C)SP+: Certified Security Principles +
About this Course
Mile2’s Certified Security Principles+ course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products. These skills have become increasingly important, as additional safeguards such as intrusion detection systems, physical access control, and multi‐factor authentication become standard methods of protection. Students are given real-world scenarios to reinforce the material covered and will learn how to apply the concepts to their daily operations.
The Certified Security Principles+ exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions.
- IT Professionals
- Server Administrators
- Network Administrators
- Virtualization and Cloud Administrators
- Anyone that needs a general understanding of security,
- Those seeking the Security+Certification
- 8570 Directive
At Course Completion
Upon completion, the Certified Security Principles+ candidate will not only be able to competently take the C)SP+ exam but will also understand the principle security knowledge to keep companies IP and IT infrastructure safe.
The Certified Security Principles+ exam is taken online through Mile2’s Assessment and Certification System (“MACS”),which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100
multiple choice questions.
Introduction to IT Security
Building a Security Program
Governance, Risk, Compliance
State of Security Today
Types of Risk, Threats and Vulnerabilities
Discovering Vulnerabilities and Threats
Responding to Risk
Understanding of Cryptography
Cryptography in Use
Understanding Identity and Access Management
Access Control Monitoring
Managing Data Security
Key Components Mapped to Cloud Layer
Key Security Concerns
Other Technologies Used in the Cloud
Relevant CCM Controls
Different Types of Storage
Managing Server/Host Security
The Operating Systems
Hardening the OS
Virtualization and Cloud Technologies
Application Security for Non
Application Security Principle
Software Development Life Cycle
OWASP Top 10
Hardening Web Applications
Understanding Mobile Device Security (IoT)
What Devices are we talking about?
What is the risk?
Hardening Mobile/IoT Devices
Managing Day to Day Security
Business Continuity Basics
Understating Compliance and Auditing
Benefits of Compliance
What is Auditing
One-year of experience with server administration or network administration.
General understanding of business processes is beneficial.