Certified Security Principles Plus

Become a certified security expert with Mile2's Certified Security Principles Plus course, designed for IT professionals seeking to master system security, access control, network infrastructure, and cryptography to protect their organization's data.

Course Thumbnail

Essential Skills Gained

Checkmark

Design robust security protocols across various vendor products.

Checkmark

Implement effective access control and network infrastructure techniques.

Checkmark

Assess and audit systems to identify vulnerabilities.

Checkmark

Understand cryptography and its organizational applications.

Format

  • Instructor-led
  • 5 days with lectures and hands-on labs.

Audience

  • IT Professionals
  • Server Administrators
  • Network Administrators
  • Virtualization and Cloud Administrators

Description

Mile2’s Certified Security Principles+ course provides the skills necessary to apply and implement technical knowledge of security concepts in today’s security environment. Students will gain an in‐depth knowledge of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across all vendor products. These skills have become increasingly important, as additional safeguards such as intrusion detection systems, physical access control, and multi‐factor authentication become standard methods of protection. Students are given real-world scenarios to reinforce the material covered and will learn how to apply the concepts to their daily operations.

The Certified Security Principles+ exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple-choice questions.

Calendar icon

Upcoming Course Dates

No upcoming dates. Please check back later.

Course Outline

Download PDF

Module 1

  1. Introduction to IT Security

  2. Understanding Security

  3. Responsibilities

  4. Building a Security Program

  5. CIA Triad

  6. Governance, Risk, Compliance

  7. State of Security Today

Module 2

  1. Risk Management

  2. Risk Assessment

  3. Types of Risk, Threats and Vulnerabilities

  4. Mitigating Attacks

  5. Discovering Vulnerabilities and Threats

  6. Responding to Risk

Module 3

  1. Understanding of Cryptography

  2. Symmetric Encryption

  3. Asymmetric Encryption

  4. Hashing

  5. PKI

  6. Cryptography in Use

Module 4

  1. Understanding Identity and Access Management

  2. Identity Management

  3. Authentication Techniques

  4. Single Sign-on

  5. Access Control Monitoring

Module 5

  1. Managing Data Security

  2. Virtualization Principles

  3. Key Components Mapped to Cloud Layer

  4. Key Security Concerns

  5. Other Technologies Used in the Cloud

  6. The Layers

  7. Relevant CCM Controls

Module 6

  1. Data Security

  2. Different Types of Storage

  3. Encryption Options

  4. Data Management

Module 7

  1. Managing Server/Host Security

  2. The Operating Systems

  3. Hardening the OS

  4. Physical security

  5. Virtualization and Cloud Technologies

Module 8

  1. Application Security for Non-Developers

  2. Application Security Principle

  3. Software Development Life Cycle

  4. OWASP Top 10

  5. Hardening Web Applications

  6. Patch/Update/Configuration Management

Module 9

  1. Understanding Mobile Device Security (IoT)

  2. What Devices are we talking about?

  3. What is the risk?

  4. Hardening Mobile/IoT Devices

  5. Corporate Management

Module 10

  1. Managing Day to Day Security

  2. Company Responsibilities

  3. Product Management

  4. Business Continuity Basics

  5. Incident Response

  6. Why Train?

Module 11

  1. Understanding Compliance and Auditing

  2. Benefits of Compliance

  3. Assurance

  4. Frameworks

  5. What is Auditing

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.