CompTIA SY0-401 or JK0-018: Security+

Oxford Applied Training
Online

£ 499 - (593 )
+ IVA

Información importante

  • Training
  • Beginner
  • Online
  • 9 horas de estudio
  • Duración:
    Flexible
  • Cuándo:
    A elegir
Descripción

CompTIA Security+ certification is globally recognized to validate foundational, vendor-neutral IT security knowledge and skills. This CompTIA Security+ course is an excellent starting point for a career in information security and will prepare you to pass the Security+ exam.

Información importante
¿Qué objetivos tiene esta formación?

Through this course you will get a good overview of:
Network Security
Compliance and Operations Security
Threats And Vulnerabilities
Application
Data and Host Security
Cyrptography

¿Esta formación es para mí?

Everyone can take this course, although it is most suitable for
Science & Technology Professionals

Instalaciones y fechas

Dónde se imparte y en qué fechas

Inicio Ubicación
A elegir
Online

¿Qué aprendes en este curso?

Access Control
Business Continuity
Risk
Risk Analysis
Monitoring
Access
Networking
Network
Flash
Industry
IT risk
Monitoring Tools
Network Training
Wireless
Disaster Recovery
Network Design
Networking Terminology
Firewalls
Security Terminology
Physical Security„„

Temario

Module 1: Networking Terminology

1.1 Course Introduction
1.2 Network Devices Part 1
1.3 Network Devices Part 2
1.4 Networking Cabling
1.5 Networking Addressing Part 1
1.6 Networking Addressing Part 2
1.7 Networking Addressing Part 3
1.8 Networking Addressing Part 4

Module 2: Locking Down Or Network

2.1 Firewalls Part 1
2.2 Firewalls Part 2
2.3 Intrusion Detection Systems
2.4 Network Design
2.5 Securing Devices

Module 3: Wireless

3.1 Wireless Basics Part 1
3.2 Wireless Basics Part 2
3.3 Securing Wireless Part 1
3.4 Securing Wireless Part 2
3.5 Configuring Wireless, Bluetooth And Infrared

Module 4: Intro To Security Terminology

4.1 Goals Of Information Security
4.2 Authentication And Authorization
4.3 Security Principles And Terminology Part 1
4.4 Security Principles And Terminology Part 2

Module 5: Policies And Standards

5.1 Introduction To Security Policies
5.2 Looking At Some Security Policies Part 1
5.3 Looking At Some Security Policies Part 2
5.4 Looking At Some Security Policies Part 3
5.5 Human Resource Policies Part 1
5.6 Human Resource Policies Part 2
5.7 User Education And Awareness Part 1
5.8 User Education And Awareness Part 2

Module 6: Physical Security„„

6.1 Business Location
6.2 Physical Access Controls
6.3 Implementing Environmental Controls

Module 7: Risk Analysis
„„
7.1 Introduction Risk Analysis Part 1
7.2 Introduction Risk Analysis Part 2
7.3 Types Of Risk Analysis
7.4 Risk Mitigation Strategies

Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
„„
8.1 Business Continuity
8.2 Business Impact Analysis
8.3 Disaster Recovery
8.4 Backup And Restore

Module 9: Introduction To Computer Forensics
„„
9.1 Working With Evidence
9.2 Collecting Digital Evidence Part 1
9.3 Collecting Digital Evidence Part 2
9.4 Looking At Incident Response

Module 10: Types Of Attacks
„„
10.1 Social Engineering
10.2 Network Attacks Part 1
10.3 Network Attacks Part 2
10.4 Password And Application Attacks

Module 11: System Security Threats
„„
11.1 Identifying Physical Threats
11.2 Malicious Software Part 1
11.3 Demo
11.4 Malicious Software Part 2
11.5 Threats Against Hardware

Module 12: Security Assessments
„„
12.1 Types Of Assessments
12.2 Penetration Testing

Module 13: Monitoring And Auditing
„„
13.1 Introduction To Monitoring And Monitoring Tools
13.2 Implementing Logging And Auditing

Module 14: Authentication
„„
14.1 Authentication Models
14.2 Authentication Protocols
14.3 Implementing Authentication

Module 15: Access Control
„„
15.1 Introducing Access Control
15.2 Access Control Models
15.3 Implementing Access Control Part 1
15.4 Implementing Access Control Part 2

Module 16: Mitigating Security Threats
„
„
16.1 Operating System Hardening
16.2 System Hardening Procedures
16.3 Application Security
16.4 Server Hardening Best Practices Part 1
16.5 Server Hardening Best Practices Part 2

Module 17: Implementing System Security
„„
17.1 Implementing Personal Firewalls And HIDS
17.2 Protecting Against Malware
17.3 Device Security And Data Security Part 1
17.4 Device Security And Data Security Part 2
17.5 Understanding Virtualization And Cloud Computing

Module 18: Cryptography
„„
18.1 Introduction To Cryptography
18.2 Symmetric And Asymmetric Encryption
18.3 Understanding Hashing And Encryption Uses

Module 19: Public Key Infrastructure
„„
19.1 Intro To PKI
19.2 Managing And Implementing PKI
19.3 Course Conclusion

 

 

Expert Instructor-Led Training

Oxford Applied Training uses only the industry’s finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7.

 

 

Visual Demonstrations & Multimedia Presentations

Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor.Oxford Applied Training always focuses on real world scenarios and skill-set development.

 

 

Quizzes & Exam Simulators

Oxford Applied Training custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding.

This will allow you to gauge your effectiveness before moving to the next module in your course. Oxford Applied Training courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam.

 

 

Social Learning & Networking

Oxford Applied Training has designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students and Oxford Applied Training employees, form study groups, engage in discussions in our NOW@ Forums, rate and “like” different courses and stay up to date with all the latest industry knowledge through our forums, student contributions, and announcement features. This LMS is unmatched in the industry and makes learning fun and enjoyable.

 

 

Flash Cards & Educational Games

Oxford Applied Training knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide flash cards and educational games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of flash cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the course material extremely high.

 

 

Navigation & Controls

Oxford Applied Training self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule.