CompTIA Security+ | SY0-501

Total time
Location
At location, Online
Starting date and place
Logo DutchTrain
Provider rating: starstarstarstarstar_border 7.6 DutchTrain has an average rating of 7.6 (out of 53 reviews)

Tip: need more info about the programme, starting date or price? Request information for free!

Starting dates and places

computer Online: Dynamic Virtual Classroom
13 Dec 2021 until 17 Dec 2021
placeZoetermeer
13 Dec 2021 until 17 Dec 2021

Description

We gaan weer van start met de klassikale trainingen. Daarnaast zijn al onze klassikale trainingen ook beschikbaar in onze Dynamic Virtual Classroom. In onze Dynamic Virtual Classroom zijn zowel de docent als de cursisten zichtbaar met elkaar verbonden en kunnen documenten en beeldschermen met alle deelnemers worden gedeeld. Cursisten hebben de mogelijkheid, net zoals in een klassikale training, om zowel onderling als met de docent te communiceren en opdrachten te maken. Een actieve klassikale training maar dan op afstand.

Daarnaast zijn veel van onze trainingen ook beschikbaar als
E-Learning in onze Education On Demand Omgeving.
Deze E-Learning trainingen kunt u volgen vanaf iedere gewenste locatie, op ieder moment en heeft u 365 dagen toegang tot de online training.

Bij DutchTrain staan wij voor u klaar.

Dutchtrain "Verder niks nodig"

CompTIA Security+ | SY0-501

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

Voor wie

CompTIA Security+ is aimed at IT professionals with job roles such as security engineer, security consultant /specialist, information assurance technician, junior auditor / penetration tester, security administrator, systems administrator, and network administrator.

Inhoud

– Mod…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

We gaan weer van start met de klassikale trainingen. Daarnaast zijn al onze klassikale trainingen ook beschikbaar in onze Dynamic Virtual Classroom. In onze Dynamic Virtual Classroom zijn zowel de docent als de cursisten zichtbaar met elkaar verbonden en kunnen documenten en beeldschermen met alle deelnemers worden gedeeld. Cursisten hebben de mogelijkheid, net zoals in een klassikale training, om zowel onderling als met de docent te communiceren en opdrachten te maken. Een actieve klassikale training maar dan op afstand.

Daarnaast zijn veel van onze trainingen ook beschikbaar als
E-Learning in onze Education On Demand Omgeving.
Deze E-Learning trainingen kunt u volgen vanaf iedere gewenste locatie, op ieder moment en heeft u 365 dagen toegang tot de online training.

Bij DutchTrain staan wij voor u klaar.

Dutchtrain "Verder niks nodig"

CompTIA Security+ | SY0-501

The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations.

Voor wie

CompTIA Security+ is aimed at IT professionals with job roles such as security engineer, security consultant /specialist, information assurance technician, junior auditor / penetration tester, security administrator, systems administrator, and network administrator.

