Security+ Prep Course Overview

COURSE LENGTH:
5-DAY

CERTIFICATIONS:
1: SECURITY+


The goal of this 5 Day CompTIA Authorized Security+ Boot Camp Training course is to provide IT Professionals with the most comprehensive accelerated learning environment for the Security+ (SY0-301) exam.

InfoSec Institute is time and time again recognized as the authority in the industry for high-quality Security+ exam prep. Our instructors have a total commitment to the exam objectives of the Security+, and will teach you vital tips and tricks needed to pass the exam the first time you take it. The Security+ Boot Camp teaches you information security theory, as well as reinforces theory with hands-on exercises that help you "learn by doing". You will learn how to configure and operate many different technical security controls over the course of the 5 day Boot Camp.

Our CompTIA Authorized Security+ Boot Camp is Updated with Latest Security+Performanced Based Exam Objectives:

The most recent edition of the CompTIA Security+ exam places greater emphasis on mitigating specific security issues. In previous editions, the Security+ Exam focused on merely recognizing security issues. CompTIA has also introduced Performance Based Exam Objectives, which introduces simulator-based testing commonly found on Cisco and Microsoft exams. Read more about how InfoSec Institue prepares you for these new, more difficult questions on the Security+ exam.

InfoSec Institute applauds this change, even though it makes the exam more difficult. The end result is a Security+ certification that is more meaningful for the information security community.

The new SY0-301 exam covers 6 Primary Objectives:

  • 1. Network Security (21% of exam)
  • 2. Compliance and Operational Security (18%)
  • 3. Threats and Vulnerabilities (21%)
  • 4. Application, Data and Host Security (16%)
  • 5. Access Control and Identity Management (13%)
  • 6. Cryptography (11%)

InfoSec Institute's courseware is aligned with these objectives, enabling our students to have a powerful exam prep resource.

Why Choose InfoSec Institute?
  • There are many options for Security+ certification, why is InfoSec Institute the right place for you?

  • Five (5) full days of quality Security+ training with an expert security instructor

  • You learn from our CompTIA Authorized Quality Curriculum (CAQC)

  • Informative practice exams (enhanced by InfoSec Institute custom practice questions)

  • Extra course content on the Security+ modules we have found is most likely to trip up even seasoned IT pros - Organizational and Infrastructure Baseline Security

  • Gain measurable improvement in hands-on security skills that directly translate to the work environment

  • The InfoSec Institute Personal Touch - one-on-one time with the instructor to help you prepare for the exam

  • Breakfast, Lunch and snacks provided on each day of class

 

 

 

**In anticipation of the new version of Security+ from CompTIA, InfoSec Institute will be upgrading to the SY0-301 for all classes starting after 12/31/2011.



  • 93% Pass Rate!
  • The Industry-recognized leader!
  • Top Security Experts in the Industry
  • Massive Review Session
"Very Very good class for getting you into the frame of mind to understand the concepts and the way the test will present them"

Harvey Gilbert
Unisys

Security+ Course Syllabus

 

Module 1: General Security Concepts
Information Security • Physical Security • Operational Security • Management and Policies • Goals of Information Security • The Security Process • Antivirus Software • Access Control • Authentication • Services and Protocols • Security Topologies • Design Goals • Security Zones • Technologies • Business Concerns

 

Module 2: Know Your Enemy
Attack Strategies • Access Attacks • Modification and Repudiation Attacks • Denial of Service Attacks (DoS) • Common Attacks • Security Concerns and TCP/IP • The TCP/IP Protocol Suite • Application Layer • Host-to-Host or Transport Layer • Internet Layer • Network Interface Layer • Encapsulation • Protocols and Services • TCP/IP Attacks • Software Exploitation • Surviving Malicious Code • Viruses • Trojan Horses • Logic Bombs • Worms • Antivirus Software • Social Engineering • Auditing Processes and Files


Module 3: Infrastructure and Connectivity
Infrastructure Security • Hardware Components • Software Components • Devices • Firewalls • Routers • Switches • Wireless Access Points • Modems • Remote Access Services • Telecom/PBX Systems • Virtual Private Network • Network Monitoring and Diagnostics • Workstations • Servers • Mobile Devices • Remote Access • Serial Line Internet Protocol • Point-to-Point Protocol • Tunneling Protocols • Internet Connections • Ports and Sockets • E-Mail • Web • File Transfer Protocol • SNMP and Other TCP/IP Protocols • Cabling, Wires, and Communications • Coax • Unshielded Twisted Pair and Shielded Twisted Pair • Fiber Optic • Infrared • Radio Frequency • Microwave • Removable Media • Tape • CD-R • Hard Drives • Diskettes • Flash Cards • Smart Cards

