Security+ Certification Prep


Security+ Certification Prep, Singapore elarning online course

Course Description

Security+ Certification Prep
The Security+ Certification Prep Course readies students for CompTIA's S+ certification exam which is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. With top experts and an interactive, lab-filled enviornment, students gain essential knowledge of the principals for network security and risk management with competency in organizational security, system security, access control and network infrastructure. The S+ certification by CompTIA is an internationally recognized credential ensuring ground-level security proficiency as well as skills for organization and security professionals to provide information, infrastructure, application and operational security. This course prepares the student for the CompTIA S+ Certification Exam SYO-401.


Course Objectives

1. Security Fundamentals
2. Systems Threats and Risks
3. Protecting Systems
4. Network Defenses
5. Network Security
6. Wireless Network Security
7. Access Control Fundamentals
8. Authentication
9. Performing Vulnerability Assessments
10. Conducting Security Audits
11. Basic Cryptography
12. Applying Cryptography
13. Business Continuity
14. Security Polices and Training
15. Final Exam: Security Plus


Related Courses

  • Certification at Your Fingertips - Microsoft 70-412: Configuring Advanced Windows Server 2012 Services

    Certification at Your Fingertips - Microsoft 70-412: Configuring Advanced Windows Server 2012 Services

    SGD $589.00

    Course Description

    Practice Lab  This course comes with a Remote Practice Environment, a virtual remote environment; where you are able to practically apply the skills you have learned on the respective server, systems and networks. With this platform, get one step ahead in your preparation for your certification exams! Whether it’s Cisco, Microsoft or VMware, our Practice Lab unifies access to all of these vendors through a web browser interface. Pre-configured hardware layouts with accompanying lab guides for fast, convenient access to gain hands on experience. With step-by-step instructions covering thousands of practical tasks across Cisco, Microsoft, VMware and CompTIA exam titles, the Practice Lab makes studying for an exam or learning new technologies an engaging experience. What this course prepares you for: Before sitting for the Microsoft 70 -412: Configuring Advanced Windows Server 2012 Services certification exam, be sure to have fully revised and understand the topics for the exams. This course will cover topics such as Configure and manage high availability, Configure file and storage solutions, Implement business continuity and disaster recovery and Configure Network Services.  Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand both practical and theory aspects of the examination - Apply the practical skills through the Remote Practice Environment This course is SkillsFuture Credit Eligible.

    Read more...

  •  1st step to certification: Installing and Configuring Windows Server 2012 (70-410)

    1st step to certification: Installing and Configuring Windows Server 2012 (70-410)

    SGD $45.00

    Course Description

    Microsoft's Server operating systems have powered business for over 20 years. In the beginning, it was all about connectivity in the local area network; now it's all about connectivity in the cloud. Microsoft calls Server 2012 ’the Cloud OS’ and is branding it as being ’built from the cloud up.’ Their goal with this product is to deliver the power of many servers with the simplicity of one. Achieving a Microsoft Certification on this product is an excellent career move. In this VTC course, Mark Long brings 20+ years of experience with Microsoft technologies along to help you understand the features and functionalities of Windows Server 2012 from the standpoint of preparing for certification exam 70-410 Installing and Configuring Microsoft Windows Server 2012.  Be fully prepared for your certifications exams! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Learn and understand the chapters for each tailored certification  - Go through past questions to have a feel of the examinations

    Read more...

  • Linux Professional Institute Certification Level 1 2009

    Linux Professional Institute Certification Level 1 2009

    SGD $45.00

    Course Description

    Linux is the most important operating system on the Internet. It's recognized everywhere as the cost-effective way to operate all kinds of servers. With the support of powerhouses like IBM, Dell, HP, and Sun, demand for Linux servers is growing. This course can help you pass the LPI Level 1 Certification exams from the Linux Professional Institute. Once you earn this certification, you'll have joined an elite group of Linux professionals. Be fully prepared for your certifications exams!- Learn of the examination outline before sitting for your certification - Know and understand the topics that may be covered in your examinations- Learn and understand the chapters for each tailored certification - Go through past questions to have a feel of the examinations

    Read more...


