Notice : You are now accessing LOOP SIT SERVER. This is not meant for public access. For the actual LOOP Website please visit www.LOOP.sg instead


Certification at Your Fingertips - CompTIA SY0-401 or JK0-018: Security+


Certification at Your Fingertips - CompTIA SY0-401 or JK0-018: Security+, Singapore elarning online course

Course Description

Practice Lab
This course comes with a Remote Practice Environment, a virtual remote environment; where you are able to practically apply the skills you have learned on the respective server, systems and networks. With this platform, get one step ahead in your preparation for your certification exams!

Whether it’s Cisco, Microsoft or VMware, our Practice Lab unifies access to all of these vendors through a web browser interface. Pre-configured hardware layouts with accompanying lab guides for fast, convenient access to gain hands on experience. With step-by-step instructions covering thousands of practical tasks across Cisco, Microsoft, VMware and CompTIA exam titles, the Practice Lab makes studying for an exam or learning new technologies an engaging experience.

What this course prepares you for:

The Security+ course covers the most important foundational principles for securing a network and managing risk. Access control, identity management and cryptography are important topics on the exam, as well as selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities. Security concerns associated with cloud computing, BYOD and SCADA are addressed in the SY0-401 certification exam.

Ace your certification examination with this preparation course!

- Learn of the examination outline before sitting for your certification
- Know and understand the topics that may be covered in your examinations
- Understand both practical and theory aspects of the examination
- Apply the practical skills through the Remote Practice Environment


Course Objectives

1. Understand about Network Security
2. Know what is Compliance and Operations Security
3. Understand about Threats And Vulnerabilities
4. Understand about Application
5. Know about Data and Host Security
6. Know what is Cyrptography


Related Courses

  • Certification at Your Fingertips - Microsoft 70-488: Developing Microsoft SharePoint Server 2013 Core Solutions

    Certification at Your Fingertips - Microsoft 70-488: Developing Microsoft SharePoint Server 2013 Core Solutions

    SGD $299.00

    Course Description

    Prepare for the Microsoft 70-488: Developing Microsoft SharePoint Server 2013 Core Solutions certification examination. In this course, it will cover topics such as Working With Objects, List, And Libraries, Developing And Managing Apps and Customizing SharePoint Interfaces. These topics will prepare you and get you familiarized with the exam structure and to fully understand the topics thoroughly as well. With this certification preparation course, sharpen your skills and knowledge needed to sit for the certification exam.Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinations

    Read more...

  • CompTIA LX0-101 & LX0-102: CompTIA Linux+

    CompTIA LX0-101 & LX0-102: CompTIA Linux+

    SGD $299.00

    Course Description

    LPIC-1 is a junior level certification for Linux administrators. Students should be able to perform maintenance tasks with the command line, install and configure a workstation, and be able to configure a basic network. Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand theory aspects of the examination

    Read more...

  • Certification at Your Fingertips - Microsoft 70 -687: Configuring Windows 8

    Certification at Your Fingertips - Microsoft 70 -687: Configuring Windows 8

    SGD $589.00

    Course Description

    Practice Lab  This course comes with a Remote Practice Environment, a virtual remote environment; where you are able to practically apply the skills you have learned on the respective server, systems and networks. With this platform, get one step ahead in your preparation for your certification exams! Whether it’s Cisco, Microsoft or VMware, our Practice Lab unifies access to all of these vendors through a web browser interface. Pre-configured hardware layouts with accompanying lab guides for fast, convenient access to gain hands on experience. With step-by-step instructions covering thousands of practical tasks across Cisco, Microsoft, VMware and CompTIA exam titles, the Practice Lab makes studying for an exam or learning new technologies an engaging experience. What this course prepares you for: This course is a preparation for the Microsoft 70-687 Configuring Windows 8 certification exam. Candidates for this exam are students seeking to be IT professionals who configure or support Windows 8 computers, devices, users, and associated network and security resources. The networks with which these professionals typically work are configured as domain-based or peer-to-peer environments with access to the Internet and cloud services. The IT professional could be a consultant, a full-time desktop support technician, or an IT generalist who administers Windows 8–based computers and devices as a portion of their broader technical responsibilities.  Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand both practical and theory aspects of the examination - Apply the practical skills through the Remote Practice Environment This course is SkillsFuture Credit Eligible.

    Read more...


