Cyber Security Training Catalog – CompTIA Security+ (Exam SY0-401) !

$150.00Read more

Overview: The CompTIA Security+ (SY0-401) certification establishes knowledgeable professionals in the field of corporate security, one of the fastest-growing fields in IT. Even in a troubled economy, most businesses plan to at least maintain or optimally increase their investment in IT security. CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in network infrastructure, system security, organizational security and access control. CompTIA Security+ is the certification globally trusted to validate foundational, vendor- neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career. Recommended experience for this certification includes CompTIA Network+ and two years of experience in IT administration with a security focus. No prerequisites required

Course Modules:

Module 01 – Security Fundamentals

(Duration: 2h 29mm)

  1. Workbook (Pdf)
  2. Topic A: The Information Security Cycle
  3. What Is Information Security?
  4. What to Protect
  5. Goals of Security
  6. Risk
  7. Threats
  8. A Vulnerability
  9. Intrusions
  10. Attacks
  11. Controls
  12. Types of Controls
  13. The Security Management Process
  14. Topic B: Information Security Controls
  15. The CIA Triad
  16. Non-repudiation
  17. Identification
  18. Authentication
  19. Authentication Factors
  20. Authorization
  21. Access Control
  22. Access Control Models
  23. Accounting and Auditing
  24. Common Security Practices
  25. Implicit Deny
  26. Least Privilege
  27. Separation of Duties
  28. Job Rotation
  29. Mandatory Vacation
  30. Time of Day Restrictions
  31. Privilege Management
  32. Topic C: Authentication Methods
  33. User Name/Password Authentication
  34. Tokens
  35. Biometrics
  36. Geolocation
  37. Keystroke Authentication
  38. Multi-factor Authentication
  39. Mutual Authentication
  40. Topic D: Cryptography Fundamentals
  41. Cryptography
  42. Encryption and Decryption
  43. Ciphers
  44. Cipher Types
  45. Encryption and Security Goals
  46. Demo- Exploring Public Key Cryptography
  47. Steganography
  48. Demo- Sharing a Secret Message with Steganography
  49. A Key Hashing Encryption
  50. Hashing Encryption Algorithms
  51. Demo- Calculating Hashes
  52. Symmetric Encryption
  53. Symmetric Encryption Algorithms
  54. Asymmetric Encryption
  55. Asymmetric Encryption Techniques
  56. Key Exchange
  57. Digital Signatures
  58. Cipher Suites
  59. Session Keys
  60. Key Stretching
  61. Topic E: Security Policy Fundamentals
  62. A Security Policy
  63. Security Policy Components
  64. Common Security Policy Types
  65. Group Policy
  66. Security Document Categories
  67. Change Management
  68. Documentation Handling Measures
  69. Lesson 01 Review
  70. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – Managing Data, Application, and Host Security

(Duration: 1h 06m)

  1. Workbook (Pdf)
  2. Topic A: Manage Data Security
  3. Layered Security
  4. Defense in Depth
  5. What Is Data Security?
  6. Data Security Vulnerabilities
  7. Data Storage Methods
  8. Data Encryption Methods
  9. Hardware-Based Encryption Devices
  10. Types of Hardware-Based Encryption Devices
  11. Data States
  12. Permissions and Access Control Lists
  13. Handling Big Data
  14. Data Policies
  15. Guidelines for Managing Data Security
  16. Demo- Managing Data Security
  17. Topic B: Manage Application Security
  18. What Is Application Security?
  19. Patch Management
  20. Application Security Methods
  21. Input Validation
  22. Input Validation Vulnerabilities
  23. Client-Side and Server-Side Validation
  24. Error and Exception Handling
  25. XSS
  26. XSRF
  27. Cross-Site Attack Prevention Methods
  28. Fuzzing
  29. Web Browser Security
  30. Demo- Configuring a Web Browser
  31. Guidelines for Establishing Web Browser Security
  32. NoSQL Databases
  33. Database Security
  34. Guidelines for Managing Application Security
  35. Topic C: Manage Device and Host Security
  36. Hardening
  37. Demo- Hardening a Server
  38. Operating System Security
  39. Operating System Security Settings
  40. TCB
  41. Security Baselines
  42. Software Updates
  43. Application Blacklisting and Whitelisting
  44. Logging
  45. Auditing
  46. Demo – Implementing Auditing
  47. Anti-malware Software
  48. Types of Anti-malware Software
  49. Virtualization Security Techniques
  50. Hardware Security Controls
  51. Non-standard Hosts
  52. Security Controls for Non-standard Hosts
  53. Strong Passwords
  54. Guidelines for Establishing Device and Host Security
  55. Topic D: Manage Mobile Security
  56. Mobile Device Types
  57. Mobile Device Vulnerabilities
  58. Mobile Device Security Controls
  59. Mobile Application Security Controls
  60. BYOD Controls
  61. Guidelines for Managing Mobile Security
  62. Lesson 03 Review
  63. Review Quiz (Number of attempts allowed: Unlimited)

Module 05 – Implementing Access Control, Authentication, and Account Management

(Duration: 1h 17m)

  1. Workbook (Pdf)
  2. Topic A: Access Control and Authentication Services
  3. Directory Services
  4. LDAP
  5. LDAPS
  6. Common Directory Services
  7. Demo – Backing Up Active Directory
  8. Remote Access Methods
  9. Tunneling
  10. Remote Access Protocols
  11. HOTP
  12. TOTP
  13. PAP
  14. CHAP
  15. Guidelines for Securing Remote Access
  16. PGP
  17. RADIUS
  18. TACACS
  19. Kerberos
  20. SAML
  21. Topic B: Implement Account Management Security Controls
  22. Identity Management
  23. Account Management
  24. Account Privileges
  25. Account Policy
  26. Multiple Accounts
  27. Shared Accounts
  28. Account Federation
  29. Account Management Security Controls
  30. Demo – Account Management Security Controls
  31. Credential Management
  32. Group Policy
  33. Guidelines for Implementing Account Management Security Controls
  34. Lesson 05 Review
  35. Review Quiz (Number of attempts allowed: Unlimited)

Module 07 – Implementing Compliance and Operational Security

(Duration: 50m)

  1. Workbook (Pdf)
  2. Topic A: Physical Security
  3. Physical Security Controls
  4. Physical Security Control Types
  5. Environmental Exposures
  6. Environmental Controls
  7. Environmental Monitoring
  8. Safety
  9. Topic B: Legal Compliance
  10. Compliance Laws and Regulations
  11. Legal Requirements
  12. Types of Legal Requirements
  13. Forensic Requirements
  14. Topic C: Security Awareness and Training
  15. Security Policy Awareness
  16. Role-Based Training
  17. PII
  18. Classification of Information
  19. The Employee Education Process
  20. User Security Responsibilities
  21. Validation of Training Effectiveness
  22. Topic D: Integrate Systems and Data with Third Parties
  23. Business Partners
  24. Social Media Networks and Applications
  25. Interoperability Agreements
  26. Risk Awareness
  27. Data Sharing and Backups
  28. Guidelines for Securely Integrating Systems and Data with Third Parties
  29. Lesson 07 Review
  30. Review Quiz (Number of attempts allowed: Unlimited)

Module 09 – Troubleshooting and Managing Security Incidents

(Duration: 33m)

  1. Workbook (Pdf)
  2. Topic A: Respond to Security Incidents
  3. Security Incident Management
  4. Computer Crime
  5. An IRP
  6. First Responders
  7. Chain of Custody
  8. Computer Forensics
  9. Order of Volatility
  10. Basic Forensic Process
  11. Basic Forensic Response Procedures for IT
  12. Big Data Analysis
  13. Guidelines for Responding to Security Incidents
  14. Topic B: Recover from a Security Incident
  15. Basic Incident Recovery Process
  16. Damage Assessment
  17. Recovery Methods
  18. An Incident Report
  19. Guidelines for Recovering from a Security Incident
  20. Lesson 09 Review
  21. Review Quiz (Number of attempts allowed: Unlimited)

Module 02 – Identifying Security Threats and Vulnerabilities

(Duration: 2h 38m)

  1. Workbook (Pdf)
  2. Topic A: Social Engineering
  3. Social Engineering Attacks
  4. Social Engineering Effectiveness
  5. Types of Social Engineering
  6. Hackers and Attackers
  7. Categories of Attackers
  8. Topic B: Malware
  9. Malicious Code Attacks
  10. Viruses
  11. Demo – Installing Antivirus Software
  12. Worms
  13. Adware
  14. Spyware
  15. Demo – Scanning Your System for Spyware
  16. Trojan Horses
  17. Rootkits
  18. Logic Bombs
  19. Botnets
  20. Ransomware
  21. Polymorphic Malware
  22. Armored Viruses
  23. Topic C: Software-Based Threats
  24. Software Attacks
  25. Password Attacks
  26. Types of Password Attacks
  27. Backdoor Attacks
  28. Application Attacks
  29. Types of Application Attacks
  30. Demo – Managing Application Security
  31. Topic D: Network-Based Threats
  32. TCP/IP Basics
  33. Port Scanning Attacks
  34. Eavesdropping Attacks
  35. Man-in-the-Middle Attacks
  36. Replay Attacks
  37. Social Network Attacks
  38. DoS Attacks
  39. DDoS Attacks
  40. Types of DoS Attacks
  41. Session Hijacking
  42. P2P Attacks
  43. ARP Poisoning
  44. Transitive Access Attacks
  45. DNS Vulnerabilities
  46. Topic E: Wireless Threats and Vulnerabilities
  47. Wireless Security
  48. Demo – Configuring a Wireless Access Point
  49. Demo – Configuring a Wireless Client
  50. Rogue Access Points
  51. Evil Twins
  52. Jamming
  53. Bluejacking
  54. Bluesnarfing
  55. Near Field Communication
  56. War Driving and War Chalking
  57. IV Attacks
  58. Packet Sniffing
  59. Wireless Replay Attacks
  60. Sinkhole Attacks
  61. WEP and WPA Attacks
  62. WPS Attacks
  63. Topic F: Physical Threats and Vulnerabilities
  64. Physical Security
  65. Physical Security Threats and Vulnerabilities
  66. Hardware Attacks
  67. Environmental Threats and Vulnerabilities
  68. Lesson 02 Review
  69. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – Implementing Network Security

(Duration: 3h 9m)

  1. Workbook (Pdf)
  2. Topic A: Configure Security Parameters on Network Devices and Technologies
  3. Network Components
  4. Network Devices
  5. Demo – Configuring Firewall Parameters
  6. Network Analysis Tools
  7. IDS
  8. NIDS
  9. Demo – Configuring a Network Intrusion Detection System
  10. Wireless IDS
  11. IPS
  12. NIPS
  13. WIPS
  14. Types of Network Monitoring Systems
  15. VPN
  16. VPN Concentrator
  17. Web Security Gateways
  18. Topic B: Network Design Elements and Components
  19. NAC
  20. DMZ
  21. VLAN
  22. Subnet
  23. NAT
  24. Remote Access
  25. Telephony Components
  26. Virtualization
  27. Cloud Computing
  28. Cloud Computing Deployment Models
  29. Cloud Computing Service Types
  30. Topic C: Implement Networking Protocols and Services
  31. OSI Model
  32. OSI Model and Security
  33. TCP/IP
  34. DNS
  35. HTTP
  36. SSL/TLS
  37. HTTPS
  38. SSH
  39. SNMP
  40. ICMP
  41. IPSec
  42. Demo – Securing Network Traffic Using IP Security
  43. iSCSI
  44. Fibre Channel
  45. FCoE
  46. Telnet
  47. NetBIOS
  48. File Transfer Protocols
  49. Ports and Port Ranges
  50. Demo – Installing an IIS Web Server
  51. Topic D: Apply Secure Network Administration Principles
  52. Rule-Based Management
  53. Network Administration Security Methods
  54. Unified Threat Management
  55. Guidelines for Applying Network Security Administration Principles
  56. Topic E: Secure Wireless Traffic
  57. Wireless Networks
  58. Wireless Antenna Types
  59. 802.11 Standards
  60. Wireless Security Protocols
  61. VPNs and Open Wireless
  62. Wireless Security Methods
  63. Captive Portals
  64. Site Surveys
  65. Guidelines for Securing Wireless Traffic
  66. Demo – Securing Wireless Traffic
  67. Lesson 04 Review
  68. Review Quiz (Number of attempts allowed: Unlimited)

Module 06 – Managing Certificates

(Duration: 57m)

  1. Workbook (Pdf)
  2. Topic A: Install a CA Hierarchy
  3. Digital Certificates
  4. Certificate Authentication
  5. PKI
  6. PKI Components
  7. CA Hierarchies
  8. The Root CA
  9. Public and Private Roots
  10. Subordinate CAs
  11. Offline Root CAs
  12. CA Hierarchy Design Options
  13. Demo – Installing a Certificate Authority
  14. Topic B: Enroll Certificates
  15. The Certificate Enrollment Process
  16. Demo – Enrolling for Certificates
  17. The Certificate Life Cycle
  18. Certificate Life Cycle Management
  19. Topic C: Secure Network Traffic by Using Certificates
  20. The SSL Enrollment Process
  21. Topic D: Renew Certificates
  22. Certificate Renewal
  23. Topic E: Back Up and Restore Certificates and Private Keys
  24. Private Key Protection Methods
  25. Key Escrow
  26. Private Key Restoration Methods
  27. The Private Key Replacement Process
  28. Topic F: Revoke Certificates
  29. Certificate Revocation
  30. Demo – Revoking Certificates
  31. A CRL
  32. OCSP
  33. Lesson 06 Review
  34. Review Quiz (Number of attempts allowed: Unlimited)

Module 08 – Risk Management

(Duration: 50m)

  1. Workbook (Pdf)
  2. Topic A: Risk Analysis
  3. Risk Management
  4. Security Assessment Types
  5. Risk Types
  6. Components of Risk Analysis
  7. Phases of Risk Analysis
  8. Risk Analysis Methods
  9. Risk Calculation
  10. Risk Response Strategies
  11. Risk Mitigation and Control Types
  12. Topic B: Implement Vulnerability Assessment Tools and Techniques
  13. Vulnerability Assessment Techniques
  14. Vulnerability Assessment Tools
  15. Topic C: Scan for Vulnerabilities
  16. The Hacking Process
  17. Ethical Hacking
  18. Vulnerability Scanning and Penetration Testing
  19. Types of Vulnerability Scans
  20. Demo – Scanning for Port Vulnerabilities
  21. Demo – Scanning for Password Vulnerabilities
  22. Box Testing Methods
  23. Security Utilities
  24. Topic D: Mitigation and Deterrent Techniques
  25. Security Posture
  26. DLP
  27. Demo – Capturing Network Data
  28. Detection Controls and Prevention Controls
  29. Risk Mitigation Strategies
  30. Types of Mitigation and Deterrent Techniques
  31. Failsafe, Failsecure, and Failopen
  32. Lesson 08 Review
  33. Review Quiz (Number of attempts allowed: Unlimited)

Module 10 – Business Continuity and Disaster Recovery Planning

(Duration: 50m)

  1. Workbook (Pdf)
  2. Topic A: Business Continuity
  3. A BCP
  4. BIA
  5. MTD
  6. RPO
  7. RTO
  8. Continuity of Operations Plan
  9. Alternate Sites
  10. IT Contingency Planning
  11. Succession Planning
  12. Business Continuity Testing Methods
  13. Topic B: Plan for Disaster Recovery
  14. A DRP
  15. Fault Tolerance
  16. Redundancy Measures
  17. Demo – Creating a RAID Array Through Software
  18. High Availability
  19. Disaster Recovery Testing and Maintenance
  20. Guidelines for Planning for Disaster Recovery
  21. Topic C: Execute DRPs and Procedures
  22. The Disaster Recovery Process
  23. Recovery Team
  24. Secure Recovery
  25. Backup Types and Recovery Plans
  26. A Backout Contingency Plan
  27. Secure Backups
  28. Backup Storage Locations
  29. Guidelines for Executing DRPs and Procedures
  30. Lesson 10 Review
  31. Course Closure
  32. Review Quiz (Number of attempts allowed: Unlimited)
This course includes
  • about 16.39 hours on-demand video
  • 10 downloadable Pdf Workbooks
  • Unlimited time access (During Membership)
  • Access on mobile and Desktop
  • Certificate of Completion

$150.00Read more

Course Features Include:

  • Expert Lectures
    Learn on-demand from top instructors who are industry subject matter experts. Our highly certified expert instructors possess a superior understanding of the subject matter in their fields and have the ability to convey this knowledge in an effective, engaging, and professional manner to a wide audience.

  • Certificates of Completion
    Upon completion of a series of courses you can earn a certificate of completion from Career Academy. Certificates of Completion will display your full name, course completed, as well as the date of completion. Students have the ability to print this out or save it digitally to showcase your accomplishment.

  • PowerPoint Visuals:
    Many of the in-depth theories and processes discussed in our courses can be learned most efficiently through the detailed PowerPoint slides presented. These visuals are accompanied by an instructor voice-over to provide our students with a clear, efficient, and complete presentation of concepts.

  • Professional Development Activities
    Students are provided access to professional development activity files which allow for an individual to test out course theories and apply the knowledge they earned from the course.

  • Review Quizzes
    Once a course is completed, test your knowledge by taking our course review quiz! Students have the ability to retake any review quizzes as many times as they wish to ensure they understand the material or to improve upon their scores.

  • Mobile Access
    With our universal course player, you can learn from your computer, tablet as well as mobile devices. Keep up with your training on the go!

Trusted by Aspiring IT Professionals, Corporations and
Government agencies
for more than a Decade

Get unlimited online access learn anywhere, anytime using your computer or mobile device!