Home Study Online Training
and Exam Prep
Sale Ends Soon.
Order Today!

ORDER ONLINE AND GET FREE   SHIPPING* except diagnostics

training on DVD-ROM and online  trainingplanet.com

"I did it and so can you. Self-Study can and does work"

Ask a Question

TRAINING PLANET HOME


IT TRAINING CATEGORIES:
 

MICROSOFT SPECIFIC
MCSE Server Admin FREE CLOUD
MCTS Windows 7 Certification Training
Microsoft Project
Microsoft Exchange Server
Microsoft Office 2013 2010
Microsoft Sharepoint

Who is affected by
DoD Directive 8570
?

PC DIAGNOSTICS
Micro 2000 Microscope
PC Check by Eurosoft

DOD 8570.1 Dept. of Defense
A+
Network+
Security+
CISSP
CEH
SSCP

COMPTIA ENTRY LEVELS
A+ Certification PC Repair and Support UPDATED!
CDIA+ Document Imaging
Network+
Linux+
Security+
Project+

CISCO
Cisco CCNA Training
Cisco Wireless
Cisco VOIP Training
CCNA Voice Certification

Cisco CCNA Security Training
CCNP Certification
CCIE Certification
CCNA Voice over IP Training

SECURITY
Security+ Get DoD Certified!
Cisco CCNA Security Training
Certified Ethical Hacker (CEH) FREE LINUX+ DoD
CISSP Exam Training - Shon Harris DoD
Penetration Testing (LPT / ECSA) -
Certified Security Analyst - DoD
Computer Forensics CHFI
FREE SECURITY+ 
ENSA Network Security Administrator
SSCP Systems Security Certified Practitioner - DoD

OFFICE AND PAPER FLOW
Microsoft Office MOS Certification
Document Imaging 101 Fundamentals Training Course
CDIA+ Document Imaging
Microsoft Sharepoint

PROJECT / WORKFLOW MANAGEMENT
Microsoft Project
ITIL Orientation Basics
ITIL Foundations Training
Introduction to Project Management
CAPM Certified Associate in Project Management
PMP Project Management Professional

NETWORKING
Linux Training
VMWare Vsphere Training 5.0 Certified Virtualization Expert (CVE)
MCSE 2012 Windows Server
Cisco Wireless Networking
ENSA Network Security Administrator

BEGINNER
IT Beginner Basic Training
A+ Certification PC Help Desk and Support
Network+
Security+
EC-Council ENSA Network Security Administrator
Microsoft Office
Help Desk / Job Getter Bundle
Document Imaging 101 Fundamentals Training Course


AUTOCAD
Autocad Training 2006 FREE 3D
 


LIVE BOOT CAMP CLASSES

NETWORKED / ONLINE & SITE LICENSE VERSIONS

EXAM SIMULATORS

EXAM TAKING FAQ

FINANCING

IT JOBS IN YOUR AREA

IT JOB SALARY SURVEYS

- PURCHASE ORDERS


CONTACT US

POLICIES

PRIVACY


 

Ask a Question

From Interactive Online Training to Boot Camp Classes...
      at Training Planet it's all about choice.™

training course classes boot camps online cd dvd

 

OUR ENTIRE PRODUCT LINE ON SALE!

CompTIA Security+ Certification Training
 

 

security+ certification training boot camps classes dvd online


The CompTIA Security+ Certification is a vendor-neutral certification exam is the worldwide standard of competency for foundation-level security practitioners.

GET DOD 8570.1 CERTIFIED!

The CompTIA Security+ certification Exam SY0-401 establishes knowledgeable professionals in the field of corporate security, one of the fastest-growing fields in IT. Even in a troubled economy, most businesses plan to at least maintain or optimally increase their investment in IT security. CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in network infrastructure, system security, organizational security and access control. Major organizations that enlist CompTIA Security+ certified professionals include Hewlett-Packard, IBM, Motorola, Hilton Hotels Corp., General Mills, Symantec, Lockheed Martin, Unisys, Hitachi, Ricoh, the U.S. Navy, Army, Air Force and Marines.

Security+ Certification Training and Your Career
Theft and destruction of intellectual property takes place despite the presence of firewalls, encryption and corporate edicts. Neither technologies nor policies alone offer effective information security. The IT industry must have a well-trained work force to effectively combat hackers and decrease financial losses.

