SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Security+ and
Your IT Career
© Global Knowledge Training LLC. All rights reserved. Page 2
Presenter
Daniel Cummins
Daniel Cummins is a CompTIA Certified
Technical Trainer (CTT+) and has been
CompTIA certified since 2010, having
passed all of the Core and Cybersecurity
exams. Including recertification, Daniel
has taken and passed more than a
dozen CompTIA exams.
© Global Knowledge Training LLC. All rights reserved. Page 3
Overview
• The importance of Security+ in the IT industry
• The high level objectives of Security+
• Different roles that use Security+
• Post Security+ certifications
© Global Knowledge Training LLC. All rights reserved. Page 4
The importance of Security+ in the IT industry
• Security is for EVERYONE!
• Non-technical roles
• Users: Awareness
• Management: Planning
• Facilities: Physical security
• Technical roles
• Help Desk
• Networking
• Database Management
• System Administration
• Software Development
• DevOps
• And more…
• Trusted by
• US DoD (8570 compliant)
• Aerospace and Defense
• Education
• Non-profit
• Construction/Architecture/Engineering
© Global Knowledge Training LLC. All rights reserved. Page 5
The high level objectives of Security+
1.0 Threats, Attacks and Vulnerabilities
• 1.1 Given a scenario, analyze indicators of compromise and determine the type of
malware
• 1.2 Compare and contrast types of attacks
• 1.3 Explain threat actor types and attributes
• 1.4 Explain penetration testing concepts
• 1.5 Explain vulnerability scanning concepts
• 1.6 Explain the impact associated with types of vulnerabilities
© Global Knowledge Training LLC. All rights reserved. Page 6
The high level objectives of Security+
2.0 Technologies and Tools
• 2.1 Install and configure network components, both hardware and software-based,
to support organizational security
• 2.2 Given a scenario, use appropriate software tools to assess the security posture
of an organization
• 2.3 Given a scenario, troubleshoot common security issues
• 2.4 Given a scenario, analyze and interpret output from security technologies
• 2.5 Given a scenario, deploy mobile devices securely
• 2.6 Given a scenario, implement secure protocols
© Global Knowledge Training LLC. All rights reserved. Page 7
The high level objectives of Security+
3.0 Architecture and Design
• 3.1 Explain use cases and purpose for frameworks, best practices and secure
configuration guides
• 3.2 Given a scenario, implement secure network architectures concepts
• 3.3 Given a scenario, implement secure systems design
• 3.4 Explain the importance of secure staging deployment concepts
• 3.5 Explain the security implications of embedded systems
• 3.6 Summarize secure application development and deployment concepts
• 3.7 Summarize cloud and virtualization concepts
• 3.8 Explain how resiliency and automation strategies reduce risk
• 3.9 Explain the importance of physical security controls
© Global Knowledge Training LLC. All rights reserved. Page 8
The high level objectives of Security+
4.0 Identity and Access Management
• 4.1 Compare and contrast identity and access management concepts
• 4.2 Given a scenario, install and configure identity and access services
• 4.3 Given a scenario, implement identity and access management controls
• 4.4 Given a scenario, differentiate common account management practices
© Global Knowledge Training LLC. All rights reserved. Page 9
The high level objectives of Security+
5.0 Risk Management
• 5.1 Explain the importance of policies, plans and procedures related to
organizational security
• 5.2 Summarize business impact analysis concepts
• 5.3 Explain risk management processes and concepts
• 5.4 Given a scenario, follow incident response procedures
• 5.5 Summarize basic concepts of forensics
• 5.6 Explain disaster recovery and continuity of operation concepts
• 5.7 Compare and contrast various types of controls
• 5.8 Given a scenario, carry out data security and privacy practices
© Global Knowledge Training LLC. All rights reserved. Page 10
The high level objectives of Security+
6.0 Cryptography and PKI
• 6.1 Compare and contrast basic concepts of cryptography
• 6.2 Explain cryptography algorithms and their basic characteristics
• 6.3 Given a scenario, install and configure wireless security settings
• 6.4 Given a scenario, implement public key infrastructure
© Global Knowledge Training LLC. All rights reserved. Page 11
Different roles that can use Security+
• Systems Administrator
• Network Administrator
• Security Administrator
• Junior IT Auditor/ Penetration Tester
• Security Specialist
• Security Consultant
• Security Engineer
• Any other IT role??
© Global Knowledge Training LLC. All rights reserved. Page 12
Post Security+ certifications
CompTIA Cybersecurity Career Pathway
Specialist CSIS: CompTIA Secure Infrastructure Specialist (A+/Network+/Security+)
Professional CSCP: CompTIA
Secure Cloud
Professional
(Sec+/Cloud+)
CSAP: CompTIA
Security Analyst
Professional
(Sec+/CySA+)
CNVP: CompTIA Network
Vulnerability Assessment
Professional
(Sec+/PenTest+)
CNSP: CompTIA Network
Security Professional
(Sec+/PenTest+/CySA+)
Expert CSAE: CompTIA Security Analytics
Expert (Sec+/CySA+/CASP+)
CSIE: CompTIA Security Infrastructure Expert
(Sec+/CySA+/PenTest+/CASP+)
© Global Knowledge Training LLC. All rights reserved. Page 13
Post Security+ certifications
CompTIA Cybersecurity Career Pathway
• Specialist
• CSIS: CompTIA Secure Infrastructure Specialist (A+/Network+/Security+)
• Professional
• CSCP: CompTIA Secure Cloud Professional (Security+/Cloud+)
• CSAP: CompTIA Security Analyst Professional (Security+/CySA+)
• CNVP: CompTIA Network Vulnerability Assessment Professional (Sec+/PenTest+)
• CNSP: CompTIA Network Security Professional (Security+/PenTest+/CySA+)
• Expert
• CSAE: CompTIA Security Analytics Expert (Security+/CySA+/CASP+)
• CSIE: CompTIA Security Infrastructure Expert (Security+/CySA+/PenTest+/CASP+)
© Global Knowledge Training LLC. All rights reserved. Page 14
Non-CompTIA certifications
• Security
• EC-Council: CND, CEH
• ISACA: CISM, CISA, CRISC
• ISC2: SSCP, CISSP
• Vendor-specific
• Cisco: CCNA Security, Cisco Cybersecurity Specialist
• Microsoft: MCSE: Core Infrastructure (Server 2016)
• Red Hat: Red Hat Certified Specialist in Server Security and Hardening
• Symantec
• MacAfee
• Juniper
• And more…

