$125 | Duration: 6h 17m | Video: h264, 1920x1080 | Audio: AAC, 48kHz, 2 Ch | 1.1 GB
Genre: eLearning | Language: English | January 31, 2019
Learn Essential Principles of network security and risk management and pass CompTIA Security+ Certification Exam
Video Description
CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. According to the Bureau of Labor Statistics, security specialists, administrators, and managers earn over $86,000 per year.
The CompTIA Security+ SY0-501 course enables you to gain the knowledge and skills required to install and configure systems to secure applications, networks, and devices. You’ll be able to perform threat analysis and respond with appropriate mitigation techniques. You’ll participate in risk mitigation activities and operate with an awareness of applicable policies, laws, and regulations.
Upon successfully validating your skills by passing the certification exam, you’ll be able to perform these tasks to support the principles of confidentiality, integrity, and availability.
Style and Approach
This course aims to provide complete coverage of every Comptia Security+ Certification . The course is filled with relevant, concise demonstrations and explanations to help you understand concepts better.
Table of Contents
COURSE INTRODUCTION AND LAB SETUP
THREATS, ATTACKS, AND VULNERABILITIES FOR COMPTIA SECURITY+
TOOLS AND TECHNIQUES FOR COMPTIA SECURITY+
NETWORK COMPONENTS CONFIGURATION FOR COMPTIA SECURITY+
IMPLEMENT SECURE DEVICES AND PROTOCOLS FOR COMPTIA SECURITY+
SECURING INDIVIDUAL SYSTEMS FOR COMPTIA SECURITY+
ARCHITECTURE AND DESIGN FOR COMPTIA SECURITY+
IDENTITY AND ACCESS MANAGEMENT
CONFIGURING AND IMPLEMENTING IDENTITY AND ACCESS SERVICES
RISK MANAGEMENT FOR COMPTIA SECURITY+
RISK MANAGEMENT PLANS
CRYPTOGRAPHY AND PKI
INSTALL AND CONFIGURE WIRELESS STANDARDS
COMPTIA SECURITY+ SY0-501 EXAM PRACTICE QUESTIONS
What You Will Learn
Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
Understand the principles of organizational security and the elements of effective security policies.
Know the technologies and uses of cryptographic standards and products.
Install and configure network- and host-based security technologies.
Describe how wireless and remote access security is enforced.
Describe the standards and products used to enforce security on web and communications technologies. Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
Authors
Sunil Gupta
A computer and cyber security expert, Sunil Gupta consults in information technology with a focus on cyber security. He is an invited speaker for, and a member of, many key organizations.
Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations and products. His primary passion is cyber security, but he understands that, to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber-security expert, and always exceeds his clients' expectations.
Sunil performs leading-edge security consulting and works in research and development as a security expert to advance the state of the art in information systems security.
发布日期: 2019-02-02