- Analyze indicators of compromise and determine the type of malware
- Compare and contrast types of attacks
- Explain threat actor types and attributes
- Explain penetration testing concepts
- Explain vulnerability scanning concepts
- Explain the impact associated with types of vulnerabilities
- Home
- GreyCampus
- Courses
- CompTIA Security Plus Certification Training
Online
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Virtual Classroom
|
Mode of Delivery
Video Based
|
Course and certificate fees
certificate availability
Yes
certificate providing authority
GreyCampus
The syllabus
Threats, Attacks, and Vulnerabilities
Technologies and Tools
- Install and configure network components, both hardware and software-based, to support organizational security
- Use appropriate software tools to assess the security posture of an organization
- Troubleshoot common security issues
- Analyze and interpret output from security technologies
- Deploy mobile devices securely
- Implement secure protocols
Architecture and Design
- Explain use cases and purpose for frameworks, best practices, and secure configuration guides
- Implement secure network architecture concepts
- Implement secure systems design
- Explain the importance of secure staging deployment concepts
- Explain the security implications of embedded systems
- Summarize secure application development and deployment concepts
- Summarize cloud and virtualization concepts
- Explain how resiliency and automation strategies reduce risk
- Explain the importance of physical security controls
Identity and Access Management
- Compare and contrast identity and access management concepts
- Install and configure identity and access services
- Implement identity and access management controls
- Differentiate common account management practices
Risk Management
- Explain the importance of policies, plans, and procedures related to organizational security
- Summarize business impact analysis concepts
- Explain risk management processes and concepts
- Given a scenario, follow incident response procedures
- Summarize basic concepts of forensics
- Explain disaster recovery and continuity of operations concepts
- Compare and contrast various types of controls
- Given a scenario, carry out data security and privacy practices
Cryptography and PKI
- Compare and contrast basic concepts of cryptography
- Explain cryptography algorithms and their basic characteristics
- Given a scenario, install and configure wireless security settings
- Given a scenario, implement public key infrastructure