Comptia Security
Course content:

  • Threats and Vulnerabilities (continued)
    • Analyze and differentiate among types of mitigation and deterrent techniques.
    • Implement assessment tools and techniques to discover security threats and
    • vulnerabilities.
    • Within the realm of vulnerability assessments, explain the proper use of¬†penetration testing versus vulnerability scanning.
  • Application, Data, and Host Security
    • Explain the importance of application security.
    • Carry out appropriate procedures to establish host security.
    • Explain the importance of data security.
  • Access Control and Identity Management
    • Explain the function and purpose of authentication services.
    • Explain the fundamental concepts and best practices related to authentication,
    • authorization and access control.
    • Implement appropriate security controls when performing account management.
  • Cryptography
    • Summarize general cryptography concepts.
    • Use and apply appropriate cryptographic tools and products.
    • Explain the core concepts of public key infrastructure.
    • Implement PKI, certificate management and associated components.

Book Information:

CompTIA Security+ Deluxe Study Guide: Exam SY0-301, 2nd Edition
Emmett Dulaney
ISBN: 978-1-1180-1474-5
696 pages
July 2011

Want to take this class? Let us know by clicking here.