Nwiielkitaisembzfadc

Certificación CompTIA Security+

Valide las habilidades que necesite para realizar funciones básicas de seguridad e inicie su carrera de TI en seguridad

   Ver video

Por solo $563 USD


¡Obtenga las destrezas requeridas para proteger aplicaciones, redes y servicios!

No incluye examen de certificación


Contenidos de la aplicación

Como referencia de mejores prácticas en seguridad de TI, la preparación para esta certificación aborda los principios esenciales de seguridad de redes y gestión de riesgos:


CompTIA Security+ SY0-501: The Present Threat Landscape

CompTIA Security+ SY0-501: Types of Malware

CompTIA Security+ SY0-501: Social Engineering and Related Attacks

CompTIA Security+ SY0-501: Application and Service Attacks

  • Start the course
  • Describe zero day attacks
  • Classify spoofing
  • Recognize DoS and DDoS attacks
  • Describe man-in-the-middle attacks
  • Define ARP poisoning
  • Describe buffer overflow attacks
  • Recognize injection attacks
  • Define privilege escalation
  • Compare reflection and amplification
  • Describe DNS poisoning
  • Recognize domain hijacking
  • Define man-in-the-browser
  • Compare cross-site scripting and request forgery
  • Describe replay attacks
  • Define pass the hash attacks
  • Recognize application and service attacks


CompTIA Security+ SY0-501: Cryptographic and Wireless Attacks

  • Start the course
  • Recognize brute-force and dictionary attacks
  • Demonstrate brute-force tools
  • Describe birthday, known plaintext, and cipher attacks
  • Compare online vs. offline attacks
  • Define collisions
  • Describe downgrade attacks
  • Recognize replay attacks
  • Specify initialization vector weaknesses
  • Compare evil twins and rogue apps
  • Describe jamming
  • Compare bluejacking and bluesnarfing
  • Define WPS attacks
  • Recognize disassociation attacks
  • Compare RFID and near field communication (NFC)
  • Recognize cryptographic and wireless attacks


CompTIA Security+ SY0-501: Penetration Testing and Vulnerability Scanning

  • Start the course
  • Compare active vs. passive reconnaissance
  • Describe a pivot
  • Specify initial exploitation
  • Define persistence
  • Recognize escalation of privilege
  • Compare black vs. gray vs. white box
  • Compare pen testing vs. vulnerability scanning
  • Passively test security controls
  • Identify vulnerability
  • Identify lack of security controls
  • Identify common misconfigurations
  • Compare intrusive vs. non-intrusive
  • Compare credentialed vs. non-credentialed
  • Describe false positives
  • Recognize penetration testing and vulnerability scanning methods
  • /ul>

CompTIA Security+ SY0-501: Impacts from Vulnerability Types

  • Start the course
  • Describe race conditions
  • Recognize system vulnerabilities
  • Specify improper input and error handling
  • Define misconfiguration
  • Describe resource exhaustion
  • Specify untrained users
  • Work with improperly configured accounts
  • Recognize vulnerable business processes
  • Recognize weak cipher suites and implementations
  • Define memory and buffer vulnerability
  • Describe system sprawl and undocumented assets
  • Describe architecture and design weaknesses
  • Recognize new threats and zero-day attacks
  • Define improper certificate and key management
  • Specify the impact of different types of vulnerabilities


CompTIA Security+ SY0-501: Components Supporting Organizational Security

  • Start the course
  • Define firewalls
  • Describe VPN concentrators
  • Compare NIDS and NIPS
  • Compare bridges and switches
  • Describe routers
  • Compare proxies and load balancers
  • Recognize wireless access points
  • Define SIEM systems
  • Describe DLP systems
  • Define NAC gateways
  • Describe mail gateways
  • Define media gateways
  • Define encryption gateways
  • Recognize specialty appliances
  • Describe the various components that support organizational security



