Your Growth, Our Mission
In the Security+ Certification Prep Course, you will learn to:
Chapter 1: Security Fundamentals
Module A: Security concepts
Module B: Risk management
Module C: Vulnerability assessment
Chapter 2: Understanding attacks
Module A: Understanding attackers
Module B: Social engineering
Module C: Malware
Module D: Network attacks
Module E: Application attacks
Chapter 3: Cryptography
Module A: Cryptography concepts
Module B: Public key infrastructure
Chapter 4: Network fundamentals
Module A: Network components
Module B: Network addressing
Module C: Network ports and applications
Chapter 5: Securing networks
Module A: Network security components
Module B: Transport encryption
Module C: Hardening networks
Module D: Monitoring and detection
Chapter 6: Securing hosts and data
Module A: Securing hosts
Module B: Securing data
Module C: Mobile device security
Chapter 7: Securing network services
Module A: Securing applications
Module B: Virtual and cloud systems
Chapter 8: Authentication
Module A: Authentication factors
Module B: Authentication protocols
Chapter 9: Access control
Module A: Access control principles
Module B: Account management
Chapter 10: Organizational security
Module A: Security policies
Module B: User training
Module C: Physical security and safety
Chapter 11: Disaster planning and recovery
Module A: Business continuity
Module B: Fault tolerance and recovery
Module C: Incident response
Glossary
LABS
Chapter 2: Understanding Attacks
Examining Phishing Attacks
Examining Malware
Probing a Site
Simulating a DOS Attack
Cracking Passwords
Simulating an Eavesdropping Attack
Exploring Application Vulnerabilities
Examining SQL Injection Attacks
Examining Client-side Attacks
Chapter 3: Cryptography
Symmetric Encryption
Asymmetric Encryption
Creating File Hashes
Installing a Certificate Authority
Chapter 4: Network Fundamentals
Using TCP/IP Tools
Chapter 5: Securing the Network
Configuring a Firewall
Examining Website Certificates
Securing a WAP
Viewing Event Logs
Scanning the Network
Chapter 6: Securing Hosts and Data
Enabling BitLocker
Chapter 7: Securing Network Services
Finding Vulnerable Code
Chapter 8: Authentication
Installing a RADIUS Server
Examining Active Directory
Chapter 9: Access Control
Managing NTFS Permissions
Managing Active Directory Objects
Using Group Policy Objects
Creating a Security Template
Chapter 11: Disaster planning and recovery
Using Windows Server Backup
| Code | Date | Venue | Fees | Action |
|---|
Prices don't include VAT
Your Growth, Our Mission