The demand for skilled security professionals is growing significantly. The technology community identifies Security+ Certification as the perfect way to validate your knowledge of information security.



What CompTIA Security+ Certification Training Can do for You
Having proof of your skills and knowledge gives you the edge over other candidates when you're applying for a job, providing:

Proof of professional achievement
Better job opportunities
A viable career path
Foundational knowledge for additional certifications
Government jobs are now requiring Security+ as part of their IT requirements for DOD 8570.1

What Security+ Certification Training Can do for Your Company
Certification provides companies with skilled employees, leading to:

Increasing customer satisfaction & repeat business
Simplified recruiting and hiring
Lower training costs
Greater customer satisfaction
Measurable competence standards

 

What CompTIA Security+ Certification Covers:


Security+ SY0-401 Course Outline

Lesson 01 - Security Fundamentals
Topic A: The Information Security Cycle
What Is Information Security?
What to Protect
Goals of Security
Risk
Threats
A Vulnerability
Intrusions
Attacks
Controls
Types of Controls
The Security Management Process
Topic B: Information Security Controls
The CIA Triad
Non-repudiation
Identification
Authentication
Authentication Factors
Authorization
Access Control
Access Control Models
Accounting and Auditing
Common Security Practices
Implicit Deny
Least Privilege
Separation of Duties
Job Rotation
Mandatory Vacation
Time of Day Restrictions
Privilege Management
Topic C: Authentication Methods
User Name/Password Authentication
Tokens
Biometrics
Geolocation
Keystroke Authentication
Multi-factor Authentication
Mutual Authentication
Topic D: Cryptography Fundamentals
Cryptography
Encryption and Decryption
Ciphers
Cipher Types
Encryption and Security Goals
Demo - Exploring Public Key Cryptography
Steganography
Demo - Sharing a Secret Message with Steganography
A Key
Hashing Encryption
Hashing Encryption Algorithms
Demo - Calculating Hashes
Symmetric Encryption
Symmetric Encryption Algorithms
Asymmetric Encryption
Asymmetric Encryption Techniques
Key Exchange
Digital Signatures
Cipher Suites
Session Keys
Key Stretching
Topic E: Security Policy Fundamentals
A Security Policy
Security Policy Components
Common Security Policy Types
Group Policy
Security Document Categories
Change Management
Documentation Handling Measures
Lesson 01 Review


Lesson 02 - Identifying Security Threats and Vulnerabilities
Topic A: Social Engineering
Social Engineering Attacks
Social Engineering Effectiveness
Types of Social Engineering
Hackers and Attackers
Categories of Attackers
Topic B: Malware
Malicious Code Attacks
Viruses
Demo - Installing Antivirus Software
Worms
Adware
Spyware
Demo - Scanning Your System for Spyware
Trojan Horses
Rootkits
Logic Bombs
Botnets
Ransomware
Polymorphic Malware
Armored Viruses
Topic C: Software-Based Threats
Software Attacks
Password Attacks
Types of Password Attacks
Backdoor Attacks
Application Attacks
Types of Application Attacks
Demo - Managing Application Security
Topic D: Network-Based Threats
TCP/IP Basics
Port Scanning Attacks
Eavesdropping Attacks
Man-in-the-Middle Attacks
Replay Attacks
Social Network Attacks
DoS Attacks
DDoS Attacks
Types of DoS Attacks
Session Hijacking
P2P Attacks
ARP Poisoning
Transitive Access Attacks
DNS Vulnerabilities
Topic E: Wireless Threats and Vulnerabilities
Wireless Security
Demo - Configuring a Wireless Access Point
Demo - Configuring a Wireless Client
Rogue Access Points
Evil Twins
Jamming
Bluejacking
Bluesnarfing
Near Field Communication
War Driving and War Chalking
IV Attacks
Packet Sniffing
Wireless Replay Attacks
Sinkhole Attacks
WEP and WPA Attacks
WPS Attacks
Topic F: Physical Threats and Vulnerabilities
Physical Security
Physical Security Threats and Vulnerabilities
Hardware Attacks
Environmental Threats and Vulnerabilities
Lesson 02 Review


