Certification at Your Fingertips - CompTIA SY0-401: Security+


Certification at Your Fingertips - CompTIA SY0-401: Security+, Singapore elarning online course

Course Description

This CompTIA Security+ course covers the most important foundational principles for securing a network, and managing risk. Such topics as Access control, Identity management and cryptography are the few topics covered in this course. Security concerns associated with cloud computing, BYOD and SCADA are addressed in this SY0-401 course. Prepare yourself fully with the right skills and knowledge with this course.

Be fully prepared for your certifications exams!

- Learn of the examination outline before sitting for your certification
- Know and understand the topics that may be covered in your examinations
- Learn and understand the chapters for each tailored certification
- Go through past questions to have a feel of the examinations


Course Objectives

1. Understand about Network Security
2. Know what is Compliance and Operations Security
3. Understand about Threats And Vulnerabilities
4. Understand about Application
5. Know about Data and Host Security
6. Know what is Cyrptography


Related Courses

  • Oracle database 11G OCA 1Z0-051 and 1Z0-052: Installation and Administration

    Oracle database 11G OCA 1Z0-051 and 1Z0-052: Installation and Administration

    SGD $299.00

    Course Description

    The Oracle Database 11g Administrator Certification (OCA 11g) ensures that database professionals have a strong foundation and expertise in the industry's most advanced database management system, Oracle 11g. Oracle 11g training course will teach students how to install and maintain an Oracle database, how to create an operational database and properly manage the various structures in an effective and efficient manner including performance monitoring, database security, user management, and backup/recovery techniques. Students will also learn skills required for working with SQL, including how to use the advanced features of SQL in order to query and manipulate data within the database, control privileges at the object and system level, and use advanced querying and reporting techniques. After completing Oracle OCA 11g course, students will gain a conceptual understanding of the Oracle database architecture and how its components work and interact with one another. Oracle databases are the one of the most popular database platforms in the world. Increase your skills and marketability today by achieving Oracle certification! Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand the theory aspects of the examination

    Read more...

  • 1st step to certification: Red Hat Certified System Administrator (RHCSA) - EX200

    1st step to certification: Red Hat Certified System Administrator (RHCSA) - EX200

    SGD $45.00

    Course Description

    This VTC course will provide students with the knowledge and skills to take and pass the Red Hat Certified System Administrator exam. This course focuses on deploying, administrating, and securing a Red Hat Enterprise Linux 6 system. RHCE author, Kenneth Armstrong, teaches the Red Hat exam objectives while providing examples and real world scenarios essential for an exam candidate to succeed. Get your exam preparation under way today!Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinationsThis course is SkillsFuture Credit Eligible.

    Read more...

  • 1st step to certification: Troubleshooting and Maintaining Cisco IP Networks (642-832 TSHOOT)

    1st step to certification: Troubleshooting and Maintaining Cisco IP Networks (642-832 TSHOOT)

    SGD $45.00

    Course Description

    The Cisco 642-832 exam is one of the three required exams for the Cisco CCNP Certification. Passing this exam in conjunction with the ROUTE and SWITCH exams will earn you the CCNP (Cisco Certified Network Professional) certification, which is an excellent validation that you are knowledgable about the most current Cisco software and best practices. This course will teach you the basics of troubleshooting and walk you through several scenarios to put these methods to the test. Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinationsThis course is SkillsFuture Credit Eligible.

    Read more...


