Home » CompTIA Security+ SY0-501 OEM Certkit

Opleiding: CompTIA Security+ SY0-501 OEM Certkit

Bij: OEM Office Elearning Menu


OEM Office Elearning Menu

P.J, Oudweg 4

Inhoud van de cursus

CompTIA Security+ SY0-501: The Present Threat Landscape

Course Introduction1 MinuteNot StartedActions
Defining the Threat Landscape

CompTIA Security+ SY0-501: Types of Malware

Course Introduction1 MinuteNot StartedActions
Remote Access Trojans (RATs)
Common Vulnerabilities1 MinuteNot StartedActions
Bots and Botnets
Logic Bombs
Polymorphic Packers

CompTIA Security+ SY0-501: Social Engineering and Related Attacks Course

Course Introduction1 MinuteNot StartedActions
Impersonation and Hoaxing
Tailgating and Piggybacking
Shoulder Surfing
Dumpster Diving
Phishing, Spear Phishing, and Whaling
Watering Hole Attacks (Social Networks)
Vishing and Smishing1 MinuteNot StartedActions
Reasons for Effectiveness

CompTIA Security+ SY0-501: Application and Service Attacks

Course Introduction1 MinuteNot StartedActions
Zero Day Attacks
DoS and DDoS Attacks
Man-in-the-middle Attacks
ARP Poisoning
Buffer Overflow Attacks
Injection Attacks
Privilege Escalation
Reflection and Amplification
DNS Poisoning
Domain Hijacking
Cross-site Scripting and Request Forgery
Replay Attacks
Pass the Hash Attacks1 Minute

CompTIA Security+ SY0-501: Cryptographic and Wireless Attacks

Course Introduction
Brute-force and Dictionary Attacks
Brute-force Tools
Birthday, Known Plaintext, and Cipher Attacks
Online vs. Offline Attacks
Downgrade Attacks

CompTIA Security+ SY0-501: Penetration Testing and Vulnerability Scanning

Course Introduction1 MinuteNot StartedActions
Active vs. Passive Reconnaissance
Initial Exploitation
Escalation of Privilege
Black vs. Gray vs. White Box Testing

CompTIA Security+ SY0-501: Impacts from Vulnerability Types

Course Introduction1 MinuteNot StartedActions
Race Conditions
System Vulnerabilities
Improper Input and Error Handling
Resource Exhaustion
Untrained Users
Improperly Configured Accounts
Vulnerable Business Processes
Weak Cipher Suites and Implementations
Memory and Buffer Vulnerability
System Sprawl and Undocumented Assets
Architecture and Design Weaknesses
New Threats and Zero-day Attacks
Improper Certificate and Key Management

CompTIA Security+ SY0-501: Components Supporting Organizational Security

Course Introduction1 MinuteNot StartedActions
VPN Concentrators1
Bridges and Switches
Proxies and Load Balancers
Wireless Access Points1
SIEM Systems
DLP Systems
NAC Gateways
Mail Gateways
Media Gateways
Encryption Gateways
Specialty Appliances

CompTIA Security+ SY0-501: Security Assessment Using Software Tools

Course Introduction1 MinuteNot StartedActions
Protocol Analyzers
Network Scanners
Wireless Scanners/Cracker
Password Crackers
Vulnerability Scanners
Configuration Compliance Scanner
Exploitation Frameworks
Data Sanitization Tools
Steganography Tools1 MinuteNot StartedActions
Backup Utilities
Banner Grabbing
Passive vs. Active
Other Command Line Tools

CompTIA Security+ SY0-501: Cryptography

Course Introduction
Introduction to Cryptography
Properties of Secure Ciphers
Block Cipher
Stream Cipher
Key Exchange
Introducing Symmetric Algorithms
Symmetric Algorithms
Introducing Asymmetric Algorithms
Asymmetric Algorithms
Hashing Functions
Data Integrity
Digital Signatures
Key Stretching
Additional Security Considerations

CompTIA Security+ SY0-501: Public Key Infrastructure

Course Introduction1 MinuteNot StartedActions
PKI Overview
Public Key Infrastructure
CA Trust Models
Certificate Chaining
Expiration, Revocation, Suspension
Key Escrow
X.509 Certificates
Types of Certificates

CompTIA Security+ SY0-501: Wireless Security Settings

Course Introduction1 MinuteNot StartedActions
Introducing Wireless Security
Types of Wireless Networks
WPA and WPA2
Wireless Authentication
Wireless Encryption
Configuring an Open Wireless Network
Configuring a WPA PSK Wireless Network
Configuring a WPA Enterprise Wireless Network
Configuring a WPA2 PSK Wireless Network
Configuring a WPA2 Enterprise Wireless Network1
Wi-Fi Protected Setup
Captive Portals

CompTIA Security+ SY0-501: Analyzing Output from Security Technologies

Course Introduction1 MinuteNot StartedActions
Host Intrusion Prevention
File Integrity Check
Host-based Firewall
Application Whitelisting
Removable Media Control
Patch Management Tools
Unified Threat Management (UTM)
Data Loss Prevention (DLP)
Data Execution Prevention (DEP)
Web Application Firewall

CompTIA Security+ SY0-501: Deploying Mobile Devices Securely

Course Introduction
Survey of Connection Methods
Deployment Models
Passwords, Pins, and Screen Locks
Application and Content Management
Remote Wipe1 MinuteNot StartedActions
Geofencing and Geolocation
Push Notification Services
Biometrics and Context-aware Authentication
Containerization and Storage Segmentation
Full Device Encryption
Enforcement and Monitoring: Part 1
Enforcement and Monitoring: Part 2

CompTIA Security+ SY0-501: Implementing Secure Protocols

Course Introduction
Secure Shell (SSH)
Secure Sockets Layer/Transport Layer Security
Hypertext Transfer Protocol/Secure (HTTPS)
Secure Real-time Transport Protocol (SRTP)
File Transfer Protocol/Secure (FTPS)
Secure File Transfer Protocol (SFTP)
Lightweight Directory Access Protocol/Secure (LDAPS)
Simple Network Management Protocol (SNMPv3)
Network Time Protocol (NTPv3)
Post Office/Internet Message Access Protocols
Secure MIME (S/MIME)
Routing Protocol Authentication

CompTIA Security+ SY0-501: Troubleshooting Common Security Issues

Course Introduction
Unencrypted Credentials
Logs and Events Anomalies
Permission Issues
Access Violations
Certificate Issues
Data Exfiltration
Misconfigured Devices
Weak Security Configurations
Personnel Issues
Unauthorized Software
Baseline Deviation
License Compliance Violation
Asset Management
Authentication Issues

CompTIA Security+ SY0-501: Identity Concepts and Access Services

Course Introduction
Identity and Access Management Part 1
Identity and Access Management Part 2
NT LAN Manager (NTLM)
Challenge-handshake Authentication Protocol (CHAP)
Remote Authentication Dial-in User Service (RADIUS)
Lightweight Directory Access Protocol (LDAP)
Secure Token1 MinuteNot StartedActions
Security Assertion Markup Language (SAML)
OpenID Connect1 MinuteNot StartedActions
Open Authorization (OAuth)

CompTIA Security+ SY0-501: Identity and Access Management Controls

Course Introduction
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Attribute-based Access Control (ABAC)
Role-based Access Control
Rule-based Access Contro

CompTIA Security+ SY0-501: Common Account Management Practices

Course Introduction
User Accounts
Shared, Guest, and Generic Accounts
Privileged Accounts
Service Accounts

CompTIA Security+ SY0-501: Frameworks, Guidelines, and Physical Security

Course Introduction
Frameworks and Architectures
Secure Configuration Guidelines
Defense in Depth

CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts

Course Introduction
Zones and Topologies
Segregation, Segmentation, and Isolation
Tunneling and VPNs
Device and Technology Placement1
Software Defined Network

CompTIA Security+ SY0-501: Secure System and Application Design and Deployment

Course Introduction
Hardware Root of Trust
Secure Boot
Supply Chain
Operating System Security Considerations
Trusted Operating System
Keyboards, Mice, Displays, and Other Devices
Secure Development Concepts

CompTIA Security+ SY0-501: Cloud, Virtualization, and Resiliency Concepts

Course Introduction
VM Sprawl and Escape

CompTIA Security+ SY0-501: Policies, Plans, and Procedures

Course Introduction
Standard Operating Procedure
Administrative Job Control
Personnel Management
Security Awareness Training
Acceptable Use Policy
Additional Security Policies

CompTIA Security+ SY0-501: Business Impact Analysis and Risk Management

Course Introduction
Business Continuity Plan (BCP)
Business Impact Analysis (BIA)
Determining Recovery Team
Mean Time Between Failure and Mean Time to Repair
Privacy Assessments
Risk Management
Risk Assessment
Testing for Risks
Risk Analysis
Qualitative Risk Analysis
Quantitative Risk Analysis
Risk Response
Change Management

CompTIA Security+ SY0-501: Incident Response, Forensics, and Disaster Recovery

Course Introduction
Defining Incident Response
Building an Incident Response Plan

Toelatingseisen: wat heb je nodig?

Er is geen specifieke voorkennis vereist.

Duur van de cursus



Award Winning E-learning

Plaatsen / leslocaties

Heel Nederland, E-learning, Online

Algemene informatie over de cursus

De Training CompTIA Security+ SY0-501 via een Speciale Certificeringspakket. 1 Jaar toegang tot revolutionaire E-learning om het examen Gemakkelijk te halen. Laat je Introduceren door te Leren via 1 Leerportaal (LMS) met Gecertificeerde Docenten. Exclusief 24/7 Online Mentor en Uitdagende Cursus Testen en Bekijk Achter de schermen alle Tips & Tricks.
Gegarandeerd altijd het Officieel Proefexamen en na de Training een Officieel Certificaat van Deelname. Optioneel Livelabs(meerprijs).

Duur: Variabel
Taal: Engels
Certificaat van deelname: Ja
Online toegang: 1 jaar onbeperkte toegang
Voortgangsbewaking: Ja
Award Winning E-learning: Ja
Geschikt voor mobiel: Ja

Informatie aanvragen

Gegevens aangeduid met een * zijn verplicht in te vullen.
resterend: tekens
1d4b5 Typ de code exact over: (hoofdlettergevoelig)
Copyright 2009-2022 Particuliereopleidingen.nl | Algemene voorwaarden | Overzicht van onze aanbieders | Adverteren