CompTIA CompTIA SY0-401 or JK0-018 Security Plus

CompTIA SY0-401 or JK0-018 Security Plus

599.00 599.00
$599.00
PRICE PER USER
$
X
USERS


=
SUBTOTAL
$
  • Course Delivery: On Demand
  • Duration: 8.27 
  • Language: English
  • Audience: Everyone, Science & Technology Professionals

Chat Live | Contact Us | Toll Free: (888) 360-8764

 

Description

The Security+ exam covers the most important foundational principles for securing a network and managing risk. Access control, identity management and cryptography are important topics on the exam, as well as selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities. Security concerns associated with cloud computing, BYOD and SCADA are addressed in the SY0-401 exam.
 

Course Objectives

  • Network Security
  • Compliance and Operations Security
  • Threats And Vulnerabilities
  • Application
  • Data and Host Security
  • Cyrptography
 

Topics Covered

Module 1: Networking Terminology

  • 1.1 Course Introduction
  • 1.2 Network Devices Part 1
  • 1.3 Network Devices Part 2
  • 1.4 Networking Cabling
  • 1.5 Networking Addressing Part 1
  • 1.6 Networking Addressing Part 2
  • 1.7 Networking Addressing Part 3
  • 1.8 Networking Addressing Part 4

Module 2: Locking Down Or Network

  • 2.1 Firewalls Part 1
  • 2.2 Firewalls Part 2
  • 2.3 Intrusion Detection Systems
  • 2.4 Network Design
  • 2.5 Securing Devices

Module 3: Wireless

  • 3.1 Wireless Basics Part 1
  • 3.2 Wireless Basics Part 2
  • 3.3 Securing Wireless Part 1
  • 3.4 Securing Wireless Part 2
  • 3.5 Configuring Wireless, Bluetooth And Infrared

Module 4: Intro To Security Terminology

  • 4.1 Goals Of Information Security
  • 4.2 Authentication And Authorization
  • 4.3 Security Principles And Terminology Part 1
  • 4.4 Security Principles And Terminology Part 2

Module 5: Policies And Standards

  • 5.1 Introduction To Security Policies
  • 5.2 Looking At Some Security Policies Part 1
  • 5.3 Looking At Some Security Policies Part 2
  • 5.4 Looking At Some Security Policies Part 3
  • 5.5 Human Resource Policies Part 1
  • 5.6 Human Resource Policies Part 2
  • 5.7 User Education And Awareness Part 1
  • 5.8 User Education And Awareness Part 2

Module 6: Physical Security

  • 6.1 Business Location
  • 6.2 Physical Access Controls
  • 6.3 Implementing Environmental Controls

Module 7: Risk Analysis

  • 7.1 Introduction Risk Analysis Part 1
  • 7.2 Introduction Risk Analysis Part 2
  • 7.3 Types Of Risk Analysis
  • 7.4 Risk Mitigation Strategies

Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)

  • 8.1 Business Continuity
  • 8.2 Business Impact Analysis
  • 8.3 Disaster Recovery
  • 8.4 Backup And Restore

Module 9: Introduction To Computer Forensics

  • 9.1 Working With Evidence
  • 9.2 Collecting Digital Evidence Part 1
  • 9.3 Collecting Digital Evidence Part 2
  • 9.4 Looking At Incident Response

Module 10: Types Of Attacks

  • 10.1 Social Engineering
  • 10.2 Network Attacks Part 1
  • 10.3 Network Attacks Part 2
  • 10.4 Password And Application Attacks

Module 11: System Security Threats

  • 11.1 Identifying Physical Threats
  • 11.2 Malicious Software Part 1
  • 11.3 Demo
  • 11.4 Malicious Software Part 2
  • 11.5 Threats Against Hardware

Module 12: Security Assessments

  • 12.1 Types Of Assessments
  • 12.2 Penetration Testing

Module 13: Monitoring And Auditing

  • 13.1 Introduction To Monitoring And Monitoring Tools
  • 13.2 Implementing Logging And Auditing

Module 14: Authentication

  • 14.1 Authentication Models
  • 14.2 Authentication Protocols
  • 14.3 Implementing Authentication

Module 15: Access Control

  • 15.1 Introducing Access Control
  • 15.2 Access Control Models
  • 15.3 Implementing Access Control Part 1
  • 15.4 Implementing Access Control Part 2

Module 16: Mitigating Security Threats

  • 16.1 Operating System Hardening
  • 16.2 System Hardening Procedures
  • 16.3 Application Security
  • 16.4 Server Hardening Best Practices Part 1
  • 16.5 Server Hardening Best Practices Part 2

Module 17: Implementing System Security

  • 17.1 Implementing Personal Firewalls And HIDS
  • 17.2 Protecting Against Malware
  • 17.3 Device Security And Data Security Part 1
  • 17.4 Device Security And Data Security Part 2
  • 17.5 Understanding Virtualization And Cloud Computing

Module 18: Cryptography

  • 18.1 Introduction To Cryptography
  • 18.2 Symmetric And Asymmetric Encryption
  • 18.3 Understanding Hashing And Encryption Uses

Module 19: Public Key Infrastructure

  • 19.1 Intro To PKI
  • 19.2 Managing And Implementing PKI
  • 19.3 Course Conclusion

Got questions? Contact us below or call 877-881-2235

Why Choose 360training.com?

  • Fast and easy courses completion
  • Get an education faster than at traditional colleges!
  • 100% online - No classroom attendance required.
  • Unlimited 24x7 online customer support
  • Over 500,000+ certified nationwide.