SlideShare a Scribd company logo
1 of 38
Download to read offline
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
An Introduction to CompTIA
Security+ - SY0 601
NetCom Learning
Sheik Raashid Javid
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
| |
To watch the recorded webinar video for live demos, please access the link:
https://bit.ly/3N4DeT1
RECORDED WEBINAR VIDEO
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
AGENDA
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
Lesson 1: Comparing Security Roles and Security Controls
Lesson 2: Explaining Threat Actors and Threat Intelligence
Lesson 3: Performing Security Assessments
Lesson 4: Identifying Social Engineering and Malware
Lesson 5: Summarizing Basic Cryptographic Concepts
Lesson 6: Implementing Public Key Infrastructure
Lesson 7: Implementing Authentication Controls
Lesson 8: Implementing Identity and Account Management Controls
Lesson 9: Implementing Secure Network Designs
Lesson 10: Implementing Network Security Appliances
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
AGENDA
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
Lesson 11: Implementing Secure Network Protocols
Lesson 12: Implementing Host Security Solutions
Lesson 13: Implementing Secure Mobile Solutions
Lesson 14: Summarizing Secure Application Concepts
Lesson 15: Implementing Secure Cloud Solutions
Lesson 16: Explaining Data Privacy and Protection Concepts
Lesson 17: Performing Incident Response
Lesson 18: Explaining Digital Forensics
Lesson 19: Summarizing Risk Management Concepts
Lesson 20: Implementing Cybersecurity Resilience
Lesson 21: Explaining Physical Security
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
COMPARING SECURITY ROLES AND SECURITY CONTROLS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Compare and Contrast Information
Security Roles
▪ Information Security- CIA
▪ Cybersecurity Framework- NIST
▪ Information Security Roles and
Responsibilities
▪ SOC
▪ Incident Response
 Compare and Contrast Security
Control and Framework Types
 Security control categories- Technical,
Managerial, Operational.
 Security Control Functional Types-
Preventive, Detective, Corrective,
Physical, Compensating, Deterrent
 ISO and Cloud Frameworks- 27K, 31K,
Cloud Security Alliance
 Regulations, standards- GDPR, PCI-DSS
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
EXPLAINING THREAT ACTORS AND THREAT INTELLIGENCE
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Explain Threat Actor Types and
Attack Vectors
▪ Vulnerability, Threat, Risk
▪ Attributes of Threat Actors-
Internal/External, Motivation, Funding
▪ Hackers, Script Kiddies, Hactivists, State
actor, APT, Competitors, Insider.
▪ Attack Surface, Actor vector
 Explain Threat Intelligence Sources
 Threat research sources- dark web
 Threat intelligence providers- IBM X-
Force, FireEye, Recorded Future, ISAC,
OSINT
 TTPs and IOC.
 Threat Data Feeds- STIX, TAXII etc.
 AI and ML
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
PERFORMING SECURITY ASSESSMENTS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Assess organizational security with network
reconnaissance tools.
▪ Ipconfig, Ping, ARP, Route, Traceroute
▪ IP Scanners and Nmap- Service Discovery
▪ Netstat and Nslookup, Wireshark, tcpdump,
Metasploit etc.
▪ Explain security concerns with general
vulnerability types.
▪ Software vulnerabilities and patch management
▪ Zero-day, legacy, weak host configurations, weak
network configurations
▪ Impact from vulnerabilities, 3rd party risk, vendor
management
 Summarize vulnerability scanning techniques.
 Security assessment, vulnerability scan types
 CVE, CVSS, NVD
 False positive and false negatives
 Threat Hunting
 Explain penetration testing concepts.
 Penetration Testing
 ROE
 Black Box, White Box, Gray Box
 Red/Blue Team
 Active/passive Reconnaissance
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IDENTIFYING SOCIAL ENGINEERING AND MALWARE
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Compare and contrast social
engineering techniques.
▪ Social Engineering- principles
▪ Impersonation, dumpster diving,
tailgating, identity fraud
▪ Phishing, whaling, vishing, spam,
pharming.
 Analyze indicators of malware-
based attacks.
 Malware Classification
 Virus, Worm, spyware, keylogger,
 Backdoor, RAT, Rootkit
 Ransomware, Logic Bomb
 Malware Indicators
 Process Analysis- Process Explorer
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
SUMMARIZING BASIC CRYPTOGRAPHIC CONCEPTS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Compare and contrast cryptographic
ciphers.
▪ Cryptographic Concepts
▪ Hashing
▪ Symmetric and Asymmetric Encryption
▪ Summarize cryptographic modes of
operation.
▪ Digital Signatures
▪ Digital Certificates
▪ Digital Envelopes etc.
 Summarize cryptographic use cases
and weaknesses.
 Cryptography supporting CIA
 Limitations and Attacks
 Key stretching and salting
 Summarize other cryptographic
technologies.
 Quantum computing
 Blockchain
 Steganography etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMENTING PUBLIC KEY INFRASTRUCTURE
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Implement certificates and certificate
authorities.
▪ Public and private keys
▪ Certificate Authority
▪ Trust Models- Registration Authority-
CSR
▪ Digital Certificate- Types, Attributes
 Implement PKI management.
 Key management
 Key Recovery-Escrow
 Certificate Expiration
 CRL
 Online Certificate Status Protocol
Responders etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMENTING AUTHENTICATION CONTROLS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Summarize authentication design concepts.
▪ Identity and Access Management
▪ Authentication Factors
▪ MFA etc.
▪ Implement knowledge-based authentication.
▪ Local, Remote Authentication
▪ Kerberos
▪ Password Attacks , crackers.
▪ Authentication Management etc.
 Implement authentication technologies.
 Smart card authentication
 Key management devices
 RADIUS and TACACS
 OTPs
 Summarize biometrics authentication
concepts.
 Biometric Authentication- FRR, FAR, CER
 Fingerprints Recognition
 Facial Recognition etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMENTING IDENTITY AND ACCOUNT
MANAGEMENT CONTROLS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Implement identity and account types.
▪ Identity Management Controls- certificates,
smart cards, tokens Identity Providers.
▪ Background Check- onboarding Policies
▪ Personnel Policies- Separation of duties, Job
rotation, mandatory vacation etc.
▪ Root Accounts etc.
▪ Implement account policies.
▪ Account attributes and access policies
▪ Password policy
▪ Account restrictions, permissions, auditing
and lockout
 Implement authorization solutions.
 DAC, RBAC, MAC
 Directory service
 Federation etc.
 Explain the importance of personnel
policies.
 Conduct policies
 User and Role based training
 Types of Training
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMEMNTING SECURE NETWORK DESIGNS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Implement secure network designs.
▪ Secure Network Designs
▪ Network Appliances
▪ Routing and Switching Protocols
▪ Segmentation, Topology, Zones, DMZ
▪ Implement secure routing and
switching.
▪ MITM & Layer 2 Attacks
▪ ARP Poisoning, MAC Flooding.
▪ Loop prevention, MAC Filtering etc.
 Implement secure wireless
infrastructure.
 Wireless Network Installation
Considerations
 AP Security
 WEP, WPA2, WPA3, WPS
 Disassociation, Replay Attack,
Jamming
 Implement load balancers.
 DDoS & Mitigation
 Load Balancing
 Clustering, QoS
