Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Similar documents
CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

SY CompTIA Security+ Course Outline. SY CompTIA Security+ 31 Oct

LO CompTIA A+ : (Exam ) Course Outline Sep 2018

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

CompTIA A Exam 2. Course Outline. CompTIA A Exam Oct

MCSA Windows 10 (Course & Lab) Course Outline. MCSA Windows 10 (Course & Lab) 22 Apr 2018

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Course Outline. CompTIA A+: A Comprehensive Approach (Exams and )

Supporting Windows 8.1 (Course & Labs) Course Outline. Supporting Windows 8.1 (Course & Labs) 12 Nov

LO N LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) 04 Apr 2018

Enterprise support technician (Vista) Course Outline. Enterprise support technician (Vista) 15 Apr

LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) ( Add-On ) 15 Jul 2018

CIW: Network Technology Associate. Course Outline. CIW: Network Technology Associate. 17 Oct ( Add-On )

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

Course Outline. MCSA Configuring Windows 10 Devices (Course & Lab) ( Add-On ) MCSA Configuring Windows 10 Devices (Course & Lab)

MCSA - Windows 7, Configuring (Course & Lab) Course Outline. MCSA - Windows 7, Configuring (Course & Lab) ( Add-On ) 11 Jul 2018

Course Outline. CompTIA Network+ N Pearson ucertify Course and Labs. CompTIA Network+ N Pearson ucertify Course and Labs

& CompTIA A+ Complete Study Guide. Course Outline. CompTIA A+ Complete Study Guide.

CompTIA A+ Complete Study Guide. Course Outline. CompTIA A+ Complete Study Guide. 18 Oct

CompTIA A Exam 2 (Course & Labs) Course Outline. CompTIA A Exam 2 (Course & Labs) 05 Oct

CCNA CCNA Security Official Cert Guide. Course Outline. CCNA Security Official Cert Guide.

Course Outline. Installing and Configuring Windows Server 2012 R2 (Course & Lab)

Course Outline. CISSP - Certified Information Systems Security Professional

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

LO CompTIA A+ : (Exam ) Course Outline Aug 2018

CompTIA Network+ (2012) Course Outline. CompTIA Network+ (2012) 15 Jul 2018

Pearson CompTIA: Network+ (Course & Lab) Course Outline. Pearson CompTIA: Network+ (Course & Lab) 15 Jul 2018

CompTIA IT Fundamentals V5 (Course & Lab) Course Outline. CompTIA IT Fundamentals V5 (Course & Lab) 24 Jan

Course Outline. Oracle Database 12c: Installation and Administration. ( Add-On ) Oracle Database 12c: Installation and Administration

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

CompTIA Network+ N ucertify Course & Labs. Course Outline. CompTIA Network+ N ucertify Course & Labs.

Course Outline. Upgrading Your Skills to MCSA Windows Server 2012 R2. Upgrading Your Skills to MCSA Windows Server 2012 R2

MTA: Networking Fundamentals (Course & Labs) Course Outline. MTA: Networking Fundamentals (Course & Labs) 02 Oct

Pearson: Practical Guide to Advanced Networking. Course Outline. Pearson: Practical Guide to Advanced Networking. 17 Oct

LO CompTIA A+ : (Exam ) Course Outline. 04 Apr

Windows 7, Enterprise Desktop Administrator (Course & Lab) Windows 7, Enterprise Desktop Administrator (Course & Lab)

Course Outline. MCSA/MCSE - Querying Microsoft SQL Server 2012 (Course & Lab) ( Add-On )

Course Outline. ICND1 - Interconnecting Cisco Networking Devices Part 1. ICND1 - Interconnecting Cisco Networking Devices Part 1

Course Outline. Pearson: CCNP Routing and Switching SWITCH May 2018

Administering Microsoft SQL Server 2012 Databases. Course Outline. Administering Microsoft SQL Server 2012 Databases.

