top of page

CompTIA Security+

Defscope will provide training based on CompTIA Security+ certification program. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and pursue an IT security career.

Chosen by more organizations

Chosen by more corporations and defense organizations than any other certification on the market to validate baseline security skills and for fulfilling the DoD 8570 compliance

Get hands-on cybersecurity experience

The only foundational cybersecurity certification emphasizing hands-on practical skills, ensuring the security professional is better prepared to problem solve a wider variety of today’s complex issues.

Learn the latest trends and techniques
Gain core cybersecurity knowledge applicable across more of today’s job roles to secure systems, software and hardware.

What do we teach?

Module 1: Attacks,   Threats, and Vulnerabilities

· Compare and Contrast Information Security Roles

· Compare and Contrast Security Control and   Framework Types

· Explain Threat Actor Types and Attack Vectors

· Explain Threat Intelligence Sources

· Assess Organizational Security with Network   Reconnaissance Tools

· Explain Security Concerns with General Vulnerability   Types

· Summarize Vulnerability Scanning Techniques

· Explain Penetration Testing Concepts

· Compare and Contrast Social Engineering   Techniques

· Analyze Indicators of Malware-based Attacks

Module 2: Architecture   and Design

· Compare and Contrast Cryptographic Ciphers

· Summarize Cryptographic Modes of Operation

· Summarize Cryptographic Use Cases and Weaknesses

· Summarize Other Cryptographic Technologies

· Implement Certificates and Certificate   Authorities

· Implement PKI Management

· Summarize Authentication Design Concepts

· Implement Knowledge-based Authentication

· Implement Authentication Technologies

· Summarize Biometrics Authentication Concepts

· Implement Identity and Account Types

· Implement Account Policies

· Implement Authorization Solutions

· Explain the Importance of Personnel Policies

Module 3: Implementation

· Implement Secure Network Designs

· Implement Secure Switching and Routing

· Implement Secure Wireless Infrastructure

· Implement Load Balancers

· Implement Firewalls and Proxy Servers

· Implement Network Security Monitoring

· Summarize the Use of SIEM

· Implement Secure Network Operations Protocols

· Implement Secure Application Protocols

· Implement Secure Remote Access Protocols

· Implement Secure Firmware

· Implement Endpoint Security

· Explain Embedded System Security Implications

Module 4: Operations aSummarize   Incident Response Procedures

· Utilize Appropriate Data Sources for Incident   Response

· Apply Mitigation Controls

· Explain Key Aspects of Digital Forensics   Documentation

· Explain Key Aspects of Digital Forensics Evidence   Acquisitionnd Incident Response

Module 5: Governance,   Risk, and Compliance

· Explain Risk Management Processes and Concepts

· Explain Business Impact Analysis Concepts

· Implement Redundancy Strategies

· Implement Backup Strategies

· Implement Cybersecurity Resiliency Strategies

· Explain the Importance of Physical Site Controls

· Explain the Importance of Physical Host Security   Controls

Instructor

Vusal Salmanli

Principal Cyber Security Consultant

linkedin.png

Background: Former Systems & Network Engineer turned into global cybersecurity instructor, consultant and business owner with around 15 years professional experience in ICT

Day to Day: Principal CyberSecurity Consultant @ CDW USA, Business owner @ Defscope, Co-Founder and Community Leader @ INSECO

Degree & Certifications: MSc, MCP, CCNA, OCE, CCSA, CISA, CISM, CEH, CDPSE

Membership:

•ISACA Gold Level Member (www.isaca.org)

•Member of CompTIA Instructor Network (www.comptia.org)

•Member of AKTA Azerbaijan (www.akta.az)

bottom of page