Request new password

We Are All About You

XpertSkills - the parent company under which iCollege operates - was established in South Africa in 2003 and since then, we have grown globally in leaps and bounds with customers and partners in more than 120 countries. With employees on 3 continents and as a next-generation, virtual organization we are unconstrained by the limits that are usually associated with traditional “brick & mortar” companies.

This allows us to focus, without distraction, on reaching our ultimate goal – ensuring your ongoing success – by providing affordable, reliable, high quality and relevant learning products whilst remaining innovative and agile.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CompTIA Security+ (SY0-501)

Select currency

EDUTAINMENT COURSE:

CompTIA Security+ (SY0-501)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

CompTIA Security+ is the certification globally trusted to validate foundational,  vendor-neutral IT security knowledge and skills.  As a benchmark for best practices in IT security,  this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

CompTIA Security+ is the first security certification IT professionals should earn.  It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.  Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills.  Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.  Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Objectives
  • Provide operational, information, application and infrastructure level security
  • Secure the network to maintain availability, integrity, and confidentiality of critical information
  • Operate within a set of rules, policies, and regulations wherever applicable
  • Comprehend Risk identification and mitigation
Prerequisites

IT security professionals with a minimum of two years' experience in IT administration with a focus on security;  users with basic day-to-day technical information security experience;  those interested in gaining a broader and deeper knowledge of security concerns and implementation;  and learners preparing for the Security+ SY0-501 exam

Target Audience
  • The series is intended for aspiring IT security professionals entering into security.
  • The professionals who are Systems Administrator Network Administrator Security Administrator Junior IT Auditor/Penetration Tester
  1. TECHNOLOGIES AND TOOLS
0
Start
Deploy Mobile Security
13
Start
Hardware Software Organizational Security
14
Start
Hardware Software Organizational Security Part 2
15
Start
Hardware Software Organizational Security Part 3
16
Start
Hardware Software Organizational Security Part 4
17
Start
Security Posture Assessment
18
Start
Security Posture Assessment Part 2
19
Start
Security Posture Assessment Part 3
20
Start
Security Posture Assessment Part 4
21
Start
Troubleshoot Common Security Issues
23
Start
Analyze And Interpret Outputs
24
Start
Analyze And Interpret Outputs Part 2
26
Start
Implement Secure Protocols
  1. THREATS ATTACKS AND VULNERABILITIES
1
Start
Overview
2
Start
Determining Types of Malware
3
Start
Determining Types of Malware Part 2
4
Start
Types of Attacks
5
Start
Types of Attacks Part 2
6
Start
Types of Attacks Part 3
7
Start
Types of Attacks Part 4
8
Start
Threat Vector Types and Attributes
9
Start
Penetration Testing Concepts
10
Start
Vulnerability Scanning Concepts
11
Start
Impact of Various Vulnerabilities
12
Start
Impact of Various Vulnerabilities Part 2
  1. ARCHITECTURE AND DESIGN
27
Start
Best Practices and Secure Config Guides
28
Start
Secure Network Architecture Concepts
29
Start
Secure System Design
30
Start
Secure Staging Deployment Concepts
31
Start
Security Implications of Embedded Systems
32
Start
Secure App Development and Deployment
33
Start
Cloud and Virtualization Concepts
33
Start
Cloud and Virtalization Concepts Part 2
34
Start
Resiliency and Automation to Reduce Risk
35
Start
Importance of Physical Security
36
Start
Importance Of Physical Security Part 2
  1. IDENTITY AND ACCESS MANAGEMENT
37
Start
Identity and Access Management Concepts
38
Start
Identity and Access Services
39
Start
Identity and Access Management Controls
40
Start
Identity and Access Management Controls Part 2
41
Start
Account Management Practices
42
Start
Account Management Practices Part 2
  1. Risk Management
43
Start
Policies, Plans and Procedures
44
Start
Impact Business Analysis
45
Start
Risk Management Processes and Concepts
46
Start
Incident Response Procedures
47
Start
Basic Concepts of Forensics
48
Start
Disaster Recovery and Business Continuity
49
Start
Disaster Recovery and Business Continuity Part 2
50
Start
Data Security and Privacy
58
Start
Public Key Infrastructure Part 2
  1. CRYPTOGRAPHY AND PKI
51
Start
Basic Concepts of Cryptography
52
Start
Basic Concepts of Cryptography Part 2
53
Start
Cryptography Algorithms Basics
54
Start
Cryptography Algorithms Basics Part 2
55
Start
Cryptography Algorithms Basics Part 3
56
Start
Wireless Security
57
Start
Public Key Infrastructure
59
Start
Public Key Infrastructure Part 3
60
Start
Public Key Infrastructure Part 4
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
  • 27:44:00
    Hours Of learning
  • Presented by highly qualified, industry leading experts
  • 12 Months access
Back to Top