Description
CompTIA Security certification is globally recognized to validate foundational, vendor-neutral IT security knowledge and skills. This CompTIA Security course is an excellent starting point for a career in information security and will prepare you to pass the Security exam.
Module 1: Networking Terminology
1.1 Course Introduction
1.2 Network Devices Part 1
1.3 Network Devices Part 2
1.4 Networking Cabling
1.5 Networking Addressing Part 1
1.6 Networking Addressing Part 2
1.7 Networking Addressing Part 3
1.8 Networking Addressing Part 4
Module 2: Locking Down Or Network
2.1 Firewalls Part 1
2.2 Firewalls Part 2
2.3 Intrusion Detection Systems
2.4 Network Design
2.5 Securing Devices
Module 3: Wireless
3.1 Wireless Basics Part 1
3.2 Wireless Basics Part 2
3.3 Securing Wireless Part 1
3.4 Securing Wireless Part 2
3.5 Configuring Wireless, Bluetooth And Infrared
Module 4: Intro To Security Terminology
4.1 Goals Of Information Security
4.2 Authentication And Authorization
4.3 Security Principles And Terminology Part 1
4.4 Security Principles And Terminology Part 2
Module 5: Policies And Standards
5.1 Introduction To Security Policies
5.2 Looking At Some Security Policies Part 1
5.3 Looking At Some Security Policies Part 2
5.4 Looking At Some Security Policies Part 3
5.5 Human Resource Policies Part 1
5.6 Human Resource Policies Part 2
5.7 User Education And Awareness Part 1
5.8 User Education And Awareness Part 2
Module 6: Physical Security
6.1 Business Location
6.2 Physical Access Controls
6.3 Implementing Environmental Controls
Module 7: Risk Analysis
7.1 Introduction Risk Analysis Part 1
7.2 Introduction Risk Analysis Part 2
7.3 Types Of Risk Analysis
7.4 Risk Mitigation Strategies
Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
8.1 Business Continuity
8.2 Business Impact Analysis
8.3 Disaster Recovery
8.4 Backup And Restore
Module 9: Introduction To Computer Forensics
9.1 Working With Evidence
9.2 Collecting Digital Evidence Part 1
9.3 Collecting Digital Evidence Part 2
9.4 Looking At Incident Response
Module 10: Types Of Attacks
10.1 Social Engineering
10.2 Network Attacks Part 1
10.3 Network Attacks Part 2
10.4 Password And Application Attacks
Module 11: System Security Threats
11.1 Identifying Physical Threats
11.2 Malicious Software Part 1
11.3 Demo
11.4 Malicious Software Part 2
11.5 Threats Against Hardware
Module 12: Security Assessments
12.1 Types Of Assessments
12.2 Penetration Testing
Module 13: Monitoring And Auditing
13.1 Introduction To Monitoring And Monitoring Tools
13.2 Implementing Logging And Auditing
Module 14: Authentication
14.1 Authentication Models
14.2 Authentication Protocols
14.3 Implementing Authentication
Module 15: Access Control
15.1 Introducing Access Control
15.2 Access Control Models
15.3 Implementing Access Control Part 1
15.4 Implementing Access Control Part 2
Module 16: Mitigating Security Threats
16.1 Operating System Hardening
16.2 System Hardening Procedures
16.3 Application Security
16.4 Server Hardening Best Practices Part 1
16.5 Server Hardening Best Practices Part 2
Module 17: Implementing System Security
17.1 Implementing Personal Firewalls And HIDS
17.2 Protecting Against Malware
17.3 Device Security And Data Security Part 1
17.4 Device Security And Data Security Part 2
17.5 Understanding Virtualization And Cloud Computing
Module 18: Cryptography
18.1 Introduction To Cryptography
18.2 Symmetric And Asymmetric Encryption
18.3 Understanding Hashing And Encryption Uses
Module 19: Public Key Infrastructure
19.1 Intro To PKI
19.2 Managing And Implementing PKI
19.3 Course Conclusion
Reviews
There are no reviews yet.