NTUC LearningHub

Course Overview

 

CompTIA's Security+ certification is a foundation-level certificate designed for IT administrators with two years' experience whose job role is focused on system security.

CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents—not just identify them.

Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements. Regulators and government rely on ANSI accreditation because it provides confidence and trust in the outputs of an accredited program.

Course Objectives

 

Upon completing the course, students will be able to:

  • Compare security roles and security controls
  • Explain threat actors and threat intelligence
  • Perform security assessments and identify social engineering attacks and malware types
  • Summarize basic cryptographic concepts and implement public key infrastructure
  • Implement authentication controls
  • Implement identity and account management controls
  • Implement secure network designs, network security appliances, and secure network protocols
  • Implement host, embedded/Internet of Things, and mobile security solutions
  • Implement secure cloud solutions
  • Explain data privacy and protection concepts
  • Perform incident response and digital forensics
  • Summarize risk management concepts and implement cybersecurity resilience
  • Explain physical security

 

Pre-requisites

 

To ensure your success in this course, you should have basic Windows and Linux administrator skills and the ability to implement fundamental networking appliances and IP addressing concepts. CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months' experience in networking, including configuring security parameters, are strongly recommended.

It is recommended that you have prior formal trainings in the following:

  • CompTIA A+
  • CompTIA Network+

Hardware & Software
This course will be conducted as a Virtual Live Class (VLC) via Zoom platform. Participants must own a zoom account and have a laptop or a desktop with “Zoom Client for Meetings” installed. This can be downloaded from https://zoom.us/download.

System Requirement

Must Have:

Please ensure that your computer or laptop meets the following requirements.

  • Operating system: Windows 10 or MacOS (64 bit or above)
  • Processor/CPU: 1.8 GHz, 2-core Intel Core i3 or higher
  • Minimum 20 GB hard disk space.
  • Minimum 8 Gb RAM
  • Webcam (The camera must be turned on for the duration of the class)
  • Microphone
  • Internet Connection: Wired or Wireless broadband
  • Latest version of Zoom software to be installed on computer or laptop prior to the class.

Good to Have:

  • Wired internet connection
    Wired internet will provide you with stable and reliable connection.
  • Dual monitors
    Using a dual monitor setup will undoubtedly improve your training experience, enabling you to simultaneously participate in hands-on exercises and maintain engagement with your instructor.>

Not Recommended:

Using tablets is not recommended due to their smaller screen size, which could cause eye strain and discomfort over the course of the program's duration.

 

Course Outline

 

Lesson 1: Comparing Security Roles and Security Controls

  • Compare and contrast information security roles
  • Compare and contrast security control and framework types

Lesson 2: Explaining Threat Actors and Threat Intelligence

  • Explain threat actor types and attack vectors
  • Explain threat intelligence sources

Lesson 3: Performing Security Assessments

  • Assess organizational security with network reconnaissance tools.
  • Explain security concerns with general vulnerability types.
  • Summarize vulnerability scanning techniques.
  • Explain penetration testing concepts.

Lesson 4: Identifying Social Engineering and Malware

  • Compare and contrast social engineering techniques.
  • Analyze indicators of malware-based attacks.

Lesson 5: Summarizing Basic Cryptographic Concepts

  • Compare and contrast cryptographic ciphers.
  • Summarize cryptographic modes of operation.
  • Summarize cryptographic use cases and weaknesses.
  • Summarize other cryptographic technologies.

Lesson 6: Implementing Public Key Infrastructure

  • Implement certificates and certificate authorities.
  • Implement PKI management.

Lesson 7: Implementing Authentication Controls

  • Summarize authentication design concepts.
  • Implement knowledge-based authentication.
  • Implement authentication technologies.
  • Summarize biometrics authentication concepts.

Lesson 8: Implementing Identity and Account Management Controls

  • Implement identity and account types.
  • Implement account policies.
  • Implement authorization solutions.
  • Explain the importance of personnel policies.

Lesson 9: Implementing Secure Network Designs

  • Implement secure network designs.
  • Implement secure routing and switching.
  • Implement secure wireless infrastructure.
  • Implement load balancers.

Lesson 10: Implementing Network Security Appliances

  • Implement firewalls and proxy servers.
  • Implement network security monitoring.
  • Summarize the use of SIEM.

Lesson 11: Implementing Secure Network Protocols

  • Implement secure network operations protocols.
  • Implement secure application protocols.
  • Implement secure remote access protocols.

Lesson 12: Implementing Host Security Solutions

  • Implement secure firmware.
  • Implement endpoint security.
  • Explain embedded system security implications.

Lesson 13: Implementing Secure Mobile Solutions

  • Implement mobile device management.
  • Implement secure mobile device connections.

Lesson 14: Summarizing Secure Application Concepts

  • Analyze indicators of application attacks.
  • Analyze indicators of web application attacks.
  • Summarize secure coding practices.
  • Implement secure script environments.
  • Summarize deployment and automation concepts.

Lesson 15: Implementing Secure Cloud Solutions

  • Summarize secure cloud and virtualization services.
  • Apply cloud security solutions.
  • Summarize infrastructure as code concepts.

Lesson 16: Explaining Data Privacy and Protection Concepts

  • Explain privacy and data sensitivity concepts.
  • Explain privacy and data protection controls.

Lesson 17: Performing Incident Response

  • Summarize incident response procedures.
  • Utilize appropriate data sources for incident response.
  • Apply mitigation controls.

Lesson 18: Explaining Digital Forensics

  • Explain key aspects of digital forensics documentation.
  • Explain key aspects of digital forensics evidence acquisition.

Lesson 19: Summarizing Risk Management Concepts

  • Explain risk management processes and concepts.
  • Explain business impact analysis concepts.

Lesson 20: Implementing Cybersecurity Resilience

  • Implement redundancy strategies.
  • Implement backup strategies.
  • Implement cybersecurity resiliency strategies.

Lesson 21: Explaining Physical Security

  • Explain the importance of physical site security controls.
  • Explain the importance of physical host security controls.

 

Certificate Obtained and Conferred by

 

  • Certificate of Completion from NTUC LearningHub

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion from NTUC LearningHub.

  • Statement of Attainment (SOA) from SkillsFuture Singapore

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a SOA from SkillsFuture Singapore to certify that the participant has achieved the following Competency Standard(s):

  • ICT-DES-3004-1.1 Security Architecture
  • External Certification

After completing this course and when you’re ready to take the exam, purchase your Security+ voucher from the NTUC LearningHub Exam Unit. A voucher code will be issued to you that will enable you to sign up for your exam. CompTIA exams are proctored at a Pearson VUE testing center in a highly-secure environment. Visit Pearson Vue (http://www.pearsonvue.com/comptia/) to find a testing center near you.

Categories
More Information
  • NTUC LearningHub
  • No comments yet.
  • Add a review
    error: Content is protected !!