MPD 203 – Security+ Exam Preparation

Course Meeting Dates and Times:
  • Days/Time: Saturdays, 1:30-5:30pm
  • Dates: March 23 - May 4
  • Location: Pangborn Hall, Room 302 at The Catholic University of America
  • CEU’s: 5
Price per Student

$1500.00 (includes textbooks, practice tests, and exam voucher)

Instructor

Adel R. Daham

Instructor Qualifications

MA: Organizational Development Management , 2 BAs: Accounting and Business Administration, MCSE, CompTIA A+, CompTIA Network+, CompTIA Security +, CompTIA Server+, PMP, Tenable Nessus Certified Auditor (TNCA), Splunk administrator, CISSP, and Splunk Power user.

Instructor Expertise

Over 28 years of professional experience in information systems and cyber technology and security applications.

Textbooks (Included in Price of Course):
  • Clarke, Glen E. CompTIA Security+ Certification Study Guide, Third Edition (Exam SY0-501). Columbus: McGraw-Hill Education, 2018. ISBN-13: 978-1260026054
  • Lechance, Daniel. CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501). Columbus: McGraw-Hill Education, 2018. ISBN-13: 978-1260026900
Test Details

Required exam: CompTIA Security+ SY0-501

  • Number of questions: Maximum of 90
  • Types of questions: Multiple choice and performance-based
  • Length of test: 90 minutes
  • Recommended experience: At least two years of experience in IT administration with a focus on security
  • Passing score: 750 (on a scale of 100–900)
Exam Objectives (Domains)

The table below lists the domains measured by this examination and the extent to which they are represented.

Domain Percentage of Examination
  • 1.0 Threats, Attacks and Vulnerabilities: 21%
  • 2.0 Technologies and Tools: 22%
  • 3.0 Architecture and Design: 15%
  • 4.0 Identity and Access Management: 16%
  • 5.0 Risk Management: 14%
  • 6.0 Cryptography and PKI: 12%
  • Total 100%
Security + Exam Prep: Domains and session activities

These content examples are meant to clarify the test objectives and should not be construed as a comprehensive listing of all content in this examination.

Outline of Course

Session 1: Threats, Attacks and Vulnerabilities

  • 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
  • 1.2 Compare and contrast types of attacks.
  • 1.3 Explain threat actor types and attributes.
  • 1.4 Explain penetration testing concepts.
  • 1.5 Explain vulnerability scanning concepts.      
    • Session activities:
      • Exam Contents’ Overview
      • Exam Prep.
      • Reading Assignment - Study Guide Textbook: Chapters: 2, 4, 5, 9, and 18
Session 2 Technologies and Tools
  • 2.1 Install and configure network components, both hardware and software based, to support organizational security.
  • 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization.
  • 2.3 Given a scenario, troubleshoot common security issues.
  • 2.4 Given a scenario, analyze and interpret output from security technologies.
  • 2.5 Given a scenario, deploy mobile devices securely.
  • 2.6 Given a scenario, implement secure protocols.
    • Session activities:
      • Exam Contents’ Overview
      • Exam Prep.
      • Reading Assignment - Study Guide Textbook: Chapters: 1, 6, 7, 8, 9, 12, 18, and 19
Session 3: Architecture and Design
  • 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
  • 3.2 Given a scenario, implement secure network architecture concepts.
  • 3.3 Given a scenario, implement secure systems design.
  • 3.4 Explain the importance of secure staging deployment concepts.
  • 3.5 Explain the security implications of embedded systems.
  • 3.6 Summarize secure application development and deployment concepts.
  • 3.7 Summarize cloud and virtualization concepts.
  • 3.8 Explain how resiliency and automation strategies reduce risk.
  • 3.9 Explain the importance of physical security controls.
    • Session activities:
      • Exam Contents’ Overview
      • Exam Prep.
      • Reading Assignment - Study Guide Textbook: Chapters: 2, 6, 7, 8, 11, 14, and 16
Session 4: Identity and Access Management
  • 4.1 Compare and contrast identity and access management concepts
  • 4.2 Given a scenario, install and configure identity and access services.
  • 4.3 Given a scenario, implement identity and access management controls.
  • 4.4 Given a scenario, differentiate common account management practices. 
    • Session activities:
      • Exam Contents’ Overview
      • Exam Prep.
      • Reading Assignment - Study Guide Textbook: Chapters: 10, and 11
Session 5:  Risk Management
  • 5.1 Explain the importance of policies, plans and procedures related to organizational security.
  • 5.2 Summarize business impact analysis concepts.
  • 5.3 Explain risk management processes and concepts.
  • 5.4 Given a scenario, follow incident response procedures.
  • 5.5 Summarize basic concepts of forensics.
  • 5.6 Explain disaster recovery and continuity of operation concepts.
  • 5.7 Compare and contrast various types of controls.
  • 5.8 Given a scenario, carry out data security and privacy practices.
    • Session activities:
      • Exam Contents’ Overview
      • Exam Prep.
      • Reading Assignment - Study Guide Textbook: Chapters: 2, 3, 7, 11, 15, 16, 17, and 18
Session 6: Cryptography and PKI
  • 6.1 Compare and contrast basic concepts of cryptography.
  • 6.2 Explain cryptography algorithms and their basic characteristics.
  • 6.3 Given a scenario, install and configure wireless security settings.
  • 6.4 Given a scenario, implement public key infrastructure. 
  • Session activities:
    • Exam Contents’ Overview
    • Exam Prep.
    • Reading Assignment - Study Guide Textbook: Chapters: 9, 12, and 13
Session 7: Exam Prep – Review 1
  • Session activities:
    • Exam Contents’ Overview
    • Exam Prep.
    • Reading Assignment - Study Guide Textbook: Chapters: Additional reading

Session 8: Exam Prep – Review 2
  • Session activities:
    • Exam Contents’ Overview
    • Exam Prep.
    • Reading Assignment - Study Guide Textbook: Chapters: Additional reading