MIS Global Technologies

Course Price:

$ 4,250.00

Course features

Program Description


CompTIA Security+ is a global certification that certifies the fundamental skills required to perform key security responsibilities and pursue a career in IT security. Attacks, threats, and vulnerabilities; architecture and design; implementation; operations and incident response; and governance, risk, and compliance will all be covered in this course. Individuals with demonstrated skills are in high demand in today’s employment market, and the material and activities in this course can help you expand your computer security skill set so that you can successfully fulfil your obligations in any security-related work.

CompTIA Security+ is the first security certification a candidate should obtain. It establishes the fundamental knowledge essential for any cybersecurity profession and serves as a stepping stone to intermediate-level cybersecurity jobs. Security+ combines best practises in hands-on troubleshooting, ensuring candidates have the practical security problem-solving abilities required to:

  • Assess the corporate security posture and recommend and deploy relevant security solutions
  • Monitor and secure hybrid environments, including cloud, mobile, and IoT
  • Operate with an understanding of applicable laws and rules, including governance, risk, and compliance principles
  • Identify, analyze, and respond to security events and incidents

To earn your CompTIA Security+ certification, you’ll need to pass one certification exam:

  • EXAM CODE: SY0-601 

Program Outcome

In this course, you will apply information security in a number of scenarios:

  • Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and uses of cryptographic standards and products.
  • Install and configure network- and host-based security technologies.
  • Describe how wireless and remote access security is enforced.
  • Describe the standards and products used to enforce security on web and communications technologies.
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
  • Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.

SECTION 1.0: INTRODUCTION

1.1 Introduction

SECTION 2.0: PC TECHNICIAN RESPONSIBILITIES

2.1  Protection and Safety
2.2 Environmental Controls
2.3  Professionalism
2.4  Change Management
2.5 PC Maintenance
2.6 PC and Networking Tools
2.7 Troubleshooting Process Overview
2.8 Support Systems
2.9 Documentation

SECTION 3.0 HARDWARE

3.1 Network Media
3.2 Cables and Connectors
3.3 Cases and Motherboards
3.4 Motherboard Troubleshooting
3.5 Memory
3.6 Memory Installation
3.7 Memory Troubleshooting
3.8 BIOS/UEFI
3.9 Processors
3.10 Processor Troubleshooting
3.11 Video and Expansion Cards
3.12 Audio
3.13 Cooling
3.14 Power Supplies
 

SECTION 4.0: OPERATING SYSTEMS BASICS

4.1 Operating System
4.2 Windows Basics
4.3 Linux Basics
4.4 macOS Basics

SECTION 5.0 STORAGE

5.1 Storage Devices
5.2 SATA
5.3 Optical Media
5.4 RAID
5.5 File Systems
5.6 Storage Management
5.7 Storage Spaces
5.8 Disk Optimization
5.9 Storage and RAID Troubleshooting

SECTION 6.0 SYSTEM IMPLEMENTATION

6.1 Windows Pre-Installation
6.2 Windows Installation
6.3 Cloud Computing
6.4 Virtualization

SECTION 7.0: SYSTEM MANAGEMENT 1

7.1 Windows System Tools
7.2 Windows Settings
7.3 Performance Monitoring
7.4 Windows Application Management
7.5 Linux Application Management
7.6 Digital Content Management
7.7 Virtual Memory
7.8 Windows and Application Troubleshooting
7.9 Scripting Basics

SECTION 8.0: SYSTEM MANAGEMENT 2

8.1 Active Directory
8.2 Users and Groups
8.3 Remote Services
8.4 VPN
8.5 Updates
8.6 System Backup
8.7 System Recovery
8.8 Windows Boot Errors

SECTION 9.0: FILE MANAGEMENT

9.1 Manage Files on Windows
9.2 NTFS and Share Permissions
9.3 File Encryption
9.4 Linux File Management

SECTION 10.0: PERIPHERAL DEVICES

10.1 Peripheral Devices
10.2 Display Devices
10.3 Display, Video, and Projector Troubleshooting
10.4 Device Driver Management
10.5 Device Driver Troubleshooting

SECTION 11.0: NETWORKING

11.2 Networking Ports and Protocols
11.3 Client-Side Network Configuration
11.4 Services Provided by Network Devices
11.5 Wireless Networking
11.6 SOHO Configuration
11.7 Networking Hardware
11.8 Command Line Network Utilities
11.9 Network Troubleshooting

SECTION 12.0: MOBILE DEVICES

12.1 Laptops
12.2 Mobile Device Displays and Components
12.3 Laptop Power Management
12.4 Mobile Devices
12.5 Mobile Device Network Connectivity
12.6 Mobile Device Security
12.7 Laptop and Mobile Device Troubleshooting

SECTION 13.0: PRINTING

13.1 Printer Overview
13.2 Print Connectivity
13.3 Printer Types and Components
13.4 Printer Troubleshooting

SECTION 14.0: SECURITY

14.1 Security Best Practices
14.2 Incident Response and Regulated Data
14.3 Physical Security
14.4 Logical Security Measures
14.5 Social Engineering Attacks
14.6 Data Destruction and Disposal
14.7 Malware Protection
14.8 Firewalls
14.9 Proxy Servers
14.10 Install, Configure, and Secure Browsers
14.11 Security Troubleshooting

Share:

Login

Email US

We are glad that you preferred to contact us. Please fill our short form and one of our friendly team members will contact you back.

    X
    CONTACT US