Security+ Training Certification CompTIA Exam Workshop

Overview

The Security+ course designation from CompTIA is one of the world's premiere vendor neutral security certifications.  CompTIA's Security+ cert is recognized as a meeting the requirements of DoD Directive 8570.1.   We use CompTIA Approved Quality training Content and our hands on labs are designed to help you master the core concepts needs to succeed on your certification exam.

What you will learn

Obtaining CompTIA's Security designations sets you apart as a true IT security expert.  Vendor certifications come and go, but CompTIA's vendor neutral training programs remain the gold standard in global enterprise and public sector IT departments.

In this Security training class you will learn:

The skills needed to devise and implement risk mitigating security policy & procedure

  • Security Crisis management & response
  • Integration of Security considerations into all Network & Cloud based architecture design

Who Needs to Attend

If you are ready to add the Security+ certification training to your skillset, this is class you need to attend.

Prerequisites

You should possess good networking and TCP/IP skills prior to attend the workshop.  Consider attending one of our popular TCP/IP training courses.

Detailed Course Outline


Module One:  Introduction to Security Considerations & Threat Mitigation

  • Overview of IT security considerations
  • If they can touch it, they can break it:  Physical Security
  • The importance of regular system maintenance and updating
  • Understanding the role Application Security plays in keeping modern enterprises safe
  • "Hi, My name is Dan and I am calling to break into your servers".  Social Engineering and the "only for a minute" rule.
  • Lab 1.1: threat identification
  • Lab 1.2: Maintaining BIOS & Operating Systems, Windows & Linux
  • Lab 1.3: Patching Software Applications: What & How
  • Lab 1.4: Antivirus, Spyware & malware Software options & installation
  • Lab 1.5: Facility Security & User & System ID
  • Lab 1.6: Social Engineering Case Study
  • Lab 1.7: Emerging Threat Vectors: BYOD & Social Networking

Module Two: IT Security Core Concepts

  • Information Technology Theory
    • Information Exchange vs Information Confirmation
    • The concept of Information transmission - Encryption Application
    • The concept of Information existing in more than one place - Authentication Application
  • Authentication vs Encryption
    • Why we need both and what they really mean
    • Examples of Authentication
      • The requirement to "confirm" not "transmit" information
    • Examples of Encryption
      • The requirement to "transmit" information
  • Authentication concept explained
    • Authentication factors and requirements
    • How Authentication Algorithms work
    • Authentication systems
    • ​Example of MD5 Hash process
    • Other Authentication Algorithims explored
      • ​SHA1, SHA2
      • SHA-3, SHA-3-x
      • WHIRLPOOL
    • Authentication system vulnerabilities
    • What goes wrong
    • Man in the Middle Authentication challenge
  • Encryption concept explained
  • What is information encryption
    • plaintext vs ciphertext
    • Encoding information for transmission
    • The issue of "key management"
  • Symmetric cryptography
    • Types of symmetric key encryption
      • Stream ciphers
      • Block ciphers
      • Key exchange: "What came first, the chicken or the egg"?
        • The problem of exchanging symmetric keys
        • Techniques developed over the decades to exchange keys:
        • Old School key management techniques: Caution: They have mullets, and they ain't pretty!surprise
  • Asymmetric Key Exchange
    • What a strange a wonderful idea!
    • How can it be possible?
    • "Mathematicians are from Mars"cool
      • Introduction to Diffie-Hellman Key agreement and exchange
    • ​Public/Private Key concept introduced​
      • Public Key Infrastructure
      • PKI: Examples and configuration
      • Implementing PKI
      • Web Server security using PKI
  • Lab 2.1: Authentication with MD5 Hash
  • Lab 2.2: Old School Encryption techniques
  • Lab 2.3: Running Symmetric Key Encryption with AES
  • Lab 2.4: Certificate creation & distribution
  • Lab 2.5: Install & configure stand alone CA Root Certificate Authority & Enterprise CA
  • Lab 2.6: Certificate Revoking, Recovery & re-enrolling
  • Lab 2.7: Managing & Configuring Public Key Infrastructure Setup & configuration using SSL certificates on a Web Based / ISP LAMP server
  • Lab 2.8: Emerging Trends including overview of Quantum Cryptograph

Module Three: Application & Messaging Security Considerations

  • What does it mean to secure an Application?
    • The code life cycle
    • Resource allocation to applications
    • Overview of organizations such as OWASP: The Open Web Application Security Project
    • Threats, Attacks, Vulnerabilities, and Countermeasures
  • E-mail security
    • Regulatory considerations
    • Attack vectors
      • Technical
      • Social Engineering
    • Risks to users
      • Spam
      • Spoofing
      • Message modification
      • Replay
      • Denial of Service
    • Solutions
      • Encryption & Authentication techniques
        • OpenPGP, S/MIME
        • Authentication techniques
      • Secure Server login options
      • Application/Server solutions from vendors
      • Cloud based email services
  • Lab 3.1: Case Study: Identifying Types of Application Attackes
  • Lab 3.2: Deploying an Application Layer Security Firewall
  • Lab 3.3: Install & Configure Citadel Email Server in CentOS
  • Lab 3.4: Implement S/MIME
  • Lab 3.5: Implement SSL Email service
  • Lab 3.6: Implement Open PGP
  • Lab 3.7: Securing IM & Social Network traffic

