Security+ Certification Prep


Security+ Certification Prep, Singapore elarning online course

Course Description

Security+ Certification Prep
The Security+ Certification Prep Course readies students for CompTIA's S+ certification exam which is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. With top experts and an interactive, lab-filled enviornment, students gain essential knowledge of the principals for network security and risk management with competency in organizational security, system security, access control and network infrastructure. The S+ certification by CompTIA is an internationally recognized credential ensuring ground-level security proficiency as well as skills for organization and security professionals to provide information, infrastructure, application and operational security. This course prepares the student for the CompTIA S+ Certification Exam SYO-401.


Course Objectives

1. Security Fundamentals
2. Systems Threats and Risks
3. Protecting Systems
4. Network Defenses
5. Network Security
6. Wireless Network Security
7. Access Control Fundamentals
8. Authentication
9. Performing Vulnerability Assessments
10. Conducting Security Audits
11. Basic Cryptography
12. Applying Cryptography
13. Business Continuity
14. Security Polices and Training
15. Final Exam: Security Plus


Related Courses

  • CompTIA Cloud Overview

    CompTIA Cloud Overview

    SGD $299.00

    Course Description

    The CompTIA Cloud Essential certification is applicable to a wide range of IT professionals. This course is geared towards IT professionals currently in or looking for positions as IT consultants, IT technical services, IT relationship managers, IT architects, consultants and business process owners analysts.This course is the first step on a training path that leads to a technical career in cloud computing. Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand theory aspects of the examination

    Read more...

  • Essential Online Course - CSS Essentials

    Essential Online Course - CSS Essentials

    SGD $299.00

    Course Description

    Whether you’re a web developer responsible for thousands of pages or a freelance web designer working on websites for local business, CSS is a very important skill to master. CSS or Cascading Style Sheets provides web developers and designers with the ability to create attractive web pages. This course will show all levels of users an introduction to CSS3, understanding of the CSS box model, working with page layouts, using colors and backgrounds, web typography, working with lists and tables, and dynamic CSS3 properties. Learn how to develop dynamic sites all at your fingertips. - Learn the fundamentals of both CSS and CSS3 - Know the difference between CSS and CSS3  - Be able to apply the language into your projects - Understand how each language has its own purpose

    Read more...

  • Certification at Your Fingertips - Microsoft 70 -246: Monitoring and Operating a Private Cloud 2012

    Certification at Your Fingertips - Microsoft 70 -246: Monitoring and Operating a Private Cloud 2012

    SGD $589.00

    Course Description

    Practice Lab  This course comes with a Remote Practice Environment, a virtual remote environment; where you are able to practically apply the skills you have learned on the respective server, systems and networks. With this platform, get one step ahead in your preparation for your certification exams! Whether it’s Cisco, Microsoft or VMware, our Practice Lab unifies access to all of these vendors through a web browser interface. Pre-configured hardware layouts with accompanying lab guides for fast, convenient access to gain hands on experience. With step-by-step instructions covering thousands of practical tasks across Cisco, Microsoft, VMware and CompTIA exam titles, the Practice Lab makes studying for an exam or learning new technologies an engaging experience. What this course prepares you for: Prepare for Microsoft 70 -246: Monitoring and Operating a Private Cloud 2012 with this course. Be able to demonstrate your real world mastery of monitoring and operating a private cloud based on Microsoft System Centre 2012 R2. Designed for experienced IT professionals who are  ready to advance their status, focuses on the critical-thinking and decision making acumen needed for success at the MCSE level. Ace your certification examination with this preparation course! - Learn of the examination outline before sitting for your certification  - Know and understand the topics that may be covered in your examinations - Understand both practical and theory aspects of the examination - Apply the practical skills through the Remote Practice Environment

    Read more...


