Security+

Product type

Security+

Elearn UK
Logo Elearn UK
Provider rating: starstarstarstarstar 10 Elearn UK has an average rating of 10 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Description

This series helps prepare the learner for the Security+ exam. It teaches the learner about general security concepts, communication security, infrastructure security, some basics of cryptography, and operational and organizational security. It also provides the learner with a practice exam that includes questions in a format similar to what the learner will encounter when taking the exam.

Syllabus

EXAM BASICS

Provides an overview of Security+ certification and various exam preparation tips. Also included is a synopsis of the OSI reference model and some fundamental network and security concepts.
  • About the exam - who, what, when
  • About the exam - where and why
  • The OSI model and the physical…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

This series helps prepare the learner for the Security+ exam. It teaches the learner about general security concepts, communication security, infrastructure security, some basics of cryptography, and operational and organizational security. It also provides the learner with a practice exam that includes questions in a format similar to what the learner will encounter when taking the exam.

Syllabus

EXAM BASICS

Provides an overview of Security+ certification and various exam preparation tips. Also included is a synopsis of the OSI reference model and some fundamental network and security concepts.
  • About the exam - who, what, when
  • About the exam - where and why
  • The OSI model and the physical layer
  • The data link layer
  • LAN protocols and transmission methods
  • WAN technologies and protocols
  • Networking equipment at the data link layer
  • The network layer
  • The transport layer
  • The session layer
  • The presentation layer
  • The application layer
  • The goal of information

GENERAL SECURITY CONCEPTS

Provides an overview of access control, including identification, authentication, authorization, and accountability. Unauthorized access is also covered, from hacker attacks to malicious code.
  • Access control concepts
  • Access control techniques
  • Usernames and passwords
  • PINs, one-time passwords, tokens, and tickets
  • Biometrics
  • SSO, certificates, and CHAP
  • Types of attacks
  • Malicious code

REMOTE ACCESS AND WIRELESS LANS

Provides an overview of remote access vulnerabilities, security methods, and technologies. Wireless LANs and their protocols, standards, and weaknesses are also covered.
  • Remote access security methods and vulnerabilities
  • Remote access security technologies
  • Virtual private networks
  • Remote access applications
  • Wireless LAN protocols and standards
  • SSID and WEP
  • EAP and site surveys

E-MAIL, INTERNET AND FILE SECURITY

Provides an overview of the different standards and applications available for secure e-mail and Internet use. You'll learn about several vulnerabilities and nuisances, including virus hoaxes and spam. Some of the common file transfer protocols are also covered.
  • E-mail security
  • E-mail vulnerabilities
  • Internet security
  • Internet applications
  • FTP
  • S/FTP and TFTP
  • File sharing
  • File transfer vulnerabilities
  • File systems
  • DNS
  • LDAP

INFRASTRUCTURE SECURITY

Provides an overview of infrastructure security in terms of devices and media as well as security topologies. Network Address Translation and security zones are also covered.
  • Security devices
  • Routers and switches
  • More networking devices and NAT
  • Cable media
  • End devices
  • Data network types
  • Firewalls
  • Intrusion detection systems
  • Honeypots
  • Security zones

SECURITY BASELINES

Provides an overview of the basic principles for the proper hardening of a system. It also covers various hardening principles that apply to computer systems, network devices, applications, and database and directory services.
  • Hardening basics
  • OS/NOS hardening
  • Network hardening
  • Application hardening
  • Database and directory service hardening

CRYPTOGRAPHY

Provides an overview of cryptography basics, symmetric and asymmetric key cryptography, and digital certificates. Public Key Infrastructure (PKI), trust models, and key management are also covered.
  • Concepts of using cryptography
  • Cryptography basics
  • Encryption, decryption, and the cryptosystem
  • Symmetric key cryptography
  • Asymmetric key cryptography
  • Message authentication
  • Digital certificates
  • PKI components
  • Trust models and key management
  • Key management and certificate lifecycle

OPERATIONAL SECURITY

Provides an overview of physical security, including common threats, planning a secure facility, and four types of physical security controls. Ways to increase system reliability are also covered, from backup and recovery to high availability architectures. In addition, you'll learn about Business Continuity Planning and Disaster Recovery Planning.
  • Physical security
  • Facility requirements planning
  • Physical and technical controls
  • Environmental, life safety, and administrative controls
  • Backup and recovery
  • High availability architectures
  • BCP and DRP Overview
  • Scope of the BCP project and impact assessment
  • Developing the business continuity strategy
  • Elements of the business continuity strategy
  • Disaster recovery

ORGANIZATIONAL SECURITY

Provides an overview of general security policies and practices that should be considered and implemented for a successful information security program within an organization. It also covers topics related to a computer crime investigation.
  • Security management concepts
  • General security policies and practices
  • Principles of risk management
  • Security awareness
  • Documentation
  • Conducting investigations
  • Types, rules, and admissibility of evidence
  • Chain of custody and evidence lifecycle
  • Incident response

PRACTICE EXAM

Provides exam preparation tips and guidelines for the CompTIA Security+ Certification Exam SY0-101. Also included is a practice exam, consisting of 50 questions that are similar to those on the actual CompTIA exam.
  • Test day tips
  • Practice questions

Qualifications

Qualification: Printable Transcript

On completion of this course you may print a transcript off as evidence of your progression throughout the course.

Requirements for Entry

There is no experience or previous qualifications required for enrolment on this course. It is available to all students, of all academic backgrounds.

Study Options

If you do not have Internet access, or would prefer to study this course via the traditional paper/postal based study method, you can find more information on the course by clicking on the link below.

Study Hours

This is only an approximate figure and is dependant upon how much time you can dedicate to your studies and how well you grasp the learning concepts in the course material. Furthermore, at the end of each lesson there is a question paper that needs to be completed and returned to your tutor. You should allow at least 1 - 2 hours of study to complete each question paper.

The approximate amount of time required to complete the course is: 40 hrs.

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.