Cybersecurity

This program is designed to help the candidate become a leading cybersecurity professional. Included are seven certification exam prep courses from three different vendors.

CompTIA Security+
40 Hours Lecture + 33 Hours Virtual Practice Lab + 16 Hours Bootcamp
The Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT.
CompTIA CySA+
24 Hours Lecture + 21 Hours Virtual Practice Lab on Cybersecurity Fundamentals + 6 Hours of Security Hardening Bootcamp
Cybersecurity Analyst CySA+ is an IT workforce certification that applies behavioral analytics to networks and devices to prevent, detect and combat cybersecurity threats.
CompTIA CASP+
18 Hours Lecture + 32 Hours Virtual Practice Lab
The CompTIA Advanced Security Practitioner (CASP+) certification validates advanced-level competency in risk management, enterprise security operations and architecture, research and collaboration, and integration of enterprise security.
CompTIA PenTest+
18 Hours Lecture + 15 Hours Virtual Practice Lab + 8 Hours Bootcamp
CompTIA PenTest+ is a certification for cybersecurity professionals tasked with penetration testing and vulnerability assessment and management.
(ISC)2 CISSP – Certified Information Systems Security Professional
22 Hours Lecture + 28 Hours Virtual Practice Lab + 32 Hours Bootcamp
Demonstrate security expertise in Security and risk management, Communications and network security, Software development security, Security engineering and operations, and Security assessment and testing.
EC Council CEHv10 – Certified Ethical Hacker
50 Hours Lecture + 21 Hours Virtual Practice Lab
The Certified Ethical Hacker certification is designed for network and information security professionals, security officers, auditors, site administrators and anyone who is concerned about the integrity of the network infrastructure. It’s a powerful credential that shows employers you are a skilled IT professional who has the knowhow to find weaknesses in an organization’s infrastructure and the ability to apply that knowledge to protect a company.

Training topics to be covered include:
CompTIA Security+ (SY0-501)
• Mentoring
• TestPrep Security+ SY0-501: used to test your knowledge on the skills and competencies being measured by the vendor certification exam.
• Types of Malware
• Social Engineering and Related Attacks
• Application and Service Attacks
• Cryptographic and Wireless Attacks
• Penetration Testing and Vulnerability Scanning
• Impacts from Vulnerability Types
• Components Supporting Organizational Security
• Security Assessment Using Software Tools
• Cryptography
• Public Key Infrastructure
• Wireless Security Settings
• Analyzing Output from Security Technologies
• Deploying Mobile Devices Securely
• Implementing Secure Protocols
• Troubleshooting Common Security Issues
• Identity Concepts and Access Services
• Identity and Access Management Controls
• Common Account Management Practices
• Frameworks, Guidelines, and Physical Security
• Implement Secure Network Architecture Concepts
• Secure System and Application Design and Deployment
• Cloud, Virtualization, and Resiliency Concepts
• Policies, Plans, and Procedures
• Business Impact Analysis and Risk Management
• Incident Response, Forensics, and Disaster Recovery

CompTIA CYSA+ Cyber Security Analyst (CS0-001)
• Mentoring
• TestPrep CompTIA Cybersecurity Analyst CS0-001
• Network Architecture and Reconnaissance
• Threat Identification
• Threat Mitigation
• Reducing Vulnerabilities
• Investigate Security Incidents
• Monitoring for Security Issues

(ISC)2 Certified Information Systems Security Professional (CISSP)
• Mentoring
• TestPrep Certified Information Systems Security Professional (CISSP)
• (ISC)² and Security Fundamentals
• Cryptographic Client-based Systems
• Communication and Network Security
• Identity and Access Management (IAM)
• Site and Facility Security Controls
• Security and Risk Management (Parts 1 & 2)
• Security Architecture and Engineering (Parts 1 & 2)
• Security Assessment and Testing
• Security Operations (Parts 1 & 2)
• Conducting Incident Management
• Software Development Security

