CompTIA Security+ (SY0-501) Complete Course

Created by  Wattlenet Academy

  • $12.00



This course includes:
  • 17 hrs on-demand video
  • 208 Topics
  • Full lifetime access
  • Access on mobile and TV

Description

Course Description:

Taught by an expert in information technology and cyber security, this course is a fun way to master the fundamentals of computer security.

 

    

  Course Objectives:

·         Passing the CompTIA Security+ certification exam with confidence

·         Understand computer security, its functions, and its components

·         Performing basic security configurations

·         Become an effective security technician in a business environment


Class requirements: Internet, Laptop/PC


Course Content

  • Overview OF the Course
    • Introduction
    • Overview of Security
    • CIA Triad
    • AAA of Security
    • Security Threats
    • Mitigating Threats
    • Hackers
    • Threat Actors
  • Market research
    • Market Research Intro
    • How to Find a Hungry-to-Buy Audience
    • How to Get Responses to Your Survey
    • How to Analyse Your Survey Results
    • How to Get Valuable Feedback
  • Malware
    • Introduction
    • Viruses
    • Trojans
    • Ransomware
    • Spyware
    • Rootkits
    • Spam
  • Malware Infections
    • Malware Infections
    • Common Delivery Methods
    • Botnets and Zombies
    • Active Interception and Privilege Escalation
    • Privilege Escalation
    • Backdoors and Logic Bombs
    • Symptoms of Infection
    • Removing Malware
    • Preventing Malware
  • Security Applications and Devices
    • Introduction
    • Software Firewalls
    • IDS
    • Pop-up Blockers
    • Data Loss Prevention (DLP)
    • Securing the BIOS
    • Securing Storage Devices
    • Disk Encryption
  • Mobile device Security
    • Introduction
    • Securing Wireless Devices SEO Metrics
    • Mobile Malware
    • SIM Cloning & ID Theft
    • Double Conversions by Improving Website Speed
    • Bluetooth Attacks
    • Mobile Device Theft
    • Security of Apps
    • BYOD
    • Hardening Mobile Devices
  • Hardening
    • Hardening
    • Unnecessary Applications
    • Restricting Applications
    • Unnecessary Services
    • Trusted Operating System
    • Updates and Patches
    • Patch Management
    • Group Policies
    • File Systems and Hard Drives
  • Virtualization
    • Introduction
    • Hypervisors
    • Threats to VMs
    • Securing VMs
  • Application Security
    • Introduction
    • Web Browser Security
    • Web Browser Concerns
    • Web Browser Configuration
    • Securing Applications
  • Secure Software Development
    • Software Development
    • SDLC Principles
    • Testing Methods
    • Software Vulnerabilities and Exploits
    • Buffer Overflows
    • Buffer Overflow Attack
    • XSS and XSRF
    • SQL Injection
  • Network Design
    • Network Security
    • The OSI Model
    • Switches
    • Routers
    • Network Zones
    • Network Access Control
    • VLANs
    • Subnetting
    • Network Address Translation
    • Telephony
  • Perimeter Security
    • Introduction
    • Perimeter Security
    • Firewalls
    • SOHO Firewall
    • Proxy Servers
    • Data Loss Prevention
    • NIDS and NIPS
    • Unified Threat Management
  • Cloud Security
    • Cloud Computing
    • Cloud Types
    • As a Service
    • Cloud Security
    • Defending Servers
  • Network Attacks
    • Network Attacks
    • Ports and Protocols
    • Memorization of Ports
    • Unnecessary Ports
    • Denial of Service
    • DDoS
    • Stopping a DDoS
    • Spoofing
    • Hijacking
    • Replay Attack
    • Transitive Attacks
    • DNS Attacks
    • ARP Poisoning
  • Securing Networks
    • Securing Network Devices
    • Securing Network Media
    • Securing WiFi Devices
    • Wireless Encryption
    • Wireless Access Points
    • Wireless Attacks
    • Other Wireless Technologies
  • Physical Security
    • Overview of Physical Security
    • Surveillance
    • Door Locks
    • Biometric Readers
  • Facilities Security
    • Facilities Security
    • Fire Suppression
    • HVAC
    • Shielding
    • Vehicles
  • Authentication
    • Authentication Models
    • 802.1x
    • LDAP and Kerberos
    • Remote Desktop Services
    • Remote Access Service
    • VPN
    • RADIUS vs TACACS+
  • Access Control
    • Access Control Models
    • Best Practices
    • Users and Groups
    • Permissions
    • Usernames and Passwords
    • User Account Control
  • Risk Assessments
    • Risk Assessments
    • Qualitative Risk
    • Quantitative Risk
    • Methodologies
    • Security Controls
    • Vulnerability Management
    • Penetration Testing
    • OVAL
    • Vulnerability Assessments
    • Nmap Scanning
    • Vulnerability Scanning
    • Password Analysis
    • Password Cracking
  • Monitoring and Auditing
    • Monitoring Types
    • Performance Baselining
    • Protocol Analyzers
    • SNMP
    • Analytical Tools
    • Auditing
    • Auditing Files
    • Logging
    • Log Files
    • SIEM
  • Cryptography
    • Cryptography
    • Symmetric vs Asymmetric
    • Symmetric Algorithms
    • Public Key Cryptography
    • Asymmetric Algorithms
    • Pretty Good Privacy
    • Key Management
    • One-Time Pad
    • Hashing
    • Hashing Attacks
    • Increasing Hash Security
  • Public Key Infrastructure
    • Public Key Infrastructure
    • Digital Certificates
    • Certificate Authorities
    • Web of Trust
  • Security Protocols
    • Overview
    • S/MIME
    • SSL and TLS
    • SSH
    • VPN Protocols
    • Setting up a VPN
  • Planning for the Worst
    • Redundant Power
    • Backup Power
    • Data Redundancy
    • RAIDs
    • Network Redundancy
    • Server Redundancy
    • Redundant Sites
    • Data Backup
    • Tape Rotation
    • Disaster Recovery Plan
  • Social Engineering
    • Social Engineering
    • Pretexting
    • Insider Threat
    • Phishing
    • More Social Engineering
    • User Education
  • Policies and Procedures
    • Overview
    • Data Classifications
    • PII and PHI
    • Security Policies
    • User Education
    • Vendor Relationships
    • Disposal Policies
    • Incident Response Procedures
    • Data Collection Procedures
    • IT Security Frameworks
Write a review

Write a review

Please login or register to review

Tags: cybersecurity, Network Security