MyCAA-APPROVED IT & SCIENCES COURSE

CompTIA SECURITY SPECIALIST

As an international, vendor-neutral credential, CompTIA S+ certification ensures successful students gain competency in network security, compliance and operational security, common/possible threats and vulnerabilities, application, data and host security, access control and identity management as well as cryptography.

CERTIFICATION: COMP TIA S+

PROGRAM COSTS: Varies

COURSE CONTACT HOURS: 375

PROGRAM DURATION: 6 Months

EXTERNSHIP AVAILABLE: Yes

The CompTIA S+ Specialist

Computer Technology Industry Association (CompTIA) S+ training designates knowledgeable professionals in the field of IT security. As an international, vendor-neutral credential, CompTIA S+ certification ensures successful students gain competency in network security, compliance and operational security, common/possible threats and vulnerabilities, application, data and host security, access control and identity management as well as cryptography. Earning CompTIA S+ Certification signifies to employers that candidates will apply their knowledge of security concepts, tools and procedures to prevent security breaches, react accordingly to any security incidents and anticipate further security risks in order to effectively guard against them. Many well-known companies, government contractors and government agencies employ CompTIA S+ certified staff in order to ensure the quality of their work and CompTIA S+ is also one of the options for certifications required by the US Department of Defense for both military personnel and contractors engaged in information security activities.

The CompTIA S+ Specialist Program

The CompTIA Security+ course provides students with the basic knowledge and skills necessary to become an IT security professional. This course is designed to fully prepare students to sit for and pass the CompTIA Security+ certification exam. Students will gain the knowledge and skills necessary to identify risk and participate in risk mitigation activities as well as provide infrastructure, application, operational and information security. They will also acquire the knowledge necessary to apply security controls to maintain confidentiality, integrity and availability, as well as how to identify appropriate technologies and products. Finally, students will gain an awareness of applicable policies, laws and regulations with regard to IT security. Prospective job roles for successful candidates include security engineer, security architect, security assurance technician, security consultant/specialist, systems administrator, network administrator and security administrator. CompTIA N+ certification plus 2 years of technical networking experience with a focus on security is recommended for success on the exam.

After completing this course, you should be able to:

  • Describe common risks, vulnerabilities and controls
  • Explain the triple constraint of information security
  • Analyze and differentiate between types of malware and attacks
  • Identify risks for common system hardware and peripherals
  • Describe principles of software, data and host security
  • Implement OS hardening procedures
  • Identify common types of programming attacks
  • Implement secure browsing practices
  • Describe security vulnerabilities unique to virtualized environments
  • Explain the purpose and vulnerabilities of common network devices
  • Identify and secure common ports and protocols
  • Describe security concerns unique to cloud computing environments
  • Identify IDS and IPS solutions for host and network defense
  • Describe the differences between identification, authentication and authorization in Access Control
  • Identify various methods for access authentication
  • Implement logical access control methods
  • Distinguish between discretionary, mandatory, rule-based and role-based access control implementations
  • Identify various types of risk management strategies (transfer, accept, mitigate, eliminate)
  • Distinguish between management, technical and operational controls
  • Calculate risk using subjective and objective measures
  • Implement compliance audits for common security controls
  • Explain the difference between penetration testing and vulnerability scanning
  • Distinguish between symmetric and asymmetric forms of encryption
  • Explain the use of public-key/private-key pairs to encrypt and decrypt a secure message
  • Identify common security protocols (SSH, SSL, IPSec)
  • Explain basic hashing concepts
  • Distinguish between types of tickets, keys and certificate authorities in a PKI
  • Distinguish between business continuity and disaster recovery objectives and timeframes
  • Implement common backup rotation cycles
  • Identify various types of redundant hardware and backup sites
  • Recognize various types of environmental control solutions
  • Identify RAID configurations for common availability and redundancy requirements
  • Analyze and distinguish between forms of social engineering
  • Describe the principles of operational security
  • Identify common personnel security policies
  • Describe data reminisce and secure disposal practices
  • Explain common CIRT roles and responsibilities
  • Use Microsoft Office

Technical Requirements

WINDOWS USERS

  • Windows 7, XP or Vista
  • 56K modem or higher
  • Soundcard & Speakers
  • Firefox, Chrome or Microsoft Internet Explorer

MAC OS USERS

  • Mac OS X or higher (in classic mode)
  • 56K modem or higher
  • Soundcard & Speakers
  • Apple Safari

SUPPORTED BROWSERS

System will support the two latest releases of each browser. When using older versions of a browser, users risk running into problems with the course software.