Module Four: Network Security

  • Network devices, Switches, Routers, Servers, etc. and their security vulnerabilities
  • Securing LAN/WAN topologies
  • Review of core TCP/IP concepts
  • Known security issues in the TCP/IP protocol suite
    • Protocol based attacks
    • The inclusion of out of date protocols in the stack
    • DNS attacks
    • ARP & ICMP considerations
    • Ports & Sockets
    • TCP
    • TCP/IP hijacking
  • Securing Virtualization
  • Virtualization & Risk
  • Cloud computing and security
  • Lab 4.1: Wireshark Capture Scenarios
    • Capture Ethernet & IP packets
    • Examine Router Protocols & MAC/IP relationship in Subnets
      • Compare IPv4 unecrypted ARP vs IPv6 IPsec encrypted ICMPv6
    • Capture, Analyze & Troubleshoot NAT/PAT traffic
    • Capture VLAN traffic, examine Ethernet header fields
    • Capture IPsec & SSL traffic, examine Authentication techniques, Setup, & Encrypted traffic
    • Capture Traffic flowing through a Firewall
    • Capture Virtualization traffic between Physical server & client device
    • Compare Cloud computing traffic
  • Lab 4.2: Capture & Analyze Port Specific Traffic
  • Lab 4.3: Capture & compare IPv4 & IPv6 headers
  • Lab 4.4: Port Scanning with Zmap & nmap - Locating vulnerabilities
  • ​Lab 4.5: ARP & MAC filtering in Ethernet Switches
  • Lab 4.6: Wireshark capture of ARP spoofing
  • Lab 4.7: Capture & Analyze Man in the Middle - Replay & Hijacking

Module Five: Securing Wireless Networks

  • What is Wireless?
    • WiFi
    • Bluetooth
    • 4G-LTE
    • GPS
    • Infra-Red
    • emerging technologies
  • Mobile devices & information security
  • Proliferation of devices:
    • Wifi only laptops
    • Cell phones, Tablets & gaming systems with WiFi
    • Wireless "Internet of Things"
    • BYOD - Wireless & Security
    • Jail-broken phones on your network: root access devices that you don't control
    • OS vulnerabilities in embedded devices
  • Wireless network security
    • Overview of technologies & best practices
  • Lab 5.1: Setting up WiFi protected access WEP, WPA,  WPA2 using TRIP & CCMP
  • Lab 5.2: Hacking WiFi Networks: Troubleshooting Group Exercise
  • Lab 5.3: Securing Bluetooth
  • Lab 5.4: Scanning WiFi with InSSIDer
  • Lab 5.6: Cellular 3G & 4G vulnerability Assessment

Module Six: Virtual Private Networks & Remote Access

  • Remote Access history and trends
  • Remote Network access vs Cloud services
  • What is a VPN?
  • Overview of Virtual Private Networking technologies
    • SSL/TLS
    • IPsec
  • Lab 6.1: Setting up RADIUS
  • Lab 6.2: LDAP configuration with RAS
  • Lab 6.3: TACACS+ Setup & Configuration Troubleshooting
  • Lab 6.4: Setup & Configure NPS with RADIUS
  • Lab 6.5: SSL VPN configuration
  • Lab 6.6: Wireshark Capture & Troubleshooting TLS/SSL VPN
  • Lab 6.7: Setup & Configure IPsec VP

Module Seven: Enterprise & Organizational Security

  • The role of effective Security policies
  • Managing for Enterprise Security
  • Enterprise Information Security Architecture (EISA)
  • Training & Education: The first line of defense
  • Equipment disposal
  • Environmental and secure destruction
  • Redundancy, sustaining operations & disaster recovery
  • Lab 7.1: Network Scanning exercises
  • Lab 7.2: IDS Configuration & Setup: Host, Network & Cloud based solutions examined
  • Lab 7.3: Configuring Honeypots & honeynets
  • Lab 7.4: Social Engineering Group "Steal the Flag" game

Module Eight: Enterprise Vulnerability Testing

  • Assessing Risk
  • Risk vs Vulnerability
  • Logging & monitoring
  • Audits: What, Where & How
  • Intrusion Detection
  • Intrusion Prevention
  • Reporting & tracking security incidents
  • Lab 8.1: Case Study: Security Policy creation
  • Lab 8.2: Case Study: LAN migration, Equipment Recycling
  • Lab 8.3: Case Study: Backup and Restoring
    • RAID levels
    • Approaches
    • media & cloud options

View Schedule

Course Number: 
52237
Duration: 
5 Days

View Schedule