CompTIA Security+ certification is an entry level security credential which is designed for IT professionals with two years of networking experience with a focus on security. Like other CompTIA certifications, Security+ is vendor-neutral and is intended to provide a natural step toward more advanced security credentials such as CISSP and GIAC. In addition, Security+ can provide credit toward some Microsoft certification paths.
Security+ is a relevant certification for network and security administrators across the industry. In order to obtain this certification, candidates must pass a single exam that encompasses topics such as infrastructure security, access control, authentication, cryptography and communication security. Security+ allows professionals to demonstrate a focus in information security and the skills needed to thwart malicious attacks and mitigate costs associated with security breaches. Like other CompTIA certifications, Security+ does not expire.
The CompTIA Security+ exam has long stood as the forefront entry-level exam to the field of security. Through its difficulty, complexity of scope and broad spectrum covering numerous aspects of the IT field, it has become one of the most sought after and respected certification offered by CompTIA, so much so that other companies, such as Microsoft, have long since used the CompTIA Security+ as an alternative choice for their elective exams for the MCSE.
PrepLogic's Security+ LearnSmart Video Training is the smartest, fastest and most effective way to earn your Security+ certification. Let's find out what you'll learn with your Security+ LearnSmart Video Training. Session 1 of Security+ LearnSmart Video Training contains eight sections of Security+ certification video training. Section A: Introduction covers Prerequisites, Knowledge Domains, Security Importance and Applications. Section B: Security Requirements discusses Requirements, Classification, Due Care, Due Diligence, Due Process, User Education and HR Security. Section C: Security Threats focuses on Understanding Threats, Viruses and Worms, Trojans, Spyware and Malware, Rootkits, Spam Filtering and Botnets. Section D: Privilege Escalation is about Initial Entry, Escalation Methods, After Escalation and Performing a Logic Bomb. Section E: Hardware Security Risks is the chapter based on BIOS, USB Devices, Removable Storage and Cell Phones. Section F: Network Vulnerabilities provides instruction on Vulnerable Devices, Weak Passwords, Backdoors, Denial of Service and Vampire Taps. Section G: Infrastructure Risks covers Old Protocols, TCP/IP Issues, Null Sessions, Spoofing, Man-in-the-Middle, Replay Attacks, DDoS, DNS Vulnerabilities and ARP Poisoning.
Session 2 of Security+ LearnSmart Video Training contains nine sections of Security+ certification video training. Section A: Wireless Vulnerabilities covers Wireless LANs, Wi-Fi, Data Emanation, War Driving, Default Behaviors, Rogue APs and Hijacking. Section B: Wireless Encryption discusses Encryption Cracking, WEP, Authentication, Understanding WEP, WEP Key Problems and Weak Initialization Vectors. Section C: Personal Device Security covers Portable Devices, Bluejacking, Bluesnarfing, Blackjacking and Laptops. Section D: Authentication Fundamentals is about Identification, Authentication, One Factor, Multiple Factors and Single Sign-On. Section E: Authentication Hardware details Thumb Scanners, FAR and FRR, Smart Cards and RFID. Section F: Authentication Protocols provides instruction on Understanding Protocols, PAP and CHAP, LAN Manager, NTLM and NTLMv2. Section G: Advanced Authentication Protocols focuses on Kerberos, Kerberos Tickets, Kerberos Access, LDAP, 802.1X/RADIUS, TACACS and RAS. Section H: Users, Groups, and Roles shows you about Active Directory, Users, Groups, Group Strategy, Guidelines and Roles. Section I: Authorization Models features Group Policy Editor, Password Policies, Lockout Policies, Creating Accounts and Account Parameters.
Session 3 of Security+ LearnSmart Video Training contains eight sections of Security+ certification video training. Section A: ACLs illustrates Managing Folder Access and Network Resource Permissions. Section B: Access Control Methods focuses on MAC, DAC, RBAC, Least Privilege, Implicit Deny and Duty Separation. Section C: Remote Access Security covers Remote Access, RA Encryption, RA Authentication, Enabling RAS and RAS Authentication Options. Section D: Physical Security is about Understanding Physical Security, Affecting Factors, Access Control, Facility Access Checklist, Internal Access Checklist and Network Access Checklist. Section E: OS Hardening provides instruction for Patches, Service Packs, Patch Management, Linux Hardening, Windows Hardening, Creating Security Templates and Security Analysis. Section F: Application Security goes over Buffer Overflows, Dependencies, Stack-Based Overflows, Heap-Based Overflows, After the Attack, Countermeasures, Instant Messaging and P2P Networks. Section G: Web Application Security shows you Web Servers, Communications, Common Attacks, Web Applications, ActiveX and Java, XSS, Browser Options, Cookies and Input Validation. Section H: E-mail Security details E-mail Protocols, E-mail Threats, E-mail Authentication, Confidentiality, SMTP Relay and Spam Solutions.
