SlideShare una empresa de Scribd logo
1 de 14
Security+ and
Your IT Career
© Global Knowledge Training LLC. All rights reserved. Page 2
Presenter
Daniel Cummins
Daniel Cummins is a CompTIA Certified
Technical Trainer (CTT+) and has been
CompTIA certified since 2010, having
passed all of the Core and Cybersecurity
exams. Including recertification, Daniel
has taken and passed more than a
dozen CompTIA exams.
© Global Knowledge Training LLC. All rights reserved. Page 3
Overview
• The importance of Security+ in the IT industry
• The high level objectives of Security+
• Different roles that use Security+
• Post Security+ certifications
© Global Knowledge Training LLC. All rights reserved. Page 4
The importance of Security+ in the IT industry
• Security is for EVERYONE!
• Non-technical roles
• Users: Awareness
• Management: Planning
• Facilities: Physical security
• Technical roles
• Help Desk
• Networking
• Database Management
• System Administration
• Software Development
• DevOps
• And more…
• Trusted by
• US DoD (8570 compliant)
• Aerospace and Defense
• Education
• Non-profit
• Construction/Architecture/Engineering
© Global Knowledge Training LLC. All rights reserved. Page 5
The high level objectives of Security+
1.0 Threats, Attacks and Vulnerabilities
• 1.1 Given a scenario, analyze indicators of compromise and determine the type of
malware
• 1.2 Compare and contrast types of attacks
• 1.3 Explain threat actor types and attributes
• 1.4 Explain penetration testing concepts
• 1.5 Explain vulnerability scanning concepts
• 1.6 Explain the impact associated with types of vulnerabilities
© Global Knowledge Training LLC. All rights reserved. Page 6
The high level objectives of Security+
2.0 Technologies and Tools
• 2.1 Install and configure network components, both hardware and software-based,
to support organizational security
• 2.2 Given a scenario, use appropriate software tools to assess the security posture
of an organization
• 2.3 Given a scenario, troubleshoot common security issues
• 2.4 Given a scenario, analyze and interpret output from security technologies
• 2.5 Given a scenario, deploy mobile devices securely
• 2.6 Given a scenario, implement secure protocols
© Global Knowledge Training LLC. All rights reserved. Page 7
The high level objectives of Security+
3.0 Architecture and Design
• 3.1 Explain use cases and purpose for frameworks, best practices and secure
configuration guides
• 3.2 Given a scenario, implement secure network architectures concepts
• 3.3 Given a scenario, implement secure systems design
• 3.4 Explain the importance of secure staging deployment concepts
• 3.5 Explain the security implications of embedded systems
• 3.6 Summarize secure application development and deployment concepts
• 3.7 Summarize cloud and virtualization concepts
• 3.8 Explain how resiliency and automation strategies reduce risk
• 3.9 Explain the importance of physical security controls
© Global Knowledge Training LLC. All rights reserved. Page 8
The high level objectives of Security+
4.0 Identity and Access Management
• 4.1 Compare and contrast identity and access management concepts
• 4.2 Given a scenario, install and configure identity and access services
• 4.3 Given a scenario, implement identity and access management controls
• 4.4 Given a scenario, differentiate common account management practices
© Global Knowledge Training LLC. All rights reserved. Page 9
The high level objectives of Security+
5.0 Risk Management
• 5.1 Explain the importance of policies, plans and procedures related to
organizational security
• 5.2 Summarize business impact analysis concepts
• 5.3 Explain risk management processes and concepts
• 5.4 Given a scenario, follow incident response procedures
• 5.5 Summarize basic concepts of forensics
• 5.6 Explain disaster recovery and continuity of operation concepts
• 5.7 Compare and contrast various types of controls
• 5.8 Given a scenario, carry out data security and privacy practices
© Global Knowledge Training LLC. All rights reserved. Page 10
The high level objectives of Security+
6.0 Cryptography and PKI
• 6.1 Compare and contrast basic concepts of cryptography
• 6.2 Explain cryptography algorithms and their basic characteristics
• 6.3 Given a scenario, install and configure wireless security settings
• 6.4 Given a scenario, implement public key infrastructure
© Global Knowledge Training LLC. All rights reserved. Page 11
Different roles that can use Security+
• Systems Administrator
• Network Administrator
• Security Administrator
• Junior IT Auditor/ Penetration Tester
• Security Specialist
• Security Consultant
• Security Engineer
• Any other IT role??
© Global Knowledge Training LLC. All rights reserved. Page 12
Post Security+ certifications
CompTIA Cybersecurity Career Pathway
Specialist CSIS: CompTIA Secure Infrastructure Specialist (A+/Network+/Security+)
Professional CSCP: CompTIA
Secure Cloud
Professional
(Sec+/Cloud+)
CSAP: CompTIA
Security Analyst
Professional
(Sec+/CySA+)
CNVP: CompTIA Network
Vulnerability Assessment
Professional
(Sec+/PenTest+)
CNSP: CompTIA Network
Security Professional
(Sec+/PenTest+/CySA+)
Expert CSAE: CompTIA Security Analytics
Expert (Sec+/CySA+/CASP+)
CSIE: CompTIA Security Infrastructure Expert
(Sec+/CySA+/PenTest+/CASP+)
© Global Knowledge Training LLC. All rights reserved. Page 13
Post Security+ certifications
CompTIA Cybersecurity Career Pathway
• Specialist
• CSIS: CompTIA Secure Infrastructure Specialist (A+/Network+/Security+)
• Professional
• CSCP: CompTIA Secure Cloud Professional (Security+/Cloud+)
• CSAP: CompTIA Security Analyst Professional (Security+/CySA+)
• CNVP: CompTIA Network Vulnerability Assessment Professional (Sec+/PenTest+)
• CNSP: CompTIA Network Security Professional (Security+/PenTest+/CySA+)
• Expert
• CSAE: CompTIA Security Analytics Expert (Security+/CySA+/CASP+)
• CSIE: CompTIA Security Infrastructure Expert (Security+/CySA+/PenTest+/CASP+)
© Global Knowledge Training LLC. All rights reserved. Page 14
Non-CompTIA certifications
• Security
• EC-Council: CND, CEH
• ISACA: CISM, CISA, CRISC
• ISC2: SSCP, CISSP
• Vendor-specific
• Cisco: CCNA Security, Cisco Cybersecurity Specialist
• Microsoft: MCSE: Core Infrastructure (Server 2016)
• Red Hat: Red Hat Certified Specialist in Server Security and Hardening
• Symantec
• MacAfee
• Juniper
• And more…

