Security+ Certification Prep


Security+ Certification Prep, Singapore elarning online course

Course Description

Security+ Certification Prep
The Security+ Certification Prep Course readies students for CompTIA's S+ certification exam which is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. With top experts and an interactive, lab-filled enviornment, students gain essential knowledge of the principals for network security and risk management with competency in organizational security, system security, access control and network infrastructure. The S+ certification by CompTIA is an internationally recognized credential ensuring ground-level security proficiency as well as skills for organization and security professionals to provide information, infrastructure, application and operational security. This course prepares the student for the CompTIA S+ Certification Exam SYO-401.


Course Objectives

1. Security Fundamentals
2. Systems Threats and Risks
3. Protecting Systems
4. Network Defenses
5. Network Security
6. Wireless Network Security
7. Access Control Fundamentals
8. Authentication
9. Performing Vulnerability Assessments
10. Conducting Security Audits
11. Basic Cryptography
12. Applying Cryptography
13. Business Continuity
14. Security Polices and Training
15. Final Exam: Security Plus


Related Courses

  • Become a High Earning Cloud Architect

    Become a High Earning Cloud Architect

    SGD $20.00

    Course Description

    The demand for Cloud Architects is very high and you as a technical guru can take advantage of this. If your currently a Solutions Architect, System Administrator or Developer this course is a great transition. As your well credentialed instructor I will be working with you for over 10 hours going through what a Cloud Architect needs to know. We will cover the basics of cloud, then we will cover cloud frameworks, cloud ecosystems, cloud migrations, cloud analysis, etc. This is a vendor neutral course where you will learn the basics but i will apply the fundamentals to the three major providers so you can take this knowledge and run. We will touch on Google Cloud, Amazon Web Services and MS Azure for IaaS/PaaS. Salesforce and Servicenow for SaaS as well as O365 briefly. Lastly, I will go through what you need to look for in a Cloud role and the best resources for finding a new job or gig. The materials are based on the The Professional Cloud Solutions Architect certification which equips solution architects with insights and familiarity with the topology and ecosystems that are being created as a result of cloud technology adoption and operating models. These materials are Vendor neutral.

    Read more...

  • Certified Security Analyst Training

    Certified Security Analyst Training

    SGD $299.00

    Course Description

    The Certified Security Analyst Training course prepares students for gaining practical experience with conducting realistic penetration tests. Thought by top experts in the field, students learn advanced knowledge and experience regarding the available methodologies, tools and techniques which are required to perform comprehensive information security penetration tests.  Students gain practical experience with the Licensed Penetration Tester in order to perform the intensive assessments required to effectively identify and mitigate risks to an infrastructure's security. Students not only learn to identify information security problems in this course, but also how to avoid and eliminate them with complete coverage of analysis and network security testing methods and tools.

    Read more...

  • Oracle Java SE7 Programmer Level 1 Certification

    Oracle Java SE7 Programmer Level 1 Certification

    SGD $50.00

    Course Description

    Have you ever wondered how all those cool applications and games around the web are made? The answer is: Java. Java is the most commonly used programming language in the world. Get started learning Java today, and in a few days with this Java Tutorial for Beginners you'll be a pro. To make your life a bit easier, you will learn Java from scratch using the NetBeans environment. Java allows you to play online games, chat with people around the world, calculate your mortgage interest, and view images in 3D, just to name a few. It's also integral to the intranet applications and other e-business solutions that are the foundation of corporate computing.Everything you need to know for Java Certification. - Know the basics of Java programming language - Learn the the topics in this course to pass Oracle's Java Programmer Level 1 Exam- Know how to code using Java after the completion of this course- Be able to apply the knowledge into your own projects after this course 

    Read more...


