• No results found

CompTIA Security+ (Exam SY0-410)

N/A
N/A
Protected

Academic year: 2021

Share "CompTIA Security+ (Exam SY0-410)"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)
(2)

CompTIA Security+ (Exam SY0-410)

Length: 5 Days

Location: 182, Broadway, Newmarket, Auckland Language(s): English,

Audience(s): Entry Level IT Professionals

Level: Intermediate

Vendor: CompTIA

Type: Corporate Short Course Delivery Method: Instructor-led (classroom)

Security affects all areas of business, not just the IT department. In addition to a loss of income and employee productivity, a security breach can cost your business its reputation. The Techtorium CompTIA Security+ Corporate Short Course aims to provide participants with the foundation-level security skills and knowledge used by organisations and security professionals in New Zealand and around the globe.

This Corporate Short Course will prepare participants for the CompTIA Security+ exam, an internationally recognised certification that will certify that the successful candidate has the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the successful candidate will apply security controls to maintain confidentiality, integrity, and availability, identify appropriate technologies and products, troubleshoot security events and incidents, and operate with an awareness of applicable policies, laws, and regulations.

CompTIA Security+ is supported by top technology companies and other organisations for which information security is of primary importance. HP, IBM, Motorola, Symantec, Boeing, and Lockheed Martin are just some of the organisations that have participated in the development of the CompTIA Security+ exam.

Audience Profile

 A minimum of 2 years’ experience in IT administration with a focus on security  Day to day technical information security experience

 Broad knowledge of security concerns and implementation including the topics in the domain list below This Techtorium Corporate Short Course is designed for the following IT professionals:

• Security Architects • Security Engineers

• Security Consultants/Specialists • Information Assurance Technicians • Security Administrators

• Systems Administrators • Network Administrators

(3)

Module 1: Network Security

• Implement security configuration parameters on network devices and other technologies. o Firewalls

o Routers o Switches o Load Balancers o Proxies

o Web security gateways o VPN concentrators o NIDS and NIPS o Protocol analysers o Spam filter

o UTM security appliances

o Web application firewall vs. network firewall o Application aware devices

• Given a scenario, use secure network administration principles. o Rule-based management

o Firewall rules o VLAN management o Secure router configuration o Access control lists o Port Security o 802.1x o Flood guards o Loop protection o Implicit deny o Network separation o Log analysis

o Unified Threat Management

• Explain network design elements and components. o DMZ

o Subnetting o VLAN o NAT

o Remote Access o Telephony o NAC o Virtualisation o Cloud Computing o Telephony

• Given a scenario, implement common protocols and services. o Protocols

o Ports

o OSI relevance

(4)

 Explain the importance of risk related concepts. o Control types

o False positives & False negatives o Importance of policies in reducing risk o Quantitative vs. qualitative

o Vulnerabilities, threat vectors, threat likelihood

o Risk-avoidance, transference, acceptance, mitigation, deterrence o Risks associated with Cloud Computing and Virtualisation

 Summarise the security implications of integrating systems and data with third parties. o On-boarding/off-boarding business partners

o Social media networks and/or applications o Privacy considerations

o Risk awareness

o Unauthorised data sharing o Data ownership & Data backups

o Review agreement requirements to verify compliance and performance standards  Given a scenario, implement appropriate risk mitigation strategies.

o Change management o Incident management

o User rights and permissions reviews

 Given a scenario, implement basic forensic procedures o Order of volatility

o Capture system image & Video o Network traffic and logs o Record time offset

o Take hashes, Screenshots & Witnesses o Big Data analysis

 Summarise common incident response procedures o Incident identification, escalation and notification o Mitigation steps & Reporting

o Recovery/reconstitution procedures o First responder & Incident isolation

 Explain the importance of security related awareness and training o Role-based training

o Personally identifiable information

o Information classification, Data labelling, handling and disposal o Compliance with laws, best practices and standards

o New threats and new security trends/alerts

 Compare and contrast physical security and environmental controls o Environmental controls

o Physical security o Control types

 Summarise risk management best practices. o Business continuity concepts o Fault tolerance

o Disaster recovery concepts

 Given a scenario, select the appropriate control to meet the goals of security o Confidentiality, Integrity, Availability, Safety