Lesson 03 - Managing Data, Application, and Host Security
Topic A: Manage Data Security
Layered Security
Defense in Depth
What Is Data Security?
Data Security Vulnerabilities
Data Storage Methods
Data Encryption Methods
Hardware-Based Encryption Devices
Types of Hardware-Based Encryption Devices
Data States
Permissions and Access Control Lists
Handling Big Data
Data Policies
Guidelines for Managing Data Security
Demo - Managing Data Security
Topic B: Manage Application Security
What Is Application Security?
Patch Management
Application Security Methods
Input Validation
Input Validation Vulnerabilities
Client-Side and Server-Side Validation
Error and Exception Handling
XSS
XSRF
Cross-Site Attack Prevention Methods
Fuzzing
Web Browser Security
Demo - Configuring a Web Browser
Guidelines for Establishing Web Browser Security
NoSQL Databases
Database Security
Guidelines for Managing Application Security
Topic C: Manage Device and Host Security
Hardening
Demo - Hardening a Server
Operating System Security
Operating System Security Settings
TCB
Security Baselines
Software Updates
Application Blacklisting and Whitelisting
Logging
Auditing
Demo - Implementing Auditing
Anti-malware Software
Types of Anti-malware Software
Virtualization Security Techniques
Hardware Security Controls
Non-standard Hosts
Security Controls for Non-standard Hosts
Strong Passwords
Guidelines for Establishing Device and Host Security
Topic D: Manage Mobile Security
Mobile Device Types
Mobile Device Vulnerabilities
Mobile Device Security Controls
Mobile Application Security Controls
BYOD Controls
Guidelines for Managing Mobile Security
Lesson 03 Review


Lesson 04 - Implementing Network Security
Topic A: Configure Security Parameters on Network Devices and Technologies
Network Components
Network Devices
Demo - Configuring Firewall Parameters
Network Analysis Tools
IDS
NIDS
Demo - Configuring a Network Intrusion Detection System
Wireless IDS
IPS
NIPS
WIPS
Types of Network Monitoring Systems
VPN
VPN Concentrator
Web Security Gateways
Topic B: Network Design Elements and Components
NAC
DMZ
VLAN
Subnet
NAT
Remote Access
Telephony Components
Virtualization
Cloud Computing
Cloud Computing Deployment Models
Cloud Computing Service Types
Topic C: Implement Networking Protocols and Services
OSI Model
OSI Model and Security
TCP/IP
DNS
HTTP
SSL/TLS
HTTPS
SSH
SNMP
ICMP
IPSec
Demo - Securing Network Traffic Using IP Security
iSCSI
Fibre Channel
FCoE
Telnet
NetBIOS
File Transfer Protocols
Ports and Port Ranges
Demo - Installing an IIS Web Server
Topic D: Apply Secure Network Administration Principles
Rule-Based Management
Network Administration Security Methods
Unified Threat Management
Guidelines for Applying Network Security Administration Principles

Topic E: Secure Wireless Traffic
Wireless Networks
Wireless Antenna Types
802.11 Standards
Wireless Security Protocols
VPNs and Open Wireless
Wireless Security Methods
Captive Portals
Site Surveys
Guidelines for Securing Wireless Traffic
Demo - Securing Wireless Traffic
Lesson 04 Review


Lesson 05 - Implementing Access Control, Authentication, and Account Management
Topic A: Access Control and Authentication Services
Directory Services
LDAP
LDAPS
Common Directory Services
Demo - Backing Up Active Directory
Remote Access Methods
Tunneling
Remote Access Protocols
HOTP
TOTP
PAP
CHAP
Guidelines for Securing Remote Access
PGP
RADIUS
TACACS
Kerberos
SAML
Topic B: Implement Account Management Security Controls
Identity Management
Account Management
Account Privileges
Account Policy
Multiple Accounts
Shared Accounts
Account Federation
Account Management Security Controls
Demo - Account Management Security Controls
Credential Management
Group Policy
Guidelines for Implementing Account Management Security Controls
Lesson 05 Review


Lesson 06 - Managing Certificates
Topic A: Install a CA Hierarchy
Digital Certificates
Certificate Authentication
PKI
PKI Components
CA Hierarchies
The Root CA
Public and Private Roots
Subordinate CAs
Offline Root CAs
CA Hierarchy Design Options
Demo - Installing a Certificate Authority
Topic B: Enroll Certificates
The Certificate Enrollment Process
Demo - Enrolling for Certificates
The Certificate Life Cycle
Certificate Life Cycle Management
Topic C: Secure Network Traffic by Using Certificates
The SSL Enrollment Process
Topic D: Renew Certificates
Certificate Renewal
Topic E: Back Up and Restore Certificates and Private Keys
Private Key Protection Methods
Key Escrow
Private Key Restoration Methods
The Private Key Replacement Process
Topic F: Revoke Certificates
Certificate Revocation
Demo - Revoking Certificates
A CRL
OCSP
Lesson 06 Review