Weitere ähnliche Inhalte

Mehr von Global Knowledge Training

Mehr von Global Knowledge Training (20)

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification Journey
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
How to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS LambdaHow to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS Lambda
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your Organization
 
How to Migrate a Web App to AWS
How to Migrate a Web App to AWSHow to Migrate a Web App to AWS
How to Migrate a Web App to AWS
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your Organization
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People Management
 
Using Apache Spark with IBM SPSS Modeler
Using Apache Spark with IBM SPSS ModelerUsing Apache Spark with IBM SPSS Modeler
Using Apache Spark with IBM SPSS Modeler
 
How the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouHow the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts You
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
What's New in Windows 10
What's New in Windows 10What's New in Windows 10
What's New in Windows 10
 
Aligning IT and Business for Better Results
Aligning IT and Business for Better ResultsAligning IT and Business for Better Results
Aligning IT and Business for Better Results
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Proving Project Value
Proving Project ValueProving Project Value
Proving Project Value
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Security+ and Your Career

  • 2. © Global Knowledge Training LLC. All rights reserved. Page 2 Presenter Daniel Cummins Daniel Cummins is a CompTIA Certified Technical Trainer (CTT+) and has been CompTIA certified since 2010, having passed all of the Core and Cybersecurity exams. Including recertification, Daniel has taken and passed more than a dozen CompTIA exams.
  • 3. © Global Knowledge Training LLC. All rights reserved. Page 3 Overview • The importance of Security+ in the IT industry • The high level objectives of Security+ • Different roles that use Security+ • Post Security+ certifications
  • 4. © Global Knowledge Training LLC. All rights reserved. Page 4 The importance of Security+ in the IT industry • Security is for EVERYONE! • Non-technical roles • Users: Awareness • Management: Planning • Facilities: Physical security • Technical roles • Help Desk • Networking • Database Management • System Administration • Software Development • DevOps • And more… • Trusted by • US DoD (8570 compliant) • Aerospace and Defense • Education • Non-profit • Construction/Architecture/Engineering
  • 5. © Global Knowledge Training LLC. All rights reserved. Page 5 The high level objectives of Security+ 1.0 Threats, Attacks and Vulnerabilities • 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware • 1.2 Compare and contrast types of attacks • 1.3 Explain threat actor types and attributes • 1.4 Explain penetration testing concepts • 1.5 Explain vulnerability scanning concepts • 1.6 Explain the impact associated with types of vulnerabilities
  • 6. © Global Knowledge Training LLC. All rights reserved. Page 6 The high level objectives of Security+ 2.0 Technologies and Tools • 2.1 Install and configure network components, both hardware and software-based, to support organizational security • 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization • 2.3 Given a scenario, troubleshoot common security issues • 2.4 Given a scenario, analyze and interpret output from security technologies • 2.5 Given a scenario, deploy mobile devices securely • 2.6 Given a scenario, implement secure protocols
