Notice : You are now accessing LOOP SIT SERVER. This is not meant for public access. For the actual LOOP Website please visit www.LOOP.sg instead


1st step to certification: CompTIA Security+ Certification (SY0-401)


  • 1st step to certification: CompTIA Security+ Certification (SY0-401), Singapore SKillsFuture elarning online course
  • 1st step to certification: CompTIA Security+ Certification (SY0-401), Singapore SKillsFuture elarning online course
  • 1st step to certification: CompTIA Security+ Certification (SY0-401), Singapore SKillsFuture elarning online course
  • 1st step to certification: CompTIA Security+ Certification (SY0-401), Singapore SKillsFuture elarning online course
  • 1st step to certification: CompTIA Security+ Certification (SY0-401), Singapore SKillsFuture elarning online course
  • 1st step to certification: CompTIA Security+ Certification (SY0-401), Singapore SKillsFuture elarning online course

Course Description

Network and computer security used to be a high proiority, now security has become an absolute necessity. Understanding the fundamentals of network and computer security is a must in today's environment. CompTIA's Security+ certification is recognized around the world as validation that you know about the fundamental network and computer security practices and actions as well as the technologies involved. Earning the Security+ certification will open doors in the Information Technology workplace. In this course, Mark Long goes step-by-step to help you understand the various technologies and techniques to help you prepare for the CompTIA Security+ SY0-401 exam. Mark has been working in Information Technology for over 25 years and has worked in data security in the corporate environment and brings real-world knowledge to help you get ready for this exam.

Be fully prepared for your certifications exams!

- Learn of the examination outline before sitting for your certification
- Know and understand the topics that may be covered in your examinations
- Learn and understand the chapters for each tailored certification
- Go through past questions to have a feel of the examinations

This course is SkillsFuture Credit Eligible.


Course Objectives

1. Know what to expect for your examination 
2. Understand the introduction to Computer Security Basics 
3. Know Network Designs, Protocols and Threats
4. Know about Access Controls
5. Understand about Securing Applications 
6. Be able to Monitor and Audit 
7. Know about OS Hardening 
8. Understand about Encryption 
9. Be able to perform Disaster Recovery 
10. Understand about Risk Assessment and Vulnerability


Related Courses

  • Certification at Your Fingertips - Microsoft 70-488: Developing Microsoft SharePoint Server 2013 Core Solutions

    Certification at Your Fingertips - Microsoft 70-488: Developing Microsoft SharePoint Server 2013 Core Solutions

    SGD $299.00

    Course Description

    Prepare for the Microsoft 70-488: Developing Microsoft SharePoint Server 2013 Core Solutions certification examination. In this course, it will cover topics such as Working With Objects, List, And Libraries, Developing And Managing Apps and Customizing SharePoint Interfaces. These topics will prepare you and get you familiarized with the exam structure and to fully understand the topics thoroughly as well. With this certification preparation course, sharpen your skills and knowledge needed to sit for the certification exam.Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinations

    Read more...

  • Certification at Your Fingertips - Microsoft 70-346: Managing Office 365 Identities and Requirements

    Certification at Your Fingertips - Microsoft 70-346: Managing Office 365 Identities and Requirements

    SGD $299.00

    Course Description

    This exam is designed for IT professionals who take part in evaluating, planning, deploying, and operating the Office 365 services, including its dependencies, requirements, and supporting technologies. Be fully prepared for your certifications exams! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Learn and understand the chapters for each tailored certification  - Go through past questions to have a feel of the examinations

    Read more...

  • Certified Scrum Master (CSM)

    Certified Scrum Master (CSM)

    SGD $299.00

    Course Description

    A Certified Scrum Master helps project teams properly use Scrum, increasing the likelihood of the project's overall success. CSMs understand Scrum values, practices, and applications and provide a level of knowledge and expertise above and beyond that of typical project managers. CSMs act as "servant leaders," helping the rest of the Scrum team work together and learn the Scrum framework.  Discover the new way of project management with SCRUM! - Learn about the benefits of applying SCRUM into your projects - Benefit from its unique iteration process for better productivity  - Understand the differences SCRUM and Agile  - Be one of the succesful organization to apply SCRUM into your organization

    Read more...


Content

Welcome/Intro

Preview Available

+

Welcome/Intro

Course Overview

Why Security+

About the Exam

Preview Available

+

What to Expect on the Exam

How to Prepare

How to Take the Exam

Computer Security Basics

+

Security Basics

Security Threats

Securing Computer Hardware

Securing Storage Devices

Security Removable Media

Securing Storage Devices Demo

Malicious Software pt. 1

Malicious Software pt. 2

Preventing Malicious Software

Understanding Physical Security

Hardware Disposal

Network Design

+

Network Security Basics

Understanding Firewalls

Firewall Operations

Network Address Translation

Switches

Routers

Network Security Devices

Understanding VLANs

Cloud Computing Basics

Cloud Computing Types

Security in the Cloud

Securing Servers

Network Protocols and Threats

+

Network Protocol Basics

Understanding Ports

Common Ports

Network Attacks pt. 1

Network Attacks pt. 2

Honeypots and Honeynets

Intrusion Detection Systems

NIDS and NIPS

Unified Threat Management

Access Control

+

Access Control Basics

Authentication and Authorization

Users, Groups, and Permissions

Authentication Services

Usernames and Passwords

File and Folder Permissions

Permissions Inheritance

Remote Authentication

Securing Applications

+

Application Security Basics

Application Attacks

Securing the Browser

Preventing Application Attacks

Monitoring and Auditing

+

Monitoring Basics

Monitoring Tools

Network Monitor

Auditing Basics

OS Hardening

+

What is System Hardening?

Network Device Hardening

Understanding Virtualization

Virtual Machine Security

Encryption

+

Cryptography and Encryption

Symmetric vs. Asymmetric

Understanding Hashing pt. 1

Understanding Hashing pt. 2

Public Key Infrastructure pt. 1

Public Key Infrastructure pt. 2

Disaster Recovery

+

Disaster Recovery Basics

Redundancy Basics

High Availability

Redundancy Planning

Fault Tolerance

RAID Levels pt. 1

RAID Levels pt. 2

Risk Assessment and Vulnerability

+

Dealing with Security Risks pt. 1

Dealing with Security Risks pt. 2

Risk Analysis Options

Risk Mitigation

Data Loss Preventions

Third Party Risks

The Three P's

+

Policies, Procedures & People

Data Classification

Social Engineering pt. 1

Social Engineering pt. 2

Environmental Threats

User Education

Incident Response Procedures

Course Wrap-Up

+
Resource Files

Course Wrap-Up

About the Author

+

About the Author

SkillsFuture Credit Eligible
SGD $40.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.