top of page

Related Courses

CompTIA Security+ Exam Prep - Online Course And PDF Guides

Price: 4.00 USD | Size: 2.37 GB | Duration : 10.00 Hours | 83 Lessons | 

BRAND : Expert TRAINING | ENGLISH | INSTANT DOWNLOAD  

 

CompTIA Security+ Exam Prep - Online  Course And Bonus PDF Guides

 

 

Course Overview

The CompTIA Security+ Exam Prep will be targeted towards both new learners and even professionals. One of the major issues within the cybersecurity realm is that IT professionals are not able to identify both internal and external threats that are affecting their organization. By completing this video series, you will be able to understand the baseline of IT security practices, policies, tools, types of attacks, and vulnerabilities and how to prevent and mitigate those threats. This video series also prepares you for the official CompTIA Security+ SY0-601 certification.

What You Will Learn

Learn how to identify threats, attacks, and vulnerabilities

Learn about security technologies and tools to help you secure your network

Learn how to design and create a security architecture within your organization

Understand how identity and access management improves security on a network

Learn how cryptography and PKI helps secure your data as its passes across an unsecure network

 

Course Syllabus

Course Overview

Chapter 1: Fundamental of Information Technology

Chapter 2: Threats, Attacks, and Vulnerabilities

Chapter 3: Technologies and Tools

Chapter 4: Architecture and Design

Chapter 5: Identity and Access Management

Chapter 6: Risk Management

Chapter 7: Cryptography and PKI

 

Video Lessons

 

1 - Course Overview

2 - Introduction

3 - Safety and Professionalism

4 - Essentials of Computing

5 - Types of RAM

6 - Fundamentals of Motherboards

7 - Power Supply Unit

8 - Mass Storage Devices

9 - Introduction

10 - Identifying Indicators of Compromise (IoC)

 

11 - Comparing Different Types of Attacks – Social Engineering

12 - Comparing Different Types of Attacks – Application Attacks

13 - Comparing Different Types of Attacks – Wireless Attacks

14 - Comparing Different Types of Attacks – Cryptographic Attacks

15 - Understanding Threat Actors

16 - Understanding the Need for Penetration Testing

17 - Learning About the Concepts of Vulnerability Scanning

18 - Types of Vulnerabilities

19 - Introduction

20 - Network Security Components – Firewalls and VPN

 

21 - Network Security Components – Network Devices

22 - Network Security Components – Proxies and Load Balancers

23 - Network Security Components – Wireless Devices

24 - Network Security Components – Other Security Devices

25 - Using Security Tools to Assess Security Posture – Software Tools

26 - Using Security Tools to Assess Security Posture – CLI Tools

27 - Understanding Common Security Issues

28 - Understanding Security Technologies

29 - Securing Mobile Devices - Connection

 

30 - Securing Mobile Devices - Management

31 - Securing Mobile Devices - Enforcement

32 - Securing Mobile Devices - Deployment

33 - Implementing Secure Protocols

34 - Introduction

35 - Understanding Frameworks and Best Practices

36 - Secure Configuration

37 - Secure Network Architecture – Zones & Topologies

38 - Secure Network Architecture – Network Segmentation

39 - Secure Network Architecture – VPN

 

40 - Secure Network Architecture – Device Placement

41 - Implementing Secure Systems – Hardware Firmware Security

42 - Implementing Secure Systems – Operating System Security

43 - Implementing Secure Systems – Peripherals

44 - Understanding the Importance of Secure Staging Concepts

45 - Understanding Security Issues with Embedded Systems

46 - Secure Application Development – Life Cycle Models

47 - Secure Application Development – Version Control, Change Management, and Provisioning

48 - Secure Application Development – Secure Coding Concepts

49 - Secure Application Development – Code Quality and Testing

 

50 - Security in Cloud and Virtualization Concepts

51 - Understanding Resiliency and Automation Strategies to Reduce Risk

52 - Implementing Physical Security Controls

53 - Introduction

54 - Understanding Identity and Access Management

55 - Configuring Identity and Access Services – Part 1

56 - Configuring Identity and Access Services – Part 2

57 - Implementing Identity and Access Management Controls

58 - Account Management Practices – Part 1

59 - Account Management Practices – Part 2

 

60 - Introduction

61 - Understanding the Importance of Policies, Plans, and Procedures – Part 1

62 - Understanding the Importance of Policies, Plans, and Procedures – Part 2

63 - Understanding the Importance of Policies, Plans, and Procedures – Part 3

64 - Business Impact Analysis Concepts

65 - Risk Management Processes

66 - Incident Response Procedures – Part 1

67 - Incident Response Procedures – Part 2

68 - Building and Planning Effective Business Continuity Plans

69 - Computer Forensics Concepts – Part 1

 

70 - Computer Forensics Concepts – Part 2

71 - Understanding Disaster Recovery and Continuity of Operations – Part 1

72 - Understanding Disaster Recovery and Continuity of Operations – Part 2

73 - Understanding Types of Controls

74 - Data Security and Privacy Practices

75 - Introduction

76 - Understanding the Concepts of Cryptography – Part 1

77 - Understanding the Concepts of Cryptography – Part 2

78 - Understanding the Concepts of Cryptography – Part 3

79 - Describing the Characteristics of Cryptography Algorithms – Part 1

 

80 - Describing the Characteristics of Cryptography Algorithms – Part 2

81 - Implementing Wireless Security

82 - Understanding Public Key Infrastructure (PKI) – Part 1

83 - Understanding Public Key Infrastructure (PKI) – Part 2

CompTIA Security+ Exam Prep - Online Course And PDF Guides

SKU: EXT2021-0267
$4.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.  

bottom of page