Registration is now open for September 2024 and Winter 2025.  Consult our programs authorized by the Ministry of Higher Education. We also offer institutional certificate courses.

Security +

Method of Instruction: Onsite or Online

Language: English or French

Course Duration: 30 Hours (5 Weeks of 6 Hours Each)

Establishment: Cestar Collège, Campus Sherbrooke

Course Description

The CompTIA Security + (SYO-601) course is designed for people who plan to further their security-related certifications, want to keep their skills sharp, or retain their job due to a company policy mandating they take the Security + exam. Topics include cyber-attacks, threats, and vulnerabilities, social engineering, wireless attacks, denial of service attacks, threat hunting and incident response, indicators of compromise and threat intelligence cloud security concepts and cryptography, security assessments and penetration testing concepts, governance, risk management, and cyber resilience, authentication, Authorization, and Accounting (AAA), IoT and Industrial Control Systems (ICS) security, and physical and administrative security controls.

The goal of this course is to provide you with all the tools you need to prepare for the CompTIA Security + exam — including extensive prep tools such as quizzes, foundation topics, exam preparation tasks, exercises, and review questions — to increase your chances of passing the exam on your first try. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics, by helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.

$2199
$599
REGISTER NOW

Course Schedule and Duration

30Hours - Beginner/Intermediate

Or Advanced Students can do the program at your own pace

Fall 2024

A detailed course outline will be provided at the beginning of class or upon request.

Method of Learning

A combination of online and onsite training tailored according to your needs to help you get the education you need at your own convenience

Course Prerequisites and Admission

*Recommended
2+ years of IT administration experience with an emphasis on security

  • Network Administration A.E.C or CompTIA Network+ certification is recommended
  • Knowledge about configuring IPs and VLANs

Required Materials

A laptop or computer with internet access

Tech Requirements for Attending Cestar Online Classes

Minimum Requirements

  • A strong uninterrupted broadband wired or wireless (3G or 4G/LTE) connection with a minimum 600kbps bandwidth (up/down).
  • A Laptop/Desktop computer equipped with a single core processor (at least 1 GHZ processing speed) or a smartphone/tablet with equivalent processing capabilities
  • Good speakers/earphones to listen to the classes
  • Browser - IE7+, Safari 5+, Firefox, Chrome
  • Operating System - Windows XP, Mac OS 10.6, Linux distro based on 3.0 kernel, Android 5.0, iOS 10

 

Cestar Recommendations

  • A strong uninterrupted broadband wired or wireless (3G or 4G/LTE) connection with a minimum 1.5Mbps bandwidth (up/down). You can also connect to the internet directly using your ethernet cable to improve your experience.
  • Laptop/Desktop computer equipped with a dual core processor with at least 2 GHZ processing speed and a 4 GB RAM
  • High Quality speakers/earphones to listen to the classes
  • Browser & Operating System - We recommend using the latest version of the browser and operating system for an optimal online classroom experience.

Course Outline

Part I: Threats, Attacks, and Vulnerabilities
Lesson 1: Comparing and Contrasting Different Types of Social Engineering Techniques
Lesson 2: Analyzing Potential Indicators to Determine the Type of Attack
Lesson 3: Analyzing Potential Indicators Associated with Application Attacks
Lesson 4: Analyzing Potential Indicators Associated with Network Attacks
Lesson 5: Understanding Different Threat Actors, Vectors, and Intelligence Sources
Lesson 6: Understanding the Security Concerns Associated with Various Types of Vulnerabilities
Lesson 7: Summarizing the Techniques Used in Security Assessments
Lesson 8: Understanding the Techniques Used in Penetration Testing

Part II: Architecture and Design
Lesson 9: Understanding the Importance of Security Concepts in an Enterprise Environment
Lesson 10: Summarizing Virtualization and Cloud Computing Concepts
Lesson 11: Summarizing Secure Application Development, Deployment, and Automation Concepts
Lesson 12: Summarizing Authentication and Authorization Design Concepts
Lesson 13: Implementing Cybersecurity Resilience
Lesson 14: Understanding the Security Implications of Embedded and Specialized Systems
Lesson 15: Understanding the Importance of Physical Security Controls
Lesson 16: Summarizing the Basics of Cryptographic Concepts

Part III: Implementation
Lesson 17: Implementing Secure Protocols
Lesson 18: Implementing Host or Application Security Solutions
Lesson 19: Implementing Secure Network Designs
Lesson 20: Installing and Configuring Wireless Security Settings
Lesson 21: Implementing Secure Mobile Solutions
Lesson 22: Applying Cybersecurity Solutions to the Cloud
Lesson 23: Implementing Identity and Account Management Controls
Lesson 24: Implementing Authentication and Authorization Solutions
Lesson 25: Implementing Public Key Infrastructure

Part IV: Operations and Incident Response
Lesson 26: Using the Appropriate Tool to Assess Organizational Security
Lesson 27: Summarizing the Importance of Policies, Processes, and Procedures for Incident Response
Lesson 28: Using Appropriate Data Sources to Support an Investigation
Lesson 29: Applying Mitigation Techniques or Controls to Secure an Environment
Lesson 30: Understanding the Key Aspects of Digital Forensics

Part V: Governance, Risk, and Compliance
Lesson 31: Comparing and Contrasting the Various Types of Controls
Lesson 32: Understanding the Importance of Applicable Regulations, Standards, or Frameworks That Impact Organizational Security Posture
Lesson 33: Understanding the Importance of Policies to Organizational Security
Lesson 34: Summarizing Risk Management Processes and Concepts
Lesson 35: Understanding Privacy and Sensitive Data Concepts in Relation to Security

Instructors

Nicola Stanojevic

After graduating from computer science in Bosnia and Herzegovina, Nikola moved to Quebec, Canada to complete vocational studies for IT Expertise. He then took on a teacher assistant's role, and shortly after became a teacher himself. His skills revolve around computers in general, operating systems, system administration, network security and network architecture in addition to basic web development. On a more personal level, Nikola speaks 5 languages, he loves to travel a lot, enjoys producing music, and photography is one of his preferred hobbies.

Registration

 

 

Get started in I.T. today!  Sign up while spaces are still available!

This short course is being offered at

$2199
$599
*All prices shown are in Canadian Dollars.
Choose your Section
Register Now

SPEAK TO AN ADVISOR