CompTIA Security+
Defscope will provide training based on CompTIA Security+ certification program. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.
Chosen by more organizations
Chosen by more corporations and defense organizations than any other certification on the market to validate baseline security skills and for fulfilling the DoD 8570 compliance
Get hands-on cybersecurity experience
The only foundational cybersecurity certification emphasizing hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of today’s complex issues.
Learn the latest trends and techniques
Gain core cybersecurity knowledge applicable across more of today’s job roles to secure systems, software and hardware.
Biz nə öyrədirik?
Module 1: Attacks, Threats, and Vulnerabilities
· Compare and Contrast Information Security Roles
· Compare and Contrast Security Control and Framework Types
· Explain Threat Actor Types and Attack Vectors
· Explain Threat Intelligence Sources
· Assess Organizational Security with Network Reconnaissance Tools
· Explain Security Concerns with General Vulnerability Types
· Summarize Vulnerability Scanning Techniques
· Explain Penetration Testing Concepts
· Compare and Contrast Social Engineering Techniques
· Analyze Indicators of Malware-based Attacks
Module 2: Architecture and Design
· Compare and Contrast Cryptographic Ciphers
· Summarize Cryptographic Modes of Operation
· Summarize Cryptographic Use Cases and Weaknesses
· Summarize Other Cryptographic Technologies
· Implement Certificates and Certificate Authorities
· Implement PKI Management
· Summarize Authentication Design Concepts
· Implement Knowledge-based Authentication
· Implement Authentication Technologies
· Summarize Biometrics Authentication Concepts
· Implement Identity and Account Types
· Implement Account Policies
· Implement Authorization Solutions
· Explain the Importance of Personnel Policies
Module 3: Implementation
· Implement Secure Network Designs
· Implement Secure Switching and Routing
· Implement Secure Wireless Infrastructure
· Implement Load Balancers
· Implement Firewalls and Proxy Servers
· Implement Network Security Monitoring
· Summarize the Use of SIEM
· Implement Secure Network Operations Protocols
· Implement Secure Application Protocols
· Implement Secure Remote Access Protocols
· Implement Secure Firmware
· Implement Endpoint Security
· Explain Embedded System Security Implications
Module 4: Operations aSummarize Incident Response Procedures
· Utilize Appropriate Data Sources for Incident Response
· Apply Mitigation Controls
· Explain Key Aspects of Digital Forensics Documentation
· Explain Key Aspects of Digital Forensics Evidence Acquisitionnd Incident Response
Module 5: Governance, Risk, and Compliance
· Explain Risk Management Processes and Concepts
· Explain Business Impact Analysis Concepts
· Implement Redundancy Strategies
· Implement Backup Strategies
· Implement Cybersecurity Resiliency Strategies
· Explain the Importance of Physical Site Controls
· Explain the Importance of Physical Host Security Controls
Təlimçi
Vusal Salmanli
Principal Cyber Security Consultant
Background: Former Systems & Network Engineer turned into global cybersecurity instructor, consultant and business owner with around 15 years professional experience in ICT
Day to Day: Principal CyberSecurity Consultant @ CDW USA, Business owner @ Defscope, Co-Founder and Community Leader @ INSECO
Degree & Certifications: MSc, MCP, CCNA, OCE, CCSA, CISA, CISM, CEH, CDPSE
Membership:
•ISACA Gold Level Member (www.isaca.org)
•Member of CompTIA Instructor Network (www.comptia.org)
•Member of AKTA Azerbaijan (www.akta.az)