CompTIA A Exam 1 (Course & Labs) Course Outline. CompTIA A Exam 1 (Course & Labs) 15 Nov

MCTS/MCSE - Windows Server 2008 R2. Course Outline. MCTS/MCSE - Windows Server 2008 R Jun 2018

Course Outline. MCSA: Windows 8.1 Complete Study Guide Exam & (Course & Labs)

CompTIA Network+ N (Course & Labs) Course Outline. CompTIA Network+ N (Course & Labs) 14 Mar

Cisco Certified Design Associate. Course Outline. Cisco Certified Design Associate. 09 Oct

Course Outline. Pearson: CCNP Routing and Switching ROUTE

Interconnecting Cisco Networking Devices Part 1. Course Outline. Interconnecting Cisco Networking Devices Part 1.

Pearson: CCNP TSHOOT. Course Outline. Pearson: CCNP TSHOOT Jun 2018

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

Mobility+ Computing Deployment and Management. Course Outline. Mobility+ Computing Deployment and Management. 07 Apr

Course Outline. Pearson: MCSA Cert Guide: Identity with Windows Server

Course Outline. CCNA Cisco Certified Network Associate Routing and Switching Study Guide.

Course Outline. CCNA Cisco Certified Network Associate Routing and Switching Study Guide.

Pearson: CCNP Routing and Switching ROUTE Course Outline. Pearson: CCNP Routing and Switching ROUTE

Pearson: CCNP TSHOOT. Course Outline. Pearson: CCNP TSHOOT. 26 Dec

Course Outline. Pearson: MCSA Cert Guide: Identity with Windows Server 2016 (Course & Lab)

Pearson CISSP Lab. Course Outline. Pearson CISSP Lab. 05 Apr

Course Outline. CISSP - Certified Information Systems Security Professional 2015 (Course & Labs)

Course Outline. Pearson CISCO: CCNA Routing and Switching (ICND ) Pearson CISCO: CCNA Routing and Switching (ICND )

Oracle Java SE 7 Programmer II. Course Outline. Oracle Java SE 7 Programmer II. 30 Apr 2018

Course Outline. Upgrading Your Skills to MCSA Windows Server 2012 R2 (Course & Lab)

Course Outline. Administering Microsoft SQL Server 2012 Databases (Course & Lab) ( Add-On )

CIW: JavaScript Specialist v2.0. Course Outline. CIW: JavaScript Specialist v Jun 2018

Course Outline. CCNA Cyber Ops SECOPS Official Cert Guide (Course & Labs)

Course Outline. LPIC-1 Exam 1 - Linux Server Professional Certification V4.0 (Course & Labs)

Course Outline. Pearson: CCNP Routing and Switching TSHOOT

Course Outline. [ORACLE PRESS] OCA Java SE 8 Programmer Course for Exam 1Z

CIW: Advanced HTML5 and CSS3 Specialist. Course Outline. CIW: Advanced HTML5 and CSS3 Specialist. ( Add-On ) 16 Sep 2018

Course Outline. CWTS Certified Wireless Technology Specialist. CWTS Certified Wireless Technology Specialist

Course Outline. Pearson: CompTIA A Cert Guide (Course & Labs) Pearson: CompTIA A Cert Guide (Course & Labs)

CIW: JavaScript Specialist. Course Outline. CIW: JavaScript Specialist. 30 Dec

Course Outline. Pearson: CCNP Routing and Switching TSHOOT Sep 2018

Course Outline. Interconnecting Cisco Networking Devices Part 1 and 2. Interconnecting Cisco Networking Devices Part 1 and 2

Course Outline. ICND2 - Interconnecting Cisco Networking Devices Part 2. ICND2 - Interconnecting Cisco Networking Devices Part 2

Course Outline. MCSA/MCSE - SQL Server 2008 Administration and MCSA/MCSE - SQL Server 2008 Administration

Course Outline. CCNA - Interconnecting Cisco Networking Devices Part 1 and 2.

