Comptia
CompTIA Network Security Professional (Security+ / PenTest+ / CySA+)

Seminar-Beschreibung

On this accelerated 6-day CompTIA Network Vulnerability Assessment Professional (CNVP) course, you’ll get the knowledge and skills required to identify, exploit, report, and manage vulnerabilities on a network and how to troubleshoot security incidents within an organisation.
Combining theory and practice from official CompTIA Security+ and PenTest+ curricula, your expert instructor will guide you through how to provide infrastructure and operational security through risk analysis and mitigation. You’ll learn about the following CompTIA Security+ topics:
• Network Security
• Compliance and Operational Security
• Threats and Vulnerabilities
• Application, Data and Host Security
• Access Control and Identity Management
• Cryptography
• Threat Management
• Vulnerability Management
• Reaktion auf Cybersecurity Vorfälle
• Security Architektur und Tool Sets

Seminarziel

During the course, you’ll prepare for and sit the following CompTIA Security+ and PenTest+exams, covered by your Certification Guarantee.
• Exam SY0-501 Security+
• Exam PT0-001 PenTest+
• CS0-002 CySA+

Seminarsformen

Online-Seminar

15 Tage

1 – 25 Teilnehmer

Online

Preis nach Angebot

Firmen-Seminar

15 Tage (anpassbar)

1 – 15 Teilnehmer

Biplus ACADEMY, Bonn

Preis nach Angebot

Inhouse-Seminar

15 Tage (anpassbar)

1 – 30 Teilnehmer

In Ihrem Hause/Büro

Preis nach Angebot

Seminar-Details

Zielgruppe

Before attending the course, it is recommended that you have:

  • previously attended the CompTIA A+ and/or CompTIA Network+ course
  • two years of experience in IT administration with a security focus
  • an understanding of operating systems and knowledge of Windows-based systems such as Windows 7 or Windows 8.1
  • the ability to identify basic network components and their roles, including routers, switches, firewalls and server roles. Some firewall configuration experience would be beneficial
  • a basic understanding of Wireless networks
  • a basic understanding of the OSI Model and TCP/IP including IPv4 subnetting

Ihr Seminar

Präsenz-Seminar
Online-Seminar

Präsenz-Seminar

Seminarmethode
Vermittlung der Theorie in Kombination mit der Bearbeitung von praxisnahen Beispielen.

Seminarunterlagen
Sie erhalten zu jedem Seminar die passenden Unterlagen oder passende Fachliteratur.

Technische Umgebung
Der Arbeitsplatz ist mit hochwertigen und leistungsstarken PCs sowie Virtuellen Maschinen ausgestattet. Ebenso sind die Monitore Höhenverstellbar.

Seminarumgebung
Alle Systeme werden individuell vor jedem Seminar neu aufgesetzt.

Seminarmaterialien
Sie erhalten einen DIN A4 Schreibblock mit passenden Stiften sowie eine Seminarmappe zum Abheften der Seminarsunterlagen.

Seminarzertifikat
Sie erhalten nach Abschluss des Seminars ein Seminarzertifikat inklusive der vermittelnden Kenntnisse.

Seminarzeiten
Montag bis Freitag von 8:00 Uhr bis 17:00 Uhr

Ort für Präsenz-Seminare
Biplus ACADEMY
Godesberger Allee 125–127
53175 Bonn
oder als Online- sowie Inhouse-Seminar

Seminarräume
Alle Seminarräume sind freundlich und hell ausgestattet mit einer hochwertigen Infrastruktur.

Online-Seminar

Seminarmethode
Jeder Teilnehmer erhält seine eigene Seminarumgebung, dadurch kann der Trainer die Übungen in einer Mischung aus Theorie und Praxis wie in einem Präsenzseminar durchführen.
Die Kommunikation zwischen Trainer und Teilnehmer erfolgt via zoom aber auch Teams, Webex oder eine andere bevorzugte Lösung.

