CompTIA Security+ by ActiveLearning - SpeedyCourse Philippines
We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Details

CompTIA Security+ certification is an internationally-recognized, vendor-neutral certification for network security. Through this network security course, students will learn security concepts, and tools to help them react to security incidents. More importantly, students will learn how to anticipate security risks and defend against network security attacks.

CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. This practical hands-on 5-day course will teach students the fundamental principles of installing and configuring computer and network security systems.

You Will Learn How To:
  • Identify network attack strategies and defenses
  • Understand the principles of organizational security and the elements of effective security policies
  • Know the technologies and uses of encryption standards and products
  • Identify network- and host-based security technologies and practices
  • Describe how remote access security is enforced
  • Describe the standards and products used to enforce security on web and communications technologies
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery
Who Should Attend:

This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing.

Outline

  • Security Fundamentals
    • Security Concepts
    • Why is Security Important?
    • Security Fundamentals
    • Access Control
    • Identification and Authentication
    • Accounting
    • Training
    • Threats
    • Types and Sources of Threats
    • What Makes a Network Secure?
    • Social Engineering
    • Malware
    • Network Attack Strategies
    • Operational Security
    • Corporate Security Policy
    • Risk Management
    • Privilege Policies
    • Disposal / Destruction Policy
    • HR Policy
    • Incident Response Policy
  • Cryptography
    • Cryptography
    • What is Cryptography?
    • Encryption Technologies
    • Cryptographic Attacks
    • Steganography
    • Public Key Infrastructure
    • What is PKI?
    • Implementing PKI
    • Cryptographic Standards
  • Implementing Local Security
    • Site Security
    • Physical Access Controls
    • Environmental Security
    • Network Security
    • Secure Network Topologies
    • Virtual LANs (VLAN)
    • Network Address Translation
    • Tunneling
    • Network Interconnections
    • Switches
    • Routers
    • Firewalls
    • SNMP
    • Network Access Control
    • Wireless Access Security
    • Wireless Technologies
    • Wireless LAN Security
    • Operating System Security
    • Computer Hardening
    • Hardening Windows
    • Hardening Other OS
    • Virtualization Technologies
    • Services and Protocols
    • Hardware and Software Updates
    • Authentication Technologies
    • Directory Services
    • Application Security
    • File and Print Services
    • Storage Security
    • Databases
    • DHCP Security
    • DNS Security
    • Auditing and Intrusion Detection Systems
    • Systems and Performance Monitoring
    • Audit Logs
    • Vulnerability Assessments
    • Intrusion Detection Systems
    • Honeypots
  • Implementing Remote Security
    • Remote Access Security
    • What is Remote Access?
    • Remote Access Infrastructure
    • Remote Connectivity Protocols
    • Remote Access Server
    • Enterprise Remote Access Authentication
    • Remote Authentication Protocols
    • Hardening Remote Access Infrastructure
    • Securing Email and Messaging Communications
    • Email Standards
    • Email Application Security
    • Email Authentication and Confidentiality
    • Instant Messaging and VoIP
    • File Transfer
    • Securing Web Services
    • HTTP
    • SSL / TLS
    • Web Servers
    • Web Browsers
    • Desktop Security Applications
  • Disaster Recovery and Business Continuity
    • Disaster Recovery and Business Continuity
    • Disaster Recovery Planning
    • Business Continuity
    • Secure Recovery
    • Backup Strategies

Speaker/s

An EC-Council Certified Trainer, Nimalan Simananthan has over 10 years of experience in implementing Internet security and High Availability solutions.

He is considered an expert instructor for EC-Council in Malaysia and has been awarded EC-Council Instructor of the Year for the past 5 years. He holds numerous certifications in various IT fields including Certified Ethical Hacker, Certified Hacking Forensic Investigator, Microsoft Certified Trainer, CCNP, and PMP. Nimalan holds a degree in B.S. Telecommunications and Computer Engineering. 
Reviews
Be the first to write a review about this course.
Write a Review

ActiveLearning, Inc. is the Philippines' leading provider of Information Technology and Project Management education, where thousands of students take courses from Application Development to Project Management to Network Security, and much more. Our courses are taught by expert instructors, and learning is enhanced through a blend of in-depth lectures, workshops, and hands-on exercises.

Expert Instructors

Learn from expert instructors who practice what they teach. Our instructors are involved in constant research and development, who constantly apply the lessons they teach, and who know the same technical issues you face every day.

Superior Courseware

Our courseware go through rigorous evaluation before they are released for instruction. By constantly monitoring industry developments, we make sure that you get course materials that are up to date.

Interactivity

More than just classroom lectures, practical, hands-on exercises are carefully developed for you to immediately put in to practice what you learn. By being immersed in a classroom setting, you get to participate, inquire, and be involved - all essential in expediting the learning process. Aspects you won't find in Computer-Based-Training and self-study. ...

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.