Comptia
CompTIA Secure Cloud Professional (Security+_Cloud+)

Seminar-Beschreibung

Combining theory and practice from official CompTIA Security+ topics:

• Network Security
• Compliance and Operational Security
• Threats and Vulnerabilities
• Application, Data and Host Security
• Access Control and Identity Management
• Cryptography

you’ll also understand the aspects of IT security and industry best practices related to cloud implementations and virtualization:

• Cloud concepts and models
• Virtualisation
• Cloud infrastructure
• Resource management
• Security
• Systems management
• Business continuity in the cloud

Schulungsziel

During the course, you’ll prepare for and sit the following CompTIA Security+ and PenTest+exams, covered by your Certification Guarantee.
• Exam SY0-501
• CompTIA Cloud+ (Exam CV0-001) English

Schulungsformen

Online-Schulung

10 Tage

1 – 25 Teilnehmer

Online

Preis nach Angebot

Firmen-Schulung

10 Tage (anpassbar)

1 – 15 Teilnehmer

Biplus ACADEMY, Bonn

Preis nach Angebot

Inhouse-Schulung

10 Tage (anpassbar)

1 – 30 Teilnehmer

In Ihrem Hause/Büro

Preis nach Angebot

Seminar-Details

Wer teilnehmen sollte

Before attending the course, it is recommended that you have:

  • previously attended the CompTIA A+ and/or CompTIA Network+ course
  • two years of experience in IT administration with a security focus
  • CompTIA A+ certification or equivalent knowledge
  • 9-12 months of networking experience

Ihre Schulung

Präsenz-Schulung
Online-Schulung

Präsenz-Schulung

Lernmethode
Vermittlung der Theorie in Kombination mit der Bearbeitung von praxisnahen Beispielen.

Unterlagen
Seminarunterlagen oder Fachbuch zum Seminar inklusive, das man nach Rücksprache mit dem Trainer individuell auswählen kann.

Arbeitsplatz:
PC/VMs für jeden Teilnehmer
Hochwertige und performante Hardware
Große, höhenverstellbare Bildschirme

Lernumgebung
Neu aufgesetzte Systeme für jeden Kurs in Abstimmung mit dem Seminarleiter.

Arbeitsmaterialien
Din A4 Block, Kugelschreiber

Teilnahmebescheinigung
Wird am Ende des Seminars ausgehändigt, inkl. Inhaltsverzeichnis

Schulungszeiten
5 Tage, 09:00 - 16:00 Uhr

Ort der Schulung:
Biplus ACADEMY
Godesberger Allee 125–127
53175 Bonn
oder bei Ihnen als Inhouse-Schulung

Räumlichkeiten
Helle und modern ausgestattete Räume mit perfekter Infrastruktur.

Online-Schulung

Lernmethode
Jeder Teilnehmer erhält seine eigene Lernumgebung, dadurch kann der Trainer die Übungen in einer Mischung aus Theorie und Praxis wie in einem Präsenzseminar durchführen.
Die Kommunikation zwischen Trainer und Teilnehmer erfolgt via zoom aber auch Teams, Webex oder eine andere bevorzugte Lösung.

Unterlagen
Seminarunterlagen oder Fachbuch zum Seminar inklusive, kann nach Rücksprache mit dem Trainer individuell ausgewählt werden. Alle benötigten Unterlagen bekommen Sie rechtzeitig vor Beginn der Schulung per Post zugeschickt.

Arbeitsplatz
Virtual Classroom mit eigenem Schulungs-PC für jeden Teilnehmer.
Hochwertige und performante Hardware.
Die Virtual Classroom Lösung lässt sich im Browser betreiben.
Keine Installation am eigenen PC notwendig.
Zugang zu Ihrem Firmennetz erlaubt.
Auf Wunsch können Monitor, Webcam etc. günstig zur Verfügung gestellt werden.

Lernumgebung
Neu aufgesetzte Systeme für jeden Kurs in Abstimmung mit dem Seminarleiter.

Arbeitsmaterialien
Din A4 Block, Notizblock, Kugelschreiber, USB-Stick, Textmarker, Post-its

Teilnahmebescheinigung
Das Teilnahmezertifikat, inkl. Gliederung der behandelten Themen wird Ihnen per Post zugesandt.

Schulungszeiten
5 Tage, 09:00 - 16:00 Uhr

Ort der Schulung
Online im Virtual Classroom

Buchen ohne Risiko

Rechnungsstellung
Erst nach dem erfolgreichen Seminar. Keine Vorkasse.

Stornierung
Kostenfrei bis zum Vortag des Seminars

Vormerken statt buchen
Sichern Sie sich unverbindlich Ihren Seminarplatz schon vor der Buchung – auch wenn Sie selbst nicht berechtigt sind zu buchen.

Bildungsgutschein
Bildungsscheck NRW, Bildungsprämie

Seminar-Inhalte

Security+

1.0 Threats, Attacks and Vulnerabilities

  • Given a scenario, analyse indicators of compromise and determine the type of malware.
  • 2 Compare and contrast types of attacks.
  • 3 Explain threat actor types and attributes.
  • 4 Explain penetration testing concepts.
  • 5 Explain vulnerability scanning concepts.
  • 6 Explain the impact associated with types of vulnerabilities.

