CompTIA Security+ is a globally trusted certification that validates foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification training covers the essential principles of network security and risk management.

15,000.00 12,000.00Add to cart

CompTIA Security+ 501

  • Course Overview
  • program highlights
  • Pre Requisites
  • Projects
  • Tools Covered
  • Career Centre
  • Syllabus
  • FAQ
 

 Program Highlights 

 

Why Choose CompTIA+ 501 Security Program?

 

 
Interactive learning anywhere

Attend online classes led by our top-notch faculty from anywhere in the world. Ask questions, engage with your peers.

 

 
Project Based Education

Apply data analysis techniques to solve real-world problems & build machine learning models to solve industry grade data problems

 

 
Specialize through our electives

Specialize from a variety of electives including Advanced Machine Learning, Data Analytics with R, Deep Learning etc.

 

 
Industry Focus

Choose projects from Ecommerce, BFSI, Telecom, Retail & become a domain specialist in the application of data science & machine learning.

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Program Highlights 

 

Why Choose CompTIA+ 501 Security Program?

 

 
Interactive learning anywhere

Attend online classes led by our top-notch faculty from anywhere in the world. Ask questions, engage with your peers.

 

 
Project Based Education

Apply data analysis techniques to solve real-world problems & build machine learning models to solve industry grade data problems

 

 
Specialize through our electives

Specialize from a variety of electives including Advanced Machine Learning, Data Analytics with R, Deep Learning etc.

 

 
Industry Focus

Choose projects from Ecommerce, BFSI, Telecom, Retail & become a domain specialist in the application of data science & machine learning.

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Pre Requisites 

 

Learners taking the DevOps online training course must be from a technical background with an understanding of Linux fundamentals, Web Development fundamentals, and Java fundamentals.

 

 

 Projects 

Real world datasets from companies like Nike, Yelp, Amazon, Netflix etc. are provided to our students

 

Study of IPL data 

 

Process, transform, and analyse the data to find the winner for each season and the top 5 batsmen with maximum runs in each season and overall

 

Analysis of Zomato data

 

Zomato contains 9K+ rows of data with 21 variables on popular cuisines and best restaurants.

 

Evaluation of Amazon electronic product sales

 

Analyse product sales based on customers reviews and ratings.Amazon reviews contains 142.8 million rows of review data on popular products.

 

 Tools Covered 

 

 

 Career Centre 

Exclusive Interview Preparation Guides, Career Support, Placement Opportunity and many more...!

 

Career Booster

Interview Preparation Guides,Extra sessions on cutting edge technologies

 

Real World Projects

Integrating real world projects to make your resume world class

 

Workshops

Exclusive Resume Workshop session by an expert.

 

Placement Opportunity

Post assessment, we provide jobs and internships to qualified students In Tech Mahindra*

 

 

 Syllabus 

Week 1

Module 1: Risk Management
Module 2: The CIA of Security
Module 3: Threat Actors
Module 4: What is Risk
Module 5: Managing Risk
Module 6: Using Guides for Risk Assessment
Module 7: Security Controls
Module 8: Interesting Security Controls
Module 9: Defense in Depth
Module 10: IT Security Governance
Module 11: Security Policies
Module 12: Frameworks
Module 13: Quantitative Risk Calculations
Module 14: Business Impact Analysis
Module 15: Organizing Data
Module 16: Security Training
Module 17: Third Party Agreements

Week 2

Module 18: Cryptography Basics
Module 19: Cryptographic Methods
Module 20: Symmetric Cryptosystems
Module 21: Symmetric Block Modes
Module 22: RSA Cryptosystems
Module 23: Diffie-Hellman
Module 24: PGP GPG
Module 25: Hashing
Module 26: HMAC
Module 27: Steganography
Module 28: Certificates and Trust
Module 29: Public Key Infrastructure
Module 30: Cryptographic Attacks

Week 3

Module 31: Identity and Access Management
Module 32: Authorization Concepts
Module 33: Access Control List
Module 34: Password Security
Module 35: Linux File Permissions
Module 36: Windows File Permissions
Module 37: User Account Management
Module 38: AAA
Module 39: Authentication Methods
Module 40: Single Sign On

Week 4

Module 41: Tools of the Trade
Module 42: OS Utilities
Module 43: OS Utilities ipconfig
Module 44: Network Scanners
Module 45: Protocol Analyzers
Module 46: SNMP
Module 47: Logs