  • Windows Users: Firefox, Chrome, Explorer
  • Mac OS Users: Safari, Chrome, Firefox

SCREEN RESOLUTION

We recommend setting your screen resolution to 1024 x 768 pixels.

SUGGESTED PLUGINS

  • Flash Player
  • Real Player
  • Adobe Reader
  • Java

U.S. Department of Labor

Career Information

The information below provides helpful job information, statistics and projections for this program’s related career tracts.

Career Median Salary Job Openings Growth Rate
Network and Computer Systems Administrators $79,700 27,000 5% to 9%

Description

Install, configure, and support an organization's local area network (LAN), wide area network (WAN), and Internet systems or a segment of a network system. Monitor network to ensure network availability to all system users and may perform necessary maintenance to support network availability. May monitor and test Web site performance to ensure Web sites operate correctly and without interruption. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software. May supervise computer user support specialists and computer network support specialists. May administer network security measures.
Job Titles Include
Information Analyst, Information Systems Manager (IS Manager), Information Technology Specialist (IT Specialist), LAN Specialist (Local Area Network Specialist), Local Area Network Administrator (LAN Administrator), Network Administrator, Network Coordinator, Network Manager, Network Specialist, Systems Administrator

Wages

Bottom 15% Median Salary Top 10%
United States $48,870 $79,700 $127,610

Employment

current employment 2016 projected job openings 2016 - 2026 projected growth 2016 - 2026
United States 391,000 27,000 5% to 9%

typical tasks

  • Maintain and administer computer networks and related computing environments including computer hardware, systems software, applications software, and all configurations.
  • Perform data backups and disaster recovery operations.
  • Diagnose, troubleshoot, and resolve hardware, software, or other network and system problems, and replace defective components when necessary.
  • Configure, monitor, and maintain email applications or virus protection software.
  • Operate master consoles to monitor the performance of computer systems and networks, and to coordinate computer network access and use.
  • Monitor network performance to determine whether adjustments need to be made, and to determine where changes will need to be made in the future.
  • Plan, coordinate, and implement network security measures to protect data, software, and hardware.
  • Analyze equipment performance records to determine the need for repair or replacement.
  • Confer with network users about how to solve existing system problems.
  • Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
  • Design, configure, and test computer hardware, networking software and operating system software.
  • Perform routine network startup and shutdown procedures, and maintain control records.
  • Maintain logs related to network functions, as well as maintenance and repair records.
  • Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.
  • Research new technologies by attending seminars, reading trade articles, or taking classes, and implement or recommend the implementation of new technologies.
Computer Network Support Specialists $62,670 16,500 5% to 9%

Description

Analyze, test, troubleshoot, and evaluate existing network systems, such as local area network (LAN), wide area network (WAN), and Internet systems or a segment of a network system. Perform network maintenance to ensure networks operate correctly with minimal interruption.
Job Titles Include
Computer Network Specialist, IT Consultant (Information Technology Consultant), Network Engineer, Network Specialist, Network Support Specialist, Network Technical Analyst, Network Technician, Personal Computer Network Analyst, Senior IT Assistant (Senior Information Technology Assistant), Systems Specialist