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMEMNTING NETWORK SECURITY APPLIANCES
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Implement firewalls and proxy servers.
▪ Packet Filtering Firewalls
▪ Stateful Inspection Firewalls
▪ Iptables, Proxies, Gateways, NAT etc.
▪ Implement network security monitoring.
▪ NIDS & NIPS
▪ Signature based and Behavior based
detection
▪ Next Generation Firewalls
▪ HIDS, WAF
 Summarize the use of SIEM
 Monitoring Services
 SIEM
 Analysis & Report Review
 File Manipulation Commands
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMEMNTING SECURE NETWORK PROTOCOL
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Implement secure network
operations protocols.
▪ NAT
▪ DNS
▪ DNS Poisoning- Security
▪ Secure Directory Services
▪ SNMP Security
 Implement secure application
protocols.
 HTTP and Web Services
 TLS
 FTP- Security
 Email- POP- IMAP- S/MIME-Security
 VOIP-SIP
 Implement secure remote access
protocols.
 VPN
 IPsec, L2TP.
 RDP-SSH
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMEMNTING HOST SECURITY SOLUTIONS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Implement secure firmware.
▪ Secure Boot
▪ Disk Encryption
▪ USB/Flash Drive Security
▪ EOL Systems
▪ Organizational Security Agreements
 Implement endpoint security.
 Hardening
 Base Configuration, Registry settings
 Patch Management
 End-point protection- Next Generation
 Antivirus
 Explain embedded system security
implications.
 Embedded Systems
 Logic Controllers- Communication
 Industrial Control Systems
 IoT
 Specialized Systems- Multifunction Printers, etc.
 Security for embedded Systems etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMEMNTING SECURE MOBILE SOLUTIONS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Implement mobile device
management.
▪ Deployment Models
▪ Enterprise Mobility Management
▪ Mobile Access Control Systems
▪ Remote Wipe- Full Device Encryption
▪ Location services
▪ Application Management -Content
Management
▪ Rooting/ Jailbreaking
 Implement secure mobile device
connections.
 Cellular & GPS
 Wi-Fi and Tethering
 Bluetooth
 Infrared-NFC – USB etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
SUMMARIZING SECURE APPLICATION CONCEPTS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Analyze indicators of application attacks.
Application Attacks
Overflow Vulnerabilities
Race Conditions- Memory Leak- Resource
Exhaustion
Driver Manipulation, pass the hash
▪ Analyze indicators of web application
attacks.
▪ URL Analysis
▪ API Attacks
▪ Replay- Session Hijack- CSRF
▪ SQL Injection-Directory Traversal
▪ Summarize secure coding practices.
▪ Secure coding techniques, Web app security
▪ Data exposure-Memory Management
▪ Secure code usage
▪ Static/Dynamic Code analysis
▪ Implement secure script environments.
▪ Scripting, Python, PowerShell
▪ Malicious code indicators etc.
▪ Summarize deployment and automation
concepts.
▪ Application Development, Deployment, Automation
▪ Secure Application Development Environment
▪ Provisioning, Deprovisioning, Version Control etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMENTING SECURE CLOUD SOLUTIONS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Summarize secure cloud and
virtualization services.
▪ Cloud Deployment Models
▪ Cloud Service Models
▪ Anything as a service
▪ Security as a service
▪ Virtualization- Hypervisor
▪ Virtual Desktop
▪ VM Escape Protection- Sprawl
Avoidance
 Apply cloud security solutions.
 Cloud security Integration and Auditing
 Security Controls- compute security
 Storage Security- High Availability
 Network Security- Firewalls etc.
 Summarize infrastructure as code
concepts.
 Microservices
 API
 Serverless Architecture
 SDN etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
EXPLAINING DATA PRIVACY AND PROTECTION CONCEPTS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Explain privacy and data sensitivity
concepts.
▪ Privacy and sensitive data concepts
▪ Data Roles and responsibilities
▪ Data Classifications
▪ Data Retention- Geographical
Considerations
▪ Breaches
▪ Data Sharing
 Explain privacy and data protection
controls.
 Data Protection
 Data Exfiltration
 DLP
 Privacy enhancing- deidentification
etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
PERFORMING INCIDENT RESPONSE
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Summarize incident response
procedures.
▪ Incident Response Process
▪ Preparation
▪ Identification
▪ Containment
▪ Eradication
▪ Recovery
▪ Lessons Learned
▪ Team, Communication, Plan, Exercise
▪ Attack Frameworks- Cyber Kill Chain
 Utilize appropriate data sources for
incident response.
 Incident Identification
 SIEM- Dashboards
 Trend Analysis
 Logging- Data Sources
 Apply mitigation controls.
 Incident Containment
 Eradication and recovery
 Firewall, content filter, end point
configuration changes, SOAR etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
EXPLAINING DIGITAL FORENSICS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Explain key aspects of digital
forensics documentation.
▪ Key aspects of digital forensics
▪ Report- E-Discovery- witness interview-
Timeline- Logs- Intelligence
 Explain key aspects of digital
forensics evidence acquisition.
 Data acquisition and order of volatility
 Forensic software
 Image and other data acquisition
 Integrity
 Data forensics in Cloud
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
SUMMARIZING RISK MANAGEMENT CONCEPTS
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Explain risk management processes
and concepts.
▪ Risk management Process
▪ Risk Types
▪ Assessment- Quantitative, Qualitative
▪ Risk Management Strategies
▪ Avoid, Transfer, Accept
▪ Risk Awareness
 Explain business impact analysis
concepts.
 Business Impact Analysis
 Mission Essential Functions
 Critical systems- single point of failure
 Disaster Recovery Plans etc.
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
IMPLEMENTING CYBERSECURITY RESILIENCE
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Implement redundancy strategies.
▪ High availability
▪ Power redundancy
▪ Network Redundancy
▪ Disk Redundancy
▪ Geographical Redundancy- Replication
 Implement backup strategies.
 Backup & Retention Policies
 Backup types
 Snapshots and Images
 Backup storage Issues
 Restoration Order etc.
 Implement cybersecurity resiliency
strategies.
 Configuration Management
 Assets Management
 Change Management
 Site Resiliency- Defense in Depth
 Disruption Strategies etc
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
EXAM DETAILS
Exam Code SY0-601
Launch Date
November 12, 2020
Exam Description
The CompTIA Security+ certification
exam will verify the successful
candidate has the knowledge and skills
required to assess the security posture
of an enterprise environment and
recommend and implement appropriate
security solutions; monitor and secure
hybrid environments, including cloud,
mobile, and IoT; operate with an
awareness of applicable laws and
policies, including principles of
governance, risk, and compliance;
identify, analyze, and respond to
security events and incidents
Number of Questions Maximum of 90 questions
Type of Questions
Multiple choice and performance-based
Length of Test
90 minutes
Passing Score 750 (on a scale of 100-900)
Recommended Experience
CompTIA Network+ and two years of
experience in IT administration with a
security focus
Languages
English, Japanese, Vietnamese, Thai,
Portuguese
Retirement Usually, three years after launch
Testing Provider
•Pearson VUE
Testing Centers
•Online Testing
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© 1998-2022 NetCom Learning
