Certification at Your Fingertips - CompTIA SY0-401: Security+


Certification at Your Fingertips - CompTIA SY0-401: Security+, Singapore elarning online course

Course Description

This CompTIA Security+ course covers the most important foundational principles for securing a network, and managing risk. Such topics as Access control, Identity management and cryptography are the few topics covered in this course. Security concerns associated with cloud computing, BYOD and SCADA are addressed in this SY0-401 course. Prepare yourself fully with the right skills and knowledge with this course.

Be fully prepared for your certifications exams!

- Learn of the examination outline before sitting for your certification
- Know and understand the topics that may be covered in your examinations
- Learn and understand the chapters for each tailored certification
- Go through past questions to have a feel of the examinations


Course Objectives

1. Understand about Network Security
2. Know what is Compliance and Operations Security
3. Understand about Threats And Vulnerabilities
4. Understand about Application
5. Know about Data and Host Security
6. Know what is Cyrptography


Related Courses

  • Advanced Solutions of Microsoft SharePoint Server 2013 (70-332)

    Advanced Solutions of Microsoft SharePoint Server 2013 (70-332)

    SGD $49.00

    Course Description

    The Microsoft 70-332 exam is one of two SharePoint-specific exams required for the Microsoft Certified Solutions Expert: SharePoint Certification. This VTC course moves deeper into SharePoint administration and takes on topics such as high availability, advanced service application configuration, and connecting to external data sources from within SharePoint. Upon completion of this course you should have the necessary skills to administer advanced aspects of the Microsoft SharePoint 2013 platform. Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinations

    Read more...

  • 1st step towards certification: CISSP-ISSEP

    1st step towards certification: CISSP-ISSEP

    SGD $58.00

    Course Description

    In this VTC course, veteran instructor Bobby Rogers prepares you for the ISC2 Information System Security Engineering Professional (ISSEP) certification exam. Designed for persons already holding a current CISSP certification, the course will cover all 4 domains of the ISSEP Common Body of Knowledge (CBK): Information System Security Engineering, Certification and Accreditation, Technical Management, and US Government IA Publications. This course covers the new March 2012 objectives. Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinationsThis course is SkillsFuture Credit Eligible.

    Read more...

  • Administering Windows Server 2012 (70-411)

    Administering Windows Server 2012 (70-411)

    SGD $45.00

    Course Description

    Microsoft's server operating systems have powered business for over 20 years. In the beginning, it was all about connectivity in the local area network, now it's all about connectivity in the cloud. Microsoft calls Server 2012 ’The Cloud OS’ and is branding it as being ’built from the cloud up.’ Their goal with this product is to deliver the power of many servers with the simplicity of one. Achieving a Microsoft Certification on this product is an excellent career move. In this VTC course, Mark Long brings 20+ years of experience with Microsoft technologies along to help you understand the features and functionalities of Windows Server 2012 from the standpoint of preparing for certification exam 70-411 Administering Microsoft Windows Server 2012.  Be fully prepared for your certifications exams! - Learn of the examination outline for your certification  - Know and understand the topics that may be covered in your examinations - Learn and understand the chapters for each tailored certification  - Go through past questions to have a feel of the examinations This course is SkillsFuture Credit Eligible.

    Read more...