Seminarunterlagen
Seminarunterlagen oder Fachbuch zum Seminar inklusive, kann nach Rücksprache mit dem Trainer individuell ausgewählt werden. Alle benötigten Seminarunterlagen bekommen Sie rechtzeitig vor Beginn der Seminar per Post zugeschickt.

Technische Umgebung
Virtual Classroom mit eigenem Seminars-PC für jeden Teilnehmer.
Die Virtual Classroom Lösung lässt sich im Browser betreiben.
Keine Installation am eigenen PC notwendig.
Zugang zu Ihrem Firmennetz erlaubt.
Auf Wunsch können Monitor, Webcam etc. günstig zur Verfügung gestellt werden.

Seminarumgebung
Alle Systeme werden individuell vor jedem Seminar neu aufgesetzt.

Seminarmaterialien
Din A4 Block, Notizblock, Kugelschreiber, USB-Stick, Textmarker, Post-its

Seminarzertifikat
Das Teilnahmezertifikat, inkl. Gliederung der behandelten Themen wird Ihnen per Post zugesandt.

Seminarzeiten
Montag bis Freitag von 8:00 Uhr bis 17:00 Uhr

Ort für Online-Seminare
Online im Virtual Classroom

Risikofreies Buchen unserer Seminare

Abrechnung
Sie zahlen das Seminar erst nach der Durchführung und nicht im Voraus!

Rücktrittsrecht
Sie können kostenlos bis zum Vortrag des Seminars von der Buchung zurücktreten.

Reservieren statt Buchen!
Reservieren Sie Ihren Seminarplatz – Buchen Sie das Seminar erst ein Tag vor Seminarstart.

Bildungsgutschein
Bildungsscheck NRW, Bildungsprämie

Seminar-Inhalte

Security+

1.0 Threats, Attacks and Vulnerabilities

  • Given a scenario, analyse indicators of compromise and determine the type of malware.
  • 2 Compare and contrast types of attacks.
  • 3 Explain threat actor types and attributes.
  • 4 Explain penetration testing concepts.
  • 5 Explain vulnerability scanning concepts.
  • 6 Explain the impact associated with types of vulnerabilities.

2.0 Technologies and Tools

  • 1 Install and configure network components, both hardwareand software-based, to support organisational security.
  • 2 Given a scenario, use appropriate software tools to assess the security posture of an organisation.
  • 3 Given a scenario, troubleshoot common security issues.
  • 4 Given a scenario, analyse and interpret output from security technologies.
  • 5 Given a scenario, deploy mobile devices securely.
  • 6 Given a scenario, implement secure protocols.

3.0 Architecture and Design

  • 1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
  • 2 Given a scenario, implement secure network architecture concepts.
  • 3 Given a scenario, implement secure systems design.
  • 4 Explain the importance of secure staging deployment concepts.
  • 5 Explain the security implications of embedded systems.
  • 6 Summarise secure application development and deployment concepts.
  • 7 Summarise cloud and virtualisation concepts.
  • 8 Explain how resiliency and automation strategies reduce risk.
  • 9 Explain the importance of physical security controls.

4.0 Identity and Access Management

  • 1 Compare and contrast identity and access management concepts.
  • 2 Given a scenario, install and configure identity and access services.
  • 3 Given a scenario, implement identity and access management controls.
  • 4 Given a scenario, differentiate common account management practices.

5.0 Risk Management

  • 1 Explain the importance of policies, plans and procedures related to organisational security.
  • 2 Summarise business impact analysis concepts.
  • 3 Explain risk management processes and concepts.
  • 4 Given a scenario, follow incident response procedures.
  • 5 Summarise basic concepts of forensics.
  • 6 Explain disaster recovery and continuity of operation concepts.
  • 7 Compare and contrast various types of controls.
  • 8 Given a scenario, carry out data security and privacy practices.

6.0 Cryptography and PKI

  • 1 Compare and contrast basic concepts of cryptography.
  • 2 Explain cryptography algorithms and their basic characteristics.
  • 3 Given a scenario, install and configure wireless security settings.
  • 4 Given a scenario, implement public key infrastructure.