CompTIA Security+ SY0-501: Security Assessment Using Software Tools

  • Start the course
  • Work with protocol analyzers
  • Work with network scanners
  • Specify wireless scanners/cracker
  • Work with password crackers
  • Describe vulnerability scanners
  • Define configuration compliance scanner
  • Describe exploitation frameworks
  • Compare data sanitization tools
  • Define steganography tools
  • Describe honeypots
  • Configure backup utilities
  • Define banner grabbing
  • Compare passive vs. active
  • Describe other command line tools
  • Work with security assessment using software tools



CompTIA Security+ SY0-501: Cryptography

  • Start the course
  • Identify the role cryptography plays in maintaining CIA
  • Identify the purpose of a cipher
  • Identify the properties of a secure cipher
  • Describe the function of block ciphers
  • Describe the function of stream ciphers
  • Describe the purpose of a cryptographic key
  • Recognize the various ways to exchange cryptographic keys
  • Describe the purpose of encryption
  • Describe symmetric algorithms
  • Identify various symmetric algorithms
  • Describe asymmetric algorithms
  • Identify various asymmetric algorithms
  • Describe hashing
  • Identify various hashing functions
  • Describe data integrity
  • Describe authentication
  • Describe the purpose of digital signatures
  • Describe the purpose of key stretching
  • Identify additional security considerations such as steganography, obscurity, and weak algorithms
  • Identify various cryptographic features and services



CompTIA Security+ SY0-501: Public Key Infrastructure

  • Start the course
  • Recall the purpose of a PKI and a trusted introducer
  • Describe the benefits and uses of the public key infrastructure for an organization
  • Recognize the various CA trust models that can be implemented, such as single CA, hierarchical, bridge, peer-to-peer, and mesh
  • Describe the concept of certificate chaining
  • Identify the purpose and types of pinning
  • Describe the benefits of certificate expiration, revocation, and suspension, and distinguish between a CRL and OCSP
  • Describe the benefits of key escrow and when you might consider using it
  • Recognize the x.509 certificate format and file extensions
  • Describe various types certificates and their uses
  • Recall various PKI concepts



CompTIA Security+ SY0-501: Wireless Security Settings

  • Start the course
  • Describe the importance of authentication and encryption for wireless networks
  • Identify the differences between the three different types of wireless networks
  • Choose the most appropriate wireless standard and mode to secure your wireless communications
  • Distinguish between PSK and Enterprise authentication for wireless networks
  • Identify the common methods of encrypting communications on wireless networks
  • Configure an open wireless network
  • Configure a WPA PSK wireless network
  • Configure a WPA Enterprise wireless network
  • Configure a WPA2 PSK wireless network
  • Configure a WPA2 Enterprise wireless network
  • Describe and use Wi-Fi Protected Setup
  • Describe and use a captive portal
  • To recall various wireless security topics and concepts



CompTIA Security+ SY0-501: Analyzing Output from Security Technologies

  • Start the course
  • Work with Host Intrusion Detection System (HIDS) and Host Intrusion Prevention System (HIPS)
  • Describe antivirus
  • Define file integrity check
  • Describe a host-based firewall
  • Specify application whitelisting
  • Define removable media control
  • Compare patch management tools
  • Describe UTM
  • Define DLP
  • Specify data execution prevention
  • Describe web application firewall
  • Work with technology output analysis



CompTIA Security+ SY0-501: Deploying Mobile Devices Securely

  • Start the course
  • Specify connection methods
  • Compare deployment models
  • Describe passwords, pins, and screen locks
  • Define application and content management
  • Describe remote wipe
  • Compare geofencing and geolocation
  • Describe push notification services
  • Define biometrics and context-aware authentication
  • Classify containerization and storage segmentation
  • Describe full device encryption
  • Describe enforcement and monitoring
  • Describe enforcement and monitoring
  • describe ways to secure mobile devices



CompTIA Security+ SY0-501: Implementing Secure Protocols

  • Start the course
  • Work with SSH
  • Describe Secure Sockets Layer and Transport Layer Security (SSL/TLS)
  • Describe HTTPS
  • Describe DNSSEC
  • Describe SRTP
  • Describe FTPS
  • Describe SFTP
  • Describe LDAPS
  • Describe work with SNMPv3
  • Describe NTPv3
  • Describe Secure POP/IMAP
  • Describe S/MIME
  • Work with routing protocol authentication
  • Recognize various secure versions of common protocols



