CompTIA Security+ (SY0-601)
Le registrazioni sono chiuse
CompTIA Security+
The CompTIA Security+ certification exam will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyze, and respond to security events and incidents.
- Comparing Security Roles and Security Controls
- Explaining Threat Actors and Threat Intelligence
- Performing Security Assessments
- Identifying Social Engineering and Malware
- Summarizing Basic Cryptographic Concepts
- Implementing Public Key Infrastructure
- Implementing Authentication Controls
- Implementing Identity and Account Management Controls
- Implementing Secure Network Designs
- Implementing Network Security Appliances
- Implementing Secure Network Protocols
- Implementing Host Security Solutions
- Implementing Secure Mobile Solutions
- Summarizing Secure Application Concepts
- Implementing Secure Cloud Solutions
- Explaining Data Privacy and Protection Concepts
- Performing Incident Response
- Explaining Digital Forensics
- Summarizing Risk Management Concepts
- Implementing Cybersecurity Resilience
- Explaining Physical Security
- Mapping Course Content to CompTIA Security+ SY0-601 Exam Objectives
Labs
- Exploring the Lab Environment
- Scanning and Identifying Network Nodes
- Intercepting and Interpreting Network Traffic with Packet Sniffing Tools
- Analyzing the Results of a Credentialed Vulnerability Scan
- Installing, Using, and Blocking a Malware-based Backdoor
- Performing Network Reconnaissance and Vulnerability Scanning
- Managing the Lifecycle of a Certificate
- Managing Certificates with OpenSSL
- Auditing Passwords with a Password Cracking Utility
- Managing Centralized Authentication
- Managing Access Controls in Windows Server
- Configuring a System for Auditing Policies
- Managing Access Controls in Linux
- Configuring Identity and Access Management Controls
- Implementing a Secure Network Design
- Configuring a Firewall
- Configuring an Intrusion Detection System
- Implementing Secure Network Addressing Services
- Implementing a Virtual Private Network
- Implementing a Secure SSH Server
- Implementing Endpoint Protection
- Securing the Network Infrastructure
- Identifying Application Attack Indicators
- Identifying a Browser Attack
- Implementing PowerShell Security
- Identifying Malicious Code
- Identifying Application Attacks
- Managing Data Sources for Incident Response
- Configuring Mitigation Controls
- Acquiring Digital Forensics Evidence
- Backing Up and Restoring Data in Windows and Linux
- Managing Incident Response, Mitigation and Recovery