Price: 4.00 USD | Size: 2.37 GB | Duration : 10.00 Hours | 83 Lessons |
BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
CompTIA Security+ Exam Prep - Online Course And Bonus PDF Guides
Course Overview
The CompTIA Security+ Exam Prep will be targeted towards both new learners and even professionals. One of the major issues within the cybersecurity realm is that IT professionals are not able to identify both internal and external threats that are affecting their organization. By completing this video series, you will be able to understand the baseline of IT security practices, policies, tools, types of attacks, and vulnerabilities and how to prevent and mitigate those threats. This video series also prepares you for the official CompTIA Security+ SY0-601 certification.
What You Will Learn
Learn how to identify threats, attacks, and vulnerabilities
Learn about security technologies and tools to help you secure your network
Learn how to design and create a security architecture within your organization
Understand how identity and access management improves security on a network
Learn how cryptography and PKI helps secure your data as its passes across an unsecure network
Course Syllabus
Course Overview
Chapter 1: Fundamental of Information Technology
Chapter 2: Threats, Attacks, and Vulnerabilities
Chapter 3: Technologies and Tools
Chapter 4: Architecture and Design
Chapter 5: Identity and Access Management
Chapter 6: Risk Management
Chapter 7: Cryptography and PKI
Video Lessons
1 - Course Overview
2 - Introduction
3 - Safety and Professionalism
4 - Essentials of Computing
5 - Types of RAM
6 - Fundamentals of Motherboards
7 - Power Supply Unit
8 - Mass Storage Devices
9 - Introduction
10 - Identifying Indicators of Compromise (IoC)
11 - Comparing Different Types of Attacks – Social Engineering
12 - Comparing Different Types of Attacks – Application Attacks
13 - Comparing Different Types of Attacks – Wireless Attacks
14 - Comparing Different Types of Attacks – Cryptographic Attacks
15 - Understanding Threat Actors
16 - Understanding the Need for Penetration Testing
17 - Learning About the Concepts of Vulnerability Scanning
18 - Types of Vulnerabilities
19 - Introduction
20 - Network Security Components – Firewalls and VPN
21 - Network Security Components – Network Devices
22 - Network Security Components – Proxies and Load Balancers
23 - Network Security Components – Wireless Devices
24 - Network Security Components – Other Security Devices
25 - Using Security Tools to Assess Security Posture – Software Tools
26 - Using Security Tools to Assess Security Posture – CLI Tools
27 - Understanding Common Security Issues
28 - Understanding Security Technologies
29 - Securing Mobile Devices - Connection
30 - Securing Mobile Devices - Management
31 - Securing Mobile Devices - Enforcement
32 - Securing Mobile Devices - Deployment
33 - Implementing Secure Protocols
34 - Introduction
35 - Understanding Frameworks and Best Practices
36 - Secure Configuration
37 - Secure Network Architecture – Zones & Topologies
38 - Secure Network Architecture – Network Segmentation
39 - Secure Network Architecture – VPN
40 - Secure Network Architecture – Device Placement
41 - Implementing Secure Systems – Hardware Firmware Security
42 - Implementing Secure Systems – Operating System Security
43 - Implementing Secure Systems – Peripherals
44 - Understanding the Importance of Secure Staging Concepts
45 - Understanding Security Issues with Embedded Systems
46 - Secure Application Development – Life Cycle Models
47 - Secure Application Development – Version Control, Change Management, and Provisioning
48 - Secure Application Development – Secure Coding Concepts
49 - Secure Application Development – Code Quality and Testing
50 - Security in Cloud and Virtualization Concepts
51 - Understanding Resiliency and Automation Strategies to Reduce Risk
52 - Implementing Physical Security Controls
53 - Introduction
54 - Understanding Identity and Access Management
55 - Configuring Identity and Access Services – Part 1
56 - Configuring Identity and Access Services – Part 2
57 - Implementing Identity and Access Management Controls
58 - Account Management Practices – Part 1
59 - Account Management Practices – Part 2
60 - Introduction
61 - Understanding the Importance of Policies, Plans, and Procedures – Part 1
62 - Understanding the Importance of Policies, Plans, and Procedures – Part 2
63 - Understanding the Importance of Policies, Plans, and Procedures – Part 3
64 - Business Impact Analysis Concepts
65 - Risk Management Processes
66 - Incident Response Procedures – Part 1
67 - Incident Response Procedures – Part 2
68 - Building and Planning Effective Business Continuity Plans
69 - Computer Forensics Concepts – Part 1
70 - Computer Forensics Concepts – Part 2
71 - Understanding Disaster Recovery and Continuity of Operations – Part 1
72 - Understanding Disaster Recovery and Continuity of Operations – Part 2
73 - Understanding Types of Controls
74 - Data Security and Privacy Practices
75 - Introduction
76 - Understanding the Concepts of Cryptography – Part 1
77 - Understanding the Concepts of Cryptography – Part 2
78 - Understanding the Concepts of Cryptography – Part 3
79 - Describing the Characteristics of Cryptography Algorithms – Part 1
80 - Describing the Characteristics of Cryptography Algorithms – Part 2
81 - Implementing Wireless Security
82 - Understanding Public Key Infrastructure (PKI) – Part 1
83 - Understanding Public Key Infrastructure (PKI) – Part 2
CompTIA Security+ Exam Prep - Online Course And PDF Guides
You can Instant Download a PDF file
After successful payment ,
This PDF File Contains Course Download links
You can Download This Course immediately from click that Links.