Week 5

Module 48: Securing Individual Systems
Module 49: Denial of Service
Module 50: Host Threats
Module 51: Man in the Middle
Module 52: System Resiliency
Module 53: RAID
Module 54: NAS and SAN
Module 55: Physical Hardening
Module 56: RFI, EMI and ESD
Module 57: Host Hardening
Module 58: Data and System Security
Module 59: Disk Encryption
Module 60: Hardware Firmware Security
Module 61: Secure OS Types
Module 62: Securing Peripherals
Module 63: Malware
Module 64: Analyzing Output
Module 65: IDS and IPS
Module 66: Automation Strategies
Module 67: Data Destruction

Week 6

Module 68: Lesson 06 The Basic LAN
Module 69: LAN Review
Module 70: Network Topologies Review
Module 71: Network Zone Review
Module 72: Network Access Controls
Module 73: The Network Firewall
Module 74: Proxy Servers
Module 75: Honeypots
Module 76: Virtual Private Networks
Module 77: IPSec
Module 78: NIDS NIPS
Module 79: SIEM

Week 7

Module 80: Beyond the Basic LAN
Module 81: Wireless Review
Module 82: Living in Open Networks
Module 83: Vulnerabilities with Wireless Access Points
Module 84: Cracking WEP
Module 85: Cracking WPA
Module 86: Cracking WPS
Module 87: Wireless Hardening
Module 88: Wireless Access Points
Module 89: Virtualization Basics
Module 90: Virtual Security
Module 91: Containers
Module 92: IaaS
Module 93: PaaS
Module 94: SaaS
Module 95: Deployment Models
Module 96: Static Hosts
Module 97: Mobile Connectivity
Module 98: Deploying Mobile Devices
Module 99: Mobile Enforcement
Module 100: Mobile Device Management
Module 101: Physical Controls
Module 102: HVAC
Module 103: Fire Suppression

Week 8

Module 104 Secure Protocols
Module 105 Secure Applications and Protocols
Module 106 Network Models
Module 107 Know Your Protocols TCP IP
Module 108 Know Your Protocols Applications
Module 109 Transport Layer Security
Module 110 Internet Service Hardening
Module 111 Protecting Your Servers
Module 112 Secure Code Development
Module 113 Secure Deployment Concepts
Module 114 Code Quality and Testing

Week 9

Module 115: Testing Your Infrastructure
Module 116: Vulnerability Scanning Tools
Module 117: Vulnerability Scanning Assessment
Module 118: Social Engineering Principles
Module 119: Social Engineering Attacks
Module 120: Attacking Web Sites
Module 121: Attacking Applications
Module 122: Exploiting a Target
Module 123: Vulnerability Impact

Week 10

Module 124: Dealing with Incidents
Module 125: Incident Response
Module 126: Digital Forensics
Module 127: Contingency Planning
Module 128: Backups

 

 

 FAQ 

Where and when do the classes takes place?

All the courses are instructor-led and take place online. The online interface lets you and the faculty have a two-way interaction. It’s as good as sitting in a physical classroom.

All classes take place over the weekends in the mornings. There’ll be one class of 2 to 2.5 hours on Saturdays and Sundays each. This means that you can now acquire in-demand skills without compromising on your schedule.

Can i watch recording of the trail sections before enrolling?

Yes, the recordings of the trial classes are uploaded.

What is the benefit of taking online instructor-led courses?

In physical classrooms, students generally feel hesitant to ask questions. If you miss any class or didn’t understand some concepts, you can’t go through the class again. However, in online courses, it’s possible to do that. We share the recordings of all our classes after each class with the student. Also, there’s no hassle of long distance commuting and disrupting your schedule.

what kind of projects will i be working on?

We believe that unless you implement the concepts studied in the classes, you are unable to join the dots and hence can’t see the entire picture. Our capstone projects let you apply the learned concepts to real-world data sets. You’ll be working on real-time data-sets (which can run in 100s of MBs or possibly in GBs!) which you get to choose from a variety of domains such as retail, finance, social media, healthcare, etc. These datasets have been curated from top sources such as World Bank, US Health Department, Carnegie Mellon, Stanford and many more.

Where & how will i practice?

You’ll get access to our virtual computing lab through the login credentials provided to you. The virtual machines will enable you to work on “Big Data” sets for your projects and practice hands-on too.

Do i get a certificate of completion or certification?

We provide certification of completion to students who attend at least 70% of the classes. After the course ends, we conduct a certification exam that evaluates them on the skills they have learnt. Certification from Hatigen is provided to only those who clear the exam. The exam is purely case-based and not even a single theory question is asked.

Do you provide career assistance?

We provide career workshops and industry immersion sessions to help you become ready for roles you are aspiring for. We also help you in resume review and interview preparation. If you diligently follow our advice, you should start getting interview calls as soon as you finish the course.

1
Hello
How can we Help You
Powered by