CompTia Security+ SY0-501

CompTia Security+ SY0-501
Product Code: CTS+
Availability: In Stock
Price: R810.00

CompTia Security+ SY0-501

PS You can change currency to see the price in your country at the top of the screen, just below the search box

Course Overview
The CompTIA Security+ (Exam SY0-501) is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization. You can also take this course to prepare for the CompTIA Security+ certification examination. In this course, you will build on your knowledge of and professional experience with security fundamentals, networks, and organizational security as you acquire the specific skills required to implement basic security services on any type of computer network. 2KO International offers services, consulting and training in both the business and IT space. Our training can be delivered either as full-time classes or as online e-learning. This course can benefit you in two ways. If you intend to pass the CompTIA Security+ (Exam SY0-501) certification examination, this course can be a significant part of your preparation. But certification is not the only key to professional success in the field of computer security. Today's job market demands individuals with demonstrable skills, and the information and activities in this course can help you build your computer security skill set so that you can confidently perform your duties in any security-related role..

Who Should Attend
This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

Course Objectives
You will: Identify the fundamental components of information security. Analyze risk. Identify various threats to information security. Conduct security assessments to detect vulnerabilities. Implement security for hosts and software. Implement security for networks. Manage identity and access. Implement cryptographic solutions in the organization. Implement security at the operational level. Address security incidents. Ensure the continuity of business operations in the event of an incident.

 

Course Content

Identifying Security Fundamentals

Topic A: Identify Information Security Concepts
Topic B: Identify Basic Security Controls
Topic C: Identify Basic Authentication and Authorization Concepts
Topic D: Identify Basic Cryptography Concepts

Analyzing Risk
Topic A: Analyze Organizational Risk
Topic B: Analyze the Business Impact of Risk

Identifying Security Threats
Topic A: Identify Types of Attackers
Topic B: Identify Social Engineering Attacks
Topic C: Identify Malware
Topic D: Identify Software-Based Threats
Topic E: Identify Network-Based Threats
Topic F: Identify Wireless Threats
Topic G: Identify Physical Threats

Conducting Security Assessments
Topic A: Identify Vulnerabilities
Topic B: Assess Vulnerabilities
Topic C: Implement Penetration Testing

Implementing Host and Software Security
Topic A: Implement Host Security
Topic B: Implement Cloud and Virtualization Security
Topic C: Implement Mobile Device Security
Topic D: Incorporate Security in the Software Development Lifecycle

Implementing Network Security
Topic A: Configure Network Security Technologies
Topic B: Secure Network Design Elements
Topic C: Implement Secure Networking Protocols and Services
Topic D: Secure Wireless Traffic

Managing Identity and Access
Topic A: Implement Identity and Access Management
Topic B: Configure Directory Services
Topic C: Configure Access Services
Topic D: Manage Accounts

Implementing Cryptography
Topic A: Identify Advanced Cryptography Concepts
Topic B: Select Cryptographic Algorithms
Topic C: Configure a Public Key Infrastructure
Topic D: Enroll Certificates
Topic E: Back Up and Restore Certificates and Private Keys
Topic F: Revoke Certificates

Implementing Operational Security
Topic A: Evaluate Security Frameworks and Guidelines
Topic B: Incorporate Documentation in Operational Security
Topic C: Implement Security Strategies
Topic D: Manage Data Security Processes
Topic E: Implement Physical Controls

Addressing Security Incidents
Topic A: Troubleshoot Common Security Issues
Topic B: Respond to Security Incidents
Topic C: Investigate Security Incidents

Ensuring Business Continuity
Topic A: Select Business Continuity and Disaster Recovery Processes
Topic B: Develop a Business Continuity Plan

 

Write a review

Your Name:


Your Review: Note: HTML is not translated!

Rating: Bad           Good

Enter the code in the box below: