
CompTIA Security+ SY0-501 OEM Certkit
Bestel online de eLearning training CompTIA Security+ om u voor te bereiden op het SY0-501 examen. Incl. Exam quizzes, Online mentor, Examensimulatie en Tips.
- E-Learning - Online toegang: 365 dagen
- Taal: Engels (US)
- Certificaat van deelname
- Voor 23:00:00 uur besteld, morgen in huis
- Gecertificeerde docenten
- Interactieve training + praktijkopdrachten
- Certificaat van deelname
- Meer informatie? Neem contact op over dit product
CompTIA Security+ SY0-501 OEM Certkit E-learning
De Training CompTIA Security+ SY0-501 via een Speciale Certificeringspakket. 1 Jaar toegang tot revolutionaire E-learning om het examen Gemakkelijk te halen. Laat je Introduceren door te Leren via 1 Leerportaal (LMS) met Gecertificeerde Docenten. Exclusief 24/7 Online Mentor en Uitdagende Cursus Testen en Bekijk Achter de schermen alle Tips & Tricks.
Gegarandeerd altijd het Officieel Proefexamen en na de Training een Officieel Certificaat van Deelname. Optioneel Livelabs(meerprijs).
Cursusinhoud
CompTIA Security+ SY0-501: The Present Threat Landscape
Course Introduction1 MinuteNot StartedActions
Defining the Threat Landscape
CompTIA Security+ SY0-501: Types of Malware
Course Introduction1 MinuteNot StartedActions
Viruses
Worms
Trojans
Remote Access Trojans (RATs)
Common Vulnerabilities1 MinuteNot StartedActions
Ransomware
Cryptomalware
Bots and Botnets
Backdoors
Rootkits
Logic Bombs
Keyloggers
Spyware
Stegomalware
Polymorphic Packers
CompTIA Security+ SY0-501: Social Engineering and Related Attacks Course
Course Introduction1 MinuteNot StartedActions
Impersonation and Hoaxing
Tailgating and Piggybacking
Shoulder Surfing
Dumpster Diving
Phishing, Spear Phishing, and Whaling
Watering Hole Attacks (Social Networks)
Vishing and Smishing1 MinuteNot StartedActions
Reasons for Effectiveness
CompTIA Security+ SY0-501: Application and Service Attacks
Course Introduction1 MinuteNot StartedActions
Zero Day Attacks
Spoofing
DoS and DDoS Attacks
Man-in-the-middle Attacks
ARP Poisoning
Buffer Overflow Attacks
Injection Attacks
Privilege Escalation
Reflection and Amplification
DNS Poisoning
Domain Hijacking
Man-in-the-browser
Cross-site Scripting and Request Forgery
Replay Attacks
Pass the Hash Attacks1 Minute
CompTIA Security+ SY0-501: Cryptographic and Wireless Attacks
Course Introduction
Brute-force and Dictionary Attacks
Brute-force Tools
Birthday, Known Plaintext, and Cipher Attacks
Online vs. Offline Attacks
Collisions
Downgrade Attacks
CompTIA Security+ SY0-501: Penetration Testing and Vulnerability Scanning
Course Introduction1 MinuteNot StartedActions
Active vs. Passive Reconnaissance
Pivot
Initial Exploitation
Persistence
Escalation of Privilege
Black vs. Gray vs. White Box Testing
CompTIA Security+ SY0-501: Impacts from Vulnerability Types
Course Introduction1 MinuteNot StartedActions
Race Conditions
System Vulnerabilities
Improper Input and Error Handling
Misconfiguration
Resource Exhaustion
Untrained Users
Improperly Configured Accounts
Vulnerable Business Processes
Weak Cipher Suites and Implementations
Memory and Buffer Vulnerability
System Sprawl and Undocumented Assets
Architecture and Design Weaknesses
New Threats and Zero-day Attacks
Improper Certificate and Key Management
CompTIA Security+ SY0-501: Components Supporting Organizational Security
Course Introduction1 MinuteNot StartedActions
Firewalls
VPN Concentrators1
NIDS and NIPS1
Bridges and Switches
Routers
Proxies and Load Balancers
Wireless Access Points1
SIEM Systems
DLP Systems
NAC Gateways
Mail Gateways
Media Gateways
Encryption Gateways
Specialty Appliances
CompTIA Security+ SY0-501: Security Assessment Using Software Tools
Course Introduction1 MinuteNot StartedActions
Protocol Analyzers
Network Scanners
Wireless Scanners/Cracker
Password Crackers
Vulnerability Scanners
Configuration Compliance Scanner
Exploitation Frameworks
Data Sanitization Tools
Steganography Tools1 MinuteNot StartedActions
Honeypots
Backup Utilities
Banner Grabbing
Passive vs. Active
Other Command Line Tools
CompTIA Security+ SY0-501: Cryptography
Course Introduction
Introduction to Cryptography
Ciphers
Properties of Secure Ciphers
Block Cipher
Stream Cipher
Keys
Key Exchange
Encryption
Introducing Symmetric Algorithms
Symmetric Algorithms
Introducing Asymmetric Algorithms
Asymmetric Algorithms
Hashing
Hashing Functions
Data Integrity
Authentication
Digital Signatures
Key Stretching
Additional Security Considerations
CompTIA Security+ SY0-501: Public Key Infrastructure
Course Introduction1 MinuteNot StartedActions
PKI Overview
Public Key Infrastructure
CA Trust Models
Certificate Chaining
Pinning
Expiration, Revocation, Suspension
Key Escrow
X.509 Certificates
Types of Certificates
CompTIA Security+ SY0-501: Wireless Security Settings
Course Introduction1 MinuteNot StartedActions
Introducing Wireless Security
Types of Wireless Networks