CompTIA Certified Advanced Security Practitioner CASP+ (CAS-003)
• Mentoring
• TestPrep Certified Advanced Security Practitioner CASP+ (CAS-003)
• Business and Industry Influences and Risks
• Organizational Security and Privacy Policies
• Risk Mitigation Strategies and Controls
• Risk Metric Scenarios for Enterprise Security
• Integrating Network and Security Components, Concepts, and Architectures
• Integrating Security Controls for Host Devices
• Integrating Controls for Mobile and Small Form Factor Devices
• Selecting Software Security Controls
• Conducting Security Assessments
• Implementing Incident Response and Recovery
• Integrating Hosts, Storage, and Applications in the Enterprise

SSCP 2018 – Systems Security Certified Practitioner
• Mentoring
• TestPrep Systems Security Certified Practitioner (SSCP)
• Network Fundamentals
• Security Concepts
• Risk Management
• Cryptography Primer
• Public Key Infrastructure
• Identity Management
• Controlling Resource Access
• Security Controls
• Asset & Change Management
• Network Security
• Malware & Endpoint Security
• Securing Environments
• Securing Assessments
• Digital Forensics
• Business Continuity

PT0-001 CompTIA PenTest+ PT0-001
• Mentoring PT0-001 CompTIA PenTest+: mentors are available to help students with their studies
• Planning for an Engagement
• Scoping an Engagement
• Information Gathering
• Vulnerability Identification
• Social Engineering and Specialized System Attacks
• Network-Based Exploits
• Application-Based Vulnerabilities
• Local Host Vulnerabilities
• Post-Exploitation and Facilities Attacks
• Penetration Testing Tools
• Analyzing Tool and Script Output
• Reporting and Communication

Certified Ethical Hacker (CEHv10)
• Mentoring
• TestPrep Certified Ethical Hacker (CEHv10)
• Ethical Hacking Overview and Threats
• Hacking Concepts
• Security Controls
• Security Controls Part 2
• Pentesting, Laws, and Standards
• Footprinting
• Host Discovery and Scanning with Nmap
• ProxyChains and Enumeration
• Vulnerability Analysis Concepts and Tools
• Password Attacks Parts 1/2
• Privilege Escalation
• Covert Data Gathering
• Hidden Files and Covering Tracks
• Malware Threats
• Malware Distribution
• Network Sniffing
• Social Engineering
• Denial of Service
• Session Hijacking
• Evading IDS, Firewalls, and Honeypots Parts 1/2/3
• Hacking Web Servers
• Common Web App Threats (Parts 1 & 2)
• Practical Web App Hacking
• SQL Injection
• SQL Injection Types and Tools
• Wireless Hacking Concepts
• Wireless Hacking Tools
• Wireless Hacking Common Threats
• Cracking and Mobile Hacking
• IoT Concepts
• IoT Attacks
• IoT Hacking and Countermeasures
• Clouding Computing Concepts
• Cloud Computer Attacks
• Cryptography Concepts Parts 1/2/3
• Cryptography Attacks

Course Outcomes

Students will be eligible to work as Network Security Specialists and Network Administrators. Upon the completion of this course, students will be able to:
• Describe privacy-enhancing technologies, such as tokenization, data minimization and masking, and anonymization
• Use Nessus to audit Amazon Web Services (AWS) and to scan LAN hosts for malware
• Describe the correct process by which digital forensic evidence is acquired and handled
• Recognize how to mitigate the risks of cloud resource exhaustion outages
• Outline the cryptographic life cycle, including keys and algorithm selection
• Configure Windows Defender settings and Microsoft System Center Endpoint Protection
• Describe the various approaches that can be used to attack a cryptographic system

Target Student

The target students for this course consists of IT security professionals with a minimum of two years’ experience in IT administration with a focus on security; users with basic day-to-day technical information security experience; those interested in gaining a broader and deeper knowledge of security concerns and implementation; IT specialists who will be responsible for securing and analyzing IT assets at the hardware and software levels.

Features

Modality: Self-paced
Duration: 172 hours of Lecture, 148 hours of Virtual Practice Lab and 62 hours of Bootcamp
Offered: 24/5
Start Date: On the first Monday of every month
Registration Ends: One week before start date
Certificate: