Security+

Module 1 - Threats, Attacks, and Vulnerabilities

Useful Expressions

Tools for Professional Approach: It’s not just about learning, it’s about having the confidence to use English in real life and upgrade your business communication skills.

1 video, 13 readings
Video: 1.1 Introduction
Reading: 1.2 Types Of Malware – Part 1
Reading: 1.3 Types Of Malware – Part 2
Reading: 1.4 Types Of Attacks – Part 1
Reading: 1.12 Penetration Testing And Vulnerability Scanning – Part 2
Reading: 1.13 Impact Of Vulnerabilities – Part 1
Reading: 1.14 Impact Of Vulnerabilities – Part 2
Reading: 1.8 Types Of Attacks – Part 5
Reading: 1.9 Threat Actors – Part 1
Reading: 1.10 Threat Actors – Part 2
Reading: 1.11 Penetration Testing And Vulnerability Scanning – Part 1
Reading: 1.12 Penetration Testing And Vulnerability Scanning – Part 2
Reading: 1.13 Impact Of Vulnerabilities – Part 1
Reading: 1.14 Impact Of Vulnerabilities – Part 2
Graded: Advanced Business Principles

Module 2 - Technologies and Tools

Diplomatic Language

Tools for Professional Approach - Step 2: It’s not just about learning, it’s about having the confidence to use English in real life and upgrade your business communication skills.

16 readings
Reading: 2.1 Networking Hardware And Software – Part 1
Reading: 2.2 Networking Hardware And Software – Part 2
Reading: 2.3 Networking Hardware And Software – Part 3
Reading: 2.13 Securing Mobile Devices – Part 3
Reading: 2.14 Securing Mobile Devices – Part 4
Reading: 2.15 Secure Protocols – Part 1
Reading: 2.16 Secure Protocols – Part 2
Reading: 2.8 Security Assessment – Part 2
Reading: 2.9 Troubleshooting Issues – Part 1
Reading: 2.10 Troubleshooting Issues – Part 2
Reading: 2.11 Securing Mobile Devices – Part 1
Reading: 2.12 Securing Mobile Devices – Part 2
Graded: Information Technology Terms
Reading: 2.13 Securing Mobile Devices – Part 3
Reading: 2.14 Securing Mobile Devices – Part 4
Reading: 2.15 Secure Protocols – Part 1
Reading: 2.16 Secure Protocols – Part 2

Module 3 - Architecture and Design

15 readings
Reading: 3.1 Secure Network Architecture – Part 1
Reading: 3.2 Secure Network Architecture – Part 2
Reading: 3.3 Secure System Designs – Part 1
Reading: 3.4 Secure System Designs – Part 2
Reading: 3.5 Secure Staging Deployment Concepts
Reading: 3.6 Embedded Systems – Part 1
Reading: 3.7 Embedded Systems – Part 2
Reading: 3.8 Application Development And Deployment – Part 1
Reading: 3.9 Application Development And Deployment – Part 2
Reading: 3.10 Application Development And Deployment – Part 3
Reading: 3.11 Physical Security Controls – Part 1
Reading: 3.12 Physical Security Controls – Part 2
Reading: 3.13 Physical Security Controls – Part 3
Reading: 3.14 Cloud Virtualization – Part 1
Reading: 3.15 Cloud Virtualization – Part 2

Module 4 - Identity and Access Management

9 readings
Reading: 4.1 Identity And Access Management – Part 1
Reading: 4.2 Identity And Access Management – Part 2
Reading: 4.3 Identity And Access Services – Part 1
Reading: 4.4 Identity And Access Services – Part 2
Reading: 4.5 Management Controls – Part 1
Reading: 4.6 Management Controls – Part 2
Reading: 4.7 Account Management Practices – Part 1
Reading: 4.8 Account Management Practices – Part 2
Reading: 4.9 Account Management Practices – Part 3

Module 5 - Risk Management

16 readings
Reading: 5.1 Organizational Security – Part 1
Reading: 5.2 Organizational Security – Part 2
Reading: 5.3 Business Impact Analysis Concepts – Part 1
Reading: 5.4 Business Impact Analysis Concepts – Part 2
Reading: 5.5 Risk Management – Part 1
Reading: 5.6 Risk Management – Part 2
Reading: 5.7 Incident Response Procedures – Part 1
Reading: 5.8 Incident Response Procedures – Part 2
Reading: 5.9 Forensics – Part 1
Reading: 5.10 Forensics – Part 2
Reading: 5.11 Disaster Recovery – Part 1
Reading: 5.12 Disaster Recovery – Part 2
Reading: 5.13 Types Of Control – Part 1
Reading: 5.14 Types Of Control – Part 2
Reading: 5.15 Data Security And Privacy Practices – Part 1
Reading: 5.16 Data Security And Privacy Practices – Part 2

Module 6 - Cryptography and PKI

11 readings
Reading: 6.1 Cryptographic Basics – Part 1
Reading: 6.2 Cryptographic Basics – Part 2
Reading: 6.3 Cryptographic Basics – Part 3
Reading: 6.4 Cryptographic Algorithms – Part 1
Reading: 6.5 Cryptographic Algorithms – Part 2
Reading: 6.6 Wireless Security – Part 1
Reading: 6.7 Wireless Security – Part 2
Reading: 6.8 Implementing PKI – Part 1
Reading: 6.9 Implementing PKI – Part 2
Reading: 6.10 Implementing PKI – Part 3
Reading: 6.11 Conclusion

+1 540-429-9960

Security+

$1500
Instructor:
Categories:
Reviews:

About this course

This CompTIA security+ course covers security concerns from both a professional setting and on a personal level. Topics are covered from a ground up perspective to ensure inexperienced students have a clear understanding of the course content. We expand beyond the scope of the CompTIA certification exam SY0-501 objectives to allow for real life application.

This course has been designed to align with the latest version of the CompTIA security exam.

  • Master essential security technologies, tools, and tasks
  • Understand how Security+ concepts are applied in the real world
  • Test your knowledge along the way with practice questions

To an employer, the CompTIA Security+ certification proves that you have the knowledge base and skill set to secure applications, devices, and networks; analyze and respond to threats; participate in risk mitigation, and so much more. As data threats loom larger every day, the demand for qualified security professionals will only continue to grow. If you’re ready to take the first step toward a rewarding IT security career.
 
CAREER PATH

We’ve put together a list of relevant job titles you can apply for after achieving the CompTIA Security+ certification (note that some careers may require further study, training and/or work experience):

Internet Security Specialist
IT Compliance Specialist
Network Administrator
IT Security Architect
IT Manager
IT Security Administrator
IT Security Consultant
IT Security Controls Manager
 
Duration: 6 week – 21hrs (3hrs per session)
Awarded by: comPTIA
Type: Online
Price: $1500

Syllabus

This CompTIA security+ course covers security concerns from both a professional setting and on a personal level.

Module 1 - Threats, Attacks, and Vulnerabilities 0/15

Useful Expressions

Tools for Professional Approach: It’s not just about learning, it’s about having the confidence to use English in real life and upgrade your business communication skills.

1 video, 13 readings
Video: 1.1 Introduction
15 minutes
Reading: 1.2 Types Of Malware – Part 1
minutes
Reading: 1.3 Types Of Malware – Part 2
minutes
Reading: 1.4 Types Of Attacks – Part 1
minutes
Reading: 1.12 Penetration Testing And Vulnerability Scanning – Part 2
minutes
Reading: 1.13 Impact Of Vulnerabilities – Part 1
minutes
Reading: 1.14 Impact Of Vulnerabilities – Part 2
minutes
Reading: 1.8 Types Of Attacks – Part 5
minutes
Reading: 1.9 Threat Actors – Part 1
minutes
Reading: 1.10 Threat Actors – Part 2
minutes
Reading: 1.11 Penetration Testing And Vulnerability Scanning – Part 1
minutes
Reading: 1.12 Penetration Testing And Vulnerability Scanning – Part 2
minutes
Reading: 1.13 Impact Of Vulnerabilities – Part 1
minutes
Reading: 1.14 Impact Of Vulnerabilities – Part 2
minutes
Graded: Advanced Business Principles
3 Questions

Module 2 - Technologies and Tools 0/17

Diplomatic Language

Tools for Professional Approach - Step 2: It’s not just about learning, it’s about having the confidence to use English in real life and upgrade your business communication skills.

