Comptia
CompTIA Security Analytics Expert (Security+/CySA+/CASP)

Seminar-Beschreibung

n this accelerated 11-day CompTIA Security Analytics Expert (CSAE) certification course, you’ll learn the basics of troubleshooting security incidents and how to mitigate risks. You’ll then advance your cyber security skills by learning to design and create secure solutions across complex business environments.

Combining theory and practice from official CompTIA Security+, CySA+ and CASP+ curricula, your expert instructor will take you through infrastructure and operational security using risk analysis and mitigation. You’ll learn about the following CompTIA Security+ topics:

  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography

You’ll build on the foundation knowledge gained from Security+, focusing on tools and techniques to assess cyber security risks using the four cyber security domains from CySA+:

  • Threat Management
  • Vulnerability Management
  • Cyber Incident Response
  • Security Architecture and Tool Sets

Then, prove your ability to work as an advanced security practitioner, creating security solutions across enterprises. You’ll learn:

  • Enterprise security
  • Risk management
  • Research and analysis
  • Integration of computing, communications, and business disciplines

Schulungsziel

During the course, you’ll prepare for and sit the following CompTIA Security+, CySA+ and CASP+ exams, covered by your Certification Guarantee.
• CompTIA Security+ Exam SY0-401 (English, Japanese, Portuguese and Simplified Chinese)
• CompTIA CySA+ Exam CS1-001 (English)
• CompTIA CASP+ Exam CAS-002 (English)

Schulungsformen

Online-Schulung

15 Tage

1 – 25 Teilnehmer

Online

Preis nach Angebot

Firmen-Schulung

15 Tage (anpassbar)

1 – 15 Teilnehmer

Biplus ACADEMY, Bonn

Preis nach Angebot

Inhouse-Schulung

15 Tage (anpassbar)

1 – 30 Teilnehmer

In Ihrem Hause/Büro

Preis nach Angebot

Seminar-Details

Wer teilnehmen sollte

Before attending the course, it is recommended that you have:

Previously attended the CompTIA A+ and/or CompTIA Network+ course

  • Two years of experience in IT administration with a security focus
  • An understanding of operating systems and knowledge of Windows-based systems such as Windows 7 or Windows 8.1
  • The ability to identify basic network components and their roles, including routers, switches, firewalls and server roles. Some firewall configuration experience would be beneficial
  • A basic understanding of Wireless networks
  • A basic understanding of the OSI Model and TCP/IP including IPv4 subnetting

Ihre Schulung

Präsenz-Schulung
Online-Schulung

Präsenz-Schulung

Lernmethode
Vermittlung der Theorie in Kombination mit der Bearbeitung von praxisnahen Beispielen.

Unterlagen
Seminarunterlagen oder Fachbuch zum Seminar inklusive, das man nach Rücksprache mit dem Trainer individuell auswählen kann.

Arbeitsplatz:
PC/VMs für jeden Teilnehmer
Hochwertige und performante Hardware
Große, höhenverstellbare Bildschirme

Lernumgebung
Neu aufgesetzte Systeme für jeden Kurs in Abstimmung mit dem Seminarleiter.

Arbeitsmaterialien
Din A4 Block, Kugelschreiber

Teilnahmebescheinigung
Wird am Ende des Seminars ausgehändigt, inkl. Inhaltsverzeichnis

Schulungszeiten
5 Tage, 09:00 - 16:00 Uhr

Ort der Schulung:
Biplus ACADEMY
Godesberger Allee 125–127
53175 Bonn
oder bei Ihnen als Inhouse-Schulung

Räumlichkeiten
Helle und modern ausgestattete Räume mit perfekter Infrastruktur.

Online-Schulung

Lernmethode
Jeder Teilnehmer erhält seine eigene Lernumgebung, dadurch kann der Trainer die Übungen in einer Mischung aus Theorie und Praxis wie in einem Präsenzseminar durchführen.
Die Kommunikation zwischen Trainer und Teilnehmer erfolgt via zoom aber auch Teams, Webex oder eine andere bevorzugte Lösung.

Unterlagen
Seminarunterlagen oder Fachbuch zum Seminar inklusive, kann nach Rücksprache mit dem Trainer individuell ausgewählt werden. Alle benötigten Unterlagen bekommen Sie rechtzeitig vor Beginn der Schulung per Post zugeschickt.

Arbeitsplatz
Virtual Classroom mit eigenem Schulungs-PC für jeden Teilnehmer.
Hochwertige und performante Hardware.
Die Virtual Classroom Lösung lässt sich im Browser betreiben.
Keine Installation am eigenen PC notwendig.
Zugang zu Ihrem Firmennetz erlaubt.
Auf Wunsch können Monitor, Webcam etc. günstig zur Verfügung gestellt werden.

Lernumgebung
Neu aufgesetzte Systeme für jeden Kurs in Abstimmung mit dem Seminarleiter.

Arbeitsmaterialien
Din A4 Block, Notizblock, Kugelschreiber, USB-Stick, Textmarker, Post-its

Teilnahmebescheinigung
Das Teilnahmezertifikat, inkl. Gliederung der behandelten Themen wird Ihnen per Post zugesandt.

Schulungszeiten
5 Tage, 09:00 - 16:00 Uhr

Ort der Schulung
Online im Virtual Classroom

Buchen ohne Risiko

Rechnungsstellung
Erst nach dem erfolgreichen Seminar. Keine Vorkasse.

Stornierung
Kostenfrei bis zum Vortag des Seminars

Vormerken statt buchen
Sichern Sie sich unverbindlich Ihren Seminarplatz schon vor der Buchung – auch wenn Sie selbst nicht berechtigt sind zu buchen.

Bildungsgutschein
Bildungsscheck NRW, Bildungsprämie

Seminar-Inhalte

Security+

1.0 Network Security

  • Implement security configuration parameters on network devices and other technologies.
  • Given a scenario, use secure network administration principles.
  • Explain network design elements and components.
  • Given a scenario, implement common protocols and services.
  • Given a scenario, troubleshoot security issues related to wireless networking.

2.0 Compliance and Operational Security

  • 1 Explain the importance of risk related concepts.
  • 2 Summarise the security implications of integrating systems and data with third parties.
  • 3 Given a scenario, implement appropriate risk mitigation strategies.
  • 4 Given a scenario, implement basic forensic procedures.
  • 5 Summarise common incident response procedures.
  • 6 Explain the importance of security related awareness and training.
  • 7 Compare and contrast physical security and environmental controls.
  • 8 Summarise risk management best practices.
  • 9 Given a scenario, select the appropriate control to meet the goals of security.

3.0 Threats and Vulnerabilities

  • 1 Explain types of malware.
  • 2 Summarise various types of attacks.
  • 3 Summarise social engineering attacks and the associated effectiveness with each attack.
  • 4 Explain types of wireless attacks.
  • 5 Explain types of application attacks.
  • 6 Analyse a scenario and select the appropriate type of mitigation and deterrent techniques.
  • 7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.
  • 8 Explain the proper use of penetration testing versus vulnerability scanning.

4.0 Application, Data and Host Security

  • 1 Explain the importance of application security controls and techniques.
  • 2 Summarise mobile security concepts and technologies.
  • 3 Given a scenario, select the appropriate solution to establish host security.
  • 4 Implement the appropriate controls to ensure data security.
  • 5 Compare and contrast alternative methods to mitigate security risks in static environments.

5.0 Access Control and Identity Management

  • 1 Compare and contrast the function and purpose of authentication services.
  • 2 Given a scenario, select the appropriate authentication, authorisation or access control.
  • 3 Install and configure security controls when performing account management, based on best practices.

6.0 Cryptography

  • 1 Given a scenario, utilise general cryptography concepts.
  • 2 Given a scenario, use appropriate cryptographic methods.
  • 3 Given a scenario, use appropriate PKI, certificate management and associated components.

CySA+

  1. Threat Management
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
  • Given a scenario, analyse the results of a network reconnaissance.
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure.
  • Explain the purpose of practices used to secure a corporate environment.
  1. Vulnerability Management
  • Given a scenario, implement an information security vulnerability management process.
  • Given a scenario, analyse the output resulting from a vulnerability scan.
  • Compare and contrast common vulnerabilities found in the following targets
  1. Cyber Incident Response
  • Given a scenario, distinguish threat data or behaviour to determine the impact of an incident
  • Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
  • Explain the importance of communication during the incident response process.
  • Given a scenario, analyse common symptoms to select the best course of action to support incident response.
  • Summarise the incident recovery and post-incident response process.
  1. Security Architecture and Tool Sets
  • Explain the relationship between frameworks, common policies, controls, and procedures.
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management.
  • Given a scenario, review security architecture and make recommendations to implement compensating controls.
  • Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC).
  • Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.

CASP+

Enterprise Security (30% of exam)

  • Given a scenario, select appropriate cryptographic concepts and techniques
  • Explain the security implications associated with enterprise storage
  • Given a scenario, analyse network and security components, concepts and architectures
  • Given a scenario, select and troubleshoot security controls for hosts
  • Differentiate application vulnerabilities and select appropriate security controls

Risk Management and Incident Response (20% of exam)

  • Interpret business and industry influences and explain associated security risks
  • Given a scenario, execute risk mitigation planning, strategies and controls
  • Compare and contrast security, privacy policies and procedures based on organisational requirements
  • Given a scenario, conduct incident response and recovery procedures

Research, Analysis and Assessment (18% of exam)

  • Apply research methods to determine industry trends and impact to the enterprise
  • Analyse scenarios to secure the enterprise
  • Given a scenario, select methods or tools appropriate to conduct an assessment and analyse results

Integration of Computing, Communications and Business Disciplines (16% of exam)

  • Given a scenario, facilitate collaboration across diverse business units to achieve security goals
  • Given a scenario, select the appropriate control to secure communications and collaboration solutions
  • Implement security activities across the technology life cycle

Technical Integration of Enterprise Components (16% of exam)

  • Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture
  • Given a scenario, integrate advanced authentication and authorisation technologies to support enterprise objectives

Diese Seminare könnten Sie auch interresieren

CompTIA Systems Support Specialist (A+/ Linux+)

During the course, you'll prepare for and sit the following CompTIA A+ and Linux+ exams, covered by your Certification Guarantee.
• Exam 220-901 CompTIA A+ (English)
• Exam 220-901 CompTIA A+ (English)
• Exam LX0-103 CompTIA Linux+ (English, German, Portuguese, Spanish)
• Exam LX0-104 CompTIA Linux+ Exam LX0-104 (English, German, Portuguese, Spanish)

When you pass the above exams, you'll also receive the following certifications for free:
• Novell CLA Certification
• LPI Level 1 Certification (LPIC-1)

jetzt ansehen