MyMAHIR

Comptia Security+

text.programmeOutcomes

1. Proactively implement sound security protocols to mitigate security risks. 2. Quickly respond to security issues . 3. Retroactively identify where security breaches may have occurred. 4. Design the network, onsite or in the cloud with security mind.

text.trainingCovered

1. Networking Security -Explain the security function and purpose of network devices and technologies -Apply and implement secure network administration principles -Distinguish and differentiate network design elements and compounds -Implement and use common protocols -Identify commonly used default network ports -Implement wireless network in a secure manner 2. Compliance and Operational Security -Explain risk related concepts -Carry out appropriate risk mitigation strategies -Execute appropriate incident response procedures -Explain the importance of security related awareness and training -Compare and contrast aspects of business continuity -Explain the impact and proper use of environmental controls -Execute disaster recovery plans and procedures -Exemplify the concepts of confidentiality, integrity and availability (CIA) 3. Threats And Vulnerabilities -Analyse and differentiate among types of malware -Analyse and differentiate among types of attacks -Analyse and differentiate among types of social engineering attacks -Analyse and differentiate among types of wireless attacks -Analyse and differentiate among types of application attacks -Analyse and differentiate among types of mitigation and deterrent techniques -Implement assessment tools and techniques to discover security threats and vulnerabilities -Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning 4. Application, data and host security -Explain the importance of application security -Carry out appropriate procedures to establish host security -Explain the importance of data security 5. Access control and identity management -Explain the function and purpose of authentication services -Explain the fundamental concepts and best practices related to authentication, authorisation and access control -Implement appropriate security controls when performing account management 6. Cryptography -Summarise general cryptography concepts -Use and apply appropriate cryptographic tools and products -Explain the concepts of public key infrastructure -Implement PKI, certificate management and associated components

text.programmeMode

enum.programMode.notSpecified

text.duration

5 days

text.hrdcClaimable

text.notSpecified

trainingProgram.programLevel

enum.trainingProgram.foundation

text.trainingProgramProvidedBy SIRIM

button.viewMore

text.relatedSkills