Inhoud

– Module 1 – Threats, Attacks, and Vulnerabilities
– Indicators of Compromise
– Why is Security Important?
– Security Policy
– Threat Actor Types
– The Kill Chain
– Social Engineering
– Phishing
– Malware Types
– Trojans and Spyware
– Open Source Intelligence
– VM Orientation
– Malware Types
– Critical Security Controls
– Security Control Types
– Defense in Depth
– Frameworks and Compliance
– Vulnerability Scanning and Pen Tests
– Security Assessment Techniques
– Pen Testing Concepts
– Vulnerability Scanning Concepts
– Exploit Frameworks
– Using Vulnerability Assessment Tools
– Security Posture Assessment Tools
– Topology Discovery
– Service Discovery
– Packet Capture
– Packet Capture Tools
– Remote Access Trojans
– Honeypots and Honeynets
– Using NetworkScanning Tools 1
– Using Network Scanning Tools 2
– Using Steganography Tools
– Incident Response
– Incident Response Procedures
– Preparation Phase
– Identification Phase
– Containment Phase
– Eradication and Recovery Phases
– Module 2 – Identity and Access Management
– Cryptography
– Uses of Cryptography
– Cryptographic Terminology and Ciphers
– CryptographicProducts
– Hashing Algorithms
– Symmetric Algorithms
– Asymmetric Algorithms
– Diffie-Hellman and Elliptic Curve
– Transport Encryption
– Cryptographic Attacks
– Implementing Public Key Infrastructure Public Key Infrastructure
– PKI Standards
– Digital Certificates
– Certificate Authorities
– Types of Certificate
– Implementing PKI
– Storing and Distributing Keys
– Key Status and Revocation
– PKI Trust Models
– PGP / GPG
– Deploying Certificates and Implementing Key Recovery
– Identification and Authentication
– Access Control Systems
– Identification
– Authentication
– LAN Manager / NTLM
– Kerberos
– PAP, CHAP, and MS-CHAP
– Password Attacks –
Token-based Authentication
– Biometric Authentication
– Common Access Card
– Using Password Cracking Tools
– Identity and Access Services
– Authorization
– Directory Services
– RADIUS and TACACS+
– Federation and Trusts
– Federated Identity Protocols
– Account Management
– Formal Access Control Models
– Account Types
– Windows Active Directory
– Creating and Managing Accounts
– Account Policy Enforcement
– Credential Management Policies
– Account Restrictions
– Accounting and Auditing
– Using Account Management Tools
– Module 3 – Architecture and Design (1)
– Secure Network Design
– Network Zones and Segments
– Subnetting
– Switching Infrastructure
– Switching Attacks and Hardening
– Endpoint Security
– Network Access Control
– Routing Infrastructure
– Network Address Translation
– Software Defined Networking
– Implementing a Secure Network Design
– Firewalls and Load Balancers
– Basic Firewalls
– Stateful Firewalls
– Implementing a Firewall or Gateway
– Web Application Firewalls
– Proxies and Gateways
– Denial of Service Attacks
– Load Balancers
– Implementing a Firewall
– IDS and SIEM
– Intrusion Detection Systems
– Configuring IDS
– Log Review and SIEM
– Data Loss Prevention
– Malware and Intrusion Response
– Using an Intrusion Detection System
– Secure Wireless Access
– Wireless LANs
– WEP and WPA
– Wi-Fi Authentication
– Extensible Authentication Protocol
– Additional Wi-Fi Security Settings
– Wi-Fi Site Security
– Personal Area Networks
– Physical Security Controls
– Site Layout and Access
– Gateways and Locks
– Alarm Systems
– Surveillance
– Hardware Security
– Environmental Controls
– Module 4 – Architecture and Design (2)
– Secure Protocols and Services
– DHCP Security
– DNS Security
– Network Management Protocols
– HTTP and Web Servers
– SSL / TSL and HTTPS
– Web Security Gateways
– Email Services
– S/MIME
– File Transfer
– Voice and Video Services
– VoIP
– Implementing Secure Network Addressing Services
– Configuring a Secure Email Service
– Secure Remote Access
– Remote Access Architecture
– Virtual Private Networks
– IPSec
– Remote Access Servers
– Remote Administration Tools
– Hardening Remote Access Infrastructure
– Implementing a Virtual Private Network
– Secure Systems Design
– Trusted Computing
– Hardware / Firmware Security
– Peripheral Device Security
– Secure Configurations
– OS Hardening
– Patch Management
– Embedded Systems
– Security for Embedded Systems
– Secure Mobile Device Services
– Mobile Device Deployments
– Mobile Connection Methods
– Mobile Access Control Systems
– Enforcement and Monitoring
– Secure Virtualization and Cloud Services
– Virtualization Technologies
– Virtualization Security Best Practices
– Cloud Computing
– Cloud Security Best Practices
– Module 5 – Risk Management
– Forensics
– Forensic Procedures
– Collecting Evidence
– Capturing System Images
– Handling andmAnalyzing Evidence
– Using Forensic Tools
– Disaster Recovery and Resiliency
– Continuity of Operations Plans
– Disaster Recovery Planning
– Resiliency Strategies
– Recovery Sites
– Backup Plans and Policies
– Resiliency and Automation Strategies
– Risk Management
– Business Impact Analysis
– Identification of Critical Systems
– Risk Assessment
– Risk Mitigation
– Secure Application Development
– Application Vulnerabilities
– Application Exploits
– Web Browser Exploits
– Secure Application Design
– Secure Coding Concepts
– Auditing Applications
– Secure DevOps
– Identifying a Man-in-the-Browser Attack
– Organizational Security
– Corporate Security Policy
– Personnel Management Policies
– Interoperability Agreements
– Data Roles
– Data Sensitivity Labeling and Handling
– Data Wiping and Disposal
– Privacy and Employee Conduct Policies
– Security Policy Training

Exclusief examen

SY0-501 CompTIA Security+

DutchTrain is een officieel geaccrediteerd Test Center voor Pearson Vue Test, Prometric, Kryterion, Castle Worldwide, Certiport & PSI. U bent bij ons van harte welkom voor examens welke via deze Test Centers beschikbaar zijn. Examens kunnen elke dag, binnen kantooruren, worden afgenomen.

Duur

5 dagen

Meer informatie

Kijk op onze website voor gedetailleerde lesinhoud, examens en meer details van deze training.

Deze training is ook beschikbaar als

– Education On Demand (E-Learning)
– Maatwerktraining, neem hiervoor contact op met een van onze opleidingsadviseurs.

Stay up-to-date on new reviews

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Where should we send the information?

Gender
(optional)
(optional)
(optional)
(optional)
(optional)
(optional)
(optional)
We store your personal details, and share them with DutchTrain, in order to help you along via email and potentially via phone. You can find more info in our privacy policy.