PenTest+

  1. Planning and Scoping
  • Explain the importance of planning for an engagement
  • Explain key legal concepts.
  • Explain the importance of scoping an engagement properly.
  • Explain the key aspects of compliance-based assessments.
  1. Information Gathering and Vulnerability Identification
  • Given a scenario, conduct information gathering using appropriate techniques
  • Given a scenario, perform a vulnerability scan.
  • Given a scenario, analyse vulnerability scan results
  • Explain the process of leveraging information to prepare for exploitation.
  • Explain weaknesses related to specialised systems
  1. Attacks and Exploits
  • Compare and contrast social engineering attacks
  • Given a scenario, exploit network-based vulnerabilities
  • Given a scenario, exploit wireless and RF-based vulnerabilities
  • Given a scenario, exploit application-based vulnerabilities
  • Given a scenario, exploit local host vulnerabilities
  • Summarise physical security attacks related to facilities
  • Given a scenario, perform post-exploitation techniques
  1. Penetration Testing Tools
  • Given a scenario, use Nmap to conduct information gathering exercises
  • Compare and contrast various use cases of tools
  • Given a scenario, analyse tool output or data related to a penetration test
  • Given a scenario, analyse a basic script (limited to Bash, Python, Ruby, and PowerShell)
  1. Reporting and Communication
  • Given a scenario, use report writing and handling best practices
  • Explain post-report delivery activities
  • Given a scenario, recommend mitigation strategies for discovered vulnerabilities
  • Explain the importance of communication during the penetration testing process

CySA+

Section 1: Threat Management

  • Module 1: Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
  • Module 2: Given a scenario, analyse the results of a network reconnaissance
  • Module 3: Given a network-based threat, implement or recommend the appropriate response and countermeasure
  • Module 4: Explain the purpose of practices used to secure a corporate environment

Section 2: Vulnerability Management

  • Module 1: Given a scenario, implement an information security vulnerability management process
  • Module 2: Given a scenario, analyse the output resulting from a vulnerability scan
  • Module 3: Compare and contrast common vulnerabilities found in the following targets

Section 3: Cyber Incident Response

  • Module 1: Given a scenario, distinguish threat data or behaviour to determine the impact of an incident
  • Module 2: Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation
  • Module 3: Explain the importance of communication during the incident response process
  • Module 4: Given a scenario, analyse common symptoms to select the best course of action to support incident response
  • Module 5: Summarise the incident recovery and post-incident response process

Section 4: Security Architecture and Tool Sets

  • Module 1: Explain the relationship between frameworks, common policies, controls, and procedures
  • Module 2: Given a scenario, use data to recommend remediation of security issues related to identity and access management
  • Module 3: Given a scenario, review security architecture and make recommendations to implement compensating controls
  • Module 4: Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)
  • Module 5: Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies

Diese Seminare könnten Sie auch interresieren

CompTIA Systems Support Specialist (A+/ Linux+)

During the course, you'll prepare for and sit the following CompTIA A+ and Linux+ exams, covered by your Certification Guarantee.
• Exam 220-901 CompTIA A+ (English)
• Exam 220-901 CompTIA A+ (English)
• Exam LX0-103 CompTIA Linux+ (English, German, Portuguese, Spanish)
• Exam LX0-104 CompTIA Linux+ Exam LX0-104 (English, German, Portuguese, Spanish)

When you pass the above exams, you'll also receive the following certifications for free:
• Novell CLA Certification
• LPI Level 1 Certification (LPIC-1)

jetzt ansehen

CompTIA Security Analytics Expert (Security+/CySA+/CASP)

During the course, you'll prepare for and sit the following CompTIA Security+, CySA+ and CASP+ exams, covered by your Certification Guarantee.
• CompTIA Security+ Exam SY0-401 (English, Japanese, Portuguese and Simplified Chinese)
• CompTIA CySA+ Exam CS1-001 (English)
• CompTIA CASP+ Exam CAS-002 (English)

jetzt ansehen