Course Outline. Pearson: CompTIA A Cert Guide (Course & Labs) Pearson: CompTIA A Cert Guide (Course & Labs)

Pearson CISCO: CCENT/CCNA (ICND ) Course Outline. Pearson CISCO: CCENT/CCNA (ICND ) 07 Jun 2018

Course Outline. CCNA - Interconnecting Cisco Networking Devices Part 1 and 2.

Pearson: CompTIA Healthcare IT Technician HIT-001. Course Outline. Pearson: CompTIA Healthcare IT Technician HIT Nov

Beginning jquery. Course Outline. Beginning jquery. 09 Mar

MCSA Windows 10 Lab (70698 Lab) Course Outline. 20 Jun 2018

Course Outline. CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs)

Course Outline. Pearson: MCSA Cert Guide: Networking with Windows Server 2016 (Course & Lab)

CIW: Site Development Associate. Course Outline. CIW: Site Development Associate. ( Add-On ) 26 Aug 2018

Course Outline. [ORACLE PRESS] OCE Oracle Database SQL Certified Expert Course for Exam 1Z

MCSA Windows 10 Lab (70697 Lab) Course Outline. 24 Nov

Course Outline. Pearson: MCSA Cert Guide: Networking with Windows Server

Course Outline. Pearson: Networking Essentials, 4/E (Course & Lab)

Pearson: Networking Essentials, 4/E (Course & Lab) Course Outline. Pearson: Networking Essentials, 4/E (Course & Lab) 18 Oct

Course Outline. Pearson CISCO: CCENT/CCNA (ICND ) official cert guide.

Course Outline. Cloud Essentials (CompTIA Authorized Courseware) Labs. Cloud Essentials (CompTIA Authorized Courseware) Labs

Course Outline. Pearson CISCO: CCENT/CCNA (ICND ) official cert guide.

Course Outline. Installing and Configuring Windows Server 2012 LAB lab - Installing and Configuring Windows Server 2012 LAB

CCNA - Cisco Certified Network Associate. Course Outline. CCNA - Cisco Certified Network Associate. 09 Nov

CompTIA Network+ Lab V2.0. Course Outline. CompTIA Network+ Lab V Apr

CompTIA A+ Certification: Labs. Course Outline. CompTIA A+ Certification: Labs. 07 Dec

MTA: Windows Operating System Fundamentals. Course Outline. MTA: Windows Operating System Fundamentals. 27 Mar

CompTIA A Lab. Course Outline. CompTIA A Lab. 30 Nov

Transcription:

Course Outline Pearson CompTIA: Security+ SY0-401 (Course & Lab) 03 May 2018

Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible Platform 6. State of the Art Educator Tools 7. Award Winning Learning Platform (LMS) 8. Chapter & Lessons Syllabus Chapter 1: CompTIA Security+ SY0-401 Authorized Cert Guide, Academic Edition Chapter 2: Introduction to Security Chapter 3: Computer Systems Security Chapter 4: OS Hardening and Virtualization Chapter 5: Application Security Chapter 6: Network Design Elements Chapter 7: Networking Protocols and Threats Chapter 8: Network Perimeter Security Chapter 9: Securing Network Media and Devices Chapter 10: Physical Security and Authentication Models Chapter 11: Access Control Methods and Models Chapter 12: Vulnerability and Risk Assessment Chapter 13: Monitoring and Auditing Chapter 14: Encryption and Hashing Concepts

Chapter 15: PKI and Encryption Protocols Chapter 16: Redundancy and Disaster Recovery Chapter 17: Policies, Procedures, and People Chapter 18: Taking the Real Exam Chapter 19: Appendix A: Glossary Chapter 20: Appendix B: Q&A Flash Cards Chapter 21: Appendix C: Activities and Facts Videos and How To 9. Practice Test Here's what you get Features 10. Performance Based Labs Lab Tasks Here's what you get 11. Post-Assessment 1. Course Objective Gain hands-on expertise in CompTIA Security+ certification exam by Pearson CompTIA: Security+ SY0-401 course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. Pearson CompTIA: Security+ SY0-401 course and performance-based labs cover all the objectives of CompTIA Security+ SY0-401 exam which include the application of security controls to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security. 2. Pre-Assessment Pre-Assessment lets you identify the areas for improvement before you start your prep. It determines

