Meetings Stub Page [mx-stub]
CompTIA Security+ Certification
Agenda
1 - COMPARING AND CONTRASTING ATTACKS
- Compare and Contrast Information Security Roles
- Explain Threat Actor Types
- Compare and Contrast Social Engineering Attack Types
- Determine Malware Types
2 - COMPARING AND CONTRASTING SECURITY CONTROLS
- Compare and Contrast Security Control and Framework Types
- Follow Incident Response Procedures
3 - ASSESSING SECURITY POSTURE WITH SOFTWARE TOOLS
- Explain Penetration Testing Concepts
- Assess Security Posture with Topology Discovery Software Tools
- Assess Security Posture with Fingerprinting and Sniffing Software Tools
- Assess Security Posture with Vulnerability Scanning Software Tools
4 - EXPLAINING BASIC CRYPTOGRAPHY CONCEPTS
- Compare and Contrast Basic Concepts of Cryptography
- Explain Hashing and Symmetric Cryptographic Algorithms
- Explain Asymmetric Cryptographic Algorithms
5 - IMPLEMENTING A PUBLIC KEY INFRASTRUCTURE
- Implement Certificates and Certificate Authorities
- Implement PKI Management
6 - IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT CONTROLS
- Compare and Contrast Identity and Authentication Concepts
- Install and Configure Authentication Protocols
- Implement Multifactor Authentication
7 - MANAGING ACCESS SERVICES AND ACCOUNTS
- Install and Configure Authorization and Directory Services
- Implement Access Management Controls
- Differentiate Account Management Practices
- Implement Account Auditing and Recertification
8 - IMPLEMENTING A SECURE NETWORK ARCHITECTURE
- Implement Secure Network Architecture Concepts
- Install and Configure a Secure Switching Infrastructure
- Install and Configure Network Access Control
- Install and Configure a Secure Routing and NAT Infrastructure
9 - INSTALLING AND CONFIGURING SECURITY APPLIANCES
- Install and Configure Firewalls and Proxies
- Install and Configure Load Balancers
- Install and Configure Intrusion Detection/Prevention Systems
- Install and Configure Data Loss Prevention (DLP) Systems
- Install and Configure Logging and SIEM Systems
10 - INSTALLING AND CONFIGURING WIRELESS AND PHYSICAL ACCESS SECURITY
- Install and Configure a Wireless Infrastructure
- Install and Configure Wireless Security Settings
- Explain the Importance of Physical Security Controls
11 - DEPLOYING SECURE HOST, MOBILE, AND EMBEDDED SYSTEMS
- Implement Secure Hardware Systems Design
- Implement Secure Host Systems Design
- Implement Secure Mobile Device Systems Design
- Implement Secure Embedded Systems Design
12 - IMPLEMENTING SECURE NETWORK ACCESS PROTOCOLS
- Implement Secure Network Operations Protocols
- Implement Secure Remote Access Protocols
- Implement Secure Remote Administration Protocols
13 - IMPLEMENTING SECURE NETWORK APPLICATIONS
- Implement Secure Web Services
- Implement Secure Communications Services
- Summarize Secure Virtualization Infrastructure
- Summarize Secure Cloud Services
14 - EXPLAINING RISK MANAGEMENT AND DISASTER RECOVERY CONCEPTS
- Explain Risk Management Processes and Concepts
- Explain Resiliency and Automation Strategies
- Explain Disaster Recovery and Continuity of Operation Concepts
- Summarize Basic Concepts of Forensics
15 - SUMMARIZING SECURE APPLICATION DEVELOPMENT CONCEPTS
- Explain the Impact of Vulnerability Types
- Summarize Secure Application Development Concepts
16 - EXPLAINING ORGANIZATIONAL SECURITY CONCEPTS
- Explain the Importance of Security Policies
- Implement Data Security and Privacy Practices
- Explain the Importance of Personnel Management