MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

CompTIA Security+ (2011 objectives): Part 3

Course Summary

Part 3 of 3 in the CompTIA Security+ (2011 objectives) series. This CompTIA Security+ course will provide networking professionals with the fundamental concepts necessary to anticipate and address security risks. In this course, you will learn network sec


  • +

    Course Syllabus

    ● Business Continuity
        ◦ Introduction
        ◦ Business Continuity vs. Disaster Recovery
        ◦ Business Continuity Planning (BCP) and Testing
        ◦ Business Impact Analysis
        ◦ IT Contingency Planning
        ◦ Continuity of Operations
        ◦ Succession Planning
        ◦ What We Covered
    ● Disaster Recovery Planning
        ◦ Introduction
        ◦ Disaster Recovery Plan
        ◦ Service Level Agreement (SLA)
        ◦ Utilities
        ◦ Backup Types
        ◦ Backup Plans
        ◦ Backup Storage Options
        ◦ Recovering from Backups
        ◦ Backup and Recovery Considerations
        ◦ Redundancy
        ◦ Fault Tolerance
        ◦ Load Balancing
        ◦ Clustering
        ◦ Alternative/Backup Sites
        ◦ What We Covered
    ● Incident Response
        ◦ Introduction
        ◦ Incident Response Plan
        ◦ Damage and Loss Control
        ◦ Chain of Custody
        ◦ First Responder
        ◦ Basic Forensic Procedures
        ◦ What We Covered
    ● User Education
        ◦ Introduction
        ◦ Security Policy Training and Procedures
        ◦ Threat Awareness
        ◦ Personally Identifiable Information (PII)
        ◦ Regulatory Compliance
        ◦ Social Networking
        ◦ Peer to Peer (P2P) File Sharing
        ◦ User Habits
        ◦ Information Classification
        ◦ Data Labeling, Handling, and Disposal
        ◦ What We Covered
    ● Social Engineering
        ◦ Introduction
        ◦ Social Engineering Overview
        ◦ Impersonation
        ◦ Tailgating
        ◦ Dumpster Diving
        ◦ Shoulder Surfing
        ◦ Phishing
        ◦ Hoaxes
        ◦ Reverse Social Engineering
        ◦ What We Covered
    ● Cryptography Concepts
        ◦ Introduction
        ◦ Cryptography Overview
        ◦ Symmetric vs. Asymmetric Encryption
        ◦ Digital Signatures
        ◦ Non-repudiation
        ◦ Encryption/Decryption Methods
        ◦ Cryptographic Hashing
        ◦ Transport Encryption
        ◦ Steganography
        ◦ Use of Proven Technologies
        ◦ What We Covered
    ● Cryptography Tools
        ◦ Introduction
        ◦ Symmetric Encryption
        ◦ Asymmetric Encryption
        ◦ Cryptographic Hashing
        ◦ Transport Encryption
        ◦ Wireless Encryption
        ◦ Other Encryption Tools
        ◦ Comparative Strengths of Algorithms
        ◦ What We Covered
    ● Public Key Infrastructure (PKI) Concepts
        ◦ Introduction
        ◦ Public Key Infrastructure (PKI) Overview
        ◦ Digital Certificates
        ◦ Certificate Authorities (CA)
        ◦ How PKI Works
        ◦ Registration Authorities
        ◦ Certificate Revocation Lists (CRL)
        ◦ Recovery Agents
        ◦ Key Escrow
        ◦ What We Covered
    ● PKI Implementation
        ◦ Introduction
        ◦ Publicly Trusted Certificate Authorities
        ◦ Internal Certificate Authorities
        ◦ Working with Registration Authorities
        ◦ Key Management
        ◦ Certificate Management
        ◦ Trust Models
        ◦ What We Covered
    ● Preparing for Your C


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top