CALL NOW!
855.520.6806
  • TRAINING PROGRAMS
  • FINANCIAL ASSISTANCE
  • MILITARY
  • LOGIN

CompTIA™ Security+ Certification Training

Seattle Central Community College

Enroll Now!

Have More Questions?
855.520.6806
Career Training Program
Program Code: GES904
Hours: 80
Fees: $1495.00 USD

Overview

In this program, you'll gain the skills you need to begin a career as a security professional and prepare yourself to take the CompTIA™ Security+ exam. You'll become proficient in basic security concepts such as attacks and mitigation, security applications, risk assessment, disaster recovery and incident reporting, and vulnerability assessment.

This program will allow you to practice in virtual interactive lab environments.

This online certificate program is offered in partnership with major colleges, universities, and other accredited education providers.

Objectives

By the end of this program, you'll be able to:

  • Explain general cryptography concepts
  • Explain basic hashing concepts and map algorithms
  • Explain and implement basic encryption applications and tools
  • Explain core concepts of PKI
  • Implement PKI and Certificate Services
  • Identify security threats
  • Assess security risks for system hardware and peripherals
  • Implement OS hardening practice and procedures
  • Identify, explain and implement ports and protocols
  • Identify network elements and components
  • Identify network security tools and apply them appropriately
  • Identify best practices for Access Control and identify the best models
  • Organize users and computers into appropriate security groups
  • Apply file and print permissions
  • Implement logical access control methods
  • Summarize the different authentication models and deploy them appropriately
  • Explain and apply physical security methods
  • Establish application security
  • Implement Security Applications
  • Explain hardware virtualization
  • Identify the vulnerabilities of wireless networking
  • Use monitoring tools on systems and networks
  • Compare and contrast various monitoring methodologies
  • Evaluate proper logging procedures
  • Conduct audits of system security settings
  • Conduct assessments on risk mitigation
  • Carry out vulnerability assessments
  • Explain the use of penetration testing versus vulnerability scanning
  • Explain redundancy planning and its components
  • Implement disaster recovery procedures
  • Execute appropriate incident response procedures
  • Identify and explain applicable legislation and organizational policies
  • Explain environmental controls
  • Reduce the risk of social engineering

Contact Us

Submit