Sunday, 2 November 2014

Best ComPTIA Security Training Institute in Bangalore

ComPTIA Security+ is a vendor-neutral certification course that covers the foundations of information security across multiple technology platforms. The course covers industry-wide topics including communication security, infrastructure security, cryptography, access control, authentication, external attack and operational and organization security. The demand for skilled security professionals is growing significantly. The technology community identifies this course as the perfect way to validate your knowledge of information security.The recommended pre-requisite to join Certificate in IT Security course is to have prior knowledge of Computer Networking.


Prerequisite:


The recommended pre-requisite to join Certificate in IT Security course is to have prior knowledge of Computer Networking.

Duration of the course :

Part Time : 2 Months (2 hrs/day) 
Full Time : 1 Month ( 4 hrs/day)

Course Outline


Mitigating threats


• System maintenance.
• Application security.
• Physical security.
• Malware.
• Social engineering.

Cryptography


• Symmetric cryptography.
• Public key cryptography.

Authentication


• Authentication factors and requirements.
• Authentication systems.
• Authentication system vulnerabilities.

User- and role-based security


• Baseline security policies.
• Resource access.
• Peripheral security.

File and disk encryption


• Peripheral and component security.
• Mobile device security.

Public key infrastructure


• Public key cryptography.
• Implementing public key infrastructure.
• Web server security with PKI.

Application and messaging security


• Application security.
• E-mail security.
• Social networking and messaging.

Ports and protocols


• TCP/IP basics.
• Protocol-based attacks.

Network security


• Network devices.
• Secure network topologies.

Secure networking


• Virtualization and cloud computing.
• Wireless security.
• Wireless network security.
• Mobile device security.

Remote access security


• Remote access.
• Virtual private networks.
• Vulnerability testing and monitoring.
• Risk and vulnerability assessment.

Auditing and logging


• Intrusion detection and prevention systems.
• Incident response.

Organizational security


• Organizational policies.
• Education and training.
• Disposal and destruction.

Business continuity


• Business continuity planning.
• Disaster recovery.
• Environmental controls.


No comments:

Post a Comment