Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

INE - CompTIA Security+

Posted By: serpmolot
INE - CompTIA Security+

INE - CompTIA Security+
English | flv | H264 1280x720 | AAC 2 ch | 15 hrs 32 min | 4.55 GB
eLearning

The CompTIA Security+ exam encompasses foundational information security principles for network security and enterprise risk management. This course, featuring over 15 hours of instruction, will help you develop the knowledge and skills necessary to identify and mitigate risk, apply security controls to protect confidentiality, integrity, and availability, gain an understanding of typical security technologies, identify and troubleshoot security events and incidents, and understand the roles of policies, laws, and regulations. Covering topics such as cryptography, access control, and identity management, this course also includes the recently added topics of cloud computing, bring-your-own-device, and SCADA system security. By the end of the course, students will have a firm grasp on application, information, infrastructure, and operational security principles.


Network Security

1. Introduction to Security
2. Network Design and OSI Model
3. Network Devices
4. Server Security
5. Cloud Computing
6. Additional Concepts (LAN/WAN, NAC, DMZ, NAT, Subnetting)
7. Common Ports and Protocols
8. Network Attacks (DoS, DDos, Spoofing, Hijacking, etc.)
9. Common Configuration Vulnerabilities
10. Vulnerabilities in Cabled Devices
11. Securing Wireless Networks
12. Bluetooth Vulnerabilities

Compliance and Operational Security

13. Environmental Controls
14. Social Engineering
15. Organizational Policies and Legal Compliance
16. System Redundancy
17. Disaster Recovery

Threats and Vulnerabilities

18. Threats and Vulnerabilities Introduction
19. Threats to Computer Systems
20. Implementing Security :: Part 1
21. Implementing Security :: Part 2
22. The Basics of Risk Assessments
23. Qualitative and Quantitative Methods
24. Analysis Methodologies
25. Security Controls and Vulnerability Management :: Part 1
26. Security Controls and Vulnerability Management :: Part 2
27. Penetration Testing
28. Vulnerability Scanning & Sniffing Attacks
29. Password Auditing and Analysis
30. System and Network Monitoring
31. Auditing

Application, Data and Host Security

32. Introduction to Research Tools
33. Securing the Web Browser
34. Securing Applications
35. Secure Programming
36. Programming Vulnerabilities and Attacks :: Part 1
37. Programming Vulnerabilities and Attacks :: Part 2
38. Securing the Operating System :: Part 1
39. Securing the Operating System :: Part 2
40. Virtualization Technologies :: Part 1
41. Virtualization Technologies :: Part 2

Access Controls and Identity Management

42. Access Control And Identity Management :: Introduction
43. Authentication Models :: Part 1
44. Access Control Models and Mechanisms :: Part 1
45. Access Control Models and Mechanisms :: Part 2
46. Physical Security
47. Authentication Models :: Part 2
48. Authentication Models :: Part 3

Cryptography

49. Introduction to Cryptography
50. Encryption and Hashing Concepts :: Part 1
51. Encryption and Hashing Concepts :: Part 2
52. Public Key Infrastructure
53. Security+ Review & Resources :: Part 1
54. Security+ Review & Resources :: Part 2


Screenshots:

INE - CompTIA Security+

INE - CompTIA Security+

INE - CompTIA Security+

NO MIRRORS PLEASE

WANT MORE? VISIT MY BLOG!


INE - CompTIA Security+