COMPTIA LABS FOR SECURITY+ (SY0 601)
Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
▪ Assisted Lab: Exploring the Lab Environment
▪ Assisted Lab: Scanning and Identifying
Network Nodes
▪ Assisted Lab: Intercepting and Interpreting
Network Traffic with Packet Sniffing Tools
▪ Assisted Lab: Analyzing the Results of a
Credentialed Vulnerability Scan
▪ Assisted Lab: Installing, Using, and Blocking a
Malware-based Backdoor
▪ APPLIED LAB: Performing Network
Reconnaissance and Vulnerability Scanning
▪ Assisted Lab: Managing the Lifecycle of a
Certificate
▪ Assisted Lab: Managing Certificates with
OpenSSL
▪ Assisted Lab: Auditing Passwords with a
Password Cracking Utility
▪ Assisted Lab: Managing Centralized
Authentication
▪ Assisted Lab: Managing Access Controls in
Windows Server
▪ Assisted Lab: Configuring a System for
Auditing Policies
▪ Assisted Lab: Managing Access Controls in
Linux
▪ APPLIED LAB: Configuring Identity and Access
Management Controls
▪ Assisted Lab: Implementing a Secure
Network Design
▪ Assisted Lab: Configuring a Firewall
▪ Assisted Lab: Configuring an Intrusion
Detection System
▪ Assisted Lab: Implementing Secure Network
Addressing Services
▪ Assisted Lab: Implementing a Virtual Private
Network
▪ Assisted Lab: Implementing a Secure SSH
Server
▪ Assisted Lab: Implementing Endpoint
Protection
▪ APPLIED LAB: Securing the Network
Infrastructure
▪ Assisted Lab: Identifying Application Attack
Indicators
▪ Assisted Lab: Identifying a Browser Attack
▪ Assisted Lab: Implementing PowerShell
Security
▪ Assisted Lab: Identifying Malicious Code
▪ APPLIED LAB: Identifying Application Attack
▪ Assisted Lab: Managing Data Sources for
Incident Response
▪ Assisted Lab: Configuring Mitigation
Controls
▪ Assisted Lab: Acquiring Digital Forensics
Evidence
▪ Assisted Lab: Backing Up and Restoring
Data in Windows and Linux
▪ APPLIED LAB: Managing Incident Response,
Mitigation and Recovery
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
ABOUT NETCOM LEARNING
NetCom Learningis an award-winning
global leader in managedlearning
services, training and talentdevelopment.
Founded : 1998
Headquarters : NewYorkCity
Delivery Capability : Worldwide
CEO : RussellSarder
100K+
Professionals
trained
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
14K+
C
orporate
clients
3500
IT,Business&
Soft Skillscourses
96%
Of customers
recommend usto others
8.6/9
Instructor
evaluations
20+
Leadingvendors
recognitions
Microsoft’s
Worldwidetraining
partner of the year
80%
Trainedofthe
Fortune100
T
op20
ITTraining
Company
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
RECOMMENDED COURSES AND MARKETING ASSETS
NetCom Learning offers a comprehensive portfolio for Security
» COMPTIA SECURITY+ CERTIFICATION PREP (EXAM SY0-601) - Class Scheduled on Jun 20
» COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) - Class Scheduled on Jul 18
» COMPTIA PENTEST+ CERTIFICATION PREP (EXAM PT0-002) - Class Scheduled on Jul 11
» COMPTIA NETWORK+ CERTIFICATION PREP (EXAM N10-008) - Class Scheduled on Jun 27
| |
You can also access the below Marketing Assets
» Free 1hr Training - An Introduction to CompTIA A+ (220 – 1101)
» Free On-Demand Training - What is new with CompTIA PenTest+ - PT0 002
» Blog - CompTIA Cybersecurity certification pathway and job prospects
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
UPCOMING WEBINARS
▪ Master Class: Understand the Fundamentals of Architecting on AWS
▪ Simplify Complex Projects with SCRUM
▪ What’s New in Power Apps and Power Automate?
▪ Cisco Enterprise Networks: Learn How to Implement and Configure OSPF
▪ Getting Started with Well-Architected Framework on AWS
▪ Master Class : Designing and Implementing DevOps Processes and Practices
▪ 10 Essential PMI skills for Leader
▪ AWS Discovery Day - Machine Learning Basics
▪ Learn Incident Handling & Response in Under 40 Minutes
▪ Master Class: Getting started with AWS DevOps
▪ An Introduction to CompTIA A+ (220 – 1101)
▪ AWS Discovery Day - Strategies and tools to perform large-scale migrations
▪ Learn to Defend Against Multi-Stage Network Breaches in 40 Minutes
& More
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
PROMOTIONS
Stay Digital Safe - Assess and Upskill your team against cyber threats now !
NetCom Learning's end-user Cybersecurity Awareness Training & Phishing Simulation Solution offers phishing
simulations on email, voice, and text to organizations, and is bundled with 90+ interactive security awareness
video courses for the end-users. Request a Demo
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
© 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
PROMOTIONS
Free Cybersecurity Training!
NetCom Learning brings an immersive two-hour, instructor-led Free Training on Cybersecurity that is designed to
help businesses understand the importance of Cybersecurity in today’s digital world and gain expert insights into
how security breaches can affect a business.. Learn More
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
© 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
© 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
PROMOTIONS
Explore The World Of Unlimited Training Subscription!
NetCom+ is a limitless 12-month subscription program. Attend over 500+ courses as from a range of authorized
training courses. Get access to bundled offerings of Virtual Instructor-Led courses, e-Learning, Discovery Days, and
On-Demand training via NetCom+ training subscription.. Save Now
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
PROMOTIONS
E- Learning To Skill Up !
Align and upskill your team via e-Learning to drive results! Our robust library includes EC-Council, Microsoft, Cisco,
Citrix, CompTIA, Autodesk, and more. Our e-Learning solutions allow perfect balance among work and upskilling,
without interrupting workflow. It’s all about saving time, quality learning, knowledge check, 24/7 availability.
Learn More
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
© 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
PROMOTIONS
Access Your Passport To A Year Full Of Learning!
The NetCom Learning Passport is a flexible pre-pay training package allowing you to plan and manage your
teams’ annual training needs. With our Learning Passport, organizations get special pricing and extended
program options to simplify management. Equipped with this Passport, you make the most of your budget. It has
been specifically designed to specialize for the number of learners you plan to train.. Unlock Now
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
PROMOTIONS
Worry-Free Training with Price Match Guarantee!
Our Price Match Guarantee ensures that we'll match the offers of any other authorized training provider if you
succeed at finding anyone offering the same publicly scheduled class within 30 days of our schedule at a lower
regular price.. Learn More
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
© 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
FOLLOWUS ON
LinkedIn T
witter YouTube
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
Instagram
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
BUILDING AN INNOVATIVE LEARNING ORG.
A BOOK FROM RUSSELL SARDER,
CEO AT NETCOM LEARNING
A framework to build a smarter
workforce, adapt to change and
drive growth.
DOWNLOADe-book
| |
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning
Thankyou
© 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
| |
© 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266
|
|
© Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com
1998-2022 NetCom Learning

More Related Content

Similar to An Introduction to CompTIA Security+ - SY0-601.pdf

NetCom learning webinar start your network foundations with ccna(handouts)
NetCom learning webinar start your network foundations with ccna(handouts)NetCom learning webinar start your network foundations with ccna(handouts)
NetCom learning webinar start your network foundations with ccna(handouts)Tuan Yang
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...NetCom Learning
 
What to Expect from the New PMP® Certification Exam in 2020?
What to Expect from the New PMP® Certification Exam in 2020?What to Expect from the New PMP® Certification Exam in 2020?
What to Expect from the New PMP® Certification Exam in 2020?Tuan Yang
 
Webinar - Cisco Professionals: How to Add API Skills to Your Networking Toolbox
Webinar - Cisco Professionals: How to Add API Skills to Your Networking ToolboxWebinar - Cisco Professionals: How to Add API Skills to Your Networking Toolbox
Webinar - Cisco Professionals: How to Add API Skills to Your Networking ToolboxTuan Yang
 
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...Tuan Yang
 
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...Tuan Yang
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystTuan Yang
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Tuan Yang
 
Mark Sudan ATS Resume / Curriculum Vitae
Mark Sudan ATS Resume / Curriculum VitaeMark Sudan ATS Resume / Curriculum Vitae
Mark Sudan ATS Resume / Curriculum VitaeMarkSudan1
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.Tuan Yang
 
How to manage projects with Microsoft teams
How to manage projects with Microsoft teams How to manage projects with Microsoft teams
How to manage projects with Microsoft teams Tuan Yang
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfTuan Yang
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookCalvin Sam
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsTuan Yang
 
Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfTuan Yang
 
Mark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum VitaeMark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum VitaeMarkSudan1
 
Draw IT Network Diagrams Like a Pro Using AutoCAD
Draw IT Network Diagrams Like a Pro Using AutoCADDraw IT Network Diagrams Like a Pro Using AutoCAD
Draw IT Network Diagrams Like a Pro Using AutoCADTuan Yang
 
Webinar - Adobe Illustrator Fundamentals - Walkthrough of the Latest Features...
Webinar - Adobe Illustrator Fundamentals - Walkthrough of the Latest Features...Webinar - Adobe Illustrator Fundamentals - Walkthrough of the Latest Features...
Webinar - Adobe Illustrator Fundamentals - Walkthrough of the Latest Features...Tuan Yang
 
Webinar - Get Introduced to the Next-Level Cisco Certifications
Webinar - Get Introduced to the Next-Level Cisco CertificationsWebinar - Get Introduced to the Next-Level Cisco Certifications
Webinar - Get Introduced to the Next-Level Cisco CertificationsTuan Yang
 

Similar to An Introduction to CompTIA Security+ - SY0-601.pdf (20)

NetCom learning webinar start your network foundations with ccna(handouts)
NetCom learning webinar start your network foundations with ccna(handouts)NetCom learning webinar start your network foundations with ccna(handouts)
NetCom learning webinar start your network foundations with ccna(handouts)
 
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape... Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
Beyond Keystroke Logging and Trojans: How to Navigate the Changing Landscape...
 
What to Expect from the New PMP® Certification Exam in 2020?
What to Expect from the New PMP® Certification Exam in 2020?What to Expect from the New PMP® Certification Exam in 2020?
What to Expect from the New PMP® Certification Exam in 2020?
 
Webinar - Cisco Professionals: How to Add API Skills to Your Networking Toolbox
Webinar - Cisco Professionals: How to Add API Skills to Your Networking ToolboxWebinar - Cisco Professionals: How to Add API Skills to Your Networking Toolbox
Webinar - Cisco Professionals: How to Add API Skills to Your Networking Toolbox
 
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
 
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
Webinar - Building the Next-level Hybrid Cloud for The Next Generation of IT ...
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence Analyst
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...
 
Mark Sudan ATS Resume / Curriculum Vitae
Mark Sudan ATS Resume / Curriculum VitaeMark Sudan ATS Resume / Curriculum Vitae
Mark Sudan ATS Resume / Curriculum Vitae
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.
 
How to manage projects with Microsoft teams
How to manage projects with Microsoft teams How to manage projects with Microsoft teams
How to manage projects with Microsoft teams
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdf
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
 
Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdf
 
Mark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum VitaeMark Sudan Non-ATS Resume / Curriculum Vitae
Mark Sudan Non-ATS Resume / Curriculum Vitae
 
Draw IT Network Diagrams Like a Pro Using AutoCAD
Draw IT Network Diagrams Like a Pro Using AutoCADDraw IT Network Diagrams Like a Pro Using AutoCAD
Draw IT Network Diagrams Like a Pro Using AutoCAD
 
Webinar - Adobe Illustrator Fundamentals - Walkthrough of the Latest Features...
Webinar - Adobe Illustrator Fundamentals - Walkthrough of the Latest Features...Webinar - Adobe Illustrator Fundamentals - Walkthrough of the Latest Features...
Webinar - Adobe Illustrator Fundamentals - Walkthrough of the Latest Features...
 
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
 
Webinar - Get Introduced to the Next-Level Cisco Certifications
Webinar - Get Introduced to the Next-Level Cisco CertificationsWebinar - Get Introduced to the Next-Level Cisco Certifications
Webinar - Get Introduced to the Next-Level Cisco Certifications
 

More from Tuan Yang

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfTuan Yang
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfTuan Yang
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfTuan Yang
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfTuan Yang
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfTuan Yang
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management Tuan Yang
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Tuan Yang
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSTuan Yang
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...Tuan Yang
 
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...Tuan Yang
 
NetCom learning webinar 5 disruptive trends impacting the project management ...
NetCom learning webinar 5 disruptive trends impacting the project management ...NetCom learning webinar 5 disruptive trends impacting the project management ...
NetCom learning webinar 5 disruptive trends impacting the project management ...Tuan Yang
 
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...Tuan Yang
 
4 tips to master the art of adobe in design
4 tips to master the art of adobe in design 4 tips to master the art of adobe in design
4 tips to master the art of adobe in design Tuan Yang
 
Build your Own Business Application Using Microsoft Power Apps
Build your Own Business Application Using Microsoft Power AppsBuild your Own Business Application Using Microsoft Power Apps
Build your Own Business Application Using Microsoft Power AppsTuan Yang
 
Be cloud ready with azure and aws the ultimate cloud solutions!
Be cloud ready with azure and aws   the ultimate cloud solutions!Be cloud ready with azure and aws   the ultimate cloud solutions!
Be cloud ready with azure and aws the ultimate cloud solutions!Tuan Yang
 
Webinar - Develop your autodesk designing skills with conceptual design colla...
Webinar - Develop your autodesk designing skills with conceptual design colla...Webinar - Develop your autodesk designing skills with conceptual design colla...
Webinar - Develop your autodesk designing skills with conceptual design colla...Tuan Yang
 

More from Tuan Yang (16)

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdf
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWS
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...
 
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
NetCom learning webinar an introduction to itil®4 create, deliver & suppo...
 
NetCom learning webinar 5 disruptive trends impacting the project management ...
NetCom learning webinar 5 disruptive trends impacting the project management ...NetCom learning webinar 5 disruptive trends impacting the project management ...
NetCom learning webinar 5 disruptive trends impacting the project management ...
 
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
Understanding Microsoft Dynamics 365 and the Power Platform in 30 Minutes | N...
 
4 tips to master the art of adobe in design
4 tips to master the art of adobe in design 4 tips to master the art of adobe in design
4 tips to master the art of adobe in design
 
Build your Own Business Application Using Microsoft Power Apps
Build your Own Business Application Using Microsoft Power AppsBuild your Own Business Application Using Microsoft Power Apps
Build your Own Business Application Using Microsoft Power Apps
 
Be cloud ready with azure and aws the ultimate cloud solutions!
Be cloud ready with azure and aws   the ultimate cloud solutions!Be cloud ready with azure and aws   the ultimate cloud solutions!
Be cloud ready with azure and aws the ultimate cloud solutions!
 
Webinar - Develop your autodesk designing skills with conceptual design colla...
Webinar - Develop your autodesk designing skills with conceptual design colla...Webinar - Develop your autodesk designing skills with conceptual design colla...
Webinar - Develop your autodesk designing skills with conceptual design colla...
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

An Introduction to CompTIA Security+ - SY0-601.pdf

  • 1. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | An Introduction to CompTIA Security+ - SY0 601 NetCom Learning Sheik Raashid Javid © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 2. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | | | To watch the recorded webinar video for live demos, please access the link: https://bit.ly/3N4DeT1 RECORDED WEBINAR VIDEO © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 3. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning AGENDA Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com Lesson 1: Comparing Security Roles and Security Controls Lesson 2: Explaining Threat Actors and Threat Intelligence Lesson 3: Performing Security Assessments Lesson 4: Identifying Social Engineering and Malware Lesson 5: Summarizing Basic Cryptographic Concepts Lesson 6: Implementing Public Key Infrastructure Lesson 7: Implementing Authentication Controls Lesson 8: Implementing Identity and Account Management Controls Lesson 9: Implementing Secure Network Designs Lesson 10: Implementing Network Security Appliances
  • 4. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning AGENDA Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com Lesson 11: Implementing Secure Network Protocols Lesson 12: Implementing Host Security Solutions Lesson 13: Implementing Secure Mobile Solutions Lesson 14: Summarizing Secure Application Concepts Lesson 15: Implementing Secure Cloud Solutions Lesson 16: Explaining Data Privacy and Protection Concepts Lesson 17: Performing Incident Response Lesson 18: Explaining Digital Forensics Lesson 19: Summarizing Risk Management Concepts Lesson 20: Implementing Cybersecurity Resilience Lesson 21: Explaining Physical Security
  • 5. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning COMPARING SECURITY ROLES AND SECURITY CONTROLS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Compare and Contrast Information Security Roles ▪ Information Security- CIA ▪ Cybersecurity Framework- NIST ▪ Information Security Roles and Responsibilities ▪ SOC ▪ Incident Response  Compare and Contrast Security Control and Framework Types  Security control categories- Technical, Managerial, Operational.  Security Control Functional Types- Preventive, Detective, Corrective, Physical, Compensating, Deterrent  ISO and Cloud Frameworks- 27K, 31K, Cloud Security Alliance  Regulations, standards- GDPR, PCI-DSS
  • 6. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning EXPLAINING THREAT ACTORS AND THREAT INTELLIGENCE Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Explain Threat Actor Types and Attack Vectors ▪ Vulnerability, Threat, Risk ▪ Attributes of Threat Actors- Internal/External, Motivation, Funding ▪ Hackers, Script Kiddies, Hactivists, State actor, APT, Competitors, Insider. ▪ Attack Surface, Actor vector  Explain Threat Intelligence Sources  Threat research sources- dark web  Threat intelligence providers- IBM X- Force, FireEye, Recorded Future, ISAC, OSINT  TTPs and IOC.  Threat Data Feeds- STIX, TAXII etc.  AI and ML
  • 7. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning PERFORMING SECURITY ASSESSMENTS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Assess organizational security with network reconnaissance tools. ▪ Ipconfig, Ping, ARP, Route, Traceroute ▪ IP Scanners and Nmap- Service Discovery ▪ Netstat and Nslookup, Wireshark, tcpdump, Metasploit etc. ▪ Explain security concerns with general vulnerability types. ▪ Software vulnerabilities and patch management ▪ Zero-day, legacy, weak host configurations, weak network configurations ▪ Impact from vulnerabilities, 3rd party risk, vendor management  Summarize vulnerability scanning techniques.  Security assessment, vulnerability scan types  CVE, CVSS, NVD  False positive and false negatives  Threat Hunting  Explain penetration testing concepts.  Penetration Testing  ROE  Black Box, White Box, Gray Box  Red/Blue Team  Active/passive Reconnaissance
  • 8. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IDENTIFYING SOCIAL ENGINEERING AND MALWARE Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Compare and contrast social engineering techniques. ▪ Social Engineering- principles ▪ Impersonation, dumpster diving, tailgating, identity fraud ▪ Phishing, whaling, vishing, spam, pharming.  Analyze indicators of malware- based attacks.  Malware Classification  Virus, Worm, spyware, keylogger,  Backdoor, RAT, Rootkit  Ransomware, Logic Bomb  Malware Indicators  Process Analysis- Process Explorer
  • 9. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning SUMMARIZING BASIC CRYPTOGRAPHIC CONCEPTS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Compare and contrast cryptographic ciphers. ▪ Cryptographic Concepts ▪ Hashing ▪ Symmetric and Asymmetric Encryption ▪ Summarize cryptographic modes of operation. ▪ Digital Signatures ▪ Digital Certificates ▪ Digital Envelopes etc.  Summarize cryptographic use cases and weaknesses.  Cryptography supporting CIA  Limitations and Attacks  Key stretching and salting  Summarize other cryptographic technologies.  Quantum computing  Blockchain  Steganography etc.
  • 10. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMENTING PUBLIC KEY INFRASTRUCTURE Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Implement certificates and certificate authorities. ▪ Public and private keys ▪ Certificate Authority ▪ Trust Models- Registration Authority- CSR ▪ Digital Certificate- Types, Attributes  Implement PKI management.  Key management  Key Recovery-Escrow  Certificate Expiration  CRL  Online Certificate Status Protocol Responders etc.
  • 11. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMENTING AUTHENTICATION CONTROLS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Summarize authentication design concepts. ▪ Identity and Access Management ▪ Authentication Factors ▪ MFA etc. ▪ Implement knowledge-based authentication. ▪ Local, Remote Authentication ▪ Kerberos ▪ Password Attacks , crackers. ▪ Authentication Management etc.  Implement authentication technologies.  Smart card authentication  Key management devices  RADIUS and TACACS  OTPs  Summarize biometrics authentication concepts.  Biometric Authentication- FRR, FAR, CER  Fingerprints Recognition  Facial Recognition etc.
  • 12. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMENTING IDENTITY AND ACCOUNT MANAGEMENT CONTROLS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Implement identity and account types. ▪ Identity Management Controls- certificates, smart cards, tokens Identity Providers. ▪ Background Check- onboarding Policies ▪ Personnel Policies- Separation of duties, Job rotation, mandatory vacation etc. ▪ Root Accounts etc. ▪ Implement account policies. ▪ Account attributes and access policies ▪ Password policy ▪ Account restrictions, permissions, auditing and lockout  Implement authorization solutions.  DAC, RBAC, MAC  Directory service  Federation etc.  Explain the importance of personnel policies.  Conduct policies  User and Role based training  Types of Training
  • 13. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMEMNTING SECURE NETWORK DESIGNS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Implement secure network designs. ▪ Secure Network Designs ▪ Network Appliances ▪ Routing and Switching Protocols ▪ Segmentation, Topology, Zones, DMZ ▪ Implement secure routing and switching. ▪ MITM & Layer 2 Attacks ▪ ARP Poisoning, MAC Flooding. ▪ Loop prevention, MAC Filtering etc.  Implement secure wireless infrastructure.  Wireless Network Installation Considerations  AP Security  WEP, WPA2, WPA3, WPS  Disassociation, Replay Attack, Jamming  Implement load balancers.  DDoS & Mitigation  Load Balancing  Clustering, QoS
  • 14. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMEMNTING NETWORK SECURITY APPLIANCES Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Implement firewalls and proxy servers. ▪ Packet Filtering Firewalls ▪ Stateful Inspection Firewalls ▪ Iptables, Proxies, Gateways, NAT etc. ▪ Implement network security monitoring. ▪ NIDS & NIPS ▪ Signature based and Behavior based detection ▪ Next Generation Firewalls ▪ HIDS, WAF  Summarize the use of SIEM  Monitoring Services  SIEM  Analysis & Report Review  File Manipulation Commands
  • 15. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMEMNTING SECURE NETWORK PROTOCOL Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Implement secure network operations protocols. ▪ NAT ▪ DNS ▪ DNS Poisoning- Security ▪ Secure Directory Services ▪ SNMP Security  Implement secure application protocols.  HTTP and Web Services  TLS  FTP- Security  Email- POP- IMAP- S/MIME-Security  VOIP-SIP  Implement secure remote access protocols.  VPN  IPsec, L2TP.  RDP-SSH
  • 16. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMEMNTING HOST SECURITY SOLUTIONS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Implement secure firmware. ▪ Secure Boot ▪ Disk Encryption ▪ USB/Flash Drive Security ▪ EOL Systems ▪ Organizational Security Agreements  Implement endpoint security.  Hardening  Base Configuration, Registry settings  Patch Management  End-point protection- Next Generation  Antivirus  Explain embedded system security implications.  Embedded Systems  Logic Controllers- Communication  Industrial Control Systems  IoT  Specialized Systems- Multifunction Printers, etc.  Security for embedded Systems etc.
  • 17. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMEMNTING SECURE MOBILE SOLUTIONS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Implement mobile device management. ▪ Deployment Models ▪ Enterprise Mobility Management ▪ Mobile Access Control Systems ▪ Remote Wipe- Full Device Encryption ▪ Location services ▪ Application Management -Content Management ▪ Rooting/ Jailbreaking  Implement secure mobile device connections.  Cellular & GPS  Wi-Fi and Tethering  Bluetooth  Infrared-NFC – USB etc.
  • 18. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning SUMMARIZING SECURE APPLICATION CONCEPTS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Analyze indicators of application attacks. Application Attacks Overflow Vulnerabilities Race Conditions- Memory Leak- Resource Exhaustion Driver Manipulation, pass the hash ▪ Analyze indicators of web application attacks. ▪ URL Analysis ▪ API Attacks ▪ Replay- Session Hijack- CSRF ▪ SQL Injection-Directory Traversal ▪ Summarize secure coding practices. ▪ Secure coding techniques, Web app security ▪ Data exposure-Memory Management ▪ Secure code usage ▪ Static/Dynamic Code analysis ▪ Implement secure script environments. ▪ Scripting, Python, PowerShell ▪ Malicious code indicators etc. ▪ Summarize deployment and automation concepts. ▪ Application Development, Deployment, Automation ▪ Secure Application Development Environment ▪ Provisioning, Deprovisioning, Version Control etc.
  • 19. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMENTING SECURE CLOUD SOLUTIONS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Summarize secure cloud and virtualization services. ▪ Cloud Deployment Models ▪ Cloud Service Models ▪ Anything as a service ▪ Security as a service ▪ Virtualization- Hypervisor ▪ Virtual Desktop ▪ VM Escape Protection- Sprawl Avoidance  Apply cloud security solutions.  Cloud security Integration and Auditing  Security Controls- compute security  Storage Security- High Availability  Network Security- Firewalls etc.  Summarize infrastructure as code concepts.  Microservices  API  Serverless Architecture  SDN etc.
  • 20. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning EXPLAINING DATA PRIVACY AND PROTECTION CONCEPTS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Explain privacy and data sensitivity concepts. ▪ Privacy and sensitive data concepts ▪ Data Roles and responsibilities ▪ Data Classifications ▪ Data Retention- Geographical Considerations ▪ Breaches ▪ Data Sharing  Explain privacy and data protection controls.  Data Protection  Data Exfiltration  DLP  Privacy enhancing- deidentification etc.
  • 21. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning PERFORMING INCIDENT RESPONSE Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Summarize incident response procedures. ▪ Incident Response Process ▪ Preparation ▪ Identification ▪ Containment ▪ Eradication ▪ Recovery ▪ Lessons Learned ▪ Team, Communication, Plan, Exercise ▪ Attack Frameworks- Cyber Kill Chain  Utilize appropriate data sources for incident response.  Incident Identification  SIEM- Dashboards  Trend Analysis  Logging- Data Sources  Apply mitigation controls.  Incident Containment  Eradication and recovery  Firewall, content filter, end point configuration changes, SOAR etc.
  • 22. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning EXPLAINING DIGITAL FORENSICS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Explain key aspects of digital forensics documentation. ▪ Key aspects of digital forensics ▪ Report- E-Discovery- witness interview- Timeline- Logs- Intelligence  Explain key aspects of digital forensics evidence acquisition.  Data acquisition and order of volatility  Forensic software  Image and other data acquisition  Integrity  Data forensics in Cloud
  • 23. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning SUMMARIZING RISK MANAGEMENT CONCEPTS Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Explain risk management processes and concepts. ▪ Risk management Process ▪ Risk Types ▪ Assessment- Quantitative, Qualitative ▪ Risk Management Strategies ▪ Avoid, Transfer, Accept ▪ Risk Awareness  Explain business impact analysis concepts.  Business Impact Analysis  Mission Essential Functions  Critical systems- single point of failure  Disaster Recovery Plans etc.
  • 24. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning IMPLEMENTING CYBERSECURITY RESILIENCE Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Implement redundancy strategies. ▪ High availability ▪ Power redundancy ▪ Network Redundancy ▪ Disk Redundancy ▪ Geographical Redundancy- Replication  Implement backup strategies.  Backup & Retention Policies  Backup types  Snapshots and Images  Backup storage Issues  Restoration Order etc.  Implement cybersecurity resiliency strategies.  Configuration Management  Assets Management  Change Management  Site Resiliency- Defense in Depth  Disruption Strategies etc
  • 25. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com EXAM DETAILS Exam Code SY0-601 Launch Date November 12, 2020 Exam Description The CompTIA Security+ certification exam will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents Number of Questions Maximum of 90 questions Type of Questions Multiple choice and performance-based Length of Test 90 minutes Passing Score 750 (on a scale of 100-900) Recommended Experience CompTIA Network+ and two years of experience in IT administration with a security focus Languages English, Japanese, Vietnamese, Thai, Portuguese Retirement Usually, three years after launch Testing Provider •Pearson VUE Testing Centers •Online Testing
  • 26. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © 1998-2022 NetCom Learning COMPTIA LABS FOR SECURITY+ (SY0 601) Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com ▪ Assisted Lab: Exploring the Lab Environment ▪ Assisted Lab: Scanning and Identifying Network Nodes ▪ Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools ▪ Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan ▪ Assisted Lab: Installing, Using, and Blocking a Malware-based Backdoor ▪ APPLIED LAB: Performing Network Reconnaissance and Vulnerability Scanning ▪ Assisted Lab: Managing the Lifecycle of a Certificate ▪ Assisted Lab: Managing Certificates with OpenSSL ▪ Assisted Lab: Auditing Passwords with a Password Cracking Utility ▪ Assisted Lab: Managing Centralized Authentication ▪ Assisted Lab: Managing Access Controls in Windows Server ▪ Assisted Lab: Configuring a System for Auditing Policies ▪ Assisted Lab: Managing Access Controls in Linux ▪ APPLIED LAB: Configuring Identity and Access Management Controls ▪ Assisted Lab: Implementing a Secure Network Design ▪ Assisted Lab: Configuring a Firewall ▪ Assisted Lab: Configuring an Intrusion Detection System ▪ Assisted Lab: Implementing Secure Network Addressing Services ▪ Assisted Lab: Implementing a Virtual Private Network ▪ Assisted Lab: Implementing a Secure SSH Server ▪ Assisted Lab: Implementing Endpoint Protection ▪ APPLIED LAB: Securing the Network Infrastructure ▪ Assisted Lab: Identifying Application Attack Indicators ▪ Assisted Lab: Identifying a Browser Attack ▪ Assisted Lab: Implementing PowerShell Security ▪ Assisted Lab: Identifying Malicious Code ▪ APPLIED LAB: Identifying Application Attack ▪ Assisted Lab: Managing Data Sources for Incident Response ▪ Assisted Lab: Configuring Mitigation Controls ▪ Assisted Lab: Acquiring Digital Forensics Evidence ▪ Assisted Lab: Backing Up and Restoring Data in Windows and Linux ▪ APPLIED LAB: Managing Incident Response, Mitigation and Recovery
  • 27. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | ABOUT NETCOM LEARNING NetCom Learningis an award-winning global leader in managedlearning services, training and talentdevelopment. Founded : 1998 Headquarters : NewYorkCity Delivery Capability : Worldwide CEO : RussellSarder 100K+ Professionals trained | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 14K+ C orporate clients 3500 IT,Business& Soft Skillscourses 96% Of customers recommend usto others 8.6/9 Instructor evaluations 20+ Leadingvendors recognitions Microsoft’s Worldwidetraining partner of the year 80% Trainedofthe Fortune100 T op20 ITTraining Company © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 28. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | RECOMMENDED COURSES AND MARKETING ASSETS NetCom Learning offers a comprehensive portfolio for Security » COMPTIA SECURITY+ CERTIFICATION PREP (EXAM SY0-601) - Class Scheduled on Jun 20 » COMPTIA ADVANCED SECURITY PRACTITIONER (CASP+) - Class Scheduled on Jul 18 » COMPTIA PENTEST+ CERTIFICATION PREP (EXAM PT0-002) - Class Scheduled on Jul 11 » COMPTIA NETWORK+ CERTIFICATION PREP (EXAM N10-008) - Class Scheduled on Jun 27 | | You can also access the below Marketing Assets » Free 1hr Training - An Introduction to CompTIA A+ (220 – 1101) » Free On-Demand Training - What is new with CompTIA PenTest+ - PT0 002 » Blog - CompTIA Cybersecurity certification pathway and job prospects © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 29. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | UPCOMING WEBINARS ▪ Master Class: Understand the Fundamentals of Architecting on AWS ▪ Simplify Complex Projects with SCRUM ▪ What’s New in Power Apps and Power Automate? ▪ Cisco Enterprise Networks: Learn How to Implement and Configure OSPF ▪ Getting Started with Well-Architected Framework on AWS ▪ Master Class : Designing and Implementing DevOps Processes and Practices ▪ 10 Essential PMI skills for Leader ▪ AWS Discovery Day - Machine Learning Basics ▪ Learn Incident Handling & Response in Under 40 Minutes ▪ Master Class: Getting started with AWS DevOps ▪ An Introduction to CompTIA A+ (220 – 1101) ▪ AWS Discovery Day - Strategies and tools to perform large-scale migrations ▪ Learn to Defend Against Multi-Stage Network Breaches in 40 Minutes & More | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 30. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | PROMOTIONS Stay Digital Safe - Assess and Upskill your team against cyber threats now ! NetCom Learning's end-user Cybersecurity Awareness Training & Phishing Simulation Solution offers phishing simulations on email, voice, and text to organizations, and is bundled with 90+ interactive security awareness video courses for the end-users. Request a Demo | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 © 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 31. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | PROMOTIONS Free Cybersecurity Training! NetCom Learning brings an immersive two-hour, instructor-led Free Training on Cybersecurity that is designed to help businesses understand the importance of Cybersecurity in today’s digital world and gain expert insights into how security breaches can affect a business.. Learn More | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 © 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 32. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 © 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | PROMOTIONS Explore The World Of Unlimited Training Subscription! NetCom+ is a limitless 12-month subscription program. Attend over 500+ courses as from a range of authorized training courses. Get access to bundled offerings of Virtual Instructor-Led courses, e-Learning, Discovery Days, and On-Demand training via NetCom+ training subscription.. Save Now © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 33. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | PROMOTIONS E- Learning To Skill Up ! Align and upskill your team via e-Learning to drive results! Our robust library includes EC-Council, Microsoft, Cisco, Citrix, CompTIA, Autodesk, and more. Our e-Learning solutions allow perfect balance among work and upskilling, without interrupting workflow. It’s all about saving time, quality learning, knowledge check, 24/7 availability. Learn More | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 © 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 34. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | PROMOTIONS Access Your Passport To A Year Full Of Learning! The NetCom Learning Passport is a flexible pre-pay training package allowing you to plan and manage your teams’ annual training needs. With our Learning Passport, organizations get special pricing and extended program options to simplify management. Equipped with this Passport, you make the most of your budget. It has been specifically designed to specialize for the number of learners you plan to train.. Unlock Now | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 35. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | PROMOTIONS Worry-Free Training with Price Match Guarantee! Our Price Match Guarantee ensures that we'll match the offers of any other authorized training provider if you succeed at finding anyone offering the same publicly scheduled class within 30 days of our schedule at a lower regular price.. Learn More | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 © 1998-2022 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 36. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | FOLLOWUS ON LinkedIn T witter YouTube | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 Instagram © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 37. © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | BUILDING AN INNOVATIVE LEARNING ORG. A BOOK FROM RUSSELL SARDER, CEO AT NETCOM LEARNING A framework to build a smarter workforce, adapt to change and drive growth. DOWNLOADe-book | | © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning
  • 38. Thankyou © 1998-2019 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | | | © 1998-2021 NetCom Learning www.netcomlearning.com info@netcomlearning.com 1-888-563-8266 | | © Interested in training? Contact us! | www.netcomlearning.com | (888) 563-8266 | comptia@netcomlearning.com 1998-2022 NetCom Learning