Security+ Certification Prep


Security+ Certification Prep, Singapore elarning online course

Course Description

Security+ Certification Prep
The Security+ Certification Prep Course readies students for CompTIA's S+ certification exam which is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. With top experts and an interactive, lab-filled enviornment, students gain essential knowledge of the principals for network security and risk management with competency in organizational security, system security, access control and network infrastructure. The S+ certification by CompTIA is an internationally recognized credential ensuring ground-level security proficiency as well as skills for organization and security professionals to provide information, infrastructure, application and operational security. This course prepares the student for the CompTIA S+ Certification Exam SYO-401.


Course Objectives

1. Security Fundamentals
2. Systems Threats and Risks
3. Protecting Systems
4. Network Defenses
5. Network Security
6. Wireless Network Security
7. Access Control Fundamentals
8. Authentication
9. Performing Vulnerability Assessments
10. Conducting Security Audits
11. Basic Cryptography
12. Applying Cryptography
13. Business Continuity
14. Security Polices and Training
15. Final Exam: Security Plus


Related Courses

  • Intro to Blockchain Technology, Blockchain Security  and R3 Corda

    Intro to Blockchain Technology, Blockchain Security and R3 Corda

    SGD $29.00

    Course Description

    This course will help you identify and differentiate between security threats and attacks on a Blockchain network. Blockchain security methods, best practices, risk mitigation, and all known (to date) cyber-attack vectors on the Blockchain will be covered. You will also learn how to perform a Blockchain network security risk analysis and glean a complete understanding of Blockchain's inherent security features and risks. You will learn the key aspects around Blockchain and Bitcoin, including: What is a blockchain? What is Bitcoin? What are smart contracts? What is a cryptocurrency? What are digital tokens? How blockchain and Bitcoin are related and why it is so important to know the relationship. Some common misconceptions about blockchain and Bitcoin. R3 Corda Blockchain is an enterprise blockchain distributed ledger. A blockchain is a tamper-evident, shared digital ledger that records transactions in a public or private peer-to-peer network. Distributed to all member nodes in the network, the ledger permanently records, in a sequential chain of cryptographic hash-linked blocks, the history of asset exchanges that take place between the peers in the network. This course has been designed for technical architects, pre sales architects, developers and project managers who must make technical decisions about distributed architectures and development platform  

    Read more...

  • Google Cloud Platform Assoc. Cloud Engineer Bootcamp

    Google Cloud Platform Assoc. Cloud Engineer Bootcamp

    SGD $29.00

    Course Description

    During the course I will provide insight into the GCP Cloud Engineer exam and walk thru main exercises around managing a GCP Cloud. We will be going thru demos, reviewing content and providing you the top 10 things to remember before taking the exam. An Associate Cloud Engineer deploys applications, monitors operations, and manages enterprise solutions. This individual is able to use Google Cloud Console and the command-line interface to perform common platform-based tasks to maintain one or more deployed solutions that leverage Google-managed or self-managed services on Google Cloud.

    Read more...

  • Data Security and Privacy Training

    Data Security and Privacy Training

    SGD $299.00

    Course Description

    Did you know the number of data records compromised in publicly disclosed data breaches surpassed 2.5 billion in 2017. And as we all know, Facebook announced a data breach in 2018, where 87 million user accounts were compromised Our data is being compromised more than ever. Training all employees on how to protect themselves against attacks is one of the most effective ways to protect your organization. Course Objectives The objective of this training is to ensure that all your employees can clearly Identify, Mitigate and Report any potential cyber threats to your organization. Training Approach This training offers a fresh approach by presenting engaging content in a scenario-based format. This training uses micro-learning methodology to ensure learners aren’t overwhelmed with information. Throughout the course, the learner will take interactive quizzes and assessments to test their readiness. The training is available on-demand so learners can take at their own pace or part of a designated employee training program. Who’s this for? This compliance training is designed for all employee role types from office administration to CXO. This course will cover the following topics: Course Topics What is Information Security What are Threats How to Practice Information Security at Work Email Safety and Safe Online Browsing Implementing a Security Policy

    Read more...


