This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation. This course prepares the student for the CompTIA Security+ certification exam.
This online course is self paced and interactive, it also consists of many other features such as videos, performance based assessments, flash cards and more.
At successful completion of the program the student will be awarded with a Certificate of Completion.
PROGRAM OUTLINE OF COMPTIA Security+ (SY0-501)
Lesson 1: Comparing and Contrasting Attacks
Lesson 2: Comparing and Contrasting Security Controls
Lesson 3: Assessing Security Posture with Software Tools
Lesson 4: Explaining Basic Cryptography Concepts
Lesson 5: Implementing a Public Key Infrastructure
Lesson 6: Implementing Identity and Access Management Controls
Lesson 7: Managing Access Services and Accounts
Lesson 8: Implementing a Secure Network Architecture
Lesson 9: Installing and Configuring Security Appliances
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Lesson 11: Deploying Secure Host, Mobile, and Embedded Systems
Lesson 12: Implementing Secure Network Access Protocols
Lesson 13: Implementing Secure Network Applications
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts
Lesson 15: Summarizing Secure Application Development Concepts
Lesson 16: Explaining Organizational Security Concepts
Note: IT Certification industry keeps updating their content. We at new educare will update our content aligning with CompTIA certification.
Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
Understand the principles of organizational security and the elements of effective security policies.
Know the technologies and uses of cryptographic standards and products.
Install and configure network- and host-based security technologies.
Describe how wireless and remote access security is enforced.
Describe the standards and products used to enforce security on web and communications technologies.
Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
At successful completion, you will receive digital badges that can be used online to display your achievements.
At the completion of the program, you will be awarded with a program completion certificate.
With the completion of this program, you will also be awarded with Career Enhancement Clock Hours (CECH), that may be displayed on your resume.
Your completion also comes with a dedicated transcript that shows your areas of grades for each course you attended.