CompTIA Security+ SY0-501: Troubleshooting Common Security Issues

  • Start the course
  • Define unencrypted credentials
  • Describe logs and events anomalies
  • Specify permission issues
  • Define access violations
  • Specify certificate issues
  • Describe data exfiltration
  • Describe misconfigured devices
  • Recognize weak security configurations
  • Classify personnel issues
  • Define unauthorized software
  • Define baseline deviation
  • Recognize license compliance violation
  • Describe asset management
  • Specify authentication issues
  • Specify various security troubleshooting issues



CompTIA Security+ SY0-501: Identity Concepts and Access Services

  • Start the course
  • Compare identity and access management concepts
  • Compare and contrast identity and access management concepts
  • Define NTLM
  • Compare PAP, CHAP, and MSCHAP
  • Describe RADIUS
  • Describe Terminal Access Controller Access Control System (TACACS+)
  • Recognize Kerberos
  • Define LDAP
  • Describe secure token
  • Define SAML
  • Specify OpenID Connect
  • Define OAuth
  • Describe Shibboleth
  • Describe identity concepts and various access services



CompTIA Security+ SY0-501: Identity and Access Management Controls

  • Start the course
  • Define MAC
  • Define DAC
  • Define ABAC
  • Describe role-based access control
  • Describe rule-based access control
  • Use a fingerprint scanner
  • Work with a retinal and iris scanner
  • Use voice recognition
  • Describe facial recognition
  • Compare FAR, FRR, and CER
  • Define tokens
  • Describe certificate-based authentication
  • Define file system security
  • Define database security
  • Compare access controls and biometrics



CompTIA Security+ SY0-501: Common Account Management Practices

  • Start the course
  • Define user accounts
  • Compare shared, guest, and generic accounts
  • Describe privileged accounts
  • Specify service accounts
  • Recognize password best practices
  • Define credential management and naming conventions
  • Recognize group-based access control and Group Policy
  • Describe location-based policies
  • Define least privilege and time-of-day restrictions
  • Compare onboarding and offboarding
  • Describe recertification
  • Define account maintenance
  • Describe auditing and review
  • Describe various account management best practices



CompTIA Security+ SY0-501: Frameworks, Guidelines, and Physical Security

  • Start the course
  • Identify the purpose of various frameworks and architectures
  • Specify the reasoning behind following secure configuration guidelines
  • Describe the benefits of implementing a layered security approach and the importance of diversity and user training
  • Describe the importance of physical security in relation to the success of your organization
  • Identify the importance of lighting in relation to security
  • Identify the various methods that can be used to control or deter physical access
  • Describe the importance of alarms and the difference between false alarms and true alarms
  • Identify the benefits of using safes and secure cabinets
  • Identify different types of locks and describe the importance of key management
  • Describe various authentication options
  • Define the importance of HVAC systems and fire suppression systems
  • Describe various types of motion detection systems
  • Define the concept of a protected system and air gaps
  • Describe the purpose of various security controls such as Faraday cages, cable locks, screen filters, cameras, and sign-in and sign-out logs
  • Recall the purpose of various security controls



CompTIA Security+ SY0-501: Implement Secure Network Architecture Concepts

  • Start the course
  • Describe the reasoning behind implementing different zones and topologies
  • Define how physical, logical, virtual, and air gap separation provide security
  • Describe site-to-site and remote access vpns
  • Define where various devices and technologies should be placed for maximum security benefits
  • Describe the security concerns surrounding the SDN
  • Recall the purpose of various secure network architecture concepts



Características de la colección


  • 1 año de acceso
  • Contenidos en inglés
  • Videos, actividades y evaluaciones
  • Estadísticas para monitorear su avance
  • Diploma oficial avalado por Netec

CompTIA Security+ es una certificación reconocida a nivel mundial con profesionales certificados que trabajan en más de 147 países en todo el mundo








Solicite más información


*
País
Comentarios