• CATALOG
  • FINANCIAL ASSISTANCE
  • MILITARY
  • LOGIN
      Forget your password?
  • Open Search Dialog
Mississippi State University
Home > Training Programs > Security > CompTIA™ Security+ Certification Training
CALL
NOW

855.520.6806

Fill out the form below

*

*

*

*

*

*

By continuing you are agreeing to have ed2go contact you.
Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

CompTIA™ Security+ Certification Training

comptia-security-certification
$1,495.00 (USD)

DETAILS

OUTLINE

  1. Security Attacks and Cryptography
    1. Section A
      1. Notes: Introduction to Security
      2. Textbook Reading: Chapter 1
      3. Study Aid: Unit 1 Section A: Flash Cards
      4. Unit 1: Section A Videos
      5. Watch Unit 1: Section A Videos Here
      6. PowerPoint: Introduction to Security
      7. Study Aid: Unit 1 Section A: Matching Game
      8. Answer Key: End of Chapter 1 Textbook Questions
      9. Study Aid: Unit 1 Section A: Learning Game
      10. Quiz 1
    2. Section B
      1. Notes: Malware and Social Engineering Attacks
      2. Textbook Reading: Chapter 2
      3. Study Aid: Unit 1 Section B: Flash Cards
      4. Unit 1: Section B Videos
      5. Watch Unit 1: Section B Videos Here
      6. PowerPoint: Malware and Social Engineering Attacks
      7. Study Aid: Unit 1 Section B: Matching Game
      8. Answer Key: End of Chapter 2 Textbook Questions
      9. Study Aid: Unit 1 Section B: Learning Game
      10. Quiz 2
      11. Lab: Social Engineering Reconnaissance
    3. Section C
      1. Notes: Basic Cryptography
      2. Textbook Reading: Chapter 3
      3. Study Aid: Unit 1 Section C: Flash Cards
      4. Unit 1: Section C Videos
      5. Watch Unit 1: Section C Videos Here
      6. PowerPoint: Basic Cryptography
      7. Study Aid: Unit 1 Section C: Matching Game
      8. Answer Key: End of Chapter 3 Textbook Questions
      9. Study Aid: Unit 1 Section C: Learning Game
      10. Quiz 3
    4. Completion
      1. Study Aid: Unit 1: Flash Cards
      2. Study Aid: Unit 1: Matching Game
      3. Study Aid: Unit 1: Learning Game
      4. Exam 1
  2. Security and Networking
    1. Section A
      1. Notes: Advanced Cryptography and PKI
      2. Textbook Reading: Chapter 4
      3. Study Aid: Unit 2 Section A: Flash Cards
      4. Unit 2: Section A Videos
      5. Watch Unit 2: Section A Videos Here
      6. PowerPoint: Advanced Cryptography and PKI
      7. Study Aid: Unit 2 Section A: Matching Game
      8. Answer Key: End of Chapter 4 Textbook Questions
      9. Study Aid: Unit 2 Section A: Learning Game
      10. Quiz 4
      11. Lab: Understanding PKI Concepts
    2. Section B
      1. Notes: Application and Networking-Based Attacks
      2. Textbook Reading: Chapter 5
      3. Study Aid: Unit 2 Section B: Flash Cards
      4. Unit 2: Section B Videos
      5. Watch Unit 2: Section B Videos Here
      6. PowerPoint: Networking and Server Attacks
      7. Study Aid: Unit 2 Section B: Matching Game
      8. Answer Key: End of Chapter 5 Textbook Questions
      9. Study Aid: Unit 2 Section B: Learning Game
      10. Quiz 5
      11. Lab: Implementing DNSSEC
      12. Lab: Protocols and Services - SNMP
    3. Section C
      1. Notes: Network Security Devices, Design, and Technology
      2. Textbook Reading: Chapter 6
      3. Study Aid: Unit 2 Section C: Flash Cards
