Home > Course Catalog > Choose By Topics > Cybersecurity > CSP+: Certified Security Principles
This Certified Security Principles+ course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products. These skills have become increasingly important, as additional safeguards such as intrusion detection systems, physical access control and multi‐factor authentication become standard methods of protection. Students are given real world scenarios to reinforce the material covered and will learn how to apply the concepts to their daily operations.
Start Date | Delivery Format | Days | Time | Status | Price | Enroll |
---|---|---|---|---|---|---|
Coming Soon | Live Virtual Led | 5 | 10:00 am | Enrolling Now | $2,495 | |
Coming Soon | Live Virtual Led | 5 | 10:00 am | Enrolling Now | $2,495 |
Upon completion, the Certified Security Principles+ candidate will not only be able to competently take the CSP+ exam but will also understand basic cyber security knowledge to keep companies’ IP and IT infrastructure safe.
Identify the fundamental concepts of computer security.
• Identify security threats and vulnerabilities.
• Manage data, application, and host security.
• Implement network security.
• Identify and implement access control and account management security measures.
• Manage certificates.
• Identify and implement compliance and operational security measures.
• Manage risk.
• Troubleshoot and manage security incidents.
• Plan for business continuity and disaster recovery.
COURSE DETAILS
Module 1 – Threats and Vulnerabilities
a. Types of Malware
b. Types of Attacks
c. Social Engineering
d. Mitigating Attacks
e. Discovering vulnerabilities and threats
f. Vulnerability Assessment and Penetration Testing
Module 2 – Cryptography
a. Understanding crypto concepts
b. Crypto methods and where to use them
c. PKI and Certificate Management
Module 3 – Identity and Access Control
a. Why IAM?
b. Various Authentication Services
c. AAA
d. Implementing the Controls
Module 4 – Network Security
a. Network Devices
b. Other Devices
c. Administering and Implementing Security
d. Network Design
e. Protocols and Services
f. Wireless Networking
Module 5 – Host/Server Security
a. The Operating Systems
b. Hardening the OS
c. OS additional software security
d. Physical security
Module 6 – Data Security
a. Different Types of Storage
b. Risks associated with all types of storage
c. Encryption Options
d. Corporate Management Options
e. Various device uses
f. Hardware security options for storage
Module 7 – Application Security
a. Application Security Principals
b. Secure Coding Concepts
c. Hacking for the purpose of testing
d. Top 10 OWASP Risks
e. How to harden against those risks
f. Patch Management
Module 8 – Mobile Security
a. What devices are we talking about?
b. The Risk
c. Hardening these Devices!
d. Corporate Management and Legal issues
Module 9 – Compliance and Operational Security
a. Managing Risk
b. Managing Risk with third parties
c. Implementing Corporate Strategies
d. Incident Response and Forensics Procedures
e. Utilizing Physical and Environmental Controls