CompTIA Security+ SY0-501 Training
Details
The Training CompTIA Security+ SY0-501 through a Special Certification Package. 1 Year access to revolutionary E-Learning to pass the exam Easily. Get Introduced by Learning through 1 Learning Portal (LMS) with Certified Teachers. Exclusive 24/7 Online Mentor
and Challenging Course Testing and View behind the scenes all Tips & tricks.
Always guaranteed the Official Test Exam and after the Training an Official Certificate of Participation. Optional Livelabs (extra charge).
Outline
Course: 51 Minutes
- Course Introduction
- Defining the Threat Landscape
Course: 56 Minutes
- Course Introduction
- Viruses
- Worms
- Trojans
- Remote Access Trojans (RATs)
- Common Vulnerabilities
- Ransomware
- Cryptomalware
- Bots and Botnets
- Backdoors
- Rootkits
- Logic Bombs
- Keyloggers
- Spyware
- Stegomalware
- Polymorphic Packers
Course: 43 Minutes
- Course Introduction
- Impersonation and Hoaxing
- Tailgating and Piggybacking
- Shoulder Surfing
- Dumpster Diving
- Phishing, Spear Phishing, and Whaling
- Watering Hole Attacks (Social Networks)
- Vishing and Smishing
- Reasons for Effectiveness
Course: 55 Minutes
- Course Introduction
- Zero Day Attacks
- Spoofing
- DoS and DDoS Attacks
- Man-in-the-middle Attacks
- ARP Poisoning
- Buffer Overflow Attacks
- Injection Attacks
- Privilege Escalation
- Reflection and Amplification
- DNS Poisoning
- Domain Hijacking
- Man-in-the-browser
- Cross-site Scripting and Request Forgery
- Replay Attacks
- Pass the Hash Attacks
Course: 45 Minutes
- Course Introduction
- Brute-force and Dictionary Attacks
- Brute-force Tools
- Birthday, Known Plaintext, and Cipher Attacks
- Online vs. Offline Attacks
- Collisions
- Downgrade Attacks
Course: 47 Minutes
- Course Introduction
- Active vs. Passive Reconnaissance
- Pivot
- Initial Exploitation
- Persistence
- Escalation of Privilege
- Black vs. Gray vs. White Box Testing
Course: 54 Minutes
- Course Introduction
- Race Conditions
- System Vulnerabilities
- Improper Input and Error Handling
- Misconfiguration
- Resource Exhaustion
- Untrained Users
- Improperly Configured Accounts
- Vulnerable Business Processes
- Weak Cipher Suites and Implementations
- Memory and Buffer Vulnerability
- System Sprawl and Undocumented Assets
- Architecture and Design Weaknesses
- New Threats and Zero-day Attacks
- Improper Certificate and Key Management
Course: 1 Hour, 32 Minutes
- Course Introduction
- Firewalls
- VPN Concentrators
- NIDS and NIPS
- Bridges and Switches
- Routers
- Proxies and Load Balancers
- Wireless Access Points
- SIEM Systems
- DLP Systems
- NAC Gateways
- Mail Gateways
- Media Gateways
- Encryption Gateways
- Specialty Appliances
Course: 53 Minutes
- Course Introduction
- Protocol Analyzers
- Network Scanners
- Wireless Scanners/Cracker
- Password Crackers
- Vulnerability Scanners
- Configuration Compliance Scanner
- Exploitation Frameworks
- Data Sanitization Tools
- Steganography Tools
- Honeypots
- Backup Utilities
- Banner Grabbing
- Passive vs. Active
- Other Command Line Tools
Course: 2 Hours
- Course Introduction
- Introduction to Cryptography
- Ciphers
- Properties of Secure Ciphers
- Block Cipher
- Stream Cipher
- Keys
- Key Exchange
- Encryption
- Introducing Symmetric Algorithms
- Symmetric Algorithms
- Introducing Asymmetric Algorithms
- Asymmetric Algorithms
- Hashing
- Hashing Functions
- Data Integrity
- Authentication
- Digital Signatures
- Key Stretching
- Additional Security Considerations
Course: 1 Hour, 7 Minutes
- Course Introduction
- PKI Overview
- Public Key Infrastructure
- CA Trust Models
- Certificate Chaining
- Pinning
- Expiration, Revocation, Suspension
- Key Escrow
- X.509 Certificates
- Types of Certificates
Course: 1 Hour, 19 Minutes
- Course Introduction
- Introducing Wireless Security
- Types of Wireless Networks
- WPA and WPA
- Wireless Authentication
- Wireless Encryption
- Configuring an Open Wireless Network
- Configuring a WPA PSK Wireless Network
- Configuring a WPA Enterprise Wireless Network
- Configuring a WPA2 PSK Wireless Network
- Configuring a WPA2 Enterprise Wireless Network
- Wi-Fi Protected Setup
- Captive Portals
Course: 1 Hour, 3 Minutes
- Course Introduction
- Host Intrusion Prevention
- Antivirus
- File Integrity Check
- Host-based Firewall
- Application Whitelisting
- Removable Media Control
- Patch Management Tools
- Unified Threat Management (UTM)
- Data Loss Prevention (DLP)
- Data Execution Prevention (DEP)
- Web Application Firewall
Course: 31 Minutes
- Course Introduction
- Survey of Connection Methods
- Deployment Models