Content

Security Fundamentals

+

Security Fundamentals

Introduction to Security Part 1

What is Information Security? Part 1

What is Information Security? Part 2

Understanding the Importance of Information Security Part 1

Understanding the Importance of Information Security Part 2

Understanding the Importance of Information Security Part 4

Attacks and Defenses

Information Security Careers and the Security+ Certification

Understanding the Importance of Information Security Part 3

Systems Threats and Risks

+

Software-based Attacks Part 1

Software-based Attacks Part 2

Software-based Attacks Part 3

Software-based Attacks Part 4

Software-based Attacks Part 5

Hardware-based Attacks

Attacks on Virtual Systems Part 1

Attacks on Virtual Systems Part 2

Protecting Systems

+

Protecting Systems Overview

Hardening the Operating System Part 1

Hardening the Operating System Part 2

Hardening the Operating System Part 3

Hardening the Operating System Part 4

Preventing Attacks that Target the Web Browser Part 1

Preventing Attacks that Target the Web Browser Part 2

Preventing Attacks that Target the Web Browser Part 3

Preventing Attacks that Target the Web Browser Part 4

Preventing Attacks that Target the Web Browser Part 5

Preventing Attacks that Target the Web Browser Part 6

Network Defenses

+

Network Vulnerabilities Part 1

Network Vulnerabilities Part 2

Categories of Attacks Part 1

Categories of Attacks Part 2

Methods of Network Attacks Part 1

Methods of Network Attacks Part 2

Methods of Network Attacks Part 3

Other Attacks and Frauds

Network Security

+

Crafting a Secure Network Part 1

Crafting a Secure Network Part 2

Crafting a Secure Network Part 3

Applying Network Security Devices Part 1

Applying Network Security Devices Part 2

Applying Network Security Devices Part 3

Applying Network Security Devices Part 4

Wireless Network Security

+

IEEE 802.11 Wireless Security Protections Part 1

IEEE 802.11 Wireless Security Protections Part 2

Vulnerabilities of IEEE 802.11 Security

Personal Wireless Security

Enterprise Wireless Security

Access Control Fundamentals

+

What is Access Control Part 1

What is Access Control Part 2

Logical Access Control Methods Part 1

Logical Access Control Methods Part 2

Physical Access Control Part 1

Physical Access Control Part 2

Authentication

+

Definition of Authentication

Authentication Credentials Part 1

Authentication Credentials Part 2

Authentication Models

Authentication Servers

Extended Authentication Protocols (EAP)

Remote Authentication and Security

Performing Vulnerability Assessments

+

Performing Vulnerability Assessments Part 1

Performing Vulnerability Assessments Part 2

Performing Vulnerability Assessments Part 3

Performing Vulnerability Assessments Part 4

Performing Vulnerability Assessments Part 5

Performing Vulnerability Assessments Part 6

Performing Vulnerability Assessments Part 7

Conducting Security Audits

+

Privilege Auditing Part 1

Privilege Auditing Part 2

Usage Auditing

Monitoring Methodologies and Tools

Basic Cryptography

+

Basic Cryptography Part 1

Basic Cryptography Part 2

Cryptographic Algorithms

Hashing Algorithms Part 1

Hashing Algorithms Part 2

Hashing Algorithms Part 3

Hashing Algorithms Part 4

Symmetric Cryptographic Algorithms Part 1

Symmetric Cryptographic Algorithms Part 2

Asymmetric Cryptographic Algorithms

Using Cryptography on Files and Disks

Applying Cryptography

+

Digital Certificates Part 1

Digital Certificates Part 2

Digital Certificates Part 3

Public Key Infrastructure (PKI) Part 2

Key Management

Cryptographic Transport Protocols Part 1

Cryptographic Transport Protocols Part 2

Public Key Infrastructure (PKI) Part 1

Business Continuity

+

Redundancy Planning Part 2

Disaster Recovery Procedures Part 1

Disaster Recovery Procedures Part 2

Incident Response Procedures

Environmental Controls Part 1

Environmental Controls Part 2

Redundancy Planning Part 1

Security Policies and Training

+

Organizational Security Policies Part 1

Organizational Security Policies Part 2

Types of Security Policies Part 1

Types of Security Policies Part 2

Types of Security Policies Part 3

Education and Training

SGD $299.00
(Price excludes GST)
GET ACCESS NOW
Convince your boss email
This site is best viewed using the latest versions of Google Chrome, Apple Safari, Mozilla FireFox, Microsoft Internet Explorer 11 and Edge which supports HTML5/Webkit technologies.