COMPTIA SECURITY+

As Cybercrime is becoming more and more a serious threat to systems and identities, systems engineers and network administrators need to upscale their knowledge and skills to respond to these threats in a professional way. The Security+ course delivers the knowledge and skills required to:

* Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions.

* Monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology.

* Operate with an awareness of applicable regulations and policies, including principles of governance, risk, and compliance.

* Identify, analyze, and respond to security events and incidents.

35 hours
35 hours
English or Greek
6 - 16

code:COMPTIA SEC+

  • Objectives

    Upon completion the partcipants will be able to:

    • Describe Security Roles and Controls
    • Summarize basic cryptographic concepts
    • Summarize secure application concepts
    • Summarizing risk management concepts
    • Compare security roles and controls
    • Explain threat actors and threat intelligence
    • Perform security assessments
    • Identify social engineering and malware
    • Implement public key infrastructure
    • Implement authentication controls
    • Implement identity and account management controls
    • Implement secure network designs
    • Implement network security appliances
    • Implement secure network protocols
    • Implement host security solutions
    • Implementing secure mobile solutions
    • Implement secure cloud solutions
    • Explain data privacy and protection concepts
    • Perform incident response
    • Explain digital forensics
    • Implement cybersecurity resilience
    • Explain physical security

  • Topics

    1 - COMPARING SECURITY ROLES AND CONTROLS
    • Topic 1A: Compare and Contrast Information Security Roles
    • Topic 1B: Compare and Contrast Security Control and Framework Types

    2 - EXPLAINING
    THREAT ACTORS AND THREAT INTELLIGENCE
    • Topic 2A: Explain Threat Actor Types and Attack Vectors

    3 - PERFORMING SECURITY ASSESSMENTS
    • Topic 3A: Assess Organizational Security with Network Reconnaissance
    Tools
    • Topic 3B: Explain Security Concerns with General Vulnerability Types
    • Topic 3C: Summarize Vulnerability Scanning Techniques
    • Topic 3D: Explain Penetration Testing Concepts

    4 - IDENTIFYING SOCIAL ENGINEERING AND MALWARE
    • Topic 4A: Compare and Contrast Social Engineering Techniques
    • Topic 4B: Analyze Indicators of Malware-Based Attacks

    5 - SUMMARIZING BASIC CRYPTOGRAPHIC CONCEPTS
    • Topic 5A: Compare and Contrast Cryptographic Ciphers
    • Topic 5B: Summarize Cryptographic Modes of Operation
    • Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
    • Topic 5D: Summarize Other Cryptographic Technologies

    6 - IMPLEMENTING PUBLIC KEY INFRASTRUCTURE
    • Topic 6A: Implement Certificates and Certificate Authorities
    • Topic 6B: Implement PKI Management

    7 - IMPLEMENTING AUTHENTICATION CONTROLS
    • Topic 7A: Summarize Authentication Design Concepts
    • Topic 7B: Implement Knowledge-Based Authentication
    • Topic 7C: Implement Authentication Technologies
    • Topic 7D: Summarize Biometrics Authentication Concepts

    8 - IMPLEMENTING IDENTITY AND ACCOUNT MANAGEMENT CONTROLS
    • Topic 8A: Implement Identity and Account Types
    • Topic 8B: Implement Account Policies
    • Topic 8C: Implement Authorization Solutions
    • Topic 8D: Explain the Importance of Personnel Policies

    9 - IMPLEMENTING SECURE NETWORK DESIGNS
    • Topic 9A: Implement Secure Network Designs
    • Topic 9B: Implement Secure Switching and Routing
    • Topic 9C: Implement Secure Wireless Infrastructure
    • Topic 9D: Implement Load Balancers

    10 - IMPLEMENTING NETWORK SECURITY APPLIANCES
    • Topic 10A: Implement Firewalls and Proxy Servers
    • Topic 10B: Implement Network Security Monitoring
    • Topic 10C: Summarize the Use of SIEM

    11 - IMPLEMENTING SECURE NETWORK PROTOCOLS
    • Topic 11A: Implement Secure Network Operations Protocols
    • Topic 11B: Implement Secure Application Protocols
    • Topic 11C: Implement Secure Remote Access Protocols

    12 - IMPLEMENTING HOST SECURITY SOLUTIONS
    • Topic 12A: Implement Secure Firmware
    • Topic 12B: Implement Endpoint Security
    • Topic 12C: Explain Embedded System Security Implications

    13 - IMPLEMENTING SECURE MOBILE SOLUTIONS
    • Topic 13A: Implement Mobile Device Management
    • Topic 13B: Implement Secure Mobile Device Connections

    14 - SUMMARIZING SECURE APPLICATION CONCEPTS
    • Topic 14A: Analyze Indicators of Application Attacks
    • Topic 14B: Analyze Indicators of Web Application Attacks
    • Topic 14C: Summarize Secure Coding Practices
    • Topic 14D: Implement Secure Script Environments
    • Topic 14E: Summarize Deployment and Automation Concepts

    15 - IMPLEMENTING SECURE CLOUD SOLUTIONS
    • Topic 15A: Summarize Secure Cloud and Virtualization Services
    • Topic 15B: Apply Cloud Security Solutions
    • Topic 15C: Summarize Infrastructure as Code Concepts

    16 - EXPLAINING DATA PRIVACY AND PROTECTION CONCEPTS
    • Topic 16A: Explain Privacy and Data Sensitivity Concepts
    • Topic 16B: Explain Privacy and Data Protection Controls

    17 - PERFORMING INCIDENT RESPONSE
    • Topic 17A: Summarize Incident Response Procedures
    • Topic 17B: Utilize Appropriate Data Sources for Incident Response
    • Topic 17C: Apply Mitigation Controls

    18 - EXPLAINING DIGITAL FORENSICS
    • Topic 18A: Explain Key Aspects of Digital Forensics Documentation
    • Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition

    19 - SUMMARIZING RISK MANAGEMENT CONCEPTS
    • Topic 19A: Explain Risk Management Processes and Concepts

    20 - IMPLEMENTING CYBERSECURITY RESILIENCE
    • Topic 20A: Implement Redundancy Strategies
    • Topic 20B: Implement Backup Strategies
    • Topic 20C: Implement Cybersecurity Resiliency Strategies

    21 - EXPLAINING PHYSICAL SECURITY
    • Topic 21A: Explain the Importance of Physical Site Security Controls
    • Topic 21B: Explain the Importance of Physical Host Security Controls

  • Participants

    Εργοδοτούμενοι, αυτοτελώς εργαζόμενοι και άνεργοι οι οποίοι πρέπει να διαθέτουν καλή γνώση στη διαχείριση της τεχνολογίας πληροφοριών (IT administration) με έμφαση στην ασφάλεια πληροφοριών.

     

  • Methodology

    Lecture, discussion, demonstration and practice.