening Remote Access Infrastructure
  • Lab
    • Implementing a Virtual Private Network

Secure Systems Design

  • Trusted Computing
  • Hardware / Firmware Security
  • Peripheral Device Security
  • Secure Configurations
  • OS Hardening
  • Patch Management
  • Embedded Systems
  • Security for Embedded Systems

Secure Mobile Device Services

  • Mobile Device Deployments
  • Mobile Connection Methods
  • Mobile Access Control Systems
  • Enforcement and Monitoring

Secure Virtualization and Cloud Services

  • Virtualization Technologies
  • Virtualization Security Best Practices
  • Cloud Computing
  • Cloud Security Best Practices

Module 5 / Risk Management

Forensics

  • Forensic Procedures
  • Collecting Evidence
  • Capturing System Images
  • Handling and Analyzing Evidence
  • Lab
    • Using Forensic Tools

Disaster Recovery and Resiliency

  • Continuity of Operations Plans
  • Disaster Recovery Planning
  • Resiliency Strategies
  • Recovery Sites
  • Backup Plans and Policies
  • Resiliency and Automation Strategies

Risk Management

  • Business Impact Analysis
  • Identification of Critical Systems
  • Risk Assessment
  • Risk Mitigation

Secure Application Development

  • Application Vulnerabilities
  • Application Exploits
  • Web Browser Exploits
  • Secure Application Design
  • Secure Coding Concepts
  • Auditing Applications
  • Secure DevOps
  • Lab
    • Identifying a Man-in-the-Browser Attack

Organizational Security

  • Corporate Security Policy
  • Personnel Management Policies
  • Interoperability Agreements
  • Data Roles
  • Data Sensitivity Labeling and Handling
  • Data Wiping and Disposal
  • Privacy and Employee Conduct Policies
  • Security Policy Training
Sale

Unavailable

Sold Out