Who should take this course?

This course is designed for information technology (IT) professionals who have networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®, Unix®, or Linux®; and who want to further a career in IT by acquiring foundational knowledge of security topics or using CompTIA Security+ as the foundation for advanced security certifications or career roles. This course is also designed for students seeking the CompTIA Security+ certification who want to prepare for the CompTIA Security+ SY0-601 Certification Exam.

Prerequisites

None

The Training Covers These Topics:

  • Scan and assess networks for vulnerabilities
  • Monitor network traffic for unusual activity
  • Investigate a network breach
  • Compare and contrast attacks
  • Compare and contrast security controls
  • Use security assessment tools
  • Explain basic cryptography concepts
  • Implement a public key infrastructure
  • Implement identity and access management controls
  • Manage access services and accounts
  • Implement a secure network architecture
  • Install and configure security appliances
  • Install and configure wireless and physical access security
  • Deploy secure host, mobile, and embedded systems
  • Implement secure network access protocols
  • Implement secure network applications
  • Explain risk management and disaster recovery concepts
  • Describe secure application development concepts
  • Explain organizational security concepts

1 – Comparing Security Roles and Security Controls

  • Compare and Contrast Information Security Roles
  • Compare and Contrast Security Control and Framework Types

2 – Explaining Threat Actors and Threat Intelligence

  • Explain Threat Actor Types and Attack Vectors
  • Explain Threat Intelligence Sources

3 – Performing Security Assessments

  • Assess Organizational Security with Network Reconnaissance Tools
  • Explain Security Concerns with General Vulnerability Types
  • Summarize Vulnerability Scanning Techniques
  • Explain Penetration Testing Concepts

4 – Identifying Social Engineering and Malware

  • Compare and Contrast Social Engineering Techniques
  • Analyze Indicators of Malware-Based Attacks

5 – Summarizing Basic Cryptographic Concepts

  • Compare and Contrast Cryptographic Ciphers
  • Summarize Cryptographic Modes of Operation
  • Summarize Cryptographic Use Cases and Weaknesses
  • Summarize Other Cryptographic Technologies

6 – Implementing Public Key Infrastructure

  • Implement Certificates and Certificate Authorities
  • Implement PKI Management

7 – Implementing Authentication Controls

  • Summarize Authentication Design Concepts
  • Implement Knowledge-Based Authentication
  • Implement Authentication Technologies
  • Summarize Biometrics Authentication Concepts

8 – Implementing Identity and Account Management Controls

  • Implement Identity and Account Types
  • Implement Account Policies
  • Implement Authorization Solutions
  • Explain the Importance of Personnel Policies

9 – Implementing Secure Network Designs

  • Implement Secure Network Designs
  • Implement Secure Switching and Routing
  • Implement Secure Wireless Infrastructure
  • Implement Load Balancers

10 – Implementing Network Security Appliances

  • Implement Firewalls and Proxy Servers
  • Implement Network Security Monitoring
  • Summarize the Use of SIEM

11 – Implementing Secure Network Protocols

  • Implement Secure Network Operations Protocols
  • Implement Secure Application Protocols
  • Implement Secure Remote Access Protocols

12 – Implementing Host Security Solutions

  • Implement Secure Firmware
  • Implement Endpoint Security
  • Explain Embedded System Security Implications

13 – Implementing Secure Mobile Solutions

  • Implement Mobile Device Management
  • Implement Secure Mobile Device Connections

14 – Summarizing Secure Application Concepts

  • Analyze Indicators of Application Attacks
  • Analyze Indicators of Web Application Attacks
  • Summarize Secure Coding Practices
  • Implement Secure Script Environments
  • Summarize Deployment and Automation Concepts

15 – Implementing Secure Cloud Solutions

  • Summarize Secure Cloud and Virtualization Services
  • Apply Cloud Security Solutions
  • Summarize Infrastructure as Code Concepts

16 – Explaining Data Privacy and Protection Concepts

  • Explain Privacy and Data Sensitivity Concepts
  • Explain Privacy and Data Protection Controls

17 – Performing Incident Response

  • Summarize Incident Response Procedures
  • Utilize Appropriate Data Sources for Incident Response
  • Apply Mitigation Controls

18 – Explaining Digital Forensics

  • Explain Key Aspects of Digital Forensics Documentation
  • Explain Key Aspects of Digital Forensics Evidence Acquisition

19 – Summarizing Risk Management Concepts

  • Explain Risk Management Processes and Concepts
  • Explain Business Impact Analysis Concepts

20 – Implementing Cybersecurity Resilience

  • Implement Redundancy Strategies
  • Implement Backup Strategies
  • Implement Cybersecurity Resiliency Strategies

21 – Explaining Physical Security

  • Explain the Importance of Physical Site Security Controls
  • Explain the Importance of Physical Host Security Controls

What People Are Saying About Us

Vanessa Boston

Really good progression on Excel Levels 1-3. Was able to take a decent survey of the capability of Excel and work on target areas like V-LookUp which were of special importance to me. You can save the Manuals Work Books for reviewing and recreating lessons as practice

Ashley Lackey

Carolyn did a great job at teaching the class and making all of the information feel manageable and easy to understand. Although the class was small and quiet she stayed engaging and thorough the entire time. I would definitely recommend this class to others!

Marissa Hogan

Carolyn was a phenomenal teacher! I learned many new things from the Excel 3 course that I took; I can’t wait to take other courses that Data Creative offers.

Mariya Petrovska

I absolutely loved the trainings I have taken with Data Creative. The instructors are very professional, easy to follow, knowledgeable and friendly. The groups are relatively small, so you get personal attention. I highly recommend them for everyone that wants to learn new skills or improve their performance.

Tony Wilson

Awesome training at a very good pace. Trainers were very open to example scenarios and unique questions. Highly recommend!

John Andrew Kenyon

Today I was took the excel level 2 class with Data Creative. The instructor was very professional and knowledgeable. He presented everything available to the lesson and more. I will definitely be taking the 3rd lesson through Data Creative.

Alejandra Cabrera

I completed the level 1 and level 2 PowerPoint training with Damian and I learned so much! I’ve been using PowerPoint for a while and had no idea that there was so much you could do with it. Damian was very easy to follow, friendly, and willing to answer any and all questions. I would definitely recommend this course for anyone looking to fine tune their skills in PowerPoint.

Antoinette Medina

Excellent communication and class setup. Classes are well structured, not too fast-paced. Nice materials, easy to review and follow even if you do not have two screens!

Robert Chalmers

Trish was an excellent facilitator and very personable. The class, Excel Level 4, was easy to follow and she encourage us all day to ask questions! She supplied us with a lot of useful information and “extras”. I learned what I was hoping to learn and had fun doing it.

Jody Old

I took the Excel Level 1, 2, 3, and the Power Point class. I have worked with Excel for over 20 years and I am blown away on how much I thought I knew, but really didn’t know. I would recommend Data Creative to anyone who would want to learn more about what different programs can do. I will be looking forward to any other class my place of employment will want me to take through this company