{"id":13023,"date":"2022-08-07T20:00:59","date_gmt":"2022-08-07T17:00:59","guid":{"rendered":"https:\/\/esi.edu.sa\/?post_type=courses&#038;p=13023"},"modified":"2024-12-22T17:50:06","modified_gmt":"2024-12-22T14:50:06","slug":"compatia-course-comptia-security-sy0-601","status":"publish","type":"courses","link":"https:\/\/esi.edu.sa\/en\/courses\/compatia-course-comptia-security-sy0-601\/","title":{"rendered":"CompTIA Security+ Course"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: justify;\"><img decoding=\"async\" class=\"alignnone wp-image-20027\" src=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png\" alt=\"\" width=\"188\" height=\"40\" srcset=\"https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy.png 300w, https:\/\/esi.edu.sa\/wp-content\/uploads\/2024\/02\/\u062a\u0627\u0628\u064a2-300x64-copy-50x11.png 50w\" sizes=\"(max-width: 188px) 100vw, 188px\" \/><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Overview:<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">The threats of the digital age are rapidly evolving as more businesses<br \/>\nbecome reliant on technology to manage day-to-day activities.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Hiring professionals with cybersecurity certifications and credentials are<br \/>\nintegral to protecting information movement and storage. In turn, this<br \/>\nprotects the integrity of the business and allows businesses to maintain a<br \/>\ncompetitive edge.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">CompTIA is a leader in the global information technology ecosystem.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Their CompTIA security+ certification is an ideal course for professionals<br \/>\nlooking to build the skills needed to fortify an organization&#8217;s activities<br \/>\nacross business size, industry, or location<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Benefits:<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Getting CompTIA-SY0-601 Security+ certified is beneficial to both the hiring organization and the professional getting certified.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">CompTIA Security+ is chosen by more corporations and defense<br \/>\norganizations than any other certification on the market to validate baseline security skills and for fulfilling the DoD 8570 compliance.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">CompTIA Security+ also proves hands-on skills with its emphasis on practical applications and ensuring the security professional is better prepared to problem solve based on today&#8217;s complex issues.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Getting CompTIA Security+ certified is beneficial to individuals in various technology-based roles as cybersecurity skills are helpful to have across the system, hardware, and software management.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">CompTIA Security+ is also aligned to the latest in cybersecurity trends and techniques.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>The Main Topic of the Course:<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Domain 1: Attacks, Threats, and Vulnerabilities<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Domain 2: Architecture and Design<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Domain 3: Implementation<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Domain 4: Operations and Incident Response<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Domain 5: Governance, Risk, and Compliance<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course requirements:<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">It is recommended professionals have a minimum of 24 months or two years of experience in networking support and IT administration.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Candidates must also know how to use basic network terminology and functions along with an understanding of TCP\/IP addressing, core protocols, and troubleshooting tools.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\"><strong>Course Outlines and Training Plan:<\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: justify;\">Domain 1: Attacks, Threats, and Vulnerabilities<\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Compare and contrast different types of social engineering techniques.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, analyze potential indicators to determine the type of attack<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, analyze potential indicators associated with application attacks.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, analyze potential indicators associated with network attacks.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Explain different threat actors, vectors, and intelligence sources.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Explain the security concerns associated with various types of vulnerabilities.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Summarize the techniques used in security assessments.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Explain the techniques used in penetration testing.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Domain 2: Architecture and Design<\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Explain the importance of security concepts in an enterprise environment.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Summarize virtualization and cloud computing concepts.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Summarize secure application development, deployment, and automation concepts.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Summarize authentication and authorization design concepts.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, implement cybersecurity resilience.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Explain the security implications of embedded and specialized systems.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Explain the importance of physical security controls.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Summarize the basics of cryptographic concepts.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Domain 3: Implementation<\/p>\n<ul dir=\"ltr\" style=\"text-align: justify;\">\n<li>Given a scenario, implement secure protocols.<\/li>\n<li>Given a scenario, implement host or application security solutions<\/li>\n<li>Given a scenario, implement secure network designs.<\/li>\n<li>Given a scenario, install and configure wireless security settings.<\/li>\n<li>\u00a0Given a scenario, implement secure mobile solutions.<\/li>\n<li>Given a scenario, apply cybersecurity solutions to the cloud.<\/li>\n<li>Given a scenario, implement identity and account management controls.<\/li>\n<li>Given a scenario, implement authentication and authorization solutions.<\/li>\n<li>Given a scenario, implement public key infrastructure.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Domain 4: Operations and Incident Response<\/p>\n<ul style=\"text-align: justify;\">\n<li dir=\"ltr\" style=\"text-align: left;\">Given a scenario, use the appropriate tool to assess organizational security.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Summarize the importance of policies, processes, and procedures for incident response.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given an incident, utilize appropriate data sources to support an investigation.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Given an incident, apply mitigation techniques or controls to secure an environment.<\/li>\n<li dir=\"ltr\" style=\"text-align: left;\">Explain the key aspects of digital forensics.<\/li>\n<\/ul>\n<p dir=\"ltr\" style=\"text-align: justify;\">Domain 5: Governance, Risk, and Compliance<\/p>\n<ul dir=\"ltr\">\n<li style=\"text-align: justify;\">Compare and contrast various types of controls.<\/li>\n<li style=\"text-align: justify;\">Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture.<\/li>\n<li style=\"text-align: justify;\">Explain the importance of policies to organizational security<\/li>\n<li style=\"text-align: justify;\">Summarize risk management processes and concepts.<\/li>\n<li style=\"text-align: justify;\">Explain privacy and sensitive data concepts in relation to security<\/li>\n<\/ul>\n","protected":false},"author":6,"featured_media":13306,"template":"","course_category":[74,38],"class_list":["post-13023","courses","type-courses","status-publish","has-post-thumbnail","hentry","course_category-compatia-en","course_category-it-en","infinite-scroll-item","no-featured-image-padding"],"acf":[],"_links":{"self":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses"}],"about":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/types\/courses"}],"author":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":17,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13023\/revisions"}],"predecessor-version":[{"id":27672,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/courses\/13023\/revisions\/27672"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media\/13306"}],"wp:attachment":[{"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=13023"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/esi.edu.sa\/en\/wp-json\/wp\/v2\/course_category?post=13023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}