Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

courses popup callback

EDUTAINMENT COURSE:

CompTIA Security+ SY0-501

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview
CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.
Objectives
  • Provide operational, information, application and infrastructure level security
  • Secure the network to maintain availability, integrity, and confidentiality of critical information
  • Operate within a set of rules, policies, and regulations wherever applicable
  • Comprehend Risk identification and mitigation
Target Audience

IT security professionals with a minimum of two years' experience in IT administration with a focus on security; users with basic day-to-day technical information security experience; those interested in gaining a broader and deeper knowledge of security concerns and implementation; and learners preparing for the Security+ SY0-501 exam

Module 1 - Threats, Attacks, and Vulnerabilities

1.1 Introduction

1.2 Types Of Malware - Part 1

1.3 Types Of Malware - Part 2

1.4 Types Of Attacks - Part 1

1.5 Types Of Attacks - Part 2

1.6 Types Of Attacks - Part 3

1.7 Types Of Attacks - Part 4

1.8 Types Of Attacks - Part 5

1.9 Threat Actors - Part 1

1.10 Threat Actors - Part 2

1.11 Penetration Testing And Vulnerability Scanning - Part 1

1.12 Penetration Testing And Vulnerability Scanning - Part 2

1.13 Impact Of Vulnerabilities - Part 1

1.14 Impact Of Vulnerabilities - Part 2

Module 2 - Technologies and Tools

2.1 Networking Hardware And Software - Part 1

2.2 Networking Hardware And Software - Part 2

2.3 Networking Hardware And Software - Part 3

2.4 Networking Hardware And Software - Part 4

2.5 Networking Hardware And Software - Part 5

2.6 Networking Hardware And Software - Part 6

2.7 Security Assessment - Part 1

2.8 Security Assessment - Part 2

2.9 Troubleshooting Issues - Part 1

2.10 Troubleshooting Issues - Part 2

2.11 Securing Mobile Devices - Part 1

2.12 Securing Mobile Devices - Part 2

2.13 Securing Mobile Devices - Part 3

2.14 Securing Mobile Devices - Part 4

2.15 Secure Protocols - Part 1

2.16 Secure Protocols - Part 2

Module 3 - Architecture and Design

3.1 Secure Network Architecture - Part 1

3.2 Secure Network Architecture - Part 2

3.3 Secure System Designs - Part 1

3.4 Secure System Designs - Part 2

3.5 Secure Staging Deployment Concepts

3.6 Embedded Systems - Part 1

3.7 Embedded Systems - Part 2

3.8 Application Development And Deployment - Part 1

3.9 Application Development And Deployment - Part 2

3.10 Application Development And Deployment - Part 3

3.11 Physical Security Controls - Part 1

3.12 Physical Security Controls - Part 2

3.13 Physical Security Controls - Part 3

3.14 Cloud Virtualization - Part 1

3.15 Cloud Virtualization - Part 2

Module 4 - Identity and Access Management

4.1 Identity And Access Management - Part 1

4.2 Identity And Access Management - Part 2

4.3 Identity And Access Services - Part 1

4.4 Identity And Access Services - Part 2

4.5 Management Controls - Part 1

4.6 Management Controls - Part 2

4.7 Account Management Practices - Part 1

4.8 Account Management Practices - Part 2

4.9 Account Management Practices - Part 3

Module 5 - Risk Management

5.1 Organizational Security - Part 1

5.2 Organizational Security - Part 2

5.3 Business Impact Analysis Concepts - Part 1

5.4 Business Impact Analysis Concepts - Part 2

5.5 Risk Management - Part 1

5.6 Risk Management - Part 2

5.7 Incident Response Procedures - Part 1

5.8 Incident Response Procedures - Part 2

5.9 Forensics - Part 1

5.10 Forensics - Part 2

5.11 Disaster Recovery - Part 1

5.12 Disaster Recovery - Part 2

5.13 Types Of Control - Part 1

5.14 Types Of Control - Part 2

5.15 Data Security And Privacy Practices - Part 1

5.16 Data Security And Privacy Practices - Part 2

Module 6 - Cryptography and PKI

6.1 Cryptographic Basics - Part 1

6.2 Cryptographic Basics - Part 2

6.3 Cryptographic Basics - Part 3

6.4 Cryptographic Algorithms - Part 1

6.5 Cryptographic Algorithms - Part 2

6.6 Wireless Security - Part 1

6.7 Wireless Security - Part 2

6.8 Implementing PKI - Part 1

6.9 Implementing PKI - Part 2

6.10 Implementing PKI - Part 3

6.11 Conclusion

EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
  • 20:49:00 Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top