- Passwords, Pins, and Screen Locks
- Application and Content Management
- Remote Wipe
- Geofencing and Geolocation
- Push Notification Services
- Biometrics and Context-aware Authentication
- Containerization and Storage Segmentation
- Full Device Encryption
- Enforcement and Monitoring: Part 1
- Enforcement and Monitoring: Part 2
Course: 32 Minutes
- Course Introduction
- Secure Shell (SSH)
- Secure Sockets Layer/Transport Layer Security
- Hypertext Transfer Protocol/Secure (HTTPS)
- Secure Real-time Transport Protocol (SRTP)
- File Transfer Protocol/Secure (FTPS)
- Secure File Transfer Protocol (SFTP)
- Lightweight Directory Access Protocol/Secure (LDAPS)
- Simple Network Management Protocol (SNMPv3)
- Network Time Protocol (NTPv3)
- Post Office/Internet Message Access Protocols
- Secure MIME (S/MIME)
- Routing Protocol Authentication
Course: 27 Minutes
- Course Introduction
- Unencrypted Credentials
- Logs and Events Anomalies
- Permission Issues
- Access Violations
- Certificate Issues
- Data Exfiltration
- Misconfigured Devices
- Weak Security Configurations
- Personnel Issues
- Unauthorized Software
- Baseline Deviation
- License Compliance Violation
- Asset Management
- Authentication Issues
Course: 35 Minutes
- Course Introduction
- Identity and Access Management Part 1
- Identity and Access Management Part 2
- NT LAN Manager (NTLM)
- Challenge-handshake Authentication Protocol (CHAP)
- Remote Authentication Dial-in User Service (RADIUS)
- TACACS+
- Kerberos
- Lightweight Directory Access Protocol (LDAP)
- Secure Token
- Security Assertion Markup Language (SAML)
- OpenID Connect
- Open Authorization (OAuth)
- Shibboleth
Course: 29 Minutes
- Course Introduction
- Mandatory Access Control (MAC)
- Discretionary Access Control (DAC)
- Attribute-based Access Control (ABAC)
- Role-based Access Control
- Rule-based Access Contro
Course: 34 Minutes
- Course Introduction
- User Accounts
- Shared, Guest, and Generic Accounts
- Privileged Accounts
- Service Accounts
Course: 2 Hours
- Course Introduction
- Frameworks and Architectures
- Secure Configuration Guidelines
- Defense in Depth
Course: 46 Minutes
- Course Introduction
- Zones and Topologies
- Segregation, Segmentation, and Isolation
- Tunneling and VPNs
- Device and Technology Placement
- Software Defined Network
Course: 1 Hour, 27 Minutes
- Course Introduction
- Hardware Root of Trust
- Secure Boot
- EMI and EMP
- Supply Chain
- Operating System Security Considerations
- Trusted Operating System
- Keyboards, Mice, Displays, and Other Devices
- Secure Development Concepts
Course: 1 Hour, 7 Minutes
- Course Introduction
- Hypervisors
- VM Sprawl and Escape
Course: 49 Minutes
- Course Introduction
- Standard Operating Procedure
- Agreements
- Administrative Job Control
- Personnel Management
- Security Awareness Training
- Acceptable Use Policy
- Additional Security Policies
Course: 1 Hour, 8 Minutes
- Course Introduction
- Business Continuity Plan (BCP)
- Business Impact Analysis (BIA)
- Determining Recovery Team
- Mean Time Between Failure and Mean Time to Repair
- Privacy Assessments
- Risk Management
- Risk Assessment
- Risks
- Testing for Risks
- Risk Analysis
- Qualitative Risk Analysis
- Quantitative Risk Analysis
- Risk Response
- Change Management
Course: 1 Hour, 6 Minutes
- Course Introduction
- Defining Incident Response
- Building an Incident Response Plan
Special Offer
OEM Office Elearning Menu provides ICT training to businesses and individuals, for end users or ICT professionals of all skill levels. From Microsoft Office to Certified Ethical Hacker, with over 200 brands of training we are sure we can get you started. By responding to new technology, we can always keep our training offerings relevant. Plus, we employ our own instructors, all of whom are certified and have years of hands-on experience.
What does OEM Office Elearning Menu do?
We offer comprehensive, customized ICT training from a variety of major A-brands to certification. For Microsoft Office, we can provide training in five languages: Dutch, English, French, German and Spanish. For Microsoft Office, we also take the exams. In addition to Microsoft Office, we offer customized training for all kinds of other software. This makes us the one-stop shop for all ICT training. Our goal is to teach people how to work with software in a goal-oriented and efficient way. We find good communication very important. We offer short lines of contact. Our customers always have a fixed point of contact with us.
How does a training course at OEM Office Elearning Menu work? ...