What is in CompTIA Security
Outline
Get Register
Outline
Outline for this course
Module 1: Threats, Attacks and VulnerabilitiesKey Topics: Given a scenario, analyze indicators of compromise and determine the type of malware, Compare and contrast types of attacks, Explain threat actor types and attributes, Explain penetration testing concepts, Explain vulnerability scanning concepts, Explain the impact associated with types of vulnerabilities,
Module 2: Technologies and Tools
Key Topics: Install and configure network components, both hardware and software-based, to support organizational security, Given a scenario, use appropriate software tools to assess the security posture of an organization, Given a scenario, troubleshoot common security issues, Given a scenario, analyze and interpret output from security technologies, Given a scenario, deploy mobile devices securely, Given a scenario, implement secure protocols
Module 3: Architecture and Design
Key Topics: Explain use cases and purpose for frameworks, best practices and secure configuration guides, Given a scenario, implement secure network architecture concepts, Given a scenario, implement secure systems design, Explain the importance of secure staging deployment concepts, Explain the security implications of embedded systems, Summarize secure application development and deployment concepts, Summarize cloud and virtualization concepts, Explain how resiliency and automation strategies reduce risk, Explain the importance of physical security controls
Module 4: Identity and Access Management
Key Topics: Compare and contrast identity and access management concepts, Given a scenario, install and configure identity and access services, Given a scenario, implement identity and access management controls, Given a scenario, differentiate common account management practices
Module 5: Risk Management
Key Topics: Importance of policies, plans and procedures related to organizational security, Summarize business impact analysis concepts, risk management processes and concepts, follow incident response procedures, Summarize basic concepts of forensics, disaster recovery and continuity of operation concepts, Compare and contrast various types of controls, carry out data security and privacy practices
Module 6: Cryptography and PKI
Key Topics: Compare and contrast basic concepts of cryptography, cryptography algorithms and their basic characteristics, install and configure wireless security settings, implement public key infrastructure
Get Register