Content

Security Fundamentals

+

Security Fundamentals

Introduction to Security Part 1

What is Information Security? Part 1

What is Information Security? Part 2

Understanding the Importance of Information Security Part 1

Understanding the Importance of Information Security Part 2

Understanding the Importance of Information Security Part 4

Attacks and Defenses

Information Security Careers and the Security+ Certification

Understanding the Importance of Information Security Part 3

Systems Threats and Risks

+

Software-based Attacks Part 1

Software-based Attacks Part 2

Software-based Attacks Part 3

Software-based Attacks Part 4

Software-based Attacks Part 5

Hardware-based Attacks

Attacks on Virtual Systems Part 1

Attacks on Virtual Systems Part 2

Protecting Systems

+

Protecting Systems Overview

Hardening the Operating System Part 1

Hardening the Operating System Part 2

Hardening the Operating System Part 3

Hardening the Operating System Part 4

Preventing Attacks that Target the Web Browser Part 1

Preventing Attacks that Target the Web Browser Part 2

Preventing Attacks that Target the Web Browser Part 3

Preventing Attacks that Target the Web Browser Part 4

Preventing Attacks that Target the Web Browser Part 5

Preventing Attacks that Target the Web Browser Part 6

Network Defenses

+

Network Vulnerabilities Part 1

Network Vulnerabilities Part 2

Categories of Attacks Part 1

Categories of Attacks Part 2

Methods of Network Attacks Part 1

Methods of Network Attacks Part 2

Methods of Network Attacks Part 3

Other Attacks and Frauds

Network Security

+

Crafting a Secure Network Part 1

Crafting a Secure Network Part 2

Crafting a Secure Network Part 3

Applying Network Security Devices Part 1

Applying Network Security Devices Part 2

Applying Network Security Devices Part 3

Applying Network Security Devices Part 4

Wireless Network Security

+

IEEE 802.11 Wireless Security Protections Part 1

IEEE 802.11 Wireless Security Protections Part 2

Vulnerabilities of IEEE 802.11 Security

Personal Wireless Security

Enterprise Wireless Security

Access Control Fundamentals

+

What is Access Control Part 1

What is Access Control Part 2

Logical Access Control Methods Part 1

Logical Access Control Methods Part 2

Physical Access Control Part 1

Physical Access Control Part 2

Authentication

+

Definition of Authentication

Authentication Credentials Part 1

Authentication Credentials Part 2

Authentication Models

Authentication Servers

Extended Authentication Protocols (EAP)

Remote Authentication and Security

Performing Vulnerability Assessments

+

Performing Vulnerability Assessments Part 1

Performing Vulnerability Assessments Part 2

Performing Vulnerability Assessments Part 3

Performing Vulnerability Assessments Part 4

Performing Vulnerability Assessments Part 5

Performing Vulnerability Assessments Part 6

Performing Vulnerability Assessments Part 7

Conducting Security Audits

+

Privilege Auditing Part 1

Privilege Auditing Part 2

Usage Auditing

Monitoring Methodologies and Tools

Basic Cryptography

+

Basic Cryptography Part 1

Basic Cryptography Part 2

Cryptographic Algorithms

Hashing Algorithms Part 1

Hashing Algorithms Part 2

Hashing Algorithms Part 3

Hashing Algorithms Part 4

Symmetric Cryptographic Algorithms Part 1

Symmetric Cryptographic Algorithms Part 2

Asymmetric Cryptographic Algorithms

Using Cryptography on Files and Disks

Applying Cryptography

+

Digital Certificates Part 1

Digital Certificates Part 2

Digital Certificates Part 3

Public Key Infrastructure (PKI) Part 2

Key Management

Cryptographic Transport Protocols Part 1

Cryptographic Transport Protocols Part 2

Public Key Infrastructure (PKI) Part 1

Business Continuity

+

Redundancy Planning Part 2

Disaster Recovery Procedures Part 1

Disaster Recovery Procedures Part 2

Incident Response Procedures

Environmental Controls Part 1

Environmental Controls Part 2

Redundancy Planning Part 1

Security Policies and Training

+

Organizational Security Policies Part 1

Organizational Security Policies Part 2

Types of Security Policies Part 1

Types of Security Policies Part 2

Types of Security Policies Part 3

Education and Training

SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.