CompTIA S+ Specialist Certificate Program

MyCAA Course Information

Course Code: MYCAA-IT-CTS
Program Duration: 6 Months
Course Level: Advanced
Mentor Supported: Yes

Course Overview

The CompTIA Security+ course provides students with the basic knowledge and skills necessary to become an IT security professional. This course is designed to fully prepare students to sit for and pass the CompTIA Security+ certification exam. Students will gain the knowledge and skills necessary to identify risk and participate in risk mitigation activities as well as provide infrastructure, application, operational and information security. They will also acquire the knowledge necessary to apply security controls to maintain confidentiality, integrity and availability, as well as how to identify appropriate technologies and products. Finally, students will gain an awareness of applicable policies, laws and regulations with regard to IT security. Prospective job roles for successful candidates include security engineer, security architect, security assurance technician, security consultant/specialist, systems administrator, network administrator and security administrator. CompTIA N+ certification plus 2 years of technical networking experience with a focus on security is recommended for success on the exam.

Use the form below to request information about this course.

Request Information

First Name*
Last Name*
Email Address*
Telephone Number*
Certificate Objective*
Program Interest*
Image Verification*
Image Verification
Enter the text from the image above to help combat spam. Validation of your entry is case-sensitive. If you cannot read the text above, refresh this page to view a different image.

Course Description

Computer Technology Industry Association (CompTIA) S+ training designates knowledgeable professionals in the field of IT security. As an international, vendor-neutral credential, CompTIA S+ certification ensures successful students gain competency in network security, compliance and operational security, common/possible threats and vulnerabilities, application, data and host security, access control and identity management as well as cryptography. Earning CompTIA S+ Certification signifies to employers that candidates will apply their knowledge of security concepts, tools and procedures to prevent security breaches, react accordingly to any security incidents and anticipate further security risks in order to effectively guard against them. Many well-known companies, government contractors and government agencies employ CompTIA S+ certified staff in order to ensure the quality of their work and CompTIA S+ is also one of the options for certifications required by the US Department of Defense for both military personnel and contractors engaged in information security activities.

Program Objectives

At the conclusion of this program, students will be able to:

Describe common risks, vulnerabilities and controls

Explain the triple constraint of information security

Analyze and differentiate between types of malware and attacks

Identify risks for common system hardware and peripherals

Describe principles of software, data and host security

Implement OS hardening procedures

Identify common types of programming attacks

Implement secure browsing practices

Describe security vulnerabilities unique to virtualized environments

Explain the purpose and vulnerabilities of common network devices

Identify and secure common ports and protocols

Describe security concerns unique to cloud computing environments

Identify IDS and IPS solutions for host and network defense

Describe the differences between identification, authentication and authorization in Access Control

Identify various methods for access authentication

Implement logical access control methods

Distinguish between discretionary, mandatory, rule-based and role-based access control implementations

Identify various types of risk management strategies (transfer, accept, mitigate, eliminate)

Distinguish between management, technical and operational controls

Calculate risk using subjective and objective measures

Implement compliance audits for common security controls

Explain the difference between penetration testing and vulnerability scanning

Distinguish between symmetric and asymmetric forms of encryption

Explain the use of public-key/private-key pairs to encrypt and decrypt a secure message

Identify common security protocols (SSH, SSL, IPSec)

Explain basic hashing concepts

Distinguish between types of tickets, keys and certificate authorities in a PKI

Distinguish between business continuity and disaster recovery objectives and timeframes

Implement common backup rotation cycles

Identify various types of redundant hardware and backup sites

Recognize various types of environmental control solutions

Identify RAID configurations for common availability and redundancy requirements

Analyze and distinguish between forms of social engineering

Describe the principles of operational security

Identify common personnel security policies

Describe data reminisce and secure disposal practices

Explain common CIRT roles and responsibilities

Use Microsoft Office

MyCAA Approved
MyCAA Approved
Why ECA?

Partnered with Regionally Accredited Colleges and Universities

Online Learning

Open Enrollment

Multiple funding options

Professional Training

Optional Externships

Available 24/7

Education Consulting Associates
Search
Main Banner
computer-technology
Badge 1
Badge 2
Badge 3
Badge 4
© 2018 Education Consulting Associates, all rights reserved worldwide.
Software: ClickCartPro, Copyright 1999-2018 Kryptronic, Inc. Exec Time: 0.092537 Seconds Memory Usage: 4.510262 Megabytes
Kryptronic Internet Software Solutions