Descrizione
CompTIA CertMaster Learn rappresenta l’offerta formativa ufficiale CompTIA in modalità e-learning. Tutti i corsi CertMaster sono preparati da professionisti di livello internazionale per rispondere a pieno alle esigenze di raggiungimento della certificazione corrispondente e alla produttività aziendale. Il materiale didattico è di tipo multimediale: Video, Testo e Immagini composti secondo le ultime tecniche di auto apprendimento tipiche dei corsi in self-study online. Tutti i corsi sono corredati da Test di verifica per la preparazione all’esame di riferimento.
Obiettivi Corso:
1.0 Threats, Attacks and Vulnerabilities
- 1.1 Given a scenario, analyse indicators of compromise and determine the type of malware.
- 1.2 Compare and contrast types of attacks.
- 1.3 Explain threat actor types and attributes.
- 1.4 Explain penetration testing concepts.
- 1.5 Explain vulnerability scanning concepts.
- 1.6 Explain the impact associated with types of vulnerabilities.
2.0 Technologies and Tools
- 2.1 Install and configure network components, both hardwareand software-based, to support organisational security.
- 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organisation.
- 2.3 Given a scenario, troubleshoot common security issues.
- 2.4 Given a scenario, analyse and interpret output from security technologies.
- 2.5 Given a scenario, deploy mobile devices securely.
- 2.6 Given a scenario, implement secure protocols.
3.0 Architecture and Design
- 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides.
- 3.2 Given a scenario, implement secure network architecture concepts.
- 3.3 Given a scenario, implement secure systems design.
- 3.4 Explain the importance of secure staging deployment concepts.
- 3.5 Explain the security implications of embedded systems.
- 3.6 Summarise secure application development and deployment concepts.
- 3.7 Summarise cloud and virtualisation concepts.
- 3.8 Explain how resiliency and automation strategies reduce risk.
- 3.9 Explain the importance of physical security controls.
4.0 Identity and Access Management
- 4.1 Compare and contrast identity and access management concepts.
- 4.2 Given a scenario, install and configure identity and access services.
- 4.3 Given a scenario, implement identity and access management controls.
- 4.4 Given a scenario, differentiate common account management practices.
5.0 Risk Management
- 5.1 Explain the importance of policies, plans and procedures related to organisational security.
- 5.2 Summarise business impact analysis concepts.
- 5.3 Explain risk management processes and concepts.
- 5.4 Given a scenario, follow incident response procedures.
- 5.5 Summarise basic concepts of forensics.
- 5.6 Explain disaster recovery and continuity of operation concepts.
- 5.7 Compare and contrast various types of controls.
- 5.8 Given a scenario, carry out data security and privacy practices.
6.0 Cryptography and PKI
- 6.1 Compare and contrast basic concepts of cryptography.
- 6.2 Explain cryptography algorithms and their basic characteristics.
- 6.3 Given a scenario, install and configure wireless security settings.
- 6.4 Given a scenario, implement public key infrastructure.
Recensioni
Ancora non ci sono recensioni.