Scroll to top button

CompTIA Security+ (Course & Lab)

ISBN : 9781616915162

Start preparing for CompTIA Security+ certification exam with CompTIA Security+ course and performance-based labs. Performance-based labs simulate real-world, hardware, software & command line interface environments and can be mapped to any text-book, course & training. CompTIA Security course and performance-based labs cover all the objectives of CompTIA Security+ SY0-401 exam which include the application of security controls to maintain confidentiality, integrity, and availability; identification of appropriate technologies and products; troubleshooting security events and incidents, and much more. 

CompTIA Security+ is a standalone certification from CompTIA with the exam code SY0-401. This certification covers the most important principles for securing a network and managing risk. The CompTIA Network+ certification is recommended before taking the Security+ exam. CompTIA Security+ is an entry-level, international, vendor-neutral credential designed for IT security professionals to identify risk, participate in risk mitigation activities, provide infrastructure, information, operational, and application security.

Lessons
Lessons
14+
Exercises
235+
Quizzes
123+
Flashcards
730+
Glossary of terms
730+
TestPrep
Pre Assessment Questions
94+
Full Length Tests
5+
Post Assessment Questions
108+
Lab
Performance lab
141+
Video tutorials
55+
Minutes
44+

Videos and How To

uCertify course includes videos to help understand concepts. It also includes How Tos that help learners with how to accomplish certain tasks.

Video Lessons
Videos
48+
Hours
05:47+
  • Risk Assessment
  • Developing Policies, Standards, and Guidelines
  • Summary
  • Exam Essentials
  • Monitoring Networks
  • Understanding Hardening
  • Securing the Network
  • Security Posture
  • Reporting Security Issues
  • Differentiating between Detection Controls and Prevention Controls
  • Summary
  • Exam Essentials
  • Mastering TCP/IP
  • Designing a Secure Network
  • Understanding the Various Network Infrastructure Devices
  • Summary
  • Exam Essentials
  • Understanding Access Control Basics
  • Understanding Remote Access Connectivity
  • Understanding Authentication Services
  • Understanding Access Control
  • Implementing Access Controlling Best Practices
  • Summary
  • Exam Essentials
  • Working with Wireless Systems
  • Understanding Wireless Devices
  • Wireless Vulnerabilities to Know
  • Summary
  • Exam Essentials
  • Working with Cloud Computing
  • Working with Virtualization
  • Security and the Cloud
  • Summary
  • Exam Essentials
  • Application Hardening
  • Host Security
  • Protecting Data Through Fault Tolerance
  • Application Security
  • Best Practices for Security
  • Summary
  • Exam Essentials
  • An Overview of Cryptography
  • Modern Cryptography
  • Using Cryptographic Systems
  • Understanding Cryptography Standards and Protocols
  • Using Public Key Infrastructure
  • Summary
  • Exam Essentials
  • Understanding Malware
  • Surviving Viruses
  • Understanding Various Types of Attacks
  • Identifying Types of Application Attacks
  • Tools for Finding Threats
  • Summary
  • Exam Essentials
  • Understanding Social Engineering
  • Understanding Physical Security
  • Environmental Controls
  • Control Types
  • Data Policies
  • Summary
  • Exam Essentials
  • Third-Party Integration
  • Understanding Security Awareness and Training
  • Classifying Information
  • Information Access Controls
  • Complying with Privacy and Security Regulations
  • Mobile Devices
  • Alternative Methods to Mitigate Security Risks
  • Summary
  • Exam Essentials
  • Issues Associated with Business Continuity
  • Reinforcing Vendor Support
  • Penetration Testing
  • Summary
  • Exam Essentials
  • Introduction
  • Security Fundamentals and Controls
  • Security and Risk
  • Business Continuity and Load Balancing
  • Threats, Vulnerabilities, and Assessment Tools
  • Application, Data, and Host Security
  • Access Control and Identity Management
  • Security Controls and Cryptography
  • Virtual Private Networks
  • Conclusion

Hands on Activities (Labs)