Content

CompTIA SY0-401: Security+

+
Simulated Practice Environment
Content
  • Module 1: Networking Terminology
    • 1.1 Course Introduction
    • 1.2 Network Devices Part 1
    • 1.3 Network Devices Part 2
    • 1.4 Networking Cabling
    • 1.5 Networking Addressing Part 1
    • 1.6 Networking Addressing Part 2
    • 1.7 Networking Addressing Part 3
    • 1.8 Networking Addressing Part 4
  • Module 2: Locking Down Or Network
    • 2.1 Firewalls Part 1
    • 2.2 Firewalls Part 2
    • 2.3 Intrusion Detection Systems
    • 2.4 Network Design
    • 2.5 Securing Devices
  • Module 3: Wireless
    • 3.1 Wireless Basics Part 1
    • 3.2 Wireless Basics Part 2
    • 3.3 Securing Wireless Part 1
    • 3.4 Securing Wireless Part 2
    • 3.5 Configuring Wireless, Bluetooth And Infrared
  • Module 4: Intro To Security Terminology
    • 4.1 Goals Of Information Security
    • 4.2 Authentication And Authorization
    • 4.3 Security Principles And Terminology Part 1
    • 4.4 Security Principles And Terminology Part 2
  • Module 5: Policies And Standards
    • 5.1 Introduction To Security Policies
    • 5.2 Looking At Some Security Policies Part 1
    • 5.3 Looking At Some Security Policies Part 2
    • 5.4 Looking At Some Security Policies Part 3
    • 5.5 Human Resource Policies Part 1
    • 5.6 Human Resource Policies Part 2
    • 5.7 User Education And Awareness Part 1
    • 5.8 User Education And Awareness Part 2
  • Module 6: Physical Security??
    • 6.1 Business Location
    • 6.2 Physical Access Controls
    • 6.3 Implementing Environmental Controls
  • Module 7: Risk Analysis
    • 7.1 Introduction Risk Analysis Part 1
    • 7.2 Introduction Risk Analysis Part 2
    • 7.3 Types Of Risk Analysis
    • 7.4 Risk Mitigation Strategies
  • Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
    • 8.1 Business Continuity
    • 8.2 Business Impact Analysis
    • 8.3 Disaster Recovery
    • 8.4 Backup And Restore
  • Module 9: Introduction To Computer Forensics
    • 9.1 Working With Evidence
    • 9.2 Collecting Digital Evidence Part 1
    • 9.3 Collecting Digital Evidence Part 2
    • 9.4 Looking At Incident Response
  • Module 10: Types Of Attacks
    • 10.1 Social Engineering
    • 10.2 Network Attacks Part 1
    • 10.3 Network Attacks Part 2
    • 10.4 Password And Application Attacks
  • Module 11: System Security Threats
    • 11.1 Identifying Physical Threats
    • 11.2 Malicious Software Part 1
    • 11.3 Demo
    • 11.4 Malicious Software Part 2
    • 11.5 Threats Against Hardware
  • Module 12: Security Assessments
    • 12.1 Types Of Assessments
    • 12.2 Penetration Testing
  • Module 13: Monitoring And Auditing
    • 13.1 Introduction To Monitoring And Monitoring Tools
    • 13.2 Implementing Logging And Auditing
  • Module 14: Authentication
    • 14.1 Authentication Models
    • 14.2 Authentication Protocols
    • 14.3 Implementing Authentication
  • Module 15: Access Control
    • 15.1 Introducing Access Control
    • 15.2 Access Control Models
    • 15.3 Implementing Access Control Part 1
    • 15.4 Implementing Access Control Part 2
  • Module 16: Mitigating Security Threats
    • 16.1 Operating System Hardening
    • 16.2 System Hardening Procedures
    • 16.3 Application Security
    • 16.4 Server Hardening Best Practices Part 1
    • 16.5 Server Hardening Best Practices Part 2
  • Module 17: Implementing System Security
    • 17.1 Implementing Personal Firewalls And HIDS
    • 17.2 Protecting Against Malware
    • 17.3 Device Security And Data Security Part 1
    • 17.4 Device Security And Data Security Part 2
    • 17.5 Understanding Virtualization And Cloud Computing
  • Module 18: Cryptography
    • 18.1 Introduction To Cryptography
    • 18.2 Symmetric And Asymmetric Encryption
    • 18.3 Understanding Hashing And Encryption Uses
  • Module 19: Public Key Infrastructure
    • 19.1 Intro To PKI
    • 19.2 Managing And Implementing PKI
    • 19.3 Course Conclusion

SGD $589.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.