MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

CompTIA Security+ Certification - SY0-401 (2014 Objectives)

Course Summary

Study for the CompTIA Security+ Certification with Infinite Skills


  • +

    Course Syllabus

    • Introduction
      • Important - Download These First - Working Files
      • 0101 What To Expect From This Course
      • 0103 Course Overview
      • 0104 About The Security+ Exams
      • 0105 How To Access Your Working Files
    • Understanding The Risks
      • 0201 Risk Assessment
      • 0202 Risk Calculation
      • 0203 Policies Standards And Guidelines
      • 0204 Understanding Control Types
      • 0205 Risk Management
    • Three A Concept
      • 0301 Understanding The Three A Concept
      • 0302 Authentication
      • 0303 Access Control
      • 0304 Access Control Methods
      • 0305 Authentication Issues
      • 0306 Authentication Protocols
      • 0307 Authentication Services - Part 1
      • 0308 Authentication Services - Part 2
      • 0309 Best Practices
      • 0310 Trusted OS
      • 0311 Setting Permissions
    • Network Devices
      • 0401 Understanding TCP/IP
      • 0402 Protocols And Services - Part 1
      • 0403 Protocols And Services - Part 2
      • 0404 Firewalls - Part 1
      • 0405 Firewalls - Part 2
      • 0406 Routers And Switches
      • 0407 Load Balancing
      • 0408 Proxy Servers
      • 0409 IDS Versus IPS
      • 0410 UTM Devices
      • 0411 Protocol Analyzers
      • 0412 Using A Network Monitor
    • Network Design Elements
      • 0501 Layering For Security
      • 0502 DMZ
      • 0503 VLANs
      • 0504 NAT
    • Security Threats
      • 0601 Understanding Malware
      • 0602 Viruses
      • 0603 Virus Types - Part 1
      • 0604 Virus Types - Part 2
      • 0605 Antivirus Software
      • 0606 Attack Types - Part 1
      • 0607 Attack Types - Part 2
      • 0608 Common Attacks
      • 0609 Application Attacks - Part 1
      • 0610 Application Attacks - Part 2
    • Wireless Networks
      • 0701 Wireless Network Basics
      • 0702 Wireless Protocols
      • 0703 Encryption Options
      • 0704 WAP Basics
      • 0705 Extensible Authentication Protocol
      • 0706 Wireless Vulnerabilities
    • Application Security
      • 0801 Application Hardening
      • 0802 Databases
      • 0803 Patches And Updates
      • 0804 Secure Coding
    • Host Security
      • 0901 Host Security Basics
      • 0902 ACLs And Permissions
      • 0903 Software Baselining
      • 0904 Email And Web Server Security
      • 0905 DHCP Security
      • 0906 DNS Security
      • 0907 Authorizing A DHCP Server
    • Data Security
      • 1001 Fault Tolerance Basics
      • 1002 RAID
      • 1003 Clustering
      • 1004 The Backup Plan - Part 1
      • 1005 The Backup Plan - Part 2
    • Security In The Cloud
      • 1101 Understanding Cloud Computing
      • 1102 Four Cloud Types
      • 1103 Saas, PaaS And IaaS
      • 1104 Security In The Cloud
    • Social Engineering And Physical Security
      • 1201 Understanding Social Engineering
      • 1202 Social Engineering Types
      • 1203 Dealing With Social Engineering
      • 1204 Physical Security - Part 1
      • 1205 Physical Security - Part 2
    • Cryptography
      • 1301 Cryptography Basics
      • 1302 PKI Basics
      • 1303 X.509
      • 1304 Viewing Certificates
      • 1305 CAs And RAs
      • 1306 SSL And TLS
      • 1307 Hard And Soft Encryption
      • 1308 Encrypting Files
      • 1309 Web Server Certificate Request
    • Monitoring Networks
      • 1401 Network Monitoring Basics
      • 1402 Event Viewer
      • 1403 Hardening Basics - Part 1
      • 1404 Hardening Basics - Part 2
      • 1405 Detection Versus Prevention
      • 1406 Security Monitoring
    • Security Administration
      • 1501 Security Awareness
      • 1502 Information Classification
      • 1503 Information Access
      • 1504 Security Regulation Compliance
      • 1505 Third Party Security
      • 1506 Mobile Devices
      • 1507 BYOD
    • Disaster Recovery
      • 1601 Disaster Recovery Plans
      • 1602 Incident Response Policies
      • 1603 Working With Vendors
      • 1604 Security Testing
    • Conclusion
      • 1701 Wrap Up


Course Fee:
USD 99

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top