Security+ Training

Security+ Training with Michigan Technology Services

Michigan Technology Services offers instructor-led CompTIA Security+ courses. The Security+ training can take place at our location in Farmington Hills, 20 miles outside of Detroit, where you will sit in a room with one of our instructors, onsite at your office anywhere throughout the United States, or if you prefer, instructor led live online.

This practical “hands-on” 5 day course will teach students the fundamental principles of installing and configuring computer and network security systems. Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts.

In this class, you will experience hands-on labs that provide direct real-world experience. During these labs, you will have:

  • Exposure to interactive questions in preparation for the Certification exam.
  • Exposure to common mal-ware detection isolation and prevention
  • Utilize common hacking tools and methodologies.
  • Build System Configuration Hardening
  • And much more.

This course will prepare students to take the SY0-401 CompTIA Security+ Certification exam, for the objectives released in 2013. CompTIA Security+ Certification has been created as a benchmark for entry-level security skills. Completion of the CompTIA Security+ certification meets criteria for the DoD 8570.01-M Information Assurance Workforce Improvement Program requirements, as modified and enforced starting January 24, 2012.

Course Schedule

Private, Corporate or Group Training Available

Regular Price: $2750

Special: $2550

Date(s) Days Time Type
10/2/17 - 10/6/17 M - F 9:00am - 5:00pm

Live Online Class

Enroll

For detailed Security+ class information or to request a class date contact Michigan Technology Services. 248-489-0408

Who Should Attend

This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing.

Prerequisites

Ideally, students should have successfully completed CompTIA A+ or Network+ certification and have around 24 months' experience of personal computer or networking support. Regardless of whether students have passed CompTIA A+ or Network+, it is recommended that they have the following skills and knowledge before starting this course:

  • Know the function and basic features of the components of a PC.
  • Use Windows to create and manage files and use basic administrative features (Explorer, Control Panel and Management Consoles).
  • Basic network terminology (such as OSI Model, Topology, Ethernet, TCP/IP).
  • TCP/IP addressing, core protocols, and troubleshooting tools.
  • Basic use of desktop virtual workstation environments.

Course Objectives

On course completion, students will be able to:

  • Identify network attack strategies and defenses.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and uses of encryption standards and products.
  • Identify network and host-based security technologies and practices.
  • Describe how remote access security is enforced.
  • Describe the standards and products used to enforce security on web and communications technologies.
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.

Detailed Course Outline

Module 1 - Security Fundamentals
  • Security Concepts
  • Why is Security Important?
  • Security Controls
  • Identification and Authentication
  • Authorization
  • Accounting
  • Threats
  • Types and Sources of Threats
  • Social Engineering
  • Malware
  • Preventing Virus Infection
  • Network Vulnerabilities
  • Network Fundamentals
  • Network Attack Strategies
  • Layer 2 Attacks
  • IP Spoofing and Hijacking
  • Denial of Service Attacks
  • Application Layer Attacks
Module 2 – Network Security
  • Penetration Testing
  • Vulnerability Assessments and
  • Penetration Tests
  • Vulnerability Scanners
  • Honeypots and Honeynets
  • Secure Network Design
  • Secure Network Topologies
  • Network Device Exploitation
  • Switches and VLANs
  • Routers
  • Security Appliances and Software
  • Firewalls
  • Proxy Servers and Gateways
  • Intrusion Detection Systems
  • Audit Logs
  • Network Application Security
  • DHCP Security
  • DNS Security
  • SNMP Security
Module 3 – Internet Security
  • Cryptography
  • What is Cryptography?
  • Encryption Technologies
  • Cryptographic Attacks
  • Steganography
  • Public Key Infrastructure
  • What is PKI?
  • Implementing PKI
  • Cryptographic Standards
  • Securing Web Services
  • HTTP
  • SSL / TLS
  • Web Servers
  • Securing Web Applications
  • Web Browsers
  • File Transfer
Module 4 – Access Control
  • Authentication
  • LAN Manager / NTLM
  • Kerberos
  • PAP and CHAP
  • Password Management
  • Policy
  • Token-based Authentication
  • Biometric Authentication
  • Extensible Authentication Protocol (EAP)
  • Authorization
  • Privilege Policies
  • Directory Services
  • Lightweight Directory Access Protocol (LDAP)
  • Operating System Security
  • Computer Hardening
  • OS Hardening
  • Hardware and Software Updates
  • Network Access Control
  • Remote Access Security
  • What is Remote Access?
  • Remote Connectivity Protocols
  • Remote
  • Access Servers
  • Remote Administration Tools
  • Hardening Remote Access Infrastructure
  • Wireless Access Security
  • Wireless LAN Security
  • Bluetooth
Module 5 - Organizational Security
  • Site Security
  • Physical Access Controls
  • Environmental Security
  • Mobile Device Security
  • Telephony
  • Disaster Recovery and Business Continuity
  • Disaster Recovery Planning
  • Business Continuity and Risk Management
  • Fault Tolerance
  • Backup Strategies
  • Incident Response and Forensics
  • Incident Response Policy
  • Forensic Investigations
  • Operational Security
  • Corporate Security Policy
  • Data Handling
  • HR Policies
  • Next Generation Networks
  • Virtualization Defined
  • Virtual Platform Applications
  • Virtualization
  • Security and Best Practice
  • Cloud Computing
  • IPv4 versus IPv6

Student Successes

Programs and Certifications