16 readings
Reading: 2.1 Networking Hardware And Software – Part 1
minutes
Reading: 2.2 Networking Hardware And Software – Part 2
minutes
Reading: 2.3 Networking Hardware And Software – Part 3
minutes
Reading: 2.13 Securing Mobile Devices – Part 3
minutes
Reading: 2.14 Securing Mobile Devices – Part 4
minutes
Reading: 2.15 Secure Protocols – Part 1
minutes
Reading: 2.16 Secure Protocols – Part 2
minutes
Reading: 2.8 Security Assessment – Part 2
minutes
Reading: 2.9 Troubleshooting Issues – Part 1
minutes
Reading: 2.10 Troubleshooting Issues – Part 2
minutes
Reading: 2.11 Securing Mobile Devices – Part 1
minutes
Reading: 2.12 Securing Mobile Devices – Part 2
minutes
Graded: Information Technology Terms
3 Questions
Reading: 2.13 Securing Mobile Devices – Part 3
minutes
Reading: 2.14 Securing Mobile Devices – Part 4
minutes
Reading: 2.15 Secure Protocols – Part 1
minutes
Reading: 2.16 Secure Protocols – Part 2
minutes

Module 3 - Architecture and Design 0/15

15 readings
Reading: 3.1 Secure Network Architecture – Part 1
minutes
Reading: 3.2 Secure Network Architecture – Part 2
minutes
Reading: 3.3 Secure System Designs – Part 1
minutes
Reading: 3.4 Secure System Designs – Part 2
minutes
Reading: 3.5 Secure Staging Deployment Concepts
minutes
Reading: 3.6 Embedded Systems – Part 1
minutes
Reading: 3.7 Embedded Systems – Part 2
minutes
Reading: 3.8 Application Development And Deployment – Part 1
minutes
Reading: 3.9 Application Development And Deployment – Part 2
minutes
Reading: 3.10 Application Development And Deployment – Part 3
minutes
Reading: 3.11 Physical Security Controls – Part 1
minutes
Reading: 3.12 Physical Security Controls – Part 2
minutes
Reading: 3.13 Physical Security Controls – Part 3
minutes
Reading: 3.14 Cloud Virtualization – Part 1
minutes
Reading: 3.15 Cloud Virtualization – Part 2
minutes

Module 4 - Identity and Access Management 0/9

9 readings
Reading: 4.1 Identity And Access Management – Part 1
minutes
Reading: 4.2 Identity And Access Management – Part 2
minutes
Reading: 4.3 Identity And Access Services – Part 1
minutes
Reading: 4.4 Identity And Access Services – Part 2
minutes
Reading: 4.5 Management Controls – Part 1
minutes
Reading: 4.6 Management Controls – Part 2
minutes
Reading: 4.7 Account Management Practices – Part 1
minutes
Reading: 4.8 Account Management Practices – Part 2
minutes
Reading: 4.9 Account Management Practices – Part 3
minutes

Module 5 - Risk Management 0/16

16 readings
Reading: 5.1 Organizational Security – Part 1
minutes
Reading: 5.2 Organizational Security – Part 2
minutes
Reading: 5.3 Business Impact Analysis Concepts – Part 1
minutes
Reading: 5.4 Business Impact Analysis Concepts – Part 2
minutes
Reading: 5.5 Risk Management – Part 1
minutes
Reading: 5.6 Risk Management – Part 2
minutes
Reading: 5.7 Incident Response Procedures – Part 1
minutes
Reading: 5.8 Incident Response Procedures – Part 2
minutes
Reading: 5.9 Forensics – Part 1
minutes
Reading: 5.10 Forensics – Part 2
minutes
Reading: 5.11 Disaster Recovery – Part 1
minutes
Reading: 5.12 Disaster Recovery – Part 2
minutes
Reading: 5.13 Types Of Control – Part 1
minutes
Reading: 5.14 Types Of Control – Part 2
minutes
Reading: 5.15 Data Security And Privacy Practices – Part 1
minutes
Reading: 5.16 Data Security And Privacy Practices – Part 2
minutes

Module 6 - Cryptography and PKI 0/11

11 readings
Reading: 6.1 Cryptographic Basics – Part 1
minutes
Reading: 6.2 Cryptographic Basics – Part 2
minutes
Reading: 6.3 Cryptographic Basics – Part 3
minutes
Reading: 6.4 Cryptographic Algorithms – Part 1
minutes
Reading: 6.5 Cryptographic Algorithms – Part 2
minutes
Reading: 6.6 Wireless Security – Part 1
minutes
Reading: 6.7 Wireless Security – Part 2
minutes
Reading: 6.8 Implementing PKI – Part 1
minutes
Reading: 6.9 Implementing PKI – Part 2
minutes
Reading: 6.10 Implementing PKI – Part 3
minutes
Reading: 6.11 Conclusion
minutes

Members

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit. Nam nec tellus a odio tincidunt auctor a ornare odio. Sed non mauris vitae erat consequat auctor eu in elit.

Total number of students in course:

User registration

You don't have permission to register

Reset Password