  • Identifying risk actions
  • Identifying service associated with cloud computing
  • Understanding measures of risk calculation
  • Understanding key areas of policy implementation
  • Identifying areas to consider for the business policy
  • Downloading the Windows 7 service pack
  • Identifying key aspects of standard documents
  • Identifying policies
  • Viewing different event details
  • Viewing details of an event in Windows Server
  • Viewing the current version of BIOS
  • Understanding methods of OS hardening
  • Installing the Web Server IIS server role
  • Sharing a folder with a different user on a single computer
  • Configuring NPS Accounting
  • Creating a network bridge
  • Deleting the web browsing history
  • Understanding security posture methods
  • Understanding key areas of reporting
  • Understanding email protocols
  • Viewing the ARP table
  • Identifying TCP/IP architecture layer protocols
  • Understanding application layer protocols
  • Understanding Internet layer protocols
  • Understanding TCP/IP protocols
  • Identifying TCP ports
  • Identifying ports and services
  • Identifying primary areas of security topologies
  • Understanding protocols
  • Identifying the tunnel
  • Identifying technologies to create less vulnerable networks
  • Understanding the network infrastructure devices
  • Spotting the intranet network
  • Identifying Intrusion detection key terms
  • Understanding passive responses of intrusion
  • Identifying device for network connectivity
  • Identifying PBX system layers
  • Understanding router protocols
  • Identifying sequence in which the IDS instructs the TCP to reset connections
  • Understanding the network devices
  • Configuring the settings in Content Advisor
  • Working with a host-based IDS
  • Joining SpyNet community using Windows Defender
  • Scanning the computer
  • Viewing the update history and details
  • Identifying types of firewall
  • Viewing disk configuration
  • Identifying authentication protocols
  • Creating a hash rule in Windows Server 2012
  • Customizing group and user access with MMC
  • Turning off the guest account
  • Viewing the Generate Random Password screenshot
  • Configuring NPS to provide RADIUS authentication
  • Identifying tunneling protocols
  • Configuring NPS network policy
  • Understanding LDAP names
  • Identifying authentication services
  • Enabling the network policy server
  • Identifying types of authentication services
  • Identifying access control methods
  • Performing XArp software installation
  • Protecting a computer by blocking communications
  • Blocking a connection
  • Understanding evaluation assurance levels
  • Configuring account time limits
  • Identifying wireless protocols
  • Understanding technologies used to communicate in the 802.11 standard
  • Enabling LMHOSTS lookup
  • Understanding WAP security levels
  • Configuring wireless network settings
  • Identifying cloud computing service models
  • Understanding primary virtualization topics
  • Editing a virtual hard disk file
  • Understanding cloud models
  • Identifying methods of updating an operating system
  • Understanding models for improving system performance
  • Configuring IE settings to avoid disruption in computer operations
  • Configuring Windows firewall settings
  • Downloading and installing the Avast antivirus, and scanning the system
  • Installing the FTP server under the Web Server role
  • Creating DNS domains
  • Configuring pop-up blocker settings
  • Creating a new inbound rule
  • Mounting and dismounting an encrypted volume
  • Identifying approaches of non-mathematical cryptography
  • Identifying asymmetric algorithms
  • Identifying hashing algorithm
  • Understanding code-breaking techniques
  • Creating a virtual volume
  • Encrypting and decrypting a message
  • Encrypting and decrypting a message using the RSA algorithm
  • Checking the integrity of messages through MAC values
  • Identifying protocols for secure connections
  • Creating and backing up an encryption certificate
  • Backing up an encryption certificate and key
  • Viewing memory usage of programs
  • Adding counters
  • Encrypting a picture
  • Understanding public cryptographic initiatives
  • Understanding PKCS standards
  • Adding the Active Directory Certificate Services role
  • Understanding trust models
  • Identifying the authority process
  • Examining certificate details
  • Examining the Microsoft Root Authority certificate details
  • Understanding PKI trust models
  • Installing a subordinate Certification Authority
  • Enabling BitLocker
  • Managing the certificate server using the mmc tool
  • Identifying the filename extension
  • Identifying types of malware
  • Viewing the running processes of all the users
  • Identifying types of viruses
  • Understanding classification of viruses
  • Identifying attacks
  • Determining vulnerability of a network to attacks
  • Identifying types of system attack
  • Preventing IP address spoofing
  • Understanding web-based applications
  • Understanding types of application attacks
  • Identifying security factors
  • Identifying vulnerability scanning tasks
  • Identifying social engineering attacks
  • Identifying measures for spamming protection
  • Identifying physical security devices
  • Identifying retardants of fire extinguishers
  • Identifying causes of compromised security
  • Understanding information categories
  • Identifying Information models
  • Understanding acts to ensure privacy of information
  • Understanding security measures for mobile devices
  • Identifying storage mechanism
  • Identifying auditing processes
  • Identifying backup types
  • Understanding backup plans
  • Identifying various alternate site
  • Identifying steps to be followed on occurrence of an incident
  • Identifying SLAs measures
  • Identifying ethical hacking approaches
  • Performing penetration testing
  • Identifying testing types
×