Loading ...
  • Winner Digital Transformation Solutions
  • Recognized Leader in Cyber Security
  • Best Value for Tech Deployment & Project Management

PECB Certified ISO/IEC 27001 Lead Auditor- Training, Examination, and Certification

CompTIA (Computing Technology Industry Association) is an international accrediting body that has introduced independent certification titles from publishers and manufacturers in the IT market.


DESCRIPTION 
  • CompTIA (Computing Technology Industry Association) is an international accrediting body that has introduced independent certification titles from publishers and manufacturers in the IT market.
  • CompTIA Security + is the security certification that demonstrates knowledge of computer security concepts, tools, and procedures. It confirms the professional's ability to react to security incidents, and validates their skills to anticipate security risks and protect organizations.
DURATION 5 days / 40 hours
HEARING Professional networks: administrators, support engineers, specialists or analysts seeking to acquire fundamental knowledge of network security through obtaining Security + certification.
PRE-REQUISITES : Know the fundamental systems and networks,
GOALS

Participants will learn to proactively implement security protocols to mitigate security risks.

Implement security within a network

  • Discover cryptography and access control
  • Set up Internet security
  • Set security for hosts, data, and devices
  • Threats and security checks
  • Cryptography and access control
  • Network Security
  • Hosts, Data, and Application Security
  • Operational security
  • Tutorials: Activities include instructor-led question and answer sessions, interactive group discussions, and hands-on activities on the following topics:
  • Using Hyper-V, Trojans and Malware Protection
  • Network Vulnerabilities, Baseline Security Analyzer
  • Steganography, Configuring Certificate Services
  • Password Sniffing
  • Configuring a VPN, Telnet and FTP
  • Attacks Against DHCP and DNS
  • Network Access Protection, Data Leakage Prevention
  • HTTP and HTTPS, Web Application Vulnerabilities
  • Computer Forensics Tools