(5)

Module 3: Threats and Vulnerabilities

 Explain types of malware

o Adware o Virus o Spyware o Trojan o Rootkits o Backdoors o Logic bomb o Botnets o Ransomware o Polymorphic malware o Armored virus

 Summarise various types of attacks. o Man-in-the-middle

o DDoS & DoS o Smurf attack

o DNS poisoning and ARP poisoning o Typo squatting/URL hijacking

 Summarise social engineering attacks and the associated effectiveness with each attack. o Shoulder surfing, Dumpster diving, Tailgating, Impersonation & Hoaxes (+)  Explain types of wireless attacks.

 Explain types of application attacks o Cross-site scripting, o SQL injection, o LDAP injection, o XML injection,

o Directory traversal/command injection, o Buffer overflow,

o Integer overflow, o Zero-day,

o Cookies and attachments, o LSO (Locally Shared Objects), o Flash Cookie,

o Malicious add-ons, o Session hijacking, o Header manipulation,

o Arbitrary code execution / remote code execution

 Analyse a scenario and select the appropriate type of mitigation and deterrent techniques. o Monitoring system logs

o Hardening o Network security o

 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.  Explain the proper use of penetration testing versus vulnerability scanning

o Penetration testing o Vulnerability scanning o Black box, white box, grey box

(6)

Module 4: Application, Data and Host Security

• Explain the importance of application security controls and techniques o Fuzzing & Secure coding concepts

o Cross-site scripting prevention & Request Forgery (XSRF) prevention

o Application configuration baseline (proper settings), hardening & patch management o NoSQL databases vs. SQL databases

o Server-side vs. Client-side validation • Summarise mobile security concepts and technologies

o Device security o Application security o BYOD concerns

• Given a scenario, select the appropriate solution to establish host security o Operating system security and settings

o OS hardening o Anti-malware o Patch management

o White listing vs. black listing applications o Trusted OS

o Host-based firewalls

o Host-based intrusion detection o Hardware security

o Host software baselining o Virtualisation

• Implement the appropriate controls to ensure data security o Cloud storage

o SAN

o Handling Big Data o Data encryption

• Compare and contrast alternative methods to mitigate security risks in static environments o Environments and methods

(7)

Module 5: Access Control and Identity Management

• Compare and contrast the function and purpose of authentication services.

o RADIUS, TACACS+, Kerberos, LDAP, XTACACS, SAML, Secure LDAP • Given a scenario, select the appropriate authentication, authorization or access control.

o Identification vs. authentication vs. authorization o Authentication & Authentication factors

o Federation

o Transitive trust/authentication

• Install and configure security controls when performing account management, based on best practices o Mitigate issues associated with users with multiple account/roles and/or shared accounts o Account policy enforcement

o Group based privileges

o User assigned privileges & User access reviews o Continuous monitoring

Module 6: Cryptography

• Given a scenario, utilize general cryptography concepts • Given a scenario, use appropriate cryptographic methods

(8)

References

Related documents

• Example: Role-based and mandatory access control.  Access is determined through system-enforced

Results: We present a framework well adapted to the study of genomic diversity and evolutionary dynamics of the pea aphid holobiont from metagenomic read sets, based on mapping

Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a

Which of the following new initiatives by the information security team would BEST secure the company and mitigate the CEO\\'s concernsD. Begin simulated phishing campaigns

It is suggested students be required to pass the CompTIA A+ practice certification exam at the end of this course to receive credits, and in order to continue with the Cyber

• Unified Communications • Security • Wireless COMPTIA • CompTIA A+ • CompTIA Network+ • CompTIA Security+ INFORMATION SECURITY SOLUTIONS • CISSP MICROSOFT

The panel first defined important variables to be considered in creating such a system: the education programs in which medical school faculty participate; the categories of

Costs included are professional, technical, or business related organization costs if the organization’s function and purpose can be reasonably related to the development and