Course Description

Learn the basic concepts, tools, and functions that you will need to pass the Security+ exam and become a part of the growing Cyber Security industry.
Powerful skills at your fingertips  Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills. Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data. Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.
Suitable for beginners looking to get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   Each chapter closes with exercises putting your new learned skills into practical use immediately.
You will start by understand Network Security Concepts and Architectures including technologies such as Intrusion Detection Systems and Web Application Firewalls.
With these basics mastered, the course will take you through advanced concepts exploring the theory and practical hands-on implementation of cryptography in order to protect data at rest and in motion.   Students completing the course will have the knowledge to protect and defend computer networks, systems and data in on-premise and cloud environments.

What am I going to get from this course?

•   Learn Cyber Security/Security+ from a professional trainer at your pace and any device.

•   65 lectures (11 hours of content) covering the 6 Security+ domains.

•   Suitable for newcomers to IT and existing IT professionals who want to get certified.

•   Ideal for users who learn faster when shown.

•   55 pages of Security+ exam study notes

•   A bank of over 200 Security+ exam practice questions.

•   Visual training method, offering users increased retention and accelerated learning.

Breaks even the most complex applications down into simplistic steps

Lessons

Section 1

   Lesson 1 - Networking 101 Preview 14 min
  •    Lesson 2 - LAN Security 12 min
  •    Lesson 3 - Firewalls 3 min
  •    Lesson 4 - Intrusion Detection Systems 9 min
  •    Lesson 5 - Transport Layer Security 4 min
  •    Lesson 6 - IPSec 7 min
  •    Lesson 7 - Network Access Control 8 min
  •    Lesson 8 - Advanced Intrusion Detection Systems Concepts 6 min
  •    Lesson 9 - Advanced Perimeter Security 12 min
  •    Lesson 10 - Principles of Security 8 min
  •    Lesson 11 - Risk Management 17 min
  •    Lesson 12 - Physical Security 7 min
  •    Lesson 13 - Environmental Security 4 min
  •    Lesson 14 - Data Classification 14 min
  •    Lesson 15 - Operational Security 7 min
  •    Lesson 16 - Incident Response 9 min
  •    Lesson 17 - Change Management 4 min
  •    Lesson 18 - Disaster Recovery 9 min
  •    Lesson 19 - Forensics 14 min
  •    Lesson 20 - Malware 101 14 min
  •    Lesson 21 - Cyberattacks 17 min
  •    Lesson 22 - DNS Security 4 min
  •    Lesson 23 - Social Engineering 9 min
  •    Lesson 24 - Wireless Attacks 8 min
  •    Lesson 25 - Advanced Wireless Attacks 14 min
  •    Lesson 26 - Cross Site Scripting – XSS Attacks 8 min
  •    Lesson 27 - Buffer Overflows 23 min
  •    Lesson 28 - Security Testing Tools 9 min
  •    Lesson 29 - Security Information and Event Management 12 min
  •    Lesson 30 - Platform Hardening and Baselining 7 min
  •    Lesson 31 - Honeypots and Honeynets 6 min
  •    Lesson 32 - Vulnerability Scanning and Pen Testing 9 min
  •    Lesson 33 - Application Design Flaws and Bugs 4 min
  •    Lesson 34 - Mobile Security and Device Management 10 min
  •    Lesson 35 - Key Management 17 min
  •    Lesson 36 - Virtualization and Cloud Security 30 min
  •    Lesson 37 - Securing Storage and Storage Platforms 19 min
  •    Lesson 38 - Information Lifecycle Management 5 min
  •    Lesson 39 - Hacking IoT 9 min
  •    Lesson 40 - Securing the Power Grid 4 min
  •    Lesson 41 - Access Control Models 10 min
  •    Lesson 42 - Kerberos 13 min
  •    Lesson 43 - Single-Sign-On 13 min
  •    Lesson 44 - Identity Federation 7 min
  •    Lesson 45 - Identity Governance 13 min
  •    Lesson 46 - Encryption 7 min
  •    Lesson 47 - Advanced Cryptography 13 min
  •    Lesson 48 - Message Authentication Codes 5 min
  •    Lesson 49 - Cryptographic Algorithms 8 min
  •    Lesson 50 - A Note on Salting 7 min
  •    Lesson 51 - Public Key Infrastructure 10 min
  •    Lesson 52 - PKI Management 20 min
  • Reviews

    No reviews yet.