      4. Unit 2: Section C Videos
      5. Watch Unit 2: Section C Videos Here
      6. PowerPoint: Network Security Devices, Design, and Technology
      7. Study Aid: Unit 2 Section C: Matching Game
      8. Answer Key: End of Chapter 6 Textbook Questions
      9. Study Aid: Unit 2 Section C: Learning Game
      10. Quiz 6
      11. Lab: Firewall Rule Based Management
      12. Lab: Firewalls and Evasion
      13. Lab: NAT and OpenSSH
      14. Lab: Install and Configure Network Load Balancing
    4. Completion
      1. Study Aid: Unit 2: Flash Cards
      2. Study Aid: Unit 2: Matching Game
      3. Study Aid: Unit 2: Learning Game
      4. Exam 2
  3. Securing Networks and Clients
    1. Section A
      1. Notes: Administering a Secure Network
      2. Textbook Reading: Chapter 7
      3. Study Aid: Unit 3 Section A: Flash Cards
      4. Unit 3: Section A Videos
      5. Watch Unit 3: Section A Videos Here
      6. PowerPoint: Administering a Secure Network
      7. Study Aid: Unit 3 Section A: Matching Game
      8. Answer Key: End of Chapter 7 Textbook Questions
      9. Study Aid: Unit 3 Section A: Learning Game
      10. Quiz 7
      11. Lab: Application Data - Establish Host Security
      12. Lab: Implementing a Network Policy Server
    2. Section B
      1. Notes: Wireless Network Security
      2. Textbook Reading: Chapter 8
      3. Study Aid: Unit 3 Section B: Flash Cards
      4. Unit 3: Section B Videos
      5. Watch Unit 3: Section B Videos Here
      6. PowerPoint: Wireless Network Security
      7. Study Aid: Unit 3 Section B: Matching Game
      8. Answer Key: End of Chapter 8 Textbook Questions
      9. Study Aid: Unit 3 Section B: Learning Game
      10. Quiz 8
      11. Lab: Network Vulnerabilities Part 1
      12. Lab: Network Vulnerabilities Part 2
      13. Lab: Password Cracking Tools
    3. Section C
      1. Notes: Client and Application Security
      2. Textbook Reading: Chapter 9
      3. Study Aid: Unit 3 Section C: Flash Cards
      4. Unit 3: Section C Videos
      5. Watch Unit 3: Section C Videos Here
      6. PowerPoint: Client and Application Security
      7. Study Aid: Unit 3 Section C: Matching Game
      8. Answer Key: End of Chapter 9 Textbook Questions
      9. Study Aid: Unit 3 Section C: Learning Game
      10. Quiz 9
      11. Lab: Data Encryption
    4. Completion
      1. Study Aid: Unit 3: Flash Cards
      2. Study Aid: Unit 3: Matching Game
      3. Study Aid: Unit 3: Learning Game
      4. Exam 3
  4. Mobile Security and Access Management
    1. Section A
      1. Notes: Mobile and Embedded Device Security
      2. Textbook Reading: Chapter 10
      3. Study Aid: Unit 4 Section A: Flash Cards
      4. Unit 4: Section A Videos
      5. Watch Unit 4: Section A Videos Here
      6. PowerPoint: Mobile and Embedded Device Security
      7. Study Aid: Unit 4 Section A: Matching Game
      8. Answer Key: End of Chapter 10 Textbook Questions
      9. Study Aid: Unit 4 Section A: Learning Game
      10. Quiz 10
    2. Section B
      1. Notes: Authentication and Account Management
      2. Textbook Reading: Chapter 11
      3. Study Aid: Unit 4 Section B: Flash Cards
      4. Unit 4: Section B Videos
      5. Watch Unit 4: Section B Videos Here
      6. PowerPoint: Authentication and Account Management
      7. Study Aid: Unit 4 Section B: Matching Game
