Processing your application. Please be patient while we make sure we receive every piece of it.
Security+
CompTia Security + and Security Pro and SSCP
5 Day
REQUEST
PRIVATE SESSION
COURSE DESCRIPTION
OVER
VIEW
+
OBJEC
TIVES
+
AUD
IENCE
+
PRERE
QUISI
TES
+
OUT
LINE
+
Acend’s LabSim for Security Pro is our most comprehensive Security courseware to date. With over 60 lab simulations, LabSim for Security Pro will give you the knowledge and the experience you need to enter the industry as an entry-level IT security administrator. LabSim for Security Pro builds on the experience users gain in our LabSim for PC Pro and Network Pro courses. You’ve learned how to maintain PCs and setup a corporate network, now LabSim for Security Pro will show you how to protect that network from a myriad of threats.One Course -- Three Certification ExamsAcend looks at certification a bit differently than others in the industry. Our goal is to make training that prepares you to get certified and gives you the hands-on skills IT employers are looking for. This is why we took a comprehensive approach to developing the LabSim for Security Pro course. When you complete the LabSim for Security Pro course, you will be prepared to take any or all of three separate certification exams:1) CompTIA’s Security+ exam (SY0-401)and 2) Security Pro Certification from TestOut and3)SSCP exam from (ISC)2Layered Security FrameworkLabSim for Security Pro was designed around the layered security framework concept. From setting up perimeter defenses right down to protecting your data, we teach you how to implement the proper security measure at each layer to protect your office from threats.
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
To find out more available information
about this course, please contact us:

416-929-1599
info@acend.com
1.0Introduction
1.1 SecurityOverview
1.2 Usingthe Simulator

2.0Access Control and Identity Management
2.1 AccessControl Models
2.2Authentication
2.3Authorization
2.4 AccessControl Best Practices
2.5 WindowsDomain Users and Groups
2.6 LinuxUsers and Groups
2.7 LinuxUser Security
2.8 GroupPolicy Overview
2.9Hardening Authentication
2.10 RemoteAccess
2.11 NetworkAuthentication
2.12Identity Management

3.0Cryptography
3.1Cryptography
3.2 Hashing
3.3Symmetric Encryption
3.4Asymmetric Encryption
3.5 PublicKey Infrastructure (PKI)
3.6Cryptography Implementations

4.0Policies, Procedures, and Awareness
4.1 SecurityPolicies
4.2 BusinessContinuity
4.3 RiskManagement
4.4 IncidentResponse
4.5 SocialEngineering
4.6Certification and Accreditation
4.7Development
4.8 EmployeeManagement

5.0Physical Security
5.1 PhysicalSecurity
5.2 HardwareSecurity
5.3Environmental Controls
5.4 MobileDevices
5.5Telephony

6.0Perimeter Defenses
6.1Networking Review
6.2Perimeter Attacks
6.3 SecurityAppliances
6.4Demilitarized Zones (DMZ)
6.5Firewalls
6.6 NetworkAddress Translation (NAT)
6.7 VirtualPrivate Networks (VPN)
6.8 WebThreat Protection
6.9 NetworkAccess Control (NAC)
6.10Wireless Attacks
6.11Wireless Defenses

7.0Network Defenses
7.1 NetworkDevices
7.2 NetworkDevice Vulnerabilities
7.3 SwitchAttacks
7.4 Routerand Switch Security
7.5Intrusion Detection and Prevention

8.0 HostDefenses
8.1 Malware
8.2 PasswordAttacks
8.3 WindowsSystem Hardening
8.4Hardening Enforcement
8.5 FileServer Security
8.6 LinuxHost Security

9.0Application Defenses
9.1 WebApplication Attacks
9.2 InternetBrowsers
9.3 E-mail
9.4 NetworkApplications
9.5Virtualization
9.6Application Development


10.0 DataDefenses
10.1Redundancy
10.2 Backupand Restore
10.3 FileEncryption
10.4 SecureProtocols
10.5 CloudComputing


11.0Assessments and Audits
11.1Vulnerability Assessment
11.2Penetration Testing
11.3Protocol Analyzers
11.4 Logsand Audits
SITE MAP