• My account
  • Cart
English courses / USD

CompTIA Security+

Regular Price: $697

Special Price: $275

  • 2 students have purchased
  • Express
Centre
My Training Academy
Town
Potters Bar
Address
Maple House High Street, Potters Bar Hertfordshire United Kingdom, EN6 5BS EN6 5BS See in Google maps
Contact
sales@mytrainingacademy.org.uk
http://www.mytrainingacademy.org.uk/
Map
Description
OUR MISSION: Our mission is to help you learn the skills you need to reach your full potential. WHO WE ARE: We are one of the fastest growing online training providers. We offer engaging, effective and flexible online training solutions to both individuals and businesses. We develop courses that help individuals to prepare for and complete their certification exams with ease. Our unique, flexible approach to learning means you don’t have to put your life on hold to get certified. You can study full time and part time, from home and work and on the move; online and on mobile devices. We provide world class education developed by highly skilled and experienced instructors. Our courses are upgraded regularly to ensure our learners are up-to-date with the latest industry requirements and best practices. WHAT WE BELIEVE We believe technology has paved the way for individuals and businesses all over the world to tap into high quality learning at their fingertips.

Benefits

  • Social Learning
  • Make your own study schedule and take advantage of online tutoring hours
  • Obtain a certified diploma once you finish the course.

Details

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management Ð making it an important stepping stone of an IT security career.

IT security is paramount to organisations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it's essential to have effective security practices in place. That's where CompTIA Security+ comes in.

You will learn how to ensure a network is secure, how to detect and deal with security threats, identify vulnerabilities and cryptography (the writing and solving of codes). The acquisition of the Network+ certification will mean that you have a superior understanding of various security- and networking-related matters.

Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you're ready for the job.

After completing this course, you will learn the skills and knowledge required to work effectively in a professional IT environment and prepared for your CompTIA Security+ exam. Once certified, you'll be qualified for jobs such as Internet Security Specialist and IT Security Consultant, earning an average salary of about £32,500.00 per year, as well as ready to build on these fundamentals and specialise in your preferred area with further CompTIA certifications.

The great thing about our CompTIA Security+ course is that you are in charge of your start and finish date, with no deadline pressures!

We train our students to the very best standards, offering expert instructor-led training via our state of the art eLearning platform.

By achieving the CompTIA Security+ certification you will create more career opportunities and...

Unit 01 Topic A: System Maintenance
Causes of Compromised Security
Technology Weaknesses
Configuration Weaknesses
Policy Weaknesses
Human Error and Malice
Securing the Operating System
Microsoft Update
Windows Update Categories
Demo Ð A-2: Updating the Operating System
Patch Management
Demo Ð A-3: Managing Software Patches
Service Packs
Demo Ð A-4: Checking for and Installing Service Packs
BIOS Version
BIOS Update
Demo Ð A-5: Determining Whether You Need to Update your Computer's BIOS
Windows Firewall
User Account Control
Demo Ð A-6: Configuring Windows FirewallTopic B: Application Security
Application Vulnerabilities
Countermeasures
Demo Ð B-1: Managing Application SecurityTopic C: Physical Security
Physical Access Control
Smart Card and Reader
Fingerprint Scanner
Biometric Devices
Plant Security
Cipher Lock
Man-trap Topic D: Malware
Malware Varieties
Malware Effects Anti-malware
Antivirus Software
Anti-malware Products
Demo Ð D-2: Installing Antivirus Software
Windows Defender
Demo Ð D-3: Scanning your System for Spyware Topic E: Social Engineering
Social Engineering
Types of Social Engineering
Social Engineering Countermeasures
Phishing
Demo Ð E-2: Examining Phishing
Spam
Social NetworkingUnit 01 ReviewUnit 02 Ð Cryptography Topic A: Symmetric Cryptography
ROT13 Cipher
Keys
Symmetric Encryption in Action
Common Symmetric Ciphers
Hashes
Uses for Hashes
MD5 Hash Algorithm
SHA
Hash Vulnerabilities
Demo Ð A-2: Calculating Hashes
Steganography
Demo Ð A-3: Sharing a Secret Message with SteganographyTopic B: Public Key Cryptography
Public Key Cryptography
Asymmetric Encryption in Action
Common Asymmetric Ciphers
Demo Ð B-1: Exploring Public Key Cryptography
Digital Signatures
Signature Process
Features of Signatures
Digital Certificates
Certificate Types
Demo Ð B-2: Examining Certificates
Public Key Infrastructure
Certificate Policy
Certificate Practice Statement
Trust Models
Single-authority Trust Model
Hierarchical Trust Model
Web of Trust Model
Demo Ð B-3: Examining Certificate Trusts Single- and Dual-key Certificates
Quantum CryptographyUnit 02 Review Unit 03 Ð Authentication Topic A: Authentication Factors and Requirements
Three Steps to Secure Resources
Authentication Factors
One-factor Authentication
Two-factor Authentication
Three-factor Authentication
Considerations
Identification and Authentication
Identity Proofing
Single Sign-onTopic B: Authentication Systems
Authentication Protocols
NTLM
NTLM Challenge-response
NTLM Vulnerabilities
Kerberos
Kerberos System Composed of:
Kerberos Data Types:
Kerberos Authentication Process
Cross-realm Authentication
Kerberos Security Weaknesses
Null SessionsTopic C: Authentication System Variables
Authentication Vulnerabilities
Secure Passwords
Password Realities
Least Privilege
Demo Ð C-1: Identifying Authentication Vulnerabilities
Wireshark
Demo Ð C-2: Capturing Passwords with a Protocol Analyzer
Password Cracking
Password Guessing
SAM and SYSTEM Files
Demo Ð C-3: Cracking PasswordsUnit 03 ReviewUnit 04 Ð User Ð and Role-based Security Topic A: Baseline Security Policies
Security Baselines
Demo Ð A-1: Using MBSA to Analyse Security
Group Policy Settings
Local GPO Types
GPO Editor
Local Computer GPO Nodes
Demo Ð A-2: Creating a Console to Manage Local Security Policies
Policy Properties Dialog Box
Container Types
Types of Domain GPOs
GPOs Applied in this Order
Demo Ð A-3: Using the GPMCTopic B: Resource Access
Groups
Demo Ð B-1: Creating Users and Groups Based on Security Needs
Permissions
File System Security
Access Control Models
Demo Ð B-2: Securing File ResourcesUnit 04 ReviewUnit 05 Ð Peripheral Security Topic A: File and Disk Encryption
File and Disk Encryption
File-level Encryption
Demo Ð A-1: Enabling File-based Encryption
Whole Disk Encryption
Windows BitLocker
BitLocker Life Cycle
Recovery
Other Disk Encryption Tools
Demo Ð A-2: Creating an Encrypted Volume
Demo Ð A-3: Mounting, Using, and Dismounting an Encrypted VolumeTopic B: Peripheral and Component Security
Peripherals and Components
USB Drives
Laptops
Shredding Standards
Demo Ð B-2: Using Windows Policies to Mitigate the Risks of PeripheralsTopic C: Mobile Device Security
Mobile Device Risks
Additional Concerns
Mitigating Risks
Screen Lock
Android Security Settings
WaveSecure
Risks and ThreatsUnit 05 ReviewUnit 06 Ð Public Key Infrastructure Topic A: Public Key Cryptography
Management
Setup and Initialization Phase
Administration Phase
Cancellation and Key History
Administrative ResponsibilitiesTopic B: Implementing Public Key Infrastructure
Microsoft Certificate Services
AD Integration Options
Demo Ð B-1: Installing a Standalone Root Certificate Authority
Demo Ð B-2: Installing an Enterprise Subordinate CA
Demo Ð B-3: Implementing a File-based Certificate Request
Demo Ð B-4: Managing your Certificate Server
User Certificates
Demo Ð B-5: Requesting a User Certificate
Certificate Revocation
Demo Ð B-6: Revoking a Certificate
Key Escrow and Recovery
Key Recovery Agent
Demo Ð B-7: Enabling the EFS Recovery Agent Template
Demo Ð B-8: Enrolling for a Recovery Agent Certificate
Demo Ð B-9: Enabling Key Archival
Demo Ð B-10: Re-enrolling All CertificatesTopic C: Web Server Security with PKI
Securing Web Servers
Commercial Certificate
Demo Ð C-1: Requesting and Installing a Web Server Certificate
Demo Ð C-2: Enabling SSL for the Certificate Server Website
HTTPS Connections
Demo Ð C-3: Making a Secure Connection
Demo Ð C-4: Requesting a Client Certificate via the WebUnit 06 ReviewUnit 07 Ð Application and Messaging Security Topic A: Application Security
Application Security
Programmer's Perspective
Administrator's Perspective
User's Perspective
Application AttacksTopic B: E-mail Security
E-mail Security
E-mail Application Security
Demo Ð B-2: Configuring an E-mail Client to Use Secure Authentication
Signed and Encrypted Mail
PGP
PGP Certificates
S/MIME
X.509 Certificates
PGP vs. S/MIME
Demo Ð B-3: Examining S/MIME Features
Using PGP
Demo Ð B-4: Installing Gnu Privacy Guard and Enigmail
Demo Ð B-5: Creating an OpenPGP Certificate and Key Pair
Signed Message
Demo Ð B-6: Sending a Signed MessageTopic C: Social Networking and Messaging
Social Networking
Instant Messaging
IM PortsUnit 07 ReviewENTRY REQUIREMENTSAlthough there are no formal prerequisites, it is recommended that you earn the CompTIA Network+ certification before studying the CompTIA Security+ course.MULTI-USER TRAINING PACKAGESThis online course can be integrated in your professional training plan. M.T.A. can provide you with a tailored learning solution, that can be customised to meet each team member's requirements. Choosing a multi-user training package, you can get significant discounts for 5+ users and even further discounts for 10+ users Ð and an excellent return on your investment.

Conditions

Thanks to this offer, valid exclusively for one person, you will obtain a CompTIA Security+ Online Course.

How to register

By buying the course in Emagister Express, you will obtain an access coupon. We will send you the codes and keys to the coupon. Send the coupon code and the key to info@mytrainingacademy.org.uk. The training provider will then give you access to the course.

This course has not been reviewed yet
Hi! According to your location, we have changed your payment currency to USD.
You can change to other currency by using the option on the header.