Content

Security Fundamentals

+

Security Fundamentals

Introduction to Security Part 1

What is Information Security? Part 1

What is Information Security? Part 2

Understanding the Importance of Information Security Part 1

Understanding the Importance of Information Security Part 2

Understanding the Importance of Information Security Part 4

Attacks and Defenses

Information Security Careers and the Security+ Certification

Understanding the Importance of Information Security Part 3

Systems Threats and Risks

+

Software-based Attacks Part 1

Software-based Attacks Part 2

Software-based Attacks Part 3

Software-based Attacks Part 4

Software-based Attacks Part 5

Hardware-based Attacks

Attacks on Virtual Systems Part 1

Attacks on Virtual Systems Part 2

Protecting Systems

+

Protecting Systems Overview

Hardening the Operating System Part 1

Hardening the Operating System Part 2

Hardening the Operating System Part 3

Hardening the Operating System Part 4

Preventing Attacks that Target the Web Browser Part 1

Preventing Attacks that Target the Web Browser Part 2

Preventing Attacks that Target the Web Browser Part 3

Preventing Attacks that Target the Web Browser Part 4

Preventing Attacks that Target the Web Browser Part 5

Preventing Attacks that Target the Web Browser Part 6

Network Defenses

+

Network Vulnerabilities Part 1

Network Vulnerabilities Part 2

Categories of Attacks Part 1

Categories of Attacks Part 2

Methods of Network Attacks Part 1

Methods of Network Attacks Part 2

Methods of Network Attacks Part 3

Other Attacks and Frauds

Network Security

+

Crafting a Secure Network Part 1

Crafting a Secure Network Part 2

Crafting a Secure Network Part 3

Applying Network Security Devices Part 1

Applying Network Security Devices Part 2

Applying Network Security Devices Part 3

Applying Network Security Devices Part 4

Wireless Network Security

+

IEEE 802.11 Wireless Security Protections Part 1

IEEE 802.11 Wireless Security Protections Part 2

Vulnerabilities of IEEE 802.11 Security

Personal Wireless Security

Enterprise Wireless Security

Access Control Fundamentals

+

What is Access Control Part 1

What is Access Control Part 2

Logical Access Control Methods Part 1

Logical Access Control Methods Part 2

Physical Access Control Part 1

Physical Access Control Part 2

Authentication

+

Definition of Authentication

Authentication Credentials Part 1

Authentication Credentials Part 2

Authentication Models

Authentication Servers

Extended Authentication Protocols (EAP)

Remote Authentication and Security

Performing Vulnerability Assessments

+

Performing Vulnerability Assessments Part 1

Performing Vulnerability Assessments Part 2

Performing Vulnerability Assessments Part 3

Performing Vulnerability Assessments Part 4

Performing Vulnerability Assessments Part 5

Performing Vulnerability Assessments Part 6

Performing Vulnerability Assessments Part 7

Conducting Security Audits

+

Privilege Auditing Part 1

Privilege Auditing Part 2

Usage Auditing

Monitoring Methodologies and Tools

Basic Cryptography

+

Basic Cryptography Part 1

Basic Cryptography Part 2

Cryptographic Algorithms

Hashing Algorithms Part 1

Hashing Algorithms Part 2

Hashing Algorithms Part 3

Hashing Algorithms Part 4

Symmetric Cryptographic Algorithms Part 1

Symmetric Cryptographic Algorithms Part 2

Asymmetric Cryptographic Algorithms

Using Cryptography on Files and Disks

Applying Cryptography

+

Digital Certificates Part 1

Digital Certificates Part 2

Digital Certificates Part 3

Public Key Infrastructure (PKI) Part 2

Key Management

Cryptographic Transport Protocols Part 1

Cryptographic Transport Protocols Part 2

Public Key Infrastructure (PKI) Part 1

Business Continuity

+

Redundancy Planning Part 2

Disaster Recovery Procedures Part 1

Disaster Recovery Procedures Part 2

Incident Response Procedures

Environmental Controls Part 1

Environmental Controls Part 2

Redundancy Planning Part 1

Security Policies and Training

+

Organizational Security Policies Part 1

Organizational Security Policies Part 2

Types of Security Policies Part 1

Types of Security Policies Part 2

Types of Security Policies Part 3

Education and Training

SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.