what students know about a topic before it is taught and identifies areas for improvement with question assessment before beginning the course. 3. Exercises, Quizzes, Flashcards & Glossary Each lesson comes with Exercises, Flashcards & Quizzes. There is no limit to the number of times learners can attempt these. Exercises come with detailed remediation, which ensures that learners are confident on the topic before proceeding. Flashcards help master the key concepts while Glossary defines the key terms. Number of Questions 800 Questions Over 800 unique questions including pre-assessment, quizzes, exercises, and post assessment. 4. Expert Instructor-Led Training ucertify uses the content from the finest publishers and only the IT industry s finest instructors. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can study at your own pace. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7. 5. ADA Compliant & JAWS Compatible Platform ucertify course and labs are ADA (Americans with Disability Act) compliant. It is now more accessible to students with features such as:

Change the font, size, and color of the content of the course Text-to-speech, reads the text into spoken words Interactive videos, how-tos videos come with transcripts and voice-over Interactive transcripts, each word is clickable. Students can clip a specific part of the video by clicking on a word or a portion of the text. JAWS (Job Access with Speech) is a computer screen reader program for Microsoft Windows that reads the screen either with a text-to-speech output or by a Refreshable Braille display. Student can easily navigate ucertify course using JAWS shortcut keys. 6. State of the Art Educator Tools ucertify knows the importance of instructors and provide tools to help them do their job effectively. Instructors are able to clone and customize course. Do ability grouping. Create sections. Design grade scale and grade formula. Create and schedule assignments. Educators can also move a student from self-paced to mentor-guided to instructor-led mode in three clicks. 7. Award Winning Learning Platform (LMS) ucertify has developed an award winning, highly interactive yet simple to use platform. The SIIA CODiE Awards is the only peer-reviewed program to showcase business and education technology s finest products and services. Since 1986, thousands of products, services and solutions have been recognized for achieving excellence. ucertify has won CODiE awards consecutively for last 4 years: 2014 1. Best Postsecondary Learning Solution 2015 1. Best Education Solution 2. Best Virtual Learning Solution

3. Best Student Assessment Solution 4. Best Postsecondary Learning Solution 5. Best Career and Workforce Readiness Solution 6. Best Instructional Solution in Other Curriculum Areas 7. Best Corporate Learning/Workforce Development Solution 2016 1. Best Virtual Learning Solution 2. Best Education Cloud-based Solution 3. Best College and Career Readiness Solution 4. Best Corporate / Workforce Learning Solution 5. Best Postsecondary Learning Content Solution 6. Best Postsecondary LMS or Learning Platform 7. Best Learning Relationship Management Solution 2017 1. Best Overall Education Solution 2. Best Student Assessment Solution 3. Best Corporate/Workforce Learning Solution 4. Best Higher Education LMS or Learning Platform 8. Chapter & Lessons ucertify brings these textbooks to life. It is full of interactive activities that keeps the learner engaged. ucertify brings all available learning resources for a topic in one place so that the learner can efficiently learn without going to multiple places. Challenge questions are also embedded in the chapters so learners can attempt those while they are learning about that particular topic. This helps them grasp the concepts better because they can go over it again right away which improves learning. Learners can do Flashcards, Exercises, Quizzes and Labs related to each chapter. At the end of every lesson, ucertify courses guide the learners on the path they should follow.

