info.txt

(4 KB) Pobierz
Kurs CompTIA Security+


"Nie ma czego takiego jak odrobina wolnoci. Albo jeste wolny, albo jej nie masz wcale." - Walter Cronkite

CompTIA Security + - certyfikat który był długo oczekiwany, tylko by stać się jednym z najbardziej cenionych w dziedzinie bezpieczeństwa IT. Podstawowe oraz zaawansowane wiadomoci z dziedziny bezpieczeństwa sieci oraz zarzšdzania ryzykiem danych. Aprobowany przez amerykański departament bezpieczeństwa stał się szybko bardzo cenionym ródłem informacji (oraz wiadectwem dowiadczenia w temacie).

Kurs ten porusza tematy z wielu dziedzin; bezpieczeństwa sieci, chmury, szyfrowania danych (oraz oczywicie deszyfrowania ich), protokołów danych, oraz bezpieczeństwa systemów wraz z integralnociš infrastruktury sieci.



Module 1

- Security + Module 1.1 Part 01 - Firewalls
- Security + Module 1.1 Part 02 - Proxies
- Security + Module 1.1 Part 03 - Reverse Proxies
- Security + Module 1.1 Part 04 - Network Address Translation
- Security + Module 1.1 Part 05 - VPN Concentrators
- Security + Module 1.2 - Network Administration Principles
- Security + Module 1.3 Part 1 - Subnetting
- Security + Module 1.3 Part 2 - Subnet Mask
- Security + Module 1.3 Part 3 - Network Design Elements and Components
- Security + Module 1.4 Part 1 - TCP.IP Internet Protocol
- Security + Module 1.4 Part 2 - Common Protocols and Their Port Numbers
- Security + Module 1.5 Part 1 - Security Related Issues Wireless Network
- Security + Module 1.5 Part 2 - Security Related Issues Wireless Network

Module 2

- Security + Module 2.1 Part 1 - Risk Related Concepts
- Security + Module 2.1 Part 2 - Risk Related Concepts
- Security + Module 2.1 Part 3 - Control Types
- Security + Module 2.1 Part 4 - The Principle of Least Privilege
- Security + Module 2.2 Part 1 - Security Implications of Integrating Systems
- Security + Module 2.2 Part 2 - Security Implications of Integrating Systems
- Security + Module 2.3 - Appropriate Risk Mitigation Strategies
- Security + Module 2.4 - Basic Forensic Procedures
- Security + Module 2.5 - Incident Response Procedures
- Security + Module 2.6 Part 1 - Importance of Security
- Security + Module 2.6 Part 2 - Importance of Security Awareness and Training
- Security + Module 2.7 - Physical Security and Environmental Controls
- Security + Module 2.8 - Risk Management Best Practices
- Security + Module 2.9 - Goals of Security

Module 3

- Security + Module 3.1 Part 1 - Types of Malware
- Security + Module 3.1 Part 2 - Types of Malware
- Security + Module 3.2 Part 1 - Phishing
- Security + Module 3.2 Part 2 - Various Types of Attacks
- Security + Module 3.3 - Social Engineering
- Security + Module 3.4 - Types of Wireless Attacks
- Security + Module 3.5 Part 1 - Application Attacks
- Security + Module 3.5 Part 2 - Attacks (LDAP,XML) Injection
- Security + Module 3.5 Part 3 - Zero Day Exploits, Cookies and Attachments
- Security + Module 3.6 - Mitigation and Deterrent Techniques
- Security + Module 3.7 Part 1 - Security Traits and Vulnerabilities
- Security + Module 3.7 Part 2 - Asessment Techniques
- Security + Module 3.8 Part 1 - Penetration Testing vs Vulnerability Scanning
- Security + Module 3.8 Part 2 - Penetration Testing vs Vulnerability Scanning

Module 4

- Security + Module 4.1 - Applications, Security Controls and Techniques
- Security + Module 4.2 Part 1 - Host Security
- Security + Module 4.2 Part 2 - Hardware Security
- Security + Module 4.2 Part 3 - Virtualization
- Security + Module 4.3 - Importance of Data Security
- Security + Module 4.4 Part 1 - Data Security
- Security + Module 4.4 Part 2 - Data Encryption
- Security + Module 4.4 Part 3 - Data Policies

Module 5

- Security + Module 5.1 - Authentication Services
- Security + Module 5.2 Part 1 - Access Controls
- Security + Module 5.2 Part 2 - Authentication Authorization and Access Control
- Security + Module 5.2 Part 3 - Authentication Authorization and Access Control
- Security + Module 5.2 Part 4 - Authentication Factors
- Security + Module 5.3 Part 1 - Implementing Appropriate Security Controls When Performing Account Management
- Security + Module 5.3 Part 2 - Best Practices For Account Management

Module 6

- Security + Module 6.1 Part 1 - General Cryptography Concepts
- Security + Module 6.1 Part 2 - Block Cyphers & Stream Cyphers
- Security + Module 6.1 Part 3 - Transport Encryption
- Security + Module 6.1 Part 4 - Hashing & Steganography
- Security + Module 6.2 Part 1 - WEP, WPA and WPA2
- Security + Module 6.2 Part 2 - MD5, SHA and AES
- Security + Module 6.2 Part 3 - DES, HMAC and CHAP
- Security + Module 6.3 - 6.4 - Public Key Infrastructure

Zgłoś jeśli naruszono regulamin