Más contenido relacionado

Más de Global Knowledge Training

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Global Knowledge Training
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyGlobal Knowledge Training
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksGlobal Knowledge Training
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationGlobal Knowledge Training
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationGlobal Knowledge Training
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success Global Knowledge Training
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementGlobal Knowledge Training
 
How the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouHow the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouGlobal Knowledge Training
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityGlobal Knowledge Training
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 

Más de Global Knowledge Training (20)

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification Journey
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
How to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS LambdaHow to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS Lambda
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your Organization
 
How to Migrate a Web App to AWS
How to Migrate a Web App to AWSHow to Migrate a Web App to AWS
How to Migrate a Web App to AWS
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your Organization
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People Management
 
Using Apache Spark with IBM SPSS Modeler
Using Apache Spark with IBM SPSS ModelerUsing Apache Spark with IBM SPSS Modeler
Using Apache Spark with IBM SPSS Modeler
 
How the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouHow the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts You
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
What's New in Windows 10
What's New in Windows 10What's New in Windows 10
What's New in Windows 10
 
Aligning IT and Business for Better Results
Aligning IT and Business for Better ResultsAligning IT and Business for Better Results
Aligning IT and Business for Better Results
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Proving Project Value
Proving Project ValueProving Project Value
Proving Project Value
 

Último

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Último (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Security+ and Your Career

  • 2. © Global Knowledge Training LLC. All rights reserved. Page 2 Presenter Daniel Cummins Daniel Cummins is a CompTIA Certified Technical Trainer (CTT+) and has been CompTIA certified since 2010, having passed all of the Core and Cybersecurity exams. Including recertification, Daniel has taken and passed more than a dozen CompTIA exams.
  • 3. © Global Knowledge Training LLC. All rights reserved. Page 3 Overview • The importance of Security+ in the IT industry • The high level objectives of Security+ • Different roles that use Security+ • Post Security+ certifications
  • 4. © Global Knowledge Training LLC. All rights reserved. Page 4 The importance of Security+ in the IT industry • Security is for EVERYONE! • Non-technical roles • Users: Awareness • Management: Planning • Facilities: Physical security • Technical roles • Help Desk • Networking • Database Management • System Administration • Software Development • DevOps • And more… • Trusted by • US DoD (8570 compliant) • Aerospace and Defense • Education • Non-profit • Construction/Architecture/Engineering
  • 5. © Global Knowledge Training LLC. All rights reserved. Page 5 The high level objectives of Security+ 1.0 Threats, Attacks and Vulnerabilities • 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware • 1.2 Compare and contrast types of attacks • 1.3 Explain threat actor types and attributes • 1.4 Explain penetration testing concepts • 1.5 Explain vulnerability scanning concepts • 1.6 Explain the impact associated with types of vulnerabilities
  • 6. © Global Knowledge Training LLC. All rights reserved. Page 6 The high level objectives of Security+ 2.0 Technologies and Tools • 2.1 Install and configure network components, both hardware and software-based, to support organizational security • 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization • 2.3 Given a scenario, troubleshoot common security issues • 2.4 Given a scenario, analyze and interpret output from security technologies • 2.5 Given a scenario, deploy mobile devices securely • 2.6 Given a scenario, implement secure protocols
  • 7. © Global Knowledge Training LLC. All rights reserved. Page 7 The high level objectives of Security+ 3.0 Architecture and Design • 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides • 3.2 Given a scenario, implement secure network architectures concepts • 3.3 Given a scenario, implement secure systems design • 3.4 Explain the importance of secure staging deployment concepts • 3.5 Explain the security implications of embedded systems • 3.6 Summarize secure application development and deployment concepts • 3.7 Summarize cloud and virtualization concepts • 3.8 Explain how resiliency and automation strategies reduce risk • 3.9 Explain the importance of physical security controls
  • 8. © Global Knowledge Training LLC. All rights reserved. Page 8 The high level objectives of Security+ 4.0 Identity and Access Management • 4.1 Compare and contrast identity and access management concepts • 4.2 Given a scenario, install and configure identity and access services • 4.3 Given a scenario, implement identity and access management controls • 4.4 Given a scenario, differentiate common account management practices
  • 9. © Global Knowledge Training LLC. All rights reserved. Page 9 The high level objectives of Security+ 5.0 Risk Management • 5.1 Explain the importance of policies, plans and procedures related to organizational security • 5.2 Summarize business impact analysis concepts • 5.3 Explain risk management processes and concepts • 5.4 Given a scenario, follow incident response procedures • 5.5 Summarize basic concepts of forensics • 5.6 Explain disaster recovery and continuity of operation concepts • 5.7 Compare and contrast various types of controls • 5.8 Given a scenario, carry out data security and privacy practices
  • 10. © Global Knowledge Training LLC. All rights reserved. Page 10 The high level objectives of Security+ 6.0 Cryptography and PKI • 6.1 Compare and contrast basic concepts of cryptography • 6.2 Explain cryptography algorithms and their basic characteristics • 6.3 Given a scenario, install and configure wireless security settings • 6.4 Given a scenario, implement public key infrastructure
  • 11. © Global Knowledge Training LLC. All rights reserved. Page 11 Different roles that can use Security+ • Systems Administrator • Network Administrator • Security Administrator • Junior IT Auditor/ Penetration Tester • Security Specialist • Security Consultant • Security Engineer • Any other IT role??
  • 12. © Global Knowledge Training LLC. All rights reserved. Page 12 Post Security+ certifications CompTIA Cybersecurity Career Pathway Specialist CSIS: CompTIA Secure Infrastructure Specialist (A+/Network+/Security+) Professional CSCP: CompTIA Secure Cloud Professional (Sec+/Cloud+) CSAP: CompTIA Security Analyst Professional (Sec+/CySA+) CNVP: CompTIA Network Vulnerability Assessment Professional (Sec+/PenTest+) CNSP: CompTIA Network Security Professional (Sec+/PenTest+/CySA+) Expert CSAE: CompTIA Security Analytics Expert (Sec+/CySA+/CASP+) CSIE: CompTIA Security Infrastructure Expert (Sec+/CySA+/PenTest+/CASP+)
  • 13. © Global Knowledge Training LLC. All rights reserved. Page 13 Post Security+ certifications CompTIA Cybersecurity Career Pathway • Specialist • CSIS: CompTIA Secure Infrastructure Specialist (A+/Network+/Security+) • Professional • CSCP: CompTIA Secure Cloud Professional (Security+/Cloud+) • CSAP: CompTIA Security Analyst Professional (Security+/CySA+) • CNVP: CompTIA Network Vulnerability Assessment Professional (Sec+/PenTest+) • CNSP: CompTIA Network Security Professional (Security+/PenTest+/CySA+) • Expert • CSAE: CompTIA Security Analytics Expert (Security+/CySA+/CASP+) • CSIE: CompTIA Security Infrastructure Expert (Security+/CySA+/PenTest+/CASP+)
  • 14. © Global Knowledge Training LLC. All rights reserved. Page 14 Non-CompTIA certifications • Security • EC-Council: CND, CEH • ISACA: CISM, CISA, CRISC • ISC2: SSCP, CISSP • Vendor-specific • Cisco: CCNA Security, Cisco Cybersecurity Specialist • Microsoft: MCSE: Core Infrastructure (Server 2016) • Red Hat: Red Hat Certified Specialist in Server Security and Hardening • Symantec • MacAfee • Juniper • And more…

Notas del editor

  1. SSCP: Systems Security Certified Practitioner