SKU: comptia-csie Category:

CompTIA Security Infrastructure Expert (CSIE)

$599.00

The CompTIA CSIE is a stackable certification by CompTIA. It is designed for IT professionals with 5 or more years of experience. The ITU Certification Path for the CompTIA CSIE certification consists of the learning materials to allow you to study for and pass the CompTIA Security+, CompTIA Cybersecurity Analyst (CySA+), CompTIA PenTest+ and CompTIA CASP+ exams. Completing this path and passing the four exams means you end of with four CompTIA certifications and are a designated a CompTIA Security Infrastructure Expert. The four courses contained in this path are:

About The Exams for CompTIA CSIE

For the CompTIA Security+ certification, you must pass the following exam.

For CompTIA CySA+ certification, , you must pass the following exam.

For CompTIA PenTest+ certification, , you must pass the following exam.

For CompTIA Advanced Security Practitioner (CASP+) certification, you must pass the following exam.

Upon successfully passing the applicable exams provided by CompTIA, you will earn the CSIE certification badge.

For more information on CompTIA Stackable Certifications, visit the CompTIA website. Pricing charged by CompTIA varies by exam. For details on current pricing, visit CompTIA Pricing on their website.

Course Outline

Module 1: Threats, Attacks and Vulnerabilities
  •  Module 1 Workbook
  •  Introduction
  •  Types Of Malware-Part 1
  •  Types Of Malware-Part 2
  •  Types Of Attacks-Part 1
  •  Types Of Attacks-Part 2
  •  Types Of Attacks-Part 3
  •  Types Of Attacks-Part 4
  •  Types Of Attacks-Part 5
  •  Threat Actors-Part 1
  •  Threat Actors-Part 2
  •  Penetration Testing And Vulnerability Scanning-Part 1
  •  Penetration Testing And Vulnerability Scanning-Part 2
  •  Impact Of Vulnerabilities-Part 1
  •  Impact Of Vulnerabilities-Part 2
Module 2: Technologies and Tools
  •  Module 2 Workbook
  •  Networking Hardware And Software-Part 1
  •  Networking Hardware And Software-Part 2
  •  Networking Hardware And Software-Part 3
  •  Networking Hardware And Software-Part 4
  •  Networking Hardware And Software-Part 5
  •  Networking Hardware And Software-Part 6
  •  Security Assessment-Part 1
  •  Security Assessment-Part 2
  •  Troubleshooting Issues-Part 1
  •  Troubleshooting Issues-Part 2
  •  Securing Mobile Devices-Part 1
  •  Securing Mobile Devices-Part 2
  •  Securing Mobile Devices-Part 3
  •  Securing Mobile Devices-Part 4
  •  Secure Protocols-Part 1
  •  Secure Protocols-Part 2
Module 3: Architecture and Design
  •  Module 3 Workbook
  •  Secure Network Architecture-Part 1
  •  Secure Network Architecture-Part 2
  •  Secure System Designs-Part 1
  •  Secure System Designs-Part 2
  •  Secure Staging Deployment Concepts
  •  Embedded Systems-Part 1
  •  Embedded Systems-Part 2
  •  Application Development And Deployment-Part 1
  •  Application Development And Deployment-Part 2
  •  Application Development And Deployment-Part 3
  •  Physical Security Controls-Part 1
  •  Physical Security Controls-Part 2
  •  Physical Security Controls-Part 3
  •  Cloud Virtualization-Part 1
  •  Cloud Virtualization-Part 2
Module 4: Identity and Access Management
  •  Module 4 Workbook
  •  Identity And Access Management-Part1
  •  Identity And Access Management-Part2
  •  Identity And Access Services-Part1
  •  Identity And Access Services-Part2
  •  Management Controls-Part1
  •  Management Controls-Part2
  •  Account Management Practices-Part1
  •  Account Management Practices-Part2
  •  Account Management Practices-Part3
Module 5: Risk Management
  •  Module 5 Workbook
  •  Organizational Security-Part1
  •  Organizational Security-Part2
  •  Business Impact Analysis Concepts-Part1
  •  Business Impact Analysis Concepts-Part2
  •  Risk Management-Part1
  •  Risk Management-Part2
  •  Incident Response Procedures-Part1
  •  Incident Response Procedures-Part2
  •  Forensics-Part1
  •  Forensics-Part2
  •  Disaster Recovery-Part1
  •  Disaster Recovery-Part2
  •  Types Of Control-Part1
  •  Types Of Control-Part2
  •  Data Security And Privacy Practices-Part1
  •  Data Security And Privacy Practices-Part2
Module 6: Cryptography and PKI
  •  Module 6 Workbook
  •  Cryptographic Basics-Part1
  •  Cryptographic Basics-Part2
  •  Cryptographic Basics-Part3
  •  Cryptographic Algorithms-Part1
  •  Cryptographic Algorithms-Part2
  •  Wireless Security-Part1
  •  Wireless Security-Part2
  •  Implementing PKI-Part1
  •  Implementing PKI-Part2
  •  Implementing PKI-Part3
  •  Conclusion
CompTIA Security Infrastructure Expert (CSIE)

This Certification Path will enable you to study to obtain the CompTIA CSIE designation.


Save For Later
Add to Wishlist