Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

CompTIA Security+ (SY0-501)

EDUTAINMENT COURSE

CompTIA Security+ (SY0-501)

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview

CompTIA Security+ is the certification globally trusted to validate foundational,  vendor-neutral IT security knowledge and skills.  As a benchmark for best practices in IT security,  this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career. 

CompTIA Security+ is the first security certification IT professionals should earn.  It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.  Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills.  Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.  Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.

Objectives
  • Provide operational, information,  application and infrastructure level security
  • Secure the network to maintain availability,  integrity,  and confidentiality of critical information
  • Operate within a set of rules,  policies,  and regulations wherever applicable
  • Comprehend Risk identification and mitigation
Prerequisites

IT security professionals with a minimum of two years' experience in IT administration with a focus on security;  users with basic day-to-day technical information security experience;  those interested in gaining a broader and deeper knowledge of security concerns and implementation;  and learners preparing for the Security+ SY0-501 exam

Target Audience
  • The series is intended for aspiring IT security professionals entering into security.
  • The professionals who are Systems Administrator Network Administrator Security Administrator Junior IT Auditor/Penetration Tester
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

ITProTV is CompTIA’s Official Video Training Partner.

  1. TECHNOLOGIES AND TOOLS
0
Start
Deploy Mobile Security
13
Start
Hardware Software Organizational Security
14
Start
Hardware Software Organizational Security Part 2
15
Start
Hardware Software Organizational Security Part 3
16
Start
Hardware Software Organizational Security Part 4
17
Start
Security Posture Assessment
18
Start
Security Posture Assessment Part 2
19
Start
Security Posture Assessment Part 3
20
Start
Security Posture Assessment Part 4
21
Start
Troubleshoot Common Security Issues
23
Start
Analyze And Interpret Outputs
24
Start
Analyze And Interpret Outputs Part 2
26
Start
Implement Secure Protocols
  1. THREATS ATTACKS AND VULNERABILITIES
1
Start
Overview
2
Start
Determining Types of Malware
3
Start
Determining Types of Malware Part 2
4
Start
Types of Attacks
5
Start
Types of Attacks Part 2
6
Start
Types of Attacks Part 3
7
Start
Types of Attacks Part 4
8
Start
Threat Vector Types and Attributes
9
Start
Penetration Testing Concepts
10
Start
Vulnerability Scanning Concepts
11
Start
Impact of Various Vulnerabilities
12
Start
Impact of Various Vulnerabilities Part 2
  1. ARCHITECTURE AND DESIGN
27
Start
Best Practices and Secure Config Guides
28
Start
Secure Network Architecture Concepts
29
Start
Secure System Design
30
Start
Secure Staging Deployment Concepts
31
Start
Security Implications of Embedded Systems
32
Start
Secure App Development and Deployment
33
Start
Cloud and Virtalization Concepts Part 2
33
Start
Cloud and Virtualization Concepts
34
Start
Resiliency and Automation to Reduce Risk
35
Start
Importance of Physical Security
36
Start
Importance Of Physical Security Part 2
  1. IDENTITY AND ACCESS MANAGEMENT
37
Start
Identity and Access Management Concepts
38
Start
Identity and Access Services
39
Start
Identity and Access Management Controls
40
Start
Identity and Access Management Controls Part 2
41
Start
Account Management Practices
42
Start
Account Management Practices Part 2
  1. Risk Management
43
Start
Policies, Plans and Procedures
44
Start
Impact Business Analysis
45
Start
Risk Management Processes and Concepts
46
Start
Incident Response Procedures
47
Start
Basic Concepts of Forensics
48
Start
Disaster Recovery and Business Continuity
49
Start
Disaster Recovery and Business Continuity Part 2
50
Start
Data Security and Privacy
58
Start
Public Key Infrastructure Part 2
  1. CRYPTOGRAPHY AND PKI
51
Start
Basic Concepts of Cryptography
52
Start
Basic Concepts of Cryptography Part 2
53
Start
Cryptography Algorithms Basics
54
Start
Cryptography Algorithms Basics Part 2
55
Start
Cryptography Algorithms Basics Part 3
56
Start
Wireless Security
57
Start
Public Key Infrastructure
59
Start
Public Key Infrastructure Part 3
60
Start
Public Key Infrastructure Part 4
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
USD 19
  • 27:44:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months Access (Unless indicated otherwise)
  • 10-Day money-back guarantee
Back to Top