Lesson 07 - Implementing Compliance and Operational Security
Topic A: Physical Security
Physical Security Controls
Physical Security Control Types
Environmental Exposures
Environmental Controls
Environmental Monitoring Safety
Topic B: Legal Compliance
Compliance Laws and Regulations
Legal Requirements
Types of Legal Requirements
Forensic Requirements
Topic C: Security Awareness and Training
Security Policy Awareness
Role-Based Training
PII
Classification of Information
The Employee Education Process
User Security Responsibilities
Validation of Training Effectiveness
Topic D: Integrate Systems and Data with Third Parties
Business Partners
Social Media Networks and Applications
Interoperability Agreements
Risk Awareness
Data Sharing and Backups
Guidelines for Securely Integrating Systems and Data with Third Parties
Lesson 07 Review


Lesson 08 - Risk Management
Topic A: Risk Analysis
Risk Management
Security Assessment Types
Risk Types
Components of Risk Analysis
Phases of Risk Analysis
Risk Analysis Methods
Risk Calculation
Risk Response Strategies
Risk Mitigation and Control Types
Topic B: Implement Vulnerability Assessment Tools and Techniques
Vulnerability Assessment Techniques
Vulnerability Assessment Tools
Topic C: Scan for Vulnerabilities
The Hacking Process
Ethical Hacking
Vulnerability Scanning and Penetration Testing
Types of Vulnerability Scans
Demo - Scanning for Port Vulnerabilities
Demo - Scanning for Password Vulnerabilities
Box Testing Methods
Security Utilities
Topic D: Mitigation and Deterrent Techniques
Security Posture
DLP
Demo - Capturing Network Data
Detection Controls and Prevention Controls
Risk Mitigation Strategies
Types of Mitigation and Deterrent Techniques
Failsafe, Failsecure, and Failopen
Lesson 08 Review


Lesson 09 - Troubleshooting and Managing Security Incidents
Topic A: Respond to Security Incidents
Security Incident Management
Computer Crime
An IRP
First Responders
Chain of Custody
Computer Forensics
Order of Volatility
Basic Forensic Process
Basic Forensic Response Procedures for IT
Big Data Analysis
Guidelines for Responding to Security Incidents
Topic B: Recover from a Security Incident
Basic Incident Recovery Process
Damage Assessment
Recovery Methods
An Incident Report
Guidelines for Recovering from a Security Incident
Lesson 09 Review


Lesson 10 - Business Continuity and Disaster Recovery Planning
Topic A: Business Continuity
A BCP
BIA
MTD
RPO
RTO
Continuity of Operations Plan
Alternate Sites
IT Contingency Planning
Succession Planning
Business Continuity Testing Methods
Topic B: Plan for Disaster Recovery
A DRP
Fault Tolerance
Redundancy Measures
Demo - Creating a RAID Array Through Software
High Availability
Disaster Recovery Testing and Maintenance
Guidelines for Planning for Disaster Recovery
Topic C: Execute DRPs and Procedures
The Disaster Recovery Process
Recovery Team
Secure Recovery
Backup Types and Recovery Plans
A Backout Contingency Plan
Secure Backups
Backup Storage Locations
Guidelines for Executing DRPs and Procedures
Lesson 10 Review
Course Closure



 

*Looking for Security+ Certification Training Classes in your city? Click Here. Also New! Certified Ethical Hacker Class!

     

Breaking News:

The industry demanded security training, and we have met that demand with this comprehensive Security + Certification Training self study interactive online based training package.

 

WHAT YOU GET IF YOU ORDER THE COMPTIA SECURITY+ ONLINE TRAINING TODAY:

  • 12 Months Online Access, Featuring On Demand Instructor-Led Classroom Sessions with Full Audio and Video Lectures
  • Software Video Demonstrations
  • Self-Assessment Module Review Quizzes
  • Printable Workbooks
     

Our CompTIA Security+ Certification training will prepare you for the exam that will validate your security knowledge.