Content

CompTIA SY0-401 or JK0-018: Security+

+
Content
  • Module 1: Networking Terminology
    • 1.1 Course Introduction
    • 1.2 Network Devices Part 1
    • 1.3 Network Devices Part 2
    • 1.4 Networking Cabling
    • 1.5 Networking Addressing Part 1
    • 1.6 Networking Addressing Part 2
    • 1.7 Networking Addressing Part 3
    • 1.8 Networking Addressing Part 4
  • Module 2: Locking Down Or Network
    • 2.1 Firewalls Part 1
    • 2.2 Firewalls Part 2
    • 2.3 Intrusion Detection Systems
    • 2.4 Network Design
    • 2.5 Securing Devices
  • Module 3: Wireless
    • 3.1 Wireless Basics Part 1
    • 3.2 Wireless Basics Part 2
    • 3.3 Securing Wireless Part 1
    • 3.4 Securing Wireless Part 2
    • 3.5 Configuring Wireless, Bluetooth And Infrared
  • Module 4: Intro To Security Terminology
    • 4.1 Goals Of Information Security
    • 4.2 Authentication And Authorization
    • 4.3 Security Principles And Terminology Part 1
    • 4.4 Security Principles And Terminology Part 2
  • Module 5: Policies And Standards
    • 5.1 Introduction To Security Policies
    • 5.2 Looking At Some Security Policies Part 1
    • 5.3 Looking At Some Security Policies Part 2
    • 5.4 Looking At Some Security Policies Part 3
    • 5.5 Human Resource Policies Part 1
    • 5.6 Human Resource Policies Part 2
    • 5.7 User Education And Awareness Part 1
    • 5.8 User Education And Awareness Part 2
  • Module 6: Physical Security??
    • 6.1 Business Location
    • 6.2 Physical Access Controls
    • 6.3 Implementing Environmental Controls
  • Module 7: Risk Analysis
    • 7.1 Introduction Risk Analysis Part 1
    • 7.2 Introduction Risk Analysis Part 2
    • 7.3 Types Of Risk Analysis
    • 7.4 Risk Mitigation Strategies
  • Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
    • 8.1 Business Continuity
    • 8.2 Business Impact Analysis
    • 8.3 Disaster Recovery
    • 8.4 Backup And Restore
  • Module 9: Introduction To Computer Forensics
    • 9.1 Working With Evidence
    • 9.2 Collecting Digital Evidence Part 1
    • 9.3 Collecting Digital Evidence Part 2
    • 9.4 Looking At Incident Response
  • Module 10: Types Of Attacks
    • 10.1 Social Engineering
    • 10.2 Network Attacks Part 1
    • 10.3 Network Attacks Part 2
    • 10.4 Password And Application Attacks
  • Module 11: System Security Threats
    • 11.1 Identifying Physical Threats
    • 11.2 Malicious Software Part 1
    • 11.3 Demo
    • 11.4 Malicious Software Part 2
    • 11.5 Threats Against Hardware
  • Module 12: Security Assessments
    • 12.1 Types Of Assessments
    • 12.2 Penetration Testing
  • Module 13: Monitoring And Auditing
    • 13.1 Introduction To Monitoring And Monitoring Tools
    • 13.2 Implementing Logging And Auditing
  • Module 14: Authentication
    • 14.1 Authentication Models
    • 14.2 Authentication Protocols
    • 14.3 Implementing Authentication
  • Module 15: Access Control
    • 15.1 Introducing Access Control
    • 15.2 Access Control Models
    • 15.3 Implementing Access Control Part 1
    • 15.4 Implementing Access Control Part 2
  • Module 16: Mitigating Security Threats
    • 16.1 Operating System Hardening
    • 16.2 System Hardening Procedures
    • 16.3 Application Security
    • 16.4 Server Hardening Best Practices Part 1
    • 16.5 Server Hardening Best Practices Part 2
  • Module 17: Implementing System Security
    • 17.1 Implementing Personal Firewalls And HIDS
    • 17.2 Protecting Against Malware
    • 17.3 Device Security And Data Security Part 1
    • 17.4 Device Security And Data Security Part 2
    • 17.5 Understanding Virtualization And Cloud Computing
  • Module 18: Cryptography
    • 18.1 Introduction To Cryptography
    • 18.2 Symmetric And Asymmetric Encryption
    • 18.3 Understanding Hashing And Encryption Uses
  • Module 19: Public Key Infrastructure
    • 19.1 Intro To PKI
    • 19.2 Managing And Implementing PKI
    • 19.3 Course Conclusion
SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.