Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

courses popup callback

EDUTAINMENT COURSE:

CompTIA Security + SY0-401

Interactive and entertaining talk-show style format presented by industry leading experts.
Overview
CompTIA has released an updated version of the Security+ exam. If you'd like to prepare for the newest version of the exam, please watch our CompTIA Security+ (SY0-501) course.  This CompTIA course will teach you how to better secure applications, networks, and devices. This training will prepare you for the CompTIA Security+ SY0-401 certification exam while covering network security; threats and vulnerabilities; access control and identity management; and more.
Objectives
  • Security architect
  • Security engineer
  • Security consultant/specialist
  • Information assurance technician
  • Security administrator
  • Systems administrator
  • Network administrator
  • Penetration Tester
Prerequisites
  • Experience in IT administration with a focus on security
  • Broad knowledge of security concerns and implementation

Module 1: Networking Terminology 
 
Module 2: Locking Down Or Network
 
Module 3: Wireless
 
Module 4: Introduction To Security Terminology
 
Module 5: Policies And Standards
 
Module 6: Physical Security
 
Module 7: Risk Analysis
 
Module 8: Disaster Recovery, Business Continuity, and BIA (Business Impact Analysis) 
 
Module 9: Introduction To Computer Forensics
 
Module 10: Types Of Attacks
 
Module 11: System Security Threats
 
Module 12: Security Assessments
 
Module 13: Monitoring And Auditing 
 
Module 14: Authentication
 
Module 15: Access Control
 
Module 16: Mitigating Security Threats
 
Module 17: Implementing System Security
 
Module 18: Cryptography  
 
Module 19: Public Key Infrastructure

  1. Course Introduction
1
Start
Course Introduction
  1. Module 1
2
Start
General Security Concepts
3
Start
Security+ Exam Domains
5
Start
Basic Terminology
6
Start
Additional Security Goals
7
Start
Host Security
8
Start
Additional Security Concepts
9
Start
Module Close
  1. Module 2
10
Start
Organizational Security
11
Start
What is a Security Program
12
Start
Operational Process
13
Start
Password Policies
14
Start
Demo - Password Policies
15
Start
Social Engineering
16
Start
Security Policies
17
Start
Concepts the Support Policies
18
Start
Human Resources Policies
19
Start
Module Close
  1. Module 3
20
Start
Privacy, Ethics and Legal issues
21
Start
Cybercrime
22
Start
Reactions to Cybercrime
22
Start
Reactions to Cybercrime
23
Start
Module Close
  1. Module 4
24
Start
Cryptography
25
Start
Cryptography Explained
26
Start
Ciphers
27
Start
Cryptographic Math and Hashing
28
Start
Algorithms and Encryption
28
Start
Algorithms and Encryption
28
Start
Algorithms and Encryption
29
Start
Symmetric and Asymmetric Working Together
30
Start
Digital Signatures
31
Start
Module Close
  1. Module 5
32
Start
Public Key Infrastructure
33
Start
Basics of Public Key Infrastructures
34
Start
Certificate Hierarchies
35
Start
Trust and Certificate Verification
36
Start
Types of Certificates and Extensions
37
Start
Certificate Revocation List
38
Start
Key Protection
39
Start
Key Recovery
40
Start
Trust Models
41
Start
Module Close
  1. Module 6
42
Start
Standards and Protocols
43
Start
Standards and Protocols Supporting PKI
44
Start
SSL and TLS
45
Start
S/MIME
46
Start
IPsec
47
Start
Common Criteria - CC
48
Start
Module Close
  1. Module 7
49
Start
Physical Security
50
Start
Physical Security Measures
51
Start
Access Controls and Monitoring
52
Start
Biometrics
53
Start
Module Close
  1. Module 8
54
Start
Infrastructure Security
55
Start
Infrastructure Security - Printers and Workstations
56
Start
Servers and Devices
57
Start
VLANs and Firewalls
58
Start
Securing Wireless Access Points
59
Start
VPN - Network Access Control
60
Start
Network Monitoring
61
Start
Handling Big Data and Physical Security
62
Start
Security Zones, VLANs and NAT
63
Start
Virtualization and Cloud Computing
64
Start
Module Close
  1. Module 9
65
Start
Authentication and Remote Access
66
Start
Remote Access and Kerberos
67
Start
Alternatives to Passwords
68
Start
Other Protocols
69
Start
Federated Authentication
70
Start
HOTP and TOTP
71
Start
Remote Access Protocols Authentication
72
Start
Module Close
  1. Module 10
73
Start
Wireless Security
74
Start
Wireless Networking
75
Start
Bluetooth
76
Start
Controlling the Radio Waves
77
Start
WPA Encryption
78
Start
Module Close
  1. Module 11
79
Start
Intrusion Detection Systems
80
Start
Intrusion Detection Systems - HIDs
81
Start
HIDs Advancements and Anti-Virus
82
Start
Demo - Windows Defender
83
Start
Network-Based IDSs
84
Start
Content-Based Signatures and Proxy Servers
85
Start
Protocol Analyzers
86
Start
Anti-Spam Techniques
87
Start
Module Close
  1. Module 12
88
Start
Security Baselines
89
Start
Overview of Baselines
90
Start
Operating System Hardening
91
Start
Demo - Windows Update
92
Start
Network Hardening
93
Start
Application Hardening and Patch Management
93
Start
Application Hardening and Patch Management
94
Start
Module Close
  1. Module 13
95
Start
Attacks and Malicious Software
96
Start
Avenues of Attack
97
Start
Minimizing Possible Avenues of Attack
98
Start
DDOS Mitigation
99
Start
Null Sessions and Privilege Escalation
100
Start
IP Address Spoofing
101
Start
Replay Attacks and TCP/IP Hijacking
102
Start
Password Attacks and Software Exploitation
103
Start
Viruses
104
Start
Other Malware
105
Start
Module Close
  1. Module 14
106
Start
E-mail and Instant Messaging
107
Start
End User Issues with Email
108
Start
Enterprise Mitigation Techniques
109
Start
Module Close
  1. Module 15
110
Start
Web Components
111
Start
Web Components and Concerns
112
Start
HTTP and HTTPS
113
Start
Code-Based Vulnerabilities
114
Start
Mitigations and Cookies
115
Start
Application-Based Weaknesses
116
Start
Module Close
  1. Module 16
117
Start
Disaster Recovery and Business Continuity
118
Start
Disaster Recovery
119
Start
Backups
120
Start
Storage Considerations
121
Start
Raid
122
Start
Module Close
  1. Module 17
123
Start
Risk Management
124
Start
Risk Management Key Terms
125
Start
Risk Management Process
126
Start
General Risk Management Model
127
Start
Software Engineering Institute Model
128
Start
Common Objective Approach
129
Start
Security Integration Issues with Third Parties
130
Start
Module Close
  1. Module 18
131
Start
Change Management
132
Start
Change Management Procedures
133
Start
Change Management Workflow
134
Start
Maintaining Code Integrity
135
Start
Module Close
  1. Module 19
136
Start
Privilege Management
137
Start
Privilege Management Details
138
Start
Centralized Management
139
Start
Access Control Models
140
Start
Module Close
  1. Module 20
141
Start
Computer Forensics
142
Start
Computer Forensics and Evidence
143
Start
The Investigative Process
144
Start
Module Close
EDUTAINMENT COURSE
?Interactive and entertaining talk-show style format presented by industry leading experts.
  • 08:10:29 Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top