Wages

Bottom 15% Median Salary Top 10%
United States $37,040 $62,670 $105,910

Employment

current employment 2016 projected job openings 2016 - 2026 projected growth 2016 - 2026
United States 199,000 16,500 5% to 9%

typical tasks

  • Back up network data.
  • Configure security settings or access permissions for groups or individuals.
  • Analyze and report computer network security breaches or attempted breaches.
  • Identify the causes of networking problems, using diagnostic testing software and equipment.
  • Document network support activities.
  • Configure wide area network (WAN) or local area network (LAN) routers or related equipment.
  • Install network software, including security or firewall software.
  • Troubleshoot network or connectivity problems for users or user groups.
  • Evaluate local area network (LAN) or wide area network (WAN) performance data to ensure sufficient availability or speed, to identify network problems, or for disaster recovery purposes.
  • Analyze network data to determine network usage, disk space availability, or server function.
  • Perform routine maintenance or standard repairs to networking components or equipment.
  • Configure and define parameters for installation or testing of local area network (LAN), wide area network (WAN), hubs, routers, switches, controllers, multiplexers, or related networking equipment.
  • Install new hardware or software systems or components, ensuring integration with existing network systems.
  • Test computer software or hardware, using standard diagnostic testing equipment and procedures.
  • Monitor industry websites or publications for information about patches, releases, viruses, or potential problem identification.

U.S. Department of Labor

Career Information

Oh, darn — we’re not quite ready for you. Our most industrious website elves are busy completing this section, which should be available shortly. In the meantime, you can access this data on your tablet, laptops or desktop devices.

 

I had someone there every step of the way. They walked me through what could have been a very stressful process. It put me on a path that started an epic journey.

-Kasey, Fort Riley

Everything was easy and my advisor with The Major Group walked me through it all. This was my third time going to college and by far the least stressful enrollment process.

-Felicia, Ft. Campbell

I loved the whole process. Everyone was very helpful and made sure that the program I wanted to join was something I wanted to do. It also helped me put my goals in place.

-Crystal, Fort Riley

There was a lot of help along the way, which was great. It was smooth and everything went well.

-Elizabeth, Fort Gordon

It was easy, simple, and quick. There was someone there every step of the way to help you fill out all the required documents. I would recommend to all military spouses who want to go to school, especially if you’re a stay-at-home spouse.

-Aeisha, Hunter Army Air Field

Everything was very easy to do and got done rather quickly from start to finish.

-Anne, Schofield Barracks, Hawaii

The enrollment process was quick and easy. Lots of help when needed.

-Rita, NAS JRB Fort Worth

 

"I had someone there every step of the way. They walked me through what could have been a very stressful process. It put me on a path that started an epic journey."

-Kasey, Fort Riley

"Everything was easy and my advisor with The Major Group walked me through it all. This was my third time going to college and by far the least stressful enrollment process."

-Felicia, Ft. Campbell

"I loved the whole process. Everyone was very helpful and made sure that the program I wanted to join was something I wanted to do. It also helped me put my goals in place."

-Crystal, Fort Riley

"There was a lot of help along the way, which was great. It was smooth and everything went well."

-Elizabeth, Fort Gordon

"It was easy, simple, and quick. There was someone there every step of the way to help you fill out all the required documents. I would recommend to all military spouses who want to go to school, especially if you’re a stay-at-home spouse."

-Aeisha, Hunter Army Air Field

"Everything was very easy to do and got done rather quickly from start to finish."

-Anne, Schofield Barracks, Hawaii

"The enrollment process was quick and easy. Lots of help when needed."

-Rita, NAS JRB Fort Worth

STILL CONSIDERING YOUR OPTIONS?

Check out our entire MyCAA-approved program offerings:

  STAY INFORMED

If you’d like to know when we have new courses, new programs, new ideas, new promotions — you know, all new and good stuff — then get on this email list. We keep messages short and sweet, and only send them when there’s something really good happening, like giving away a vacation (yeah, we did that).

We are proud partners with organzations that provide military spouse support and employment.

Military Spouse Employment Partnership Logo Military Spouse Mentor Logo National Military Family Association Logo Hiring Our Heroes Logo USA Cares Logo

We are proud partners with organizations that provide military spouse support and employment.

Military Spouse Employment Partnership Logo Military Spouse Mentor Logo National Military Family Association Logo Hiring Our Heroes Logo USA Cares Logo

© The Major Group™ 2010- All rights reserved • Business Terms and ConditionsBranding and Website by Red Chalk Studios