    Place your order for a Security+ Certification Training  Security+ Exam today at the sale price of $495.00.
    Sale ends OUT OF STOCK UNAVAILABLE

     

    FREE SHIPPING IF YOU ORDER ONLINE TODAY

DEMO DEMO DEMO

 

 

 

 

.
Most training is in online format at this point.

Online Certification Training
5/5 stars
" A comprehensive collection of exam prep and training materials"
Ask a Question

certification training classes boot camp bootcamp

 Training Planet, Inc. / Certification City
 
An International Computer Support Training and Certification Services Company
Purchase Order Info Click Here
FREE SHIPPING on online orders*  except diagnostics
- U.S. and Canada Orders Only - Government APO/FPO OK

Ask a Question

FINANCING Available.

WE ACCEPT PURCHASE ORDERS



 

 


 

LIVE CLASSES ALSO OFFERED IN MOST CITIES.     
Albany, New York Albuquerque, New Mexico Alexandria, Virginia and Anchorage, Alaska.  Atlanta, Georgia Austin, Texas Baltimore, Maryland Birmingham, Alabama Bismark, North Dakota Boise, Idaho Boston, Massachusets Charlotte, North Carolina and Cheyenne, Wyoming. Chicago, Illinois Cincinnati, Ohio Cleveland, Ohio Columbus, Ohio Concord, New Hampshire Dallas, Texas Denver, Colorado. Des Moines, Iowa.
Detroit, Michigan Ft. Lauderdale, Florida. Ft. Wayne, Indiana Honolulu, Hawaii Houston, Texas Huntsville, Alabama Indianapolis, Indiana Jackson, Mississippi and Jackson, Wyoming Jacksonville, Florida Lexington, Kentucky Lincoln, Nebraska Los Angeles, California Las Vegas, Nevada. Miami, Florida Milwaukee, Wisconsin Minneapolis, Minnesota Montpelier, Vermont Nashville, Tennessee New Orleans, Louisiana New York City Norfolk, Virginia. Cisco Dallas Todd Lammle.
Oklahoma City, Oklahoma and Omaha, Nebraska Orlando, Florida Philadelphia, Pennsylvania Phoenix, Arizona Pierre, South Dakota Pittsburgh, Pennsylvania and Portland, Maine. Portland, Oregon Providence, Rhode Island.
Raleigh-Durham, North Carolina Richmond, Virginia.
Rockford, Illinois Sacramento, California. St. Louis, Missouri and Salt Lake City, Utah San Antonio, Texas San Diego, California and San Francisco, California San Jose, California Sandestin, Florida. Seattle, Washington Tulsa, Oklahoma Wichita, Kansas and Wilmington, Delaware Canada Ontario British Columbia Vancouver. Toronto Montreal Calgary and Winnipeg Quebec City Ottawa Edmunton.
 training planet blog certification city blog news



 



GET CERTIFIED
IN DAYS WITH
NATIONWIDE

mcse certification training cisco classes

MCSE Boot Camps
Cisco Boot Camp
PMP Boot Camp
CISSP Class
A+ / Network+

free training review
free course training reviews

>Watch short video instead



LIKE US
AND WIN!

 

THIS MONTHS MOST POPULAR COURSES ARE NOW ALL ON SALE!

 HUGE SPECIAL SALE!

TOP IT CERTIFICATIONS 2017

PC Diagnostics Microscope

 PMP Exam Prep

Microsoft Project

CAPM Certified Associate in Project Management

Certified Hacking Forensic Investigator
FREE Security+ training

CDIA+ Document Imaging

CISSP Certification

 

EVERTHING YOU NEED TO WORK
AND SUPPORT WITH CONFIDENCE!

 HUGE SPECIAL SALE!

 NEW to IT Bundle
Big Savings
Employability course package!

This bundle consists of:
CompTIA A+ Certification
Network+ Certification
Security+ Certifications

Each of the CompTIA program contains:
- Instructor led training delivered on interactive video 1 year Online Training Access
- E-Study guides
- Practice Quizzes


PROMO $795

MORE INFO 

Train your entire company or school with any of our titles for one low price!
Check out

Site License
Online Training
and
Networkable Solutions
Details

 

 

TRAINING PLANET BLOG REAL JOB RELATED NEWS.

FACEBOOK PAGE

GOOGLE +

COMPUTER TRAINING CHANNEL

LINKEDIN

TWITTER

signup