WPA and WPA2
Wireless Authentication
Wireless Encryption
Configuring an Open Wireless Network
Configuring a WPA PSK Wireless Network
Configuring a WPA Enterprise Wireless Network
Configuring a WPA2 PSK Wireless Network
Configuring a WPA2 Enterprise Wireless Network1
Wi-Fi Protected Setup
Captive Portals
CompTIA Security+ SY0-501: Analyzing Output from Security Technologies
Course Introduction1 MinuteNot StartedActions
Host Intrusion Prevention
Antivirus
File Integrity Check
Host-based Firewall
Application Whitelisting
Removable Media Control
Patch Management Tools
Unified Threat Management (UTM)
Data Loss Prevention (DLP)
Data Execution Prevention (DEP)
Web Application Firewall
CompTIA Security+ SY0-501: Deploying Mobile Devices Securely
Course Introduction
Survey of Connection Methods
Deployment Models
Passwords, Pins, and Screen Locks
Application and Content Management
Remote Wipe1 MinuteNot StartedActions
Geofencing and Geolocation
Push Notification Services
Biometrics and Context-aware Authentication
Containerization and Storage Segmentation
Full Device Encryption
Enforcement and Monitoring: Part 1
Enforcement and Monitoring: Part 2
CompTIA Security+ SY0-501: Implementing Secure Protocols
Course Introduction
Secure Shell (SSH)
Secure Sockets Layer/Transport Layer Security
Hypertext Transfer Protocol/Secure (HTTPS)
Secure Real-time Transport Protocol (SRTP)
File Transfer Protocol/Secure (FTPS)
Secure File Transfer Protocol (SFTP)
Lightweight Directory Access Protocol/Secure (LDAPS)
Simple Network Management Protocol (SNMPv3)
Network Time Protocol (NTPv3)
Post Office/Internet Message Access Protocols
Secure MIME (S/MIME)
Routing Protocol Authentication
CompTIA Security+ SY0-501: Troubleshooting Common Security Issues
Course Introduction
Unencrypted Credentials
Logs and Events Anomalies
Permission Issues
Access Violations
Certificate Issues
Data Exfiltration
Misconfigured Devices
Weak Security Configurations
Personnel Issues
Unauthorized Software
Baseline Deviation
License Compliance Violation
Asset Management
Authentication Issues
CompTIA Security+ SY0-501: Identity Concepts and Access Services
Course Introduction
Identity and Access Management Part 1
Identity and Access Management Part 2
NT LAN Manager (NTLM)
Challenge-handshake Authentication Protocol (CHAP)
Remote Authentication Dial-in User Service (RADIUS)
TACACS+
Kerberos
Lightweight Directory Access Protocol (LDAP)
Secure Token1 MinuteNot StartedActions
Security Assertion Markup Language (SAML)
OpenID Connect1 MinuteNot StartedActions
Open Authorization (OAuth)
Shibboleth
CompTIA Security+ SY0-501: Identity and Access Management Controls
Course Introduction
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Attribute-based Access Control (ABAC)
Role-based Access Control
Rule-based Access Contro
CompTIA Security+ SY0-501: Common Account Management Practices
Course Introduction
User Accounts
Shared, Guest, and Generic Accounts
Privileged Accounts
Service Accounts
CompTIA Security+ SY0-501: Frameworks, Guidelines, and Physical Security
Course Introduction
Frameworks and Architectures
Secure Configuration Guidelines
Defense in Depth
CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts
Course Introduction
Zones and Topologies
Segregation, Segmentation, and Isolation
Tunneling and VPNs
Device and Technology Placement1
Software Defined Network
CompTIA Security+ SY0-501: Secure System and Application Design and Deployment
Course Introduction
Hardware Root of Trust
Secure Boot
EMI and EMP
Supply Chain
Operating System Security Considerations
Trusted Operating System
Keyboards, Mice, Displays, and Other Devices
Secure Development Concepts
CompTIA Security+ SY0-501: Cloud, Virtualization, and Resiliency Concepts
Course Introduction
Hypervisors
VM Sprawl and Escape
CompTIA Security+ SY0-501: Policies, Plans, and Procedures
Course Introduction
Standard Operating Procedure
Agreements
Administrative Job Control
Personnel Management
Security Awareness Training
Acceptable Use Policy
Additional Security Policies
CompTIA Security+ SY0-501: Business Impact Analysis and Risk Management
Course Introduction
Business Continuity Plan (BCP)
Business Impact Analysis (BIA)
Determining Recovery Team
Mean Time Between Failure and Mean Time to Repair
Privacy Assessments
Risk Management
Risk Assessment
Risks
Testing for Risks
Risk Analysis
Qualitative Risk Analysis
Quantitative Risk Analysis
Risk Response
Change Management
CompTIA Security+ SY0-501: Incident Response, Forensics, and Disaster Recovery
Course Introduction
Defining Incident Response
Building an Incident Response Plan
Duur | Variabel |
Taal | Engels |
Certificaat van deelname | Ja |
Online toegang | 1 jaar onbeperkte toegang |
Voortgangsbewaking | Ja |
Award Winning E-learning | Ja |
Geschikt voor mobiel | Ja |
average of 0 review(s)
Help ons en andere klanten door het schrijven van een review