Comptia
CompTIA Security Analytics Expert (Security+/CySA+/CASP)

Seminar-Beschreibung

n this accelerated 11-day CompTIA Security Analytics Expert (CSAE) certification course, you’ll learn the basics of troubleshooting security incidents and how to mitigate risks. You’ll then advance your cyber security skills by learning to design and create secure solutions across complex business environments.

Combining theory and practice from official CompTIA Security+, CySA+ and CASP+ curricula, your expert instructor will take you through infrastructure and operational security using risk analysis and mitigation. You’ll learn about the following CompTIA Security+ topics:

  • Network Security
  • Compliance and Operational Security
  • Threats and Vulnerabilities
  • Application, Data and Host Security
  • Access Control and Identity Management
  • Cryptography

You’ll build on the foundation knowledge gained from Security+, focusing on tools and techniques to assess cyber security risks using the four cyber security domains from CySA+:

  • Threat Management
  • Vulnerability Management
  • Cyber Incident Response
  • Security Architecture and Tool Sets

Then, prove your ability to work as an advanced security practitioner, creating security solutions across enterprises. You’ll learn:

  • Enterprise security
  • Risk management
  • Research and analysis
  • Integration of computing, communications, and business disciplines

Seminarziel

During the course, you’ll prepare for and sit the following CompTIA Security+, CySA+ and CASP+ exams, covered by your Certification Guarantee.
• CompTIA Security+ Exam SY0-401 (English, Japanese, Portuguese and Simplified Chinese)
• CompTIA CySA+ Exam CS1-001 (English)
• CompTIA CASP+ Exam CAS-002 (English)

Seminarsformen

Online-Seminar

15 Tage

1 – 25 Teilnehmer

Online

Preis nach Angebot

Firmen-Seminar

15 Tage (anpassbar)

1 – 15 Teilnehmer

Biplus ACADEMY, Bonn

Preis nach Angebot

Inhouse-Seminar

15 Tage (anpassbar)

1 – 30 Teilnehmer

In Ihrem Hause/Büro

Preis nach Angebot

Seminar-Details

Zielgruppe

Before attending the course, it is recommended that you have:

Previously attended the CompTIA A+ and/or CompTIA Network+ course

  • Two years of experience in IT administration with a security focus
  • An understanding of operating systems and knowledge of Windows-based systems such as Windows 7 or Windows 8.1
  • The ability to identify basic network components and their roles, including routers, switches, firewalls and server roles. Some firewall configuration experience would be beneficial
  • A basic understanding of Wireless networks
  • A basic understanding of the OSI Model and TCP/IP including IPv4 subnetting

Ihr Seminar

Präsenz-Seminar
Online-Seminar

Präsenz-Seminar

Seminarmethode
Vermittlung der Theorie in Kombination mit der Bearbeitung von praxisnahen Beispielen.

Seminarunterlagen
Sie erhalten zu jedem Seminar die passenden Unterlagen oder passende Fachliteratur.

Technische Umgebung
Der Arbeitsplatz ist mit hochwertigen und leistungsstarken PCs sowie Virtuellen Maschinen ausgestattet. Ebenso sind die Monitore Höhenverstellbar.

Seminarumgebung
Alle Systeme werden individuell vor jedem Seminar neu aufgesetzt.

Seminarmaterialien
Sie erhalten einen DIN A4 Schreibblock mit passenden Stiften sowie eine Seminarmappe zum Abheften der Seminarsunterlagen.

Seminarzertifikat
Sie erhalten nach Abschluss des Seminars ein Seminarzertifikat inklusive der vermittelnden Kenntnisse.

Seminarzeiten
Montag bis Freitag von 8:00 Uhr bis 17:00 Uhr

Ort für Präsenz-Seminare
Biplus ACADEMY
Godesberger Allee 125–127
53175 Bonn
oder als Online- sowie Inhouse-Seminar

Seminarräume
Alle Seminarräume sind freundlich und hell ausgestattet mit einer hochwertigen Infrastruktur.

Online-Seminar

Seminarmethode
Jeder Teilnehmer erhält seine eigene Seminarumgebung, dadurch kann der Trainer die Übungen in einer Mischung aus Theorie und Praxis wie in einem Präsenzseminar durchführen.
Die Kommunikation zwischen Trainer und Teilnehmer erfolgt via zoom aber auch Teams, Webex oder eine andere bevorzugte Lösung.

Seminarunterlagen
Seminarunterlagen oder Fachbuch zum Seminar inklusive, kann nach Rücksprache mit dem Trainer individuell ausgewählt werden. Alle benötigten Seminarunterlagen bekommen Sie rechtzeitig vor Beginn der Seminar per Post zugeschickt.

Technische Umgebung
Virtual Classroom mit eigenem Seminars-PC für jeden Teilnehmer.
Die Virtual Classroom Lösung lässt sich im Browser betreiben.
Keine Installation am eigenen PC notwendig.
Zugang zu Ihrem Firmennetz erlaubt.
Auf Wunsch können Monitor, Webcam etc. günstig zur Verfügung gestellt werden.

Seminarumgebung
Alle Systeme werden individuell vor jedem Seminar neu aufgesetzt.

Seminarmaterialien
Din A4 Block, Notizblock, Kugelschreiber, USB-Stick, Textmarker, Post-its

Seminarzertifikat
Das Teilnahmezertifikat, inkl. Gliederung der behandelten Themen wird Ihnen per Post zugesandt.

Seminarzeiten
Montag bis Freitag von 8:00 Uhr bis 17:00 Uhr

Ort für Online-Seminare
Online im Virtual Classroom

Risikofreies Buchen unserer Seminare

Abrechnung
Sie zahlen das Seminar erst nach der Durchführung und nicht im Voraus!

Rücktrittsrecht
Sie können kostenlos bis zum Vortrag des Seminars von der Buchung zurücktreten.

Reservieren statt Buchen!
Reservieren Sie Ihren Seminarplatz – Buchen Sie das Seminar erst ein Tag vor Seminarstart.

Bildungsgutschein
Bildungsscheck NRW, Bildungsprämie

Seminar-Inhalte

Security+

1.0 Network Security

  • Implement security configuration parameters on network devices and other technologies.
  • Given a scenario, use secure network administration principles.
  • Explain network design elements and components.
  • Given a scenario, implement common protocols and services.
  • Given a scenario, troubleshoot security issues related to wireless networking.

2.0 Compliance and Operational Security

  • 1 Explain the importance of risk related concepts.
  • 2 Summarise the security implications of integrating systems and data with third parties.
  • 3 Given a scenario, implement appropriate risk mitigation strategies.
  • 4 Given a scenario, implement basic forensic procedures.
  • 5 Summarise common incident response procedures.
  • 6 Explain the importance of security related awareness and training.
  • 7 Compare and contrast physical security and environmental controls.
  • 8 Summarise risk management best practices.
  • 9 Given a scenario, select the appropriate control to meet the goals of security.

3.0 Threats and Vulnerabilities

  • 1 Explain types of malware.
  • 2 Summarise various types of attacks.
  • 3 Summarise social engineering attacks and the associated effectiveness with each attack.
  • 4 Explain types of wireless attacks.
  • 5 Explain types of application attacks.
  • 6 Analyse a scenario and select the appropriate type of mitigation and deterrent techniques.
  • 7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.
  • 8 Explain the proper use of penetration testing versus vulnerability scanning.

4.0 Application, Data and Host Security

  • 1 Explain the importance of application security controls and techniques.
  • 2 Summarise mobile security concepts and technologies.
  • 3 Given a scenario, select the appropriate solution to establish host security.
  • 4 Implement the appropriate controls to ensure data security.
  • 5 Compare and contrast alternative methods to mitigate security risks in static environments.

5.0 Access Control and Identity Management

  • 1 Compare and contrast the function and purpose of authentication services.
  • 2 Given a scenario, select the appropriate authentication, authorisation or access control.
  • 3 Install and configure security controls when performing account management, based on best practices.

6.0 Cryptography

  • 1 Given a scenario, utilise general cryptography concepts.
  • 2 Given a scenario, use appropriate cryptographic methods.
  • 3 Given a scenario, use appropriate PKI, certificate management and associated components.

CySA+

  1. Threat Management
  • Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
  • Given a scenario, analyse the results of a network reconnaissance.
  • Given a network-based threat, implement or recommend the appropriate response and countermeasure.
  • Explain the purpose of practices used to secure a corporate environment.
  1. Vulnerability Management
  • Given a scenario, implement an information security vulnerability management process.
  • Given a scenario, analyse the output resulting from a vulnerability scan.
  • Compare and contrast common vulnerabilities found in the following targets
  1. Cyber Incident Response
  • Given a scenario, distinguish threat data or behaviour to determine the impact of an incident
  • Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
  • Explain the importance of communication during the incident response process.
  • Given a scenario, analyse common symptoms to select the best course of action to support incident response.
  • Summarise the incident recovery and post-incident response process.
  1. Security Architecture and Tool Sets
  • Explain the relationship between frameworks, common policies, controls, and procedures.
  • Given a scenario, use data to recommend remediation of security issues related to identity and access management.
  • Given a scenario, review security architecture and make recommendations to implement compensating controls.
  • Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC).
  • Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.

CASP+

Enterprise Security (30% of exam)

  • Given a scenario, select appropriate cryptographic concepts and techniques
  • Explain the security implications associated with enterprise storage
  • Given a scenario, analyse network and security components, concepts and architectures
  • Given a scenario, select and troubleshoot security controls for hosts
  • Differentiate application vulnerabilities and select appropriate security controls

Risk Management and Incident Response (20% of exam)

  • Interpret business and industry influences and explain associated security risks
  • Given a scenario, execute risk mitigation planning, strategies and controls
  • Compare and contrast security, privacy policies and procedures based on organisational requirements
  • Given a scenario, conduct incident response and recovery procedures

Research, Analysis and Assessment (18% of exam)

  • Apply research methods to determine industry trends and impact to the enterprise
  • Analyse scenarios to secure the enterprise
  • Given a scenario, select methods or tools appropriate to conduct an assessment and analyse results

Integration of Computing, Communications and Business Disciplines (16% of exam)

  • Given a scenario, facilitate collaboration across diverse business units to achieve security goals
  • Given a scenario, select the appropriate control to secure communications and collaboration solutions
  • Implement security activities across the technology life cycle

Technical Integration of Enterprise Components (16% of exam)

  • Given a scenario, integrate hosts, storage, networks and applications into a secure enterprise architecture
  • Given a scenario, integrate advanced authentication and authorisation technologies to support enterprise objectives

Diese Seminare könnten Sie auch interresieren

CompTIA Systems Support Specialist (A+/ Linux+)

During the course, you'll prepare for and sit the following CompTIA A+ and Linux+ exams, covered by your Certification Guarantee.
• Exam 220-901 CompTIA A+ (English)
• Exam 220-901 CompTIA A+ (English)
• Exam LX0-103 CompTIA Linux+ (English, German, Portuguese, Spanish)
• Exam LX0-104 CompTIA Linux+ Exam LX0-104 (English, German, Portuguese, Spanish)

When you pass the above exams, you'll also receive the following certifications for free:
• Novell CLA Certification
• LPI Level 1 Certification (LPIC-1)

jetzt ansehen