Syllabus Chapter 1: CompTIA Security+ SY0-401 Authorized Cert Guide, Academic Edition Chapter 2: Introduction to Security Security 101 Think Like a Hacker Chapter 3: Computer Systems Security Computer Systems Security Threats Implementing Security Applications Securing Computer Hardware, Peripherals, and Mobile Devices Case Studies for Chapter 2 Chapter 4: OS Hardening and Virtualization Hardening Operating Systems Virtualization Technology Case Studies for Chapter 3 Chapter 5: Application Security Securing the Browser Securing Other Applications Secure Programming Case Studies for Chapter 4 Chapter 6: Network Design Elements Network Design

Cloud Security and Server Defense Case Studies for Chapter 5 Chapter 7: Networking Protocols and Threats Ports and Protocols Malicious Attacks Case Studies for Chapter 6 Chapter 8: Network Perimeter Security Firewalls and Network Security NIDS Versus NIPS Case Studies for Chapter 7 Chapter 9: Securing Network Media and Devices Securing Wired Networks and Devices Case Studies for Chapter 8 Chapter 10: Physical Security and Authentication Models Physical Security Authentication Models and Components Case Studies for Chapter 9 Chapter 11: Access Control Methods and Models Access Control Models Defined Rights, Permissions, and Policies

Case Studies for Chapter 10 Chapter 12: Vulnerability and Risk Assessment Conducting Risk Assessments Assessing Vulnerability with Security Tools Case Studies for Chapter 11 Chapter 13: Monitoring and Auditing Monitoring Methodologies Using Tools to Monitor Systems and Networks Conducting Audits Case Studies for Chapter 12 Chapter 14: Encryption and Hashing Concepts Cryptography Concepts Encryption Algorithms Hashing Basics Case Studies for Chapter 13 Chapter 15: PKI and Encryption Protocols Public Key Infrastructure Web of Trust Security Protocols Case Studies for Chapter 14 Chapter 16: Redundancy and Disaster Recovery Redundancy Planning

Disaster Recovery Planning and Procedures Case Study for Chapter 15 Chapter 17: Policies, Procedures, and People Environmental Controls Social Engineering Legislative and Organizational Policies Case Studies for Chapter 16 Chapter 18: Taking the Real Exam Getting Ready and the Exam Preparation Checklist Tips for Taking the Real Exam Beyond the CompTIA Security+ Certification Case Study for Chapter 17 Chapter 19: Appendix A: Glossary Chapter 20: Appendix B: Q&A Flash Cards Chapter 21: Appendix C: Activities and Facts Videos and How To ucertify course includes videos to help understand concepts. It also includes How Tos that help learners in accomplishing certain tasks.

9. 29 04:45 VIDEOS HOURS Practice Test ucertify provides full length practice tests. These tests closely follow the exam objectives and are designed to simulate real exam conditions. Each course has a number of test sets consisting of hundreds of items to ensure that learners are prepared for the certification exam. Here's what you get 105 PRE-ASSESSMENTS QUESTIONS 2 FULL LENGTH TESTS 100 POST-ASSESSMENTS QUESTIONS Features Full Remediation Each question comes with detailed remediation explaining not only why an answer option is correct but also why it is incorrect.

Unlimited Practice Each test can be taken unlimited number of times until the learner feels they are prepared. Learner can review the test and read detailed remediation. Detailed test history is also available. Learn, Test and Review Mode Each test set comes with learn, test and review modes. In learn mode, learners will attempt a question and will get immediate feedback and complete remediation as they move on to the next question. In test mode, learners can take a timed test simulating the actual exam conditions. In review mode, learners can read through one item at a time without attempting it. 10. Performance Based Labs ucertify s performance-based labs are simulators that provides virtual environment. Labs deliver hands on experience with minimal risk and thus replace expensive physical labs. ucertify Labs are cloud-based, device-enabled and can be easily integrated with an LMS. Features of ucertify labs: Provide hands-on experience in a safe, online environment Labs simulate real world, hardware, software & CLI environment Flexible and inexpensive alternative to physical Labs Comes with well-organized component library for every task Highly interactive - learn by doing Explanations and remediation available Videos on how to perform Lab Tasks Joining SpyNet community using Windows Defender Configuring Windows firewall settings Identifying types of viruses

