$2,500.00

Legend

Location Start date End Date Class Times Class Details Action
07/22/2019 07/26/2019 ICLVLT Register

Overview

COURSE OVERVIEW
Mile2’s Certified Security Principles+ course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products. These skills have become increasingly important, as additional safeguards such as intrusion detection systems, physical access control and multi‐factor authentication become standard methods of protection. Students are given real world scenarios to reinforce the material covered and will learn how to apply the concepts to their daily operations.

COURSE OBJECTIVES
• Identify the fundamental concepts of computer security.
• Identify security threats and vulnerabilities.
• Manage data, application, and host security.
• Implement network security.
• Identify and implement access control and account management security measures.
• Manage certificates.
• Identify and implement compliance and operational security measures.
• Manage risk.
• Troubleshoot and manage security incidents.
• Plan for business continuity and disaster recovery.

UPON COMPLETION

Upon completion, the Certified Security Principles+ candidate will not only be able to competently take the CSP+ exam but will also understand basic cyber security knowledge to keep companies’ IP and IT infrastructure safe.

EXAM INFORMATION

The Certified Security Principles+ exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.com.

Description

COURSE DETAILS

Module 1 – Threats and Vulnerabilities
a. Types of Malware
b. Types of Attacks
c. Social Engineering
d. Mitigating Attacks
e. Discovering vulnerabilities and threats
f. Vulnerability Assessment and Penetration Testing

Module 2 – Cryptography
a. Understanding crypto concepts
b. Crypto methods and where to use them
c. PKI and Certificate Management

Module 3 – Identity and Access Control
a. Why IAM?
b. Various Authentication Services
c. AAA
d. Implementing the Controls

Module 4 – Network Security
a. Network Devices
b. Other Devices
c. Administering and Implementing Security
d. Network Design
e. Protocols and Services
f. Wireless Networking

Module 5 – Host/Server Security
a. The Operating Systems
b. Hardening the OS
c. OS additional software security
d. Physical security

Module 6 – Data Security
a. Different Types of Storage
b. Risks associated with all types of storage
c. Encryption Options
d. Corporate Management Options
e. Various device uses
f. Hardware security options for storage

Module 7 – Application Security
a. Application Security Principals
b. Secure Coding Concepts
c. Hacking for the purpose of testing
d. Top 10 OWASP Risks
e. How to harden against those risks
f. Patch Management

Module 8 – Mobile Security
a. What devices are we talking about?
b. The Risk
c. Hardening these Devices!
d. Corporate Management and Legal issues

Module 9 – Compliance and Operational Security
a. Managing Risk
b. Managing Risk with third parties
c. Implementing Corporate Strategies
d. Incident Response and Forensics Procedures
e. Utilizing Physical and Environmental Controls