2.0 Technologies and Tools

  • 1 Install and configure network components, both hardwareand software-based, to support organisational security.
  • 2 Given a scenario, use appropriate software tools to assess the security posture of an organisation.
  • 3 Given a scenario, troubleshoot common security issues.
  • 4 Given a scenario, analyse and interpret output from security technologies.
  • 5 Given a scenario, deploy mobile devices securely.
  • 6 Given a scenario, implement secure protocols.

3.0 Architecture and Design

  • 1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
  • 2 Given a scenario, implement secure network architecture concepts.
  • 3 Given a scenario, implement secure systems design.
  • 4 Explain the importance of secure staging deployment concepts.
  • 5 Explain the security implications of embedded systems.
  • 6 Summarise secure application development and deployment concepts.
  • 7 Summarise cloud and virtualisation concepts.
  • 8 Explain how resiliency and automation strategies reduce risk.
  • 9 Explain the importance of physical security controls.

4.0 Identity and Access Management

  • 1 Compare and contrast identity and access management concepts.
  • 2 Given a scenario, install and configure identity and access services.
  • 3 Given a scenario, implement identity and access management controls.
  • 4 Given a scenario, differentiate common account management practices.

5.0 Risk Management

  • 1 Explain the importance of policies, plans and procedures related to organisational security.
  • 2 Summarise business impact analysis concepts.
  • 3 Explain risk management processes and concepts.
  • 4 Given a scenario, follow incident response procedures.
  • 5 Summarise basic concepts of forensics.
  • 6 Explain disaster recovery and continuity of operation concepts.
  • 7 Compare and contrast various types of controls.
  • 8 Given a scenario, carry out data security and privacy practices.

6.0 Cryptography and PKI

  • 1 Compare and contrast basic concepts of cryptography.
  • 2 Explain cryptography algorithms and their basic characteristics.
  • 3 Given a scenario, install and configure wireless security settings.
  • 4 Given a scenario, implement public key infrastructure.

 

Cloud+

1.0 Cloud Concepts and Models

  • Compare and contrast cloud services.
  • Compare and contrast cloud delivery models and services.
  • Summarise cloud characteristics and terms.
  • Explain object storage concepts.

2.0 Virtualisation

  • Explain the differences between hypervisor types.
  • Install, configure, and manage virtual machines and devices.
  • Given a scenario, perform virtual resource migration.
  • Explain the benefits of virtualisation in a cloud environment.
  • Compare and contrast virtual components used to construct a cloud environment.

3.0 Infrastructure

  • Compare and contrast various storage technologies.
  • Explain storage configuration concepts.
  • Execute storage provisioning.
  • Given a scenario, implement appropriate network configurations.
  • Explain the importance of network optimisation.
  • Given a scenario, troubleshoot basic network connectivity issues.
  • Explain common network protocols, ports, and topologies.
  • Explain common hardware resources and features used to enable virtual environments.

4.0 Network Management

  • Given a scenario, implement and use proper resource monitoring techniques.
  • Given a scenario, appropriately allocate physical (host) resources using best practices.
  • Given a scenario, appropriately allocate virtual (guest) resources using best practices.
  • Given a scenario, use appropriate tools for remote access.

5.0 Security

  • Explain network security concepts, tools, and best practices.
  • Explain storage security concepts, methods, and best practices.
  • Compare contrast different encryption technologies and methods.
  • Identify access control methods.
  • Implement guest and host hardening techniques.

6.0 Systems Management

  • Explain policies and procedures as they relate to a cloud environment.
  • Given a scenario, diagnose, remediate and optimise physical host performance.
  • Explain common performance concepts as they relate to the host and the guest.
  • Implement appropriate testing techniques when deploying cloud services.

7.0 Business Continuity in the Cloud

  • Compare and contrast disaster recovery methods and concepts.
  • Deploy solutions to meet availability requirements.

Diese Seminare könnten Sie auch interresieren

CompTIA Systems Support Specialist (A+/ Linux+)

During the course, you'll prepare for and sit the following CompTIA A+ and Linux+ exams, covered by your Certification Guarantee.
• Exam 220-901 CompTIA A+ (English)
• Exam 220-901 CompTIA A+ (English)
• Exam LX0-103 CompTIA Linux+ (English, German, Portuguese, Spanish)
• Exam LX0-104 CompTIA Linux+ Exam LX0-104 (English, German, Portuguese, Spanish)

When you pass the above exams, you'll also receive the following certifications for free:
• Novell CLA Certification
• LPI Level 1 Certification (LPIC-1)

jetzt ansehen

CompTIA Security Analytics Expert (Security+/CySA+/CASP)

During the course, you'll prepare for and sit the following CompTIA Security+, CySA+ and CASP+ exams, covered by your Certification Guarantee.
• CompTIA Security+ Exam SY0-401 (English, Japanese, Portuguese and Simplified Chinese)
• CompTIA CySA+ Exam CS1-001 (English)
• CompTIA CASP+ Exam CAS-002 (English)

jetzt ansehen