Identifying the filename extension Identifying types of malware Understanding classification of viruses Scanning the computer Protecting a computer by blocking communications Downloading and installing the Avast antivirus, and scanning the system Creating a new inbound rule Blocking a connection Identifying measures for spamming protection Identifying Intrusion detection key terms Understanding passive responses of intrusion Identifying sequence in which the IDS instructs the TCP to reset connections Identifying primary areas of security topologies Working with a host-based IDS Identifying causes of compromised security Viewing the Generate Random Password screenshot Enabling BitLocker Viewing the current version of BIOS Understanding security measures for mobile devices Identifying methods of updating an operating system Downloading the Windows 7 service pack Viewing the update history and details Understanding methods of OS hardening Sharing a folder with a different user on a single computer Understanding primary virtualization topics Editing a virtual hard disk file Configuring IE settings to avoid disruption in computer operations Configuring the settings in Content Advisor Customizing group and user access with MMC Deleting the web browsing history Understanding web-based applications Identifying ethical hacking approaches

Understanding types of application attacks Understanding the network infrastructure devices Identifying device for network connectivity Identifying PBX system layers Understanding router protocols Understanding the network devices Identifying TCP/IP architecture layer protocols Understanding application layer protocols Understanding Internet layer protocols Spotting the intranet network Identifying technologies to create less vulnerable networks Identifying cloud computing service models Understanding cloud models Identifying service associated with cloud computing Installing the FTP server under the Web Server role Understanding email protocols Understanding TCP/IP protocols Identifying TCP ports Identifying ports and services Understanding protocols Viewing the ARP table Identifying types of system attack Identifying attacks Preventing IP address spoofing Identifying types of firewall Enabling LMHOSTS lookup Configuring wireless network settings Creating a network bridge Understanding WAP security levels Identifying physical security devices Configuring NPS Accounting Configuring NPS network policy

Identifying the tunnel Identifying wireless protocols Understanding technologies used to communicate in the 802.11 standard Configuring NPS to provide RADIUS authentication Identifying authentication services Identifying types of authentication services Enabling the network policy server Identifying authentication protocols Identifying access control methods Turning off the guest account Configuring account time limits Identifying Information models Identifying risk actions Identifying security factors Understanding measures of risk calculation Identifying key aspects of standard documents Performing penetration testing Understanding quantitative risk assessment values Understanding code-breaking techniques Performing XArp software installation Identifying vulnerability scanning tasks Determining vulnerability of a network to attacks Understanding key areas of reporting Viewing disk configuration Viewing memory usage of programs Viewing the running processes of all the users Viewing details of an event in Windows Server Adding counters Understanding security posture methods Viewing different event details Checking the integrity of messages through MAC values Identifying approaches of non-mathematical cryptography

Creating a virtual volume Mounting and dismounting an encrypted volume Understanding public cryptographic initiatives Identifying asymmetric algorithms Encrypting and decrypting a message Encrypting and decrypting a message using the RSA algorithm Encrypting a picture Understanding PKCS standards Identifying cryptographic attacks Identifying hashing algorithm Creating a hash rule in Windows Server 2012 Identifying the authority process Examining certificate details Examining the Microsoft Root Authority certificate details Installing a subordinate Certification Authority Managing the certificate server using the mmc tool Adding the Active Directory Certificate Services role Creating and backing up an encryption certificate Backing up an encryption certificate and key Understanding trust models Understanding PKI trust models Identifying tunneling protocols Identifying protocols for secure connections Understanding models for improving system performance Identifying retardants of fire extinguishers Identifying social engineering attacks Identifying policies Understanding information categories Identifying areas to consider for the business policy Here's what you get

128 PERFORMANCE BASED LAB 11. 18 25 VIDEO TUTORIALS MINUTES Post-Assessment After completion of the ucertify course Post-Assessments are given to students and often used in conjunction with a Pre-Assessment to measure their achievement and the effectiveness of the exam. Have Any Query? We Are Happy To Help! GET IN TOUCH: Call: +1-415-763-6300 Email: sales@ucertify.com