 

Module 4: Monitoring Communications Activity
Network Monitoring • Types of Network Traffic • Network Monitoring Systems • Intrusion Detection Systems • Network-Based IDS • Host-Based IDS • Honey Pots • Incident Response • Incident Identification • Investigating the Incident • Repairing the Damage • Documenting the Response • Adjusting the Procedures • Wireless Systems • WTLS • IEEE 802.11 Wireless Protocols • WEP/WAP • Wireless Vulnerabilities • Instant Messaging • IM Vulnerabilities • 8.3 File Naming • Packet Sniffing • Privacy • Signal Analysis/Signal Intelligence • Footprinting • Scanning • Enumeration

 

Module 5: Implementing and Maintaining a Secure Network
Overview of Network Security Threats • Security Baselines • OS/NOS Hardening • Network Protocol Configuration • Microsoft Windows 9x • Microsoft Windows NT 4 • Microsoft Windows 2000 • Microsoft Windows XP • Windows .NET Server 2003 • UNIX/Linux • Novell NetWare • IBM • Apple Macintosh • File Systems • Operating System Updates • Network Hardening • Network Device Updates • Configuring Network Devices • Application Hardening • Web Servers • E-Mail Servers • FTP Servers • DNS Servers • NNTP Servers • File and Print Servers and Services • DHCP Services • Data Repositories


 

 

Module 6: Working with a Secure Network
Physical Security • Access Control • Social Engineering • Environment • Business Continuity Planning • Business Impact Analysis • Risk Assessment • Policies, Standards, and Guidelines • Policies • Standards • Guidelines • Security Standards and ISO 17799 • Information Classification • Public Information • Private Information • Government and Military Classifications • Roles in the Security Process • Information Access Controls

 

Module 7: Cryptography Basics and Methods
Overview of Cryptography • Physical Cryptography • Mathematical Cryptography • Quantum Cryptography • The Myth of Unbreakable Codes • Cryptographic Algorithms • Hashing • Symmetric Algorithms • Asymmetric Algorithms • Using Cryptographic Systems • Confidentiality • Integrity • Authentication • Non-Repudiation • Access Control • Public Key Infrastructure • Certificate Authority • RAs and LRAs • Certificates • Certificate Revocation • Trust Models • Cryptographic Attacks

 

Module 8: Cryptography Standards
Cryptography Standards and Protocols • Origins of Encryption Standards • PKIX/PKCS • X.509 • SSL • TLS • ISAKMP • CMP • S/MIME • SET • SSH • PGP • HTTPS • S-HTTP • IPSec • FIPS • Common Criteria • WTLS • WEP • ISO 17799 • Key Management and the Key Life Cycle • Centralized versus Decentralized Key Generation • Key Storage and Distribution • Key Escrow • Key Expiration • Key Revocation • Key Suspension • Recovering and Archiving Keys • Renewing Keys • Key Destruction • Key Usage


Module 9: Security Policies and Procedures
Business Continuity • Utilities • High Availability • Disaster Recovery • Vendor Support • Service Level Agreements • Code Escrow • Policies and Procedures • Personnel Policies • Business Policies • Certificate Policies • Incident Response Policies • Privilege Management • User and Group Role Management • Single Sign-On • Privilege Decision Making • Auditing • Access Control

 

Module 10: Security Management
Computer Forensics • Methodology of a Forensic Investigation • Chain of Custody • Preservation of Evidence • Collection of Evidence • Security Management • Best Practices and Documentation • Change Management • Systemic Change • Understanding the Roles in a Change Process • Justifying the Need for Change • Scheduling Changes • Change Staging • Change Documentation • Change Notification • Security Awareness and Education • Communications and Awareness • Education • Staying on Top of Security • Websites • Trade Publications • Privacy and Security Regulations • HIPAA • Gramm-Leach Bliley Act of 1999 • Computer Fraud and Abuse Act • FERPA • Computer Security Act of 1987 • Cyberspace Electronic Security Act (CESA) • Cyber Security Enhancement Act • Patriot Act • International Efforts

Dates & Locations

Dates Location Reserve a Seat!
-Dulles, VA Reserve a Seat
-Live Online, Reserve a Seat
-Dulles, VA Reserve a Seat
10/27/14-10/31/14Live Online, Reserve a Seat
12/08/14-12/12/14Dulles, VA Reserve a Seat
12/08/14-12/12/14Live Online, Reserve a Seat
Any Date Your Office!
Get Information for On-Site Training

The best in the world come train with us






See what our students are saying

  • Ryan Argomaniz

    Bank of America

    "test reflected the study materials well"

    "I think the amount of time was appropriate, the information was relevant and well-summarized, and the test reflected the study materials well. My instructor did a great job. My Training Sales Representative has also been very helpful and I am glad that he had taken a great interest to follow up during class to with the students. I am very pleased with InfoSec lnstitute and the entire process."


