DIGITAL FIRST APPRENTICESHIPS | Call: 01235 634100

CompTIA Security+: SY0-401

£499.00 exc VAT
Qty

CompTIA Security+ certification is globally recognized to validate foundational, vendor-neutral IT security knowledge and skills. This CompTIA Security+ course is an excellent starting point for a career in information security and will prepare you to pass the Security+ exam.

Course Content

Module 1: Networking Terminology
1.1 Course Introduction
1.2 Network Devices Part 1
1.3 Network Devices Part 2
1.4 Networking Cabling
1.5 Networking Addressing Part 1
1.6 Networking Addressing Part 2
1.7 Networking Addressing Part 3
1.8 Networking Addressing Part 4

Module 2: Locking Down Or Network
2.1 Firewalls Part 1
2.2 Firewalls Part 2
2.3 Intrusion Detection Systems
2.4 Network Design
2.5 Securing Devices

Module 3: Wireless
3.1 Wireless Basics Part 1
3.2 Wireless Basics Part 2
3.3 Securing Wireless Part 1
3.4 Securing Wireless Part 2
3.5 Configuring Wireless, Bluetooth And Infrared

Module 4: Intro To Security Terminology
4.1 Goals Of Information Security
4.2 Authentication And Authorization
4.3 Security Principles And Terminology Part 1
4.4 Security Principles And Terminology Part 2

Module 5: Policies And Standards
5.1 Introduction To Security Policies
5.2 Looking At Some Security Policies Part 1
5.3 Looking At Some Security Policies Part 2
5.4 Looking At Some Security Policies Part 3
5.5 Human Resource Policies Part 1
5.6 Human Resource Policies Part 2
5.7 User Education And Awareness Part 1
5.8 User Education And Awareness Part 2

Module 6: Physical Security„„
6.1 Business Location
6.2 Physical Access Controls
6.3 Implementing Environmental Controls

Module 7: Risk Analysis
7.1 Introduction Risk Analysis Part 1
7.2 Introduction Risk Analysis Part 2
7.3 Types Of Risk Analysis
7.4 Risk Mitigation Strategies

Module 8: Disaster Recovery, Business Continuity And BIA (Business Impact Analysis)
8.1 Business Continuity
8.2 Business Impact Analysis
8.3 Disaster Recovery
8.4 Backup And Restore

Module 9: Introduction To Computer Forensics
9.1 Working With Evidence
9.2 Collecting Digital Evidence Part 1
9.3 Collecting Digital Evidence Part 2
9.4 Looking At Incident Response

Module 10: Types Of Attacks
10.1 Social Engineering
10.2 Network Attacks Part 1
10.3 Network Attacks Part 2
10.4 Password And Application Attacks

Module 11: System Security Threats
11.1 Identifying Physical Threats
11.2 Malicious Software Part 1
11.3 Demo
11.4 Malicious Software Part 2
11.5 Threats Against Hardware

Module 12: Security Assessments
12.1 Types Of Assessments
12.2 Penetration Testing

Module 13: Monitoring And Auditing
13.1 Introduction To Monitoring And Monitoring Tools
13.2 Implementing Logging And Auditing

Module 14: Authentication
14.1 Authentication Models
14.2 Authentication Protocols
14.3 Implementing Authentication

Module 15: Access Control
15.1 Introducing Access Control
15.2 Access Control Models
15.3 Implementing Access Control Part 1
15.4 Implementing Access Control Part 2

Module 16: Mitigating Security Threats
16.1 Operating System Hardening
16.2 System Hardening Procedures
16.3 Application Security
16.4 Server Hardening Best Practices Part 1
16.5 Server Hardening Best Practices Part 2

Module 17: Implementing System Security
17.1 Implementing Personal Firewalls And HIDS
17.2 Protecting Against Malware
17.3 Device Security And Data Security Part 1
17.4 Device Security And Data Security Part 2
17.5 Understanding Virtualization And Cloud Computing

Module 18: Cryptography
18.1 Introduction To Cryptography
18.2 Symmetric And Asymmetric Encryption
18.3 Understanding Hashing And Encryption Uses

Module 19: Public Key Infrastructure
19.1 Intro To PKI
19.2 Managing And Implementing PKI
19.3 Course Conclusion