Certification at Your Fingertips - CompTIA SY0-401: Security+


Certification at Your Fingertips - CompTIA SY0-401: Security+, Singapore elarning online course

Course Description

This CompTIA Security+ course covers the most important foundational principles for securing a network, and managing risk. Such topics as Access control, Identity management and cryptography are the few topics covered in this course. Security concerns associated with cloud computing, BYOD and SCADA are addressed in this SY0-401 course. Prepare yourself fully with the right skills and knowledge with this course.

Be fully prepared for your certifications exams!

- Learn of the examination outline before sitting for your certification
- Know and understand the topics that may be covered in your examinations
- Learn and understand the chapters for each tailored certification
- Go through past questions to have a feel of the examinations


Course Objectives

1. Understand about Network Security
2. Know what is Compliance and Operations Security
3. Understand about Threats And Vulnerabilities
4. Understand about Application
5. Know about Data and Host Security
6. Know what is Cyrptography


Related Courses

  • 1st step to certification: Microsoft SharePoint 2010 (70-573)

    1st step to certification: Microsoft SharePoint 2010 (70-573)

    SGD $49.00

    Course Description

    Recent studies reveal that as many as 53% of businesses use Microsoft SharePoint Foundation and SharePoint Server in their day-to-day operations and that number is steadily growing. With SharePoint 2010, you and your development team can build custom applications and components to rapidly respond to business needs. With familiar tools, it's easy to create Web Parts, external content types, and workflow activities for use in SharePoint solutions. A full set of extensibility APIs also lets you customize SharePoint implementations based on business requirements. In this VTC course, author Mark Long teaches you about SharePoint 2010 development with a focus on helping you prepare for Microsoft's SharePoint Application Development 70-573 certification exam. Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinationsThis course is SkillsFuture Credit Eligible.

    Read more...

  • Certification at Your Fingertips - Microsoft 70-487: Developing Windows Azure and Web Services

    Certification at Your Fingertips - Microsoft 70-487: Developing Windows Azure and Web Services

    SGD $299.00

    Course Description

    This course will help students prepare for Developing Microsoft Azure and Web Services certification. For developers with 3 to 5 years of experience, advance your capabilities and get certified with this certification. This course will cover topics such as Accessing Data, Designing And Implementing WCF Services and Deploying Web Applications And Services. With this certification preparation course, sharpen your skills and knowledge needed to sit for the certification examination.Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinations

    Read more...

  • C# (Exam 70-483)

    C# (Exam 70-483)

    SGD $45.00

    Course Description

    C# is Microsoft's flagship programming language and is one of the most popular in the world. C# is an important part of Microsoft's .NET Framework whether you are developing desktop applications, web pages, or Windows 8 store apps. C# programming skills continue to be in strong demand in the workplace and it is one of the foundations for Microsoft's MCSD: Windows Store Apps certification. In this course, Mark Long helps you get prepared for the Programming in C# certification exam 70-483 by covering lots of C# functionalities and showing you how they work in code examples that you can follow along and code yourself.Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinationsThis course is SkillsFuture Credit Eligible.

    Read more...


Content

CompTIA SY0-401 or JK0-018: Security+

+
Content
  • Module 1: Networking Terminology
    • 1.1 Course Introduction
    • 1.2 Network Devices Part 1
    • 1.3 Network Devices Part 2
    • 1.4 Networking Cabling
    • 1.5 Networking Addressing Part 1
    • 1.6 Networking Addressing Part 2
    • 1.7 Networking Addressing Part 3
    • 1.8 Networking Addressing Part 4
  • Module 2: Locking Down Or Network
    • 2.1 Firewalls Part 1
    • 2.2 Firewalls Part 2
    • 2.3 Intrusion Detection Systems
    • 2.4 Network Design
    • 2.5 Securing Devices
  • Module 3: Wireless
    • 3.1 Wireless Basics Part 1
    • 3.2 Wireless Basics Part 2
    • 3.3 Securing Wireless Part 1
    • 3.4 Securing Wireless Part 2
    • 3.5 Configuring Wireless, Bluetooth And Infrared
  • Module 4: Intro To Security Terminology
    • 4.1 Goals Of Information Security
    • 4.2 Authentication And Authorization
    • 4.3 Security Principles And Terminology Part 1
    • 4.4 Security Principles And Terminology Part 2
  • Module 5: Policies And Standards
    • 5.1 Introduction To Security Policies
    • 5.2 Looking At Some Security Policies Part 1
    • 5.3 Looking At Some Security Policies Part 2
    • 5.4 Looking At Some Security Policies Part 3
    • 5.5 Human Resource Policies Part 1
    • 5.6 Human Resource Policies Part 2
    • 5.7 User Education And Awareness Part 1
    • 5.8 User Education And Awareness Part 2
  • Module 6: Physical Security??
    • 6.1 Business Location
    • 6.2 Physical Access Controls
    • 6.3 Implementing Environmental Controls
  • Module 7: Risk Analysis
    • 7.1 Introduction Risk Analysis Part 1
    • 7.2 Introduction Risk Analysis Part 2
    • 7.3 Types Of Risk Analysis
    • 7.4 Risk Mitigation Strategies
  • Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
    • 8.1 Business Continuity
    • 8.2 Business Impact Analysis
    • 8.3 Disaster Recovery
    • 8.4 Backup And Restore
  • Module 9: Introduction To Computer Forensics
    • 9.1 Working With Evidence
    • 9.2 Collecting Digital Evidence Part 1
    • 9.3 Collecting Digital Evidence Part 2
    • 9.4 Looking At Incident Response
  • Module 10: Types Of Attacks
    • 10.1 Social Engineering
    • 10.2 Network Attacks Part 1
    • 10.3 Network Attacks Part 2
    • 10.4 Password And Application Attacks
  • Module 11: System Security Threats
    • 11.1 Identifying Physical Threats
    • 11.2 Malicious Software Part 1
    • 11.3 Demo
    • 11.4 Malicious Software Part 2
    • 11.5 Threats Against Hardware
  • Module 12: Security Assessments
    • 12.1 Types Of Assessments
    • 12.2 Penetration Testing
  • Module 13: Monitoring And Auditing
    • 13.1 Introduction To Monitoring And Monitoring Tools
    • 13.2 Implementing Logging And Auditing
  • Module 14: Authentication
    • 14.1 Authentication Models
    • 14.2 Authentication Protocols
    • 14.3 Implementing Authentication
  • Module 15: Access Control
    • 15.1 Introducing Access Control
    • 15.2 Access Control Models
    • 15.3 Implementing Access Control Part 1
    • 15.4 Implementing Access Control Part 2
  • Module 16: Mitigating Security Threats
    • 16.1 Operating System Hardening
    • 16.2 System Hardening Procedures
    • 16.3 Application Security
    • 16.4 Server Hardening Best Practices Part 1
    • 16.5 Server Hardening Best Practices Part 2
  • Module 17: Implementing System Security
    • 17.1 Implementing Personal Firewalls And HIDS
    • 17.2 Protecting Against Malware
    • 17.3 Device Security And Data Security Part 1
    • 17.4 Device Security And Data Security Part 2
    • 17.5 Understanding Virtualization And Cloud Computing
  • Module 18: Cryptography
    • 18.1 Introduction To Cryptography
    • 18.2 Symmetric And Asymmetric Encryption
    • 18.3 Understanding Hashing And Encryption Uses
  • Module 19: Public Key Infrastructure
    • 19.1 Intro To PKI
    • 19.2 Managing And Implementing PKI
    • 19.3 Course Conclusion
SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.