My Training Academy

CompTIA Security+

My Training Academy
Prezzo Emagister

560 € 221 
*Prezzo Orientativo
Importo originale in GBP:
£ 495  £ 195

Informazioni importanti

Tipologia Vocational qualification
Metodologia Online
Inizio Scegli data
  • Vocational qualification
  • Online
  • Inizio:
    Scegli data

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management Ð making it an important stepping stone of an IT security career.

IT security is paramount to organisations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it's essential to have effective security practices in place. That's where CompTIA Security+ comes in.

You will learn how to ensure a network is secure, how to detect and deal with security threats, identify vulnerabilities and cryptography (the writing and solving of codes). The acquisition of the Network+ certification will mean that you have a superior understanding of various security- and networking-related matters.

Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you're ready for the job.

After completing this course, you will learn the skills and knowledge required to work effectively in a professional IT environment and prepared for your CompTIA Security+ exam. Once certified, you'll be qualified for jobs such as Internet Security Specialist and IT Security Consultant, earning an average salary of about £32,500.00 per year, as well as ready to build on these fundamentals and specialise in your preferred area with further CompTIA certifications.

The great thing about our CompTIA Security+ course is that you are in charge of your start and finish date, with no deadline pressures!

We train our students to the very best standards, offering expert instructor-led training via our state of the art eLearning platform.

By achieving the CompTIA Security+ certification you will create more career opportunities and...

Informazioni importanti

Prezzo per gli utenti Emagister:

Strutture (1)
Dove e quando
Inizio Luogo
Scegli data
Inizio Scegli data

Cosa impari in questo corso?

Data Protection
Computer Engineering
IT Security
Network Training
Data security
Computer Systems
IT Systems
Computer Science
Network Engineering


Unit 01 Topic A: System Maintenance
Causes of Compromised Security
Technology Weaknesses
Configuration Weaknesses
Policy Weaknesses
Human Error and Malice
Securing the Operating System
Microsoft Update
Windows Update Categories
Demo Ð A-2: Updating the Operating System
Patch Management
Demo Ð A-3: Managing Software Patches
Service Packs
Demo Ð A-4: Checking for and Installing Service Packs
BIOS Version
BIOS Update
Demo Ð A-5: Determining Whether You Need to Update your Computer's BIOS
Windows Firewall
User Account Control
Demo Ð A-6: Configuring Windows FirewallTopic B: Application Security
Application Vulnerabilities
Demo Ð B-1: Managing Application SecurityTopic C: Physical Security
Physical Access Control
Smart Card and Reader
Fingerprint Scanner
Biometric Devices
Plant Security
Cipher Lock
Man-trap Topic D: Malware
Malware Varieties
Malware Effects Anti-malware
Antivirus Software
Anti-malware Products
Demo Ð D-2: Installing Antivirus Software
Windows Defender
Demo Ð D-3: Scanning your System for Spyware Topic E: Social Engineering
Social Engineering
Types of Social Engineering
Social Engineering Countermeasures
Demo Ð E-2: Examining Phishing
Social NetworkingUnit 01 ReviewUnit 02 Ð Cryptography Topic A: Symmetric Cryptography
ROT13 Cipher
Symmetric Encryption in Action
Common Symmetric Ciphers
Uses for Hashes
MD5 Hash Algorithm
Hash Vulnerabilities
Demo Ð A-2: Calculating Hashes
Demo Ð A-3: Sharing a Secret Message with SteganographyTopic B: Public Key Cryptography
Public Key Cryptography
Asymmetric Encryption in Action
Common Asymmetric Ciphers
Demo Ð B-1: Exploring Public Key Cryptography
Digital Signatures
Signature Process
Features of Signatures
Digital Certificates
Certificate Types
Demo Ð B-2: Examining Certificates
Public Key Infrastructure
Certificate Policy
Certificate Practice Statement
Trust Models
Single-authority Trust Model
Hierarchical Trust Model
Web of Trust Model
Demo Ð B-3: Examining Certificate Trusts Single- and Dual-key Certificates
Quantum CryptographyUnit 02 Review Unit 03 Ð Authentication Topic A: Authentication Factors and Requirements
Three Steps to Secure Resources
Authentication Factors
One-factor Authentication
Two-factor Authentication
Three-factor Authentication
Identification and Authentication
Identity Proofing
Single Sign-onTopic B: Authentication Systems
Authentication Protocols
NTLM Challenge-response
NTLM Vulnerabilities
Kerberos System Composed of:
Kerberos Data Types:
Kerberos Authentication Process
Cross-realm Authentication
Kerberos Security Weaknesses
Null SessionsTopic C: Authentication System Variables
Authentication Vulnerabilities
Secure Passwords
Password Realities
Least Privilege
Demo Ð C-1: Identifying Authentication Vulnerabilities
Demo Ð C-2: Capturing Passwords with a Protocol Analyzer
Password Cracking
Password Guessing
SAM and SYSTEM Files
Demo Ð C-3: Cracking PasswordsUnit 03 ReviewUnit 04 Ð User Ð and Role-based Security Topic A: Baseline Security Policies
Security Baselines
Demo Ð A-1: Using MBSA to Analyse Security
Group Policy Settings
Local GPO Types
GPO Editor
Local Computer GPO Nodes
Demo Ð A-2: Creating a Console to Manage Local Security Policies
Policy Properties Dialog Box
Container Types
Types of Domain GPOs
GPOs Applied in this Order
Demo Ð A-3: Using the GPMCTopic B: Resource Access
Demo Ð B-1: Creating Users and Groups Based on Security Needs
File System Security
Access Control Models
Demo Ð B-2: Securing File ResourcesUnit 04 ReviewUnit 05 Ð Peripheral Security Topic A: File and Disk Encryption
File and Disk Encryption
File-level Encryption
Demo Ð A-1: Enabling File-based Encryption
Whole Disk Encryption
Windows BitLocker
BitLocker Life Cycle
Other Disk Encryption Tools
Demo Ð A-2: Creating an Encrypted Volume
Demo Ð A-3: Mounting, Using, and Dismounting an Encrypted VolumeTopic B: Peripheral and Component Security
Peripherals and Components
USB Drives
Shredding Standards
Demo Ð B-2: Using Windows Policies to Mitigate the Risks of PeripheralsTopic C: Mobile Device Security
Mobile Device Risks
Additional Concerns
Mitigating Risks
Screen Lock
Android Security Settings
Risks and ThreatsUnit 05 ReviewUnit 06 Ð Public Key Infrastructure Topic A: Public Key Cryptography
Setup and Initialization Phase
Administration Phase
Cancellation and Key History
Administrative ResponsibilitiesTopic B: Implementing Public Key Infrastructure
Microsoft Certificate Services
AD Integration Options
Demo Ð B-1: Installing a Standalone Root Certificate Authority
Demo Ð B-2: Installing an Enterprise Subordinate CA
Demo Ð B-3: Implementing a File-based Certificate Request
Demo Ð B-4: Managing your Certificate Server
User Certificates
Demo Ð B-5: Requesting a User Certificate
Certificate Revocation
Demo Ð B-6: Revoking a Certificate
Key Escrow and Recovery
Key Recovery Agent
Demo Ð B-7: Enabling the EFS Recovery Agent Template
Demo Ð B-8: Enrolling for a Recovery Agent Certificate
Demo Ð B-9: Enabling Key Archival
Demo Ð B-10: Re-enrolling All CertificatesTopic C: Web Server Security with PKI
Securing Web Servers
Commercial Certificate
Demo Ð C-1: Requesting and Installing a Web Server Certificate
Demo Ð C-2: Enabling SSL for the Certificate Server Website
HTTPS Connections
Demo Ð C-3: Making a Secure Connection
Demo Ð C-4: Requesting a Client Certificate via the WebUnit 06 ReviewUnit 07 Ð Application and Messaging Security Topic A: Application Security
Application Security
Programmer's Perspective
Administrator's Perspective
User's Perspective
Application AttacksTopic B: E-mail Security
E-mail Security
E-mail Application Security
Demo Ð B-2: Configuring an E-mail Client to Use Secure Authentication
Signed and Encrypted Mail
PGP Certificates
X.509 Certificates
Demo Ð B-3: Examining S/MIME Features
Using PGP
Demo Ð B-4: Installing Gnu Privacy Guard and Enigmail
Demo Ð B-5: Creating an OpenPGP Certificate and Key Pair
Signed Message
Demo Ð B-6: Sending a Signed MessageTopic C: Social Networking and Messaging
Social Networking
Instant Messaging
IM PortsUnit 07 ReviewENTRY REQUIREMENTSAlthough there are no formal prerequisites, it is recommended that you earn the CompTIA Network+ certification before studying the CompTIA Security+ course.MULTI-USER TRAINING PACKAGESThis online course can be integrated in your professional training plan. M.T.A. can provide you with a tailored learning solution, that can be customised to meet each team member's requirements. Choosing a multi-user training package, you can get significant discounts for 5+ users and even further discounts for 10+ users Ð and an excellent return on your investment.