CompTIA SY0-401: Security+

CompTIA SY0-401: Security+

$49.00

TRY IT FREE FOR 48 HOURS

Access our entire library for 48 hours.
Just fill out the form below.

 

Try it free for 48 Hours

No Credit Card Required.

Get Free Trial

CompTIA Security+ certification is globally recognized to validate foundational, vendor-neutral IT security knowledge and skills. This CompTIA Security+ course is an excellent starting point for a career in information security and will prepare you to pass the Security+ exam.

Module 1: Networking Terminology

1.1 Course Introduction
1.2 Network Devices Part 1
1.3 Network Devices Part 2
1.4 Networking Cabling
1.5 Networking Addressing Part 1
1.6 Networking Addressing Part 2
1.7 Networking Addressing Part 3
1.8 Networking Addressing Part 4

Module 2: Locking Down Or Network

2.1 Firewalls Part 1
2.2 Firewalls Part 2
2.3 Intrusion Detection Systems
2.4 Network Design
2.5 Securing Devices

Module 3: Wireless

3.1 Wireless Basics Part 1
3.2 Wireless Basics Part 2
3.3 Securing Wireless Part 1
3.4 Securing Wireless Part 2
3.5 Configuring Wireless, Bluetooth And Infrared

Module 4: Intro To Security Terminology

4.1 Goals Of Information Security
4.2 Authentication And Authorization
4.3 Security Principles And Terminology Part 1
4.4 Security Principles And Terminology Part 2

Module 5: Policies And Standards

5.1 Introduction To Security Policies
5.2 Looking At Some Security Policies Part 1
5.3 Looking At Some Security Policies Part 2
5.4 Looking At Some Security Policies Part 3
5.5 Human Resource Policies Part 1
5.6 Human Resource Policies Part 2
5.7 User Education And Awareness Part 1
5.8 User Education And Awareness Part 2

Module 6: Physical Security„„

6.1 Business Location
6.2 Physical Access Controls
6.3 Implementing Environmental Controls

Module 7: Risk Analysis
„„
7.1 Introduction Risk Analysis Part 1
7.2 Introduction Risk Analysis Part 2
7.3 Types Of Risk Analysis
7.4 Risk Mitigation Strategies

Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
„„
8.1 Business Continuity
8.2 Business Impact Analysis
8.3 Disaster Recovery
8.4 Backup And Restore

Module 9: Introduction To Computer Forensics
„„
9.1 Working With Evidence
9.2 Collecting Digital Evidence Part 1
9.3 Collecting Digital Evidence Part 2
9.4 Looking At Incident Response

Module 10: Types Of Attacks
„„
10.1 Social Engineering
10.2 Network Attacks Part 1
10.3 Network Attacks Part 2
10.4 Password And Application Attacks

Module 11: System Security Threats
„„
11.1 Identifying Physical Threats
11.2 Malicious Software Part 1
11.3 Demo
11.4 Malicious Software Part 2
11.5 Threats Against Hardware

Module 12: Security Assessments
„„
12.1 Types Of Assessments
12.2 Penetration Testing

Module 13: Monitoring And Auditing
„„
13.1 Introduction To Monitoring And Monitoring Tools
13.2 Implementing Logging And Auditing

Module 14: Authentication
„„
14.1 Authentication Models
14.2 Authentication Protocols
14.3 Implementing Authentication

Module 15: Access Control
„„
15.1 Introducing Access Control
15.2 Access Control Models
15.3 Implementing Access Control Part 1
15.4 Implementing Access Control Part 2

Module 16: Mitigating Security Threats
„
„
16.1 Operating System Hardening
16.2 System Hardening Procedures
16.3 Application Security
16.4 Server Hardening Best Practices Part 1
16.5 Server Hardening Best Practices Part 2

Module 17: Implementing System Security
„„
17.1 Implementing Personal Firewalls And HIDS
17.2 Protecting Against Malware
17.3 Device Security And Data Security Part 1
17.4 Device Security And Data Security Part 2
17.5 Understanding Virtualization And Cloud Computing

Module 18: Cryptography
„„
18.1 Introduction To Cryptography
18.2 Symmetric And Asymmetric Encryption
18.3 Understanding Hashing And Encryption Uses

Module 19: Public Key Infrastructure
„„
19.1 Intro To PKI
19.2 Managing And Implementing PKI
19.3 Course Conclusion