Content

CompTIA SY0-401 or JK0-018: Security+

+
Content
  • Module 1: Networking Terminology
    • 1.1 Course Introduction
    • 1.2 Network Devices Part 1
    • 1.3 Network Devices Part 2
    • 1.4 Networking Cabling
    • 1.5 Networking Addressing Part 1
    • 1.6 Networking Addressing Part 2
    • 1.7 Networking Addressing Part 3
    • 1.8 Networking Addressing Part 4
  • Module 2: Locking Down Or Network
    • 2.1 Firewalls Part 1
    • 2.2 Firewalls Part 2
    • 2.3 Intrusion Detection Systems
    • 2.4 Network Design
    • 2.5 Securing Devices
  • Module 3: Wireless
    • 3.1 Wireless Basics Part 1
    • 3.2 Wireless Basics Part 2
    • 3.3 Securing Wireless Part 1
    • 3.4 Securing Wireless Part 2
    • 3.5 Configuring Wireless, Bluetooth And Infrared
  • Module 4: Intro To Security Terminology
    • 4.1 Goals Of Information Security
    • 4.2 Authentication And Authorization
    • 4.3 Security Principles And Terminology Part 1
    • 4.4 Security Principles And Terminology Part 2
  • Module 5: Policies And Standards
    • 5.1 Introduction To Security Policies
    • 5.2 Looking At Some Security Policies Part 1
    • 5.3 Looking At Some Security Policies Part 2
    • 5.4 Looking At Some Security Policies Part 3
    • 5.5 Human Resource Policies Part 1
    • 5.6 Human Resource Policies Part 2
    • 5.7 User Education And Awareness Part 1
    • 5.8 User Education And Awareness Part 2
  • Module 6: Physical Security??
    • 6.1 Business Location
    • 6.2 Physical Access Controls
    • 6.3 Implementing Environmental Controls
  • Module 7: Risk Analysis
    • 7.1 Introduction Risk Analysis Part 1
    • 7.2 Introduction Risk Analysis Part 2
    • 7.3 Types Of Risk Analysis
    • 7.4 Risk Mitigation Strategies
  • Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
    • 8.1 Business Continuity
    • 8.2 Business Impact Analysis
    • 8.3 Disaster Recovery
    • 8.4 Backup And Restore
  • Module 9: Introduction To Computer Forensics
    • 9.1 Working With Evidence
    • 9.2 Collecting Digital Evidence Part 1
    • 9.3 Collecting Digital Evidence Part 2
    • 9.4 Looking At Incident Response
  • Module 10: Types Of Attacks
    • 10.1 Social Engineering
    • 10.2 Network Attacks Part 1
    • 10.3 Network Attacks Part 2
    • 10.4 Password And Application Attacks
  • Module 11: System Security Threats
    • 11.1 Identifying Physical Threats
    • 11.2 Malicious Software Part 1
    • 11.3 Demo
    • 11.4 Malicious Software Part 2
    • 11.5 Threats Against Hardware
  • Module 12: Security Assessments
    • 12.1 Types Of Assessments
    • 12.2 Penetration Testing
  • Module 13: Monitoring And Auditing
    • 13.1 Introduction To Monitoring And Monitoring Tools
    • 13.2 Implementing Logging And Auditing
  • Module 14: Authentication
    • 14.1 Authentication Models
    • 14.2 Authentication Protocols
    • 14.3 Implementing Authentication
  • Module 15: Access Control
    • 15.1 Introducing Access Control
    • 15.2 Access Control Models
    • 15.3 Implementing Access Control Part 1
    • 15.4 Implementing Access Control Part 2
  • Module 16: Mitigating Security Threats
    • 16.1 Operating System Hardening
    • 16.2 System Hardening Procedures
    • 16.3 Application Security
    • 16.4 Server Hardening Best Practices Part 1
    • 16.5 Server Hardening Best Practices Part 2
  • Module 17: Implementing System Security
    • 17.1 Implementing Personal Firewalls And HIDS
    • 17.2 Protecting Against Malware
    • 17.3 Device Security And Data Security Part 1
    • 17.4 Device Security And Data Security Part 2
    • 17.5 Understanding Virtualization And Cloud Computing
  • Module 18: Cryptography
    • 18.1 Introduction To Cryptography
    • 18.2 Symmetric And Asymmetric Encryption
    • 18.3 Understanding Hashing And Encryption Uses
  • Module 19: Public Key Infrastructure
    • 19.1 Intro To PKI
    • 19.2 Managing And Implementing PKI
    • 19.3 Course Conclusion
SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.