Session 4 of Security+ LearnSmart Video Training contains eight sections of Security+ certification video training. Section A: Client Security Solutions provides information about avast! Software, Spam Filtering, Pop-Up Blocking, Personal Firewalls and HIDS. Section B: Virtualization and Security shows you Virtualization Defined, Benefits, Scenarios, Virtual PC, Hyper-V, VMware, Planning and Security Issues. Section C: Network Firewalls covers Understanding Firewalls, Firewall Types, Firewall Installation, Well Known Ports and Port Blocking. Section D: Network Security Design helps you learn Subnetting, Virtual LANs, Connecting Networks, DMZ, NAT and NAC. Section E: Telephony Security has the details you need about Traditional PBX, VoIP, SIP Security and H.323 Security. Section F: Intrusion Detection and Prevention is focused on Intrusion Monitoring, IDS Solutions, Detection Methods, IPS Solutions, IPS Detection States, Intrusion Indications, IDS Implementations, Intrusion Responses and Honeypots. Section G: Controlling Internet Access is about Proxy Servers, Internet Filters and Creating a Firewall Rule. In Section H: Protocol Analyzers, you'll learn about Installing Wireshark, Capturing E-mail Logon, Creating HTTP Filter and Viewing Passwords.
Session 5 of Security+ LearnSmart Video Training contains eight sections of Security+ certification video training. In Section A: Wireless Network Security, you'll learn what you need about War Driving, SSID Issues, Rogue APs, Weak Encryption and Configuring WPA. Section B: Monitoring Systems provides instruction on Performance Tools, Task Manager, Performance Snap-In, Baselines, Creating a Baseline, Creating a Second Baseline and Comparing Baselines with Excel. Section C: Scanning the Network covers Port Scanning, Angry IP Scanner, Scanning Devices, Service Enumeration, Configuring Zenmap GUI and Nmap Scanning. Section D: Vulnerability Scanning focuses on Sectools.org, OVAL, National Vulnerability Database, Password Cracker and Pen Testing. Section E: Logging and Auditing provides instruction about Importance of Logs, DNS Logs, System Logs, Performance Logs, Access Logs, Firewall Logs, Antivirus Logs and Auditing. Section F: Cryptography 101 is your introduction to Encryption, Simple Encryption, CIA, Non-Repudiation, Whole Disk, Key Management, Steganography, Encryption Testing and TPM. Section G: Encryption Algorithms covers Encryption Types, Key Factors, DES, 3DES, RSA, ECC, PGP, AES, RC4, Secure Transfer and One-Time Pad.
Session 6 of Security+ LearnSmart Video Training contains nine sections of Security+ certification video training. Section A: Encryption Protocols and Hashing provides detailed info about Hashing, Hashing Protocols, Digital Signatures, SSL/TLS, TLS Goals, SSL Operations, PPTP, L2TP, IPSec, HTTP Solutions and SSH. Section B: Public Key Cryptography covers Certificates, PK Cryptography, PKI Components, PKI Processes. In Section C: Risk Assessments, you'll learn how to master Risk Management, Asset Identification, Threat Identification, Risk Assessment and Risk Tracking. Section D: Redundancy Planning shows you Failure Points, RAID, Spare Parts, Redundant Servers, Redundant ISP, Power Supply and Spare Sites. Section E: Incident Response helps you understand Incident Defined, IR Process, First Responders, Computer Forensics, Chain of Custody, Reporting and Damage Control. Section F: Disaster Recovery is about Planning, Backup Practices, Backup Methods, Backup Types, Media Rotation, Restoration and DR Exercises. Section G: Social Engineering helps you learn about Definition, Example Attacks, Dumpster Diving, Passive Attacks, Inside/Outside Attacks, Reverse and Phishing Attacks. Section H: Security Policies focuses on Importance, General Policies, Functional Policies and sans.org.
CompTIA Security+ Articles and Resources
Security+ Certification - More Relevant Than Ever Before