    Find out more
  •   Rob Carey
    President South Florida Chapter of ISSA

    "unlike any other in the industry"

    "This boot camp provides a very direct and focused review and provides a framework for understanding how to approach the exam, which is unlike any other in the industry. Provided that you follow their program closely, including advance study of the materials they provide as a part of their comprehensive package, this camp will be a week very well spent."


    Find out more
  • Kevin Boland

    Bentley Systems, Inc.

    "I never had a better instructor teach a class. I do mean ever."

    "The instructor was superb. I never had a better instructor teach a class. I do mean ever. He kept it entertaining as well as informational. He was able to apply theory along with real world examples. He stayed late to teach us on topics and discuss. He was truly top notch. ... I will be taking another class from your school in the future. Along with recommending my friends to your school"


    Find out more
  • " ability to make material interesting and fun is rare"

    "As I mentioned before-the instructor's ability to make material interesting and fun is rare. He truly motivates you to not only pass the certification but, to become an IT security "Jedi" & live by the warrior code."


    Find out more

Certifications & Compliance

Get Security+ Certified

The skills and knowledge measured by the Security+ examination were derived and validated though input from a committee and over 1,000 subject matter experts representative of industry. A job task analysis (JTA), global survey, beta examination and beta results review were each milestones in the development process.

The results of these milestones were used in weighing the domains and ensuring that the weighting assigned to each domain is representative of the relative importance of the content. The Security+ certification is an internationally recognized validation of the technical knowledge required of foundation-level security practitioners. A Security+ certified individual has successfully proven holding a foundation-level of skill and knowledge in General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography and Operational / Organizational Security. Candidates are recommended to have two years experience in a networking role with preexisting knowledge of TCP/IP, experience in a security related role, Network+ or equivalent certification, and adequate training and self-study materials. All candidates are encouraged to review the Security+ objectives thoroughly prior to attempting the exam. This examination includes blueprint weighting, test objectives and example content. Example concepts are included to clarify the test objectives and should not be construed as a comprehensive listing of the content of the examination.

 

Course Prerequisites:
This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills who want to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

The CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. It is an international, vendor-neutral certification that is taught at colleges, universities and commercial training centers around the world. Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience, with an emphasis on security.

Because human error is the number one cause for a network security breach, CompTIA Security+ is recognized by the technology community as a valuable credential that proves competency with information security. Major corporations such as Sun, IBM/Tivoli Software Group, Symantec, Motorola, Hitachi Electronics Services and Verisign value the CompTIA Security+ certification and recommend or require it of their IT employees.


Pricing for our SEC+ Training Course

     

     


    Questions: 100

    Exam Duration: 90 minutes each

     

    Recommended Experience:
    Two years experience in networking with emphasis on security

    Adequate training and self-study

    CompTIA Network+ recommended, but not required

     

    Passing Score:
    750 on a scale of 100 - 900

     

    Exam Codes
    CompTIA Security+ E2C Exam: JK0-015
    CompTIA Security+ 2011 Exam: SY0-301

    Note: An updated version of Security+ is scheduled to launch in May 2011.



Pricing

Call (866)-471-0059 or fill out this short form for current pricing

 

Our 5-day intense Security+ Boot Camp provides the most comprehensive approach to Security+ certification.
This is an accelerated immersion course, designed for computer professionals that require effective,
real-world skill-building and timely certification.

YOU ALSO GET

  • CompTIA Authorized Quality Curriculum (CAQC)
  • Best-of-breed practice exams (enhanced by Intense School’s Proprietary Materials
  • Personal, one-on-one mentoring by course instructor
  • Purposeful practice exams and hands-on labs
  • Lunch and snacks provided on each day of class
OUR STUDENTS SAY:
InfoSec Institute has an excellent instructor and this is the best IT security class I have ever taken. His knowledge and method of teaching are unsurpassed.