  • 7. © Global Knowledge Training LLC. All rights reserved. Page 7 The high level objectives of Security+ 3.0 Architecture and Design • 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides • 3.2 Given a scenario, implement secure network architectures concepts • 3.3 Given a scenario, implement secure systems design • 3.4 Explain the importance of secure staging deployment concepts • 3.5 Explain the security implications of embedded systems • 3.6 Summarize secure application development and deployment concepts • 3.7 Summarize cloud and virtualization concepts • 3.8 Explain how resiliency and automation strategies reduce risk • 3.9 Explain the importance of physical security controls
  • 8. © Global Knowledge Training LLC. All rights reserved. Page 8 The high level objectives of Security+ 4.0 Identity and Access Management • 4.1 Compare and contrast identity and access management concepts • 4.2 Given a scenario, install and configure identity and access services • 4.3 Given a scenario, implement identity and access management controls • 4.4 Given a scenario, differentiate common account management practices
  • 9. © Global Knowledge Training LLC. All rights reserved. Page 9 The high level objectives of Security+ 5.0 Risk Management • 5.1 Explain the importance of policies, plans and procedures related to organizational security • 5.2 Summarize business impact analysis concepts • 5.3 Explain risk management processes and concepts • 5.4 Given a scenario, follow incident response procedures • 5.5 Summarize basic concepts of forensics • 5.6 Explain disaster recovery and continuity of operation concepts • 5.7 Compare and contrast various types of controls • 5.8 Given a scenario, carry out data security and privacy practices
  • 10. © Global Knowledge Training LLC. All rights reserved. Page 10 The high level objectives of Security+ 6.0 Cryptography and PKI • 6.1 Compare and contrast basic concepts of cryptography • 6.2 Explain cryptography algorithms and their basic characteristics • 6.3 Given a scenario, install and configure wireless security settings • 6.4 Given a scenario, implement public key infrastructure
  • 11. © Global Knowledge Training LLC. All rights reserved. Page 11 Different roles that can use Security+ • Systems Administrator • Network Administrator • Security Administrator • Junior IT Auditor/ Penetration Tester • Security Specialist • Security Consultant • Security Engineer • Any other IT role??
  • 12. © Global Knowledge Training LLC. All rights reserved. Page 12 Post Security+ certifications CompTIA Cybersecurity Career Pathway Specialist CSIS: CompTIA Secure Infrastructure Specialist (A+/Network+/Security+) Professional CSCP: CompTIA Secure Cloud Professional (Sec+/Cloud+) CSAP: CompTIA Security Analyst Professional (Sec+/CySA+) CNVP: CompTIA Network Vulnerability Assessment Professional (Sec+/PenTest+) CNSP: CompTIA Network Security Professional (Sec+/PenTest+/CySA+) Expert CSAE: CompTIA Security Analytics Expert (Sec+/CySA+/CASP+) CSIE: CompTIA Security Infrastructure Expert (Sec+/CySA+/PenTest+/CASP+)
  • 13. © Global Knowledge Training LLC. All rights reserved. Page 13 Post Security+ certifications CompTIA Cybersecurity Career Pathway • Specialist • CSIS: CompTIA Secure Infrastructure Specialist (A+/Network+/Security+) • Professional • CSCP: CompTIA Secure Cloud Professional (Security+/Cloud+) • CSAP: CompTIA Security Analyst Professional (Security+/CySA+) • CNVP: CompTIA Network Vulnerability Assessment Professional (Sec+/PenTest+) • CNSP: CompTIA Network Security Professional (Security+/PenTest+/CySA+) • Expert • CSAE: CompTIA Security Analytics Expert (Security+/CySA+/CASP+) • CSIE: CompTIA Security Infrastructure Expert (Security+/CySA+/PenTest+/CASP+)
  • 14. © Global Knowledge Training LLC. All rights reserved. Page 14 Non-CompTIA certifications • Security • EC-Council: CND, CEH • ISACA: CISM, CISA, CRISC • ISC2: SSCP, CISSP • Vendor-specific • Cisco: CCNA Security, Cisco Cybersecurity Specialist • Microsoft: MCSE: Core Infrastructure (Server 2016) • Red Hat: Red Hat Certified Specialist in Server Security and Hardening • Symantec • MacAfee • Juniper • And more…

Hinweis der Redaktion

  1. SSCP: Systems Security Certified Practitioner