      8. Answer Key: End of Chapter 11 Textbook Questions
      9. Study Aid: Unit 4 Section B: Learning Game
      10. Quiz 11
      11. Lab: Implementing AD Federation Services
      12. Lab: Configuring RADIUS
    3. Section C
      1. Notes: Access Management
      2. Textbook Reading: Chapter 12
      3. Study Aid: Unit 4 Section C: Flash Cards
      4. Unit 4: Section C Videos
      5. Watch Unit 4: Section C Videos Here
      6. PowerPoint: Access Management
      7. Study Aid: Unit 4 Section C: Matching Game
      8. Answer Key: End of Chapter 12 Textbook Questions
      9. Study Aid: Unit 4 Section C: Learning Game
      10. Quiz 12
      11. Lab: Implement Patching using WSUS
    4. Completion
      1. Study Aid: Unit 4: Flash Cards
      2. Study Aid: Unit 4: Matching Game
      3. Study Aid: Unit 4: Learning Game
      4. Exam 4
  5. Business Continuity and Risk Mitigation
    1. Section A
      1. Notes: Vulnerability Assessment and Data Security
      2. Textbook Reading: Chapter 13
      3. Study Aid: Unit 5 Section A: Flash Cards
      4. Unit 5: Section A Videos
      5. Watch Unit 5: Section A Videos Here
      6. PowerPoint: Vulnerability Assessment and Data Security
      7. Study Aid: Unit 5 Section A: Matching Game
      8. Answer Key: End of Chapter 13 Textbook Questions
      9. Study Aid: Unit 5 Section A: Learning Game
      10. Quiz 13
      11. Lab: Scanning and Remediating Vulnerabilities with OpenVAS
    2. Section B
      1. Objective 5.6: Explain disaster recovery and continuity of operation concepts.
      2. Notes: Business Continuity
      3. Textbook Reading: Chapter 14
      4. Study Aid: Unit 5 Section B: Flash Cards
      5. Unit 5: Section B Videos
      6. Watch Unit 5: Section B Videos Here
      7. PowerPoint: Business Continuity
      8. Study Aid: Unit 5 Section B: Matching Game
      9. Answer Key: End of Chapter 14 Textbook Questions
      10. Study Aid: Unit 5 Section B: Learning Game
      11. Quiz 14
      12. Lab: Configuring IDS and Honeypots
      13. Lab: Backup and Recovery
      14. Lab: Managing Local Storage and Virtual Hard Disks
      15. Lab: Introduction to Digital Forensics
    3. Section C
      1. Notes: Risk Mitigation
      2. Textbook Reading: Chapter 15
      3. Study Aid: Unit 5 Section C: Flash Cards
      4. Unit 5: Section C Videos
      5. Watch Unit 5: Section C Videos Here
      6. PowerPoint: Risk Mitigation
      7. Study Aid: Unit 5 Section C: Matching Game
      8. Answer Key: End of Chapter 15 Textbook Questions
      9. Study Aid: Unit 5 Section C: Learning Game
      10. Quiz 15
      11. Lab: Managing Certificates
      12. Lab: Implementing Software RAID
    4. Completion
      1. Study Aid: Unit 5: Flash Cards
      2. Study Aid: Unit 5: Matching Game
      3. Study Aid: Unit 5: Learning Game
      4. Exam 5
  6. Final Exam and Completion Steps
    1. Course Completion
      1. Textbook Reading: Review
      2. Study Aid: Final Review: Flash Cards
      3. Practice Final Exam Quiz
      4. Study Aid: Final Review: Matching Game
      5. Course Completion Survey Feedback
      6. Study Aid: Final Review: Learning Game
      7. Final Exam

REQUIREMENTS

PREREQUISITES

INSTRUCTOR

FAQS

REVIEWS

Mississippi State University
Center for Continuing Education
P. O. Box 7558
365 Barr Avenue
Mississippi, MS 39762 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.