CompTIA Security+

by Community College Of Philadelphia Claim Listing

Cybersecurity is a problem facing individuals, businesses and government at all levels. For instance, parents are worried about online safety of their children and the privacy of their confidential information.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Community College Of Philadelphia Logo

img Duration

32 Hours

Course Details

Cybersecurity is a problem facing individuals, businesses and government at all levels. For instance, parents are worried about online safety of their children and the privacy of their confidential information. Organizations, such as the government maintain a huge amount of confidential information, including intellectual property and critical infrastructures.

These infrastructures and information require protection from the prying eyes of cyber intruders and other actors. In order to be part of a team that is responsible for providing this protection, you need the appropriate training and certification first. This class will help you to acquire those fundamental skills.

 

Course Outline

  • Threats, Attacks and Vulnerabilities - Introduces students to various types of threats, attacks and vulnerabilities, including: malware, social engineering, application/service and wireless attacks. Students will also be introduced to threat vectors and their attributes, as well as penetration testing concepts. 

  • Technologies and Tools - Students will learn how to install, configure, and deploy network components, including firewall, virtual private network, intrusion detection/prevention systems, routers, proxies, protocol analyzers, network scanners, etc. Students will also learn how to troubleshoot common security issues, implement secure protocols, as well as analyze and interpret output from security technologies. 

  • Architecture and Design - The instructor will explain how to implement secure network architecture, including DMZ, NAT, intranet, VPN and VLAN. Students will also learn how to secure systems design, such as Trusted Platform Module and secure boot, as well as secure application development and deployment concepts. This module will also introduce students to the cloud and virtualization concepts, such as hypervisor and security as a service.

  • Identity and Access Management - Introduce students to identity and access management concepts. Students will learn how to install and configure identity and access services, such as Kerberos, CHAP and RADIUS. They will also learn how to implement identity and access controls, such as biometrics and tokens.

  • Risk Management - Learn concepts of policies, plans and procedures relative to organizational security. Students will learn risk assessment concepts, incident response procedures, disaster recovery and business continuity concepts.

  • Data Security and Privacy Practices - The instructor will explain various data security and privacy practices, including shredding and wiping. Students will review data sensitivity labeling and handling concepts, such as confidentiality and private.

  • Cryptography and PKI - Learn cryptography concepts, such as symmetric algorithms, hashing, key exchange, obfuscation, stream and block. Students will also learn how to install and configure wireless security settings, as well as implement public key infrastructure. 

  • Philadelphia Branch

    1700 Spring Garden St, Philadelphia

Check out more Cybersecurity courses in USA

Learning Tree Logo

CGEIT Certification Training

This official ISACA CGEIT certification course prepares you for the exam to become Certified in the Governance of Enterprise IT. It provides you with in-depth coverage on the GEIT Framework.

by Learning Tree [Claim Listing ]
American University Washington DC Logo

Become a Cybersecurity Professional

ain Marketable Skills to Succeed in the Field Accelerated, Practical Cybersecurity Training Develop the advanced skills you’ll need from day one on the job by training on the cybersecurity industry’s top tools and software.

by American University Washington DC [Claim Listing ]
Noble Desktop Logo

Cybersecurity With Python

Learn how Python can be used to automate security processes, execute system administration tasks, and solve common IT problems.

by Noble Desktop [Claim Listing ]
The Code Academy Logo

ISACA CISM – Certified Information Security Manager

While information has become more easily accessible and readily available, the associated risks and security threats have not only increased in number but also complexity.

by The Code Academy [Claim Listing ]
Coding Dojo Logo

Cybersecurity Bootcamp

The importance of cybersecurity today cannot be overstated, which makes it a good time to join a cybersecurity bootcamp. As our reliance on technology grows, there’s a corresponding need to secure and defend networks and data against leaks, theft, and attacks.

by Coding Dojo [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy