Kurs CompTIA Security+ "Nie ma czego takiego jak odrobina wolnoci. Albo jeste wolny, albo jej nie masz wcale." - Walter Cronkite CompTIA Security + - certyfikat który był długo oczekiwany, tylko by stać się jednym z najbardziej cenionych w dziedzinie bezpieczeństwa IT. Podstawowe oraz zaawansowane wiadomoci z dziedziny bezpieczeństwa sieci oraz zarzšdzania ryzykiem danych. Aprobowany przez amerykański departament bezpieczeństwa stał się szybko bardzo cenionym ródłem informacji (oraz wiadectwem dowiadczenia w temacie). Kurs ten porusza tematy z wielu dziedzin; bezpieczeństwa sieci, chmury, szyfrowania danych (oraz oczywicie deszyfrowania ich), protokołów danych, oraz bezpieczeństwa systemów wraz z integralnociš infrastruktury sieci. Module 1 - Security + Module 1.1 Part 01 - Firewalls - Security + Module 1.1 Part 02 - Proxies - Security + Module 1.1 Part 03 - Reverse Proxies - Security + Module 1.1 Part 04 - Network Address Translation - Security + Module 1.1 Part 05 - VPN Concentrators - Security + Module 1.2 - Network Administration Principles - Security + Module 1.3 Part 1 - Subnetting - Security + Module 1.3 Part 2 - Subnet Mask - Security + Module 1.3 Part 3 - Network Design Elements and Components - Security + Module 1.4 Part 1 - TCP.IP Internet Protocol - Security + Module 1.4 Part 2 - Common Protocols and Their Port Numbers - Security + Module 1.5 Part 1 - Security Related Issues Wireless Network - Security + Module 1.5 Part 2 - Security Related Issues Wireless Network Module 2 - Security + Module 2.1 Part 1 - Risk Related Concepts - Security + Module 2.1 Part 2 - Risk Related Concepts - Security + Module 2.1 Part 3 - Control Types - Security + Module 2.1 Part 4 - The Principle of Least Privilege - Security + Module 2.2 Part 1 - Security Implications of Integrating Systems - Security + Module 2.2 Part 2 - Security Implications of Integrating Systems - Security + Module 2.3 - Appropriate Risk Mitigation Strategies - Security + Module 2.4 - Basic Forensic Procedures - Security + Module 2.5 - Incident Response Procedures - Security + Module 2.6 Part 1 - Importance of Security - Security + Module 2.6 Part 2 - Importance of Security Awareness and Training - Security + Module 2.7 - Physical Security and Environmental Controls - Security + Module 2.8 - Risk Management Best Practices - Security + Module 2.9 - Goals of Security Module 3 - Security + Module 3.1 Part 1 - Types of Malware - Security + Module 3.1 Part 2 - Types of Malware - Security + Module 3.2 Part 1 - Phishing - Security + Module 3.2 Part 2 - Various Types of Attacks - Security + Module 3.3 - Social Engineering - Security + Module 3.4 - Types of Wireless Attacks - Security + Module 3.5 Part 1 - Application Attacks - Security + Module 3.5 Part 2 - Attacks (LDAP,XML) Injection - Security + Module 3.5 Part 3 - Zero Day Exploits, Cookies and Attachments - Security + Module 3.6 - Mitigation and Deterrent Techniques - Security + Module 3.7 Part 1 - Security Traits and Vulnerabilities - Security + Module 3.7 Part 2 - Asessment Techniques - Security + Module 3.8 Part 1 - Penetration Testing vs Vulnerability Scanning - Security + Module 3.8 Part 2 - Penetration Testing vs Vulnerability Scanning Module 4 - Security + Module 4.1 - Applications, Security Controls and Techniques - Security + Module 4.2 Part 1 - Host Security - Security + Module 4.2 Part 2 - Hardware Security - Security + Module 4.2 Part 3 - Virtualization - Security + Module 4.3 - Importance of Data Security - Security + Module 4.4 Part 1 - Data Security - Security + Module 4.4 Part 2 - Data Encryption - Security + Module 4.4 Part 3 - Data Policies Module 5 - Security + Module 5.1 - Authentication Services - Security + Module 5.2 Part 1 - Access Controls - Security + Module 5.2 Part 2 - Authentication Authorization and Access Control - Security + Module 5.2 Part 3 - Authentication Authorization and Access Control - Security + Module 5.2 Part 4 - Authentication Factors - Security + Module 5.3 Part 1 - Implementing Appropriate Security Controls When Performing Account Management - Security + Module 5.3 Part 2 - Best Practices For Account Management Module 6 - Security + Module 6.1 Part 1 - General Cryptography Concepts - Security + Module 6.1 Part 2 - Block Cyphers & Stream Cyphers - Security + Module 6.1 Part 3 - Transport Encryption - Security + Module 6.1 Part 4 - Hashing & Steganography - Security + Module 6.2 Part 1 - WEP, WPA and WPA2 - Security + Module 6.2 Part 2 - MD5, SHA and AES - Security + Module 6.2 Part 3 - DES, HMAC and CHAP - Security + Module 6.3 - 6.4 - Public Key Infrastructure
Romaniek