Content

Security Fundamentals

+

Security Fundamentals

Introduction to Security Part 1

What is Information Security? Part 1

What is Information Security? Part 2

Understanding the Importance of Information Security Part 1

Understanding the Importance of Information Security Part 2

Understanding the Importance of Information Security Part 4

Attacks and Defenses

Information Security Careers and the Security+ Certification

Understanding the Importance of Information Security Part 3

Systems Threats and Risks

+

Software-based Attacks Part 1

Software-based Attacks Part 2

Software-based Attacks Part 3

Software-based Attacks Part 4

Software-based Attacks Part 5

Hardware-based Attacks

Attacks on Virtual Systems Part 1

Attacks on Virtual Systems Part 2

Protecting Systems

+

Protecting Systems Overview

Hardening the Operating System Part 1

Hardening the Operating System Part 2

Hardening the Operating System Part 3

Hardening the Operating System Part 4

Preventing Attacks that Target the Web Browser Part 1

Preventing Attacks that Target the Web Browser Part 2

Preventing Attacks that Target the Web Browser Part 3

Preventing Attacks that Target the Web Browser Part 4

Preventing Attacks that Target the Web Browser Part 5

Preventing Attacks that Target the Web Browser Part 6

Network Defenses

+

Network Vulnerabilities Part 1

Network Vulnerabilities Part 2

Categories of Attacks Part 1

Categories of Attacks Part 2

Methods of Network Attacks Part 1

Methods of Network Attacks Part 2

Methods of Network Attacks Part 3

Other Attacks and Frauds

Network Security

+

Crafting a Secure Network Part 1

Crafting a Secure Network Part 2

Crafting a Secure Network Part 3

Applying Network Security Devices Part 1

Applying Network Security Devices Part 2

Applying Network Security Devices Part 3

Applying Network Security Devices Part 4

Wireless Network Security

+

IEEE 802.11 Wireless Security Protections Part 1

IEEE 802.11 Wireless Security Protections Part 2

Vulnerabilities of IEEE 802.11 Security

Personal Wireless Security

Enterprise Wireless Security

Access Control Fundamentals

+

What is Access Control Part 1

What is Access Control Part 2

Logical Access Control Methods Part 1

Logical Access Control Methods Part 2

Physical Access Control Part 1

Physical Access Control Part 2

Authentication

+

Definition of Authentication

Authentication Credentials Part 1

Authentication Credentials Part 2

Authentication Models

Authentication Servers

Extended Authentication Protocols (EAP)

Remote Authentication and Security

Performing Vulnerability Assessments

+

Performing Vulnerability Assessments Part 1

Performing Vulnerability Assessments Part 2

Performing Vulnerability Assessments Part 3

Performing Vulnerability Assessments Part 4

Performing Vulnerability Assessments Part 5

Performing Vulnerability Assessments Part 6

Performing Vulnerability Assessments Part 7

Conducting Security Audits

+

Privilege Auditing Part 1

Privilege Auditing Part 2

Usage Auditing

Monitoring Methodologies and Tools

Basic Cryptography

+

Basic Cryptography Part 1

Basic Cryptography Part 2

Cryptographic Algorithms

Hashing Algorithms Part 1

Hashing Algorithms Part 2

Hashing Algorithms Part 3

Hashing Algorithms Part 4

Symmetric Cryptographic Algorithms Part 1

Symmetric Cryptographic Algorithms Part 2

Asymmetric Cryptographic Algorithms

Using Cryptography on Files and Disks

Applying Cryptography

+

Digital Certificates Part 1

Digital Certificates Part 2

Digital Certificates Part 3

Public Key Infrastructure (PKI) Part 2

Key Management

Cryptographic Transport Protocols Part 1

Cryptographic Transport Protocols Part 2

Public Key Infrastructure (PKI) Part 1

Business Continuity

+

Redundancy Planning Part 2

Disaster Recovery Procedures Part 1

Disaster Recovery Procedures Part 2

Incident Response Procedures

Environmental Controls Part 1

Environmental Controls Part 2

Redundancy Planning Part 1

Security Policies and Training

+

Organizational Security Policies Part 1

Organizational Security Policies Part 2

Types of Security Policies Part 1

Types of Security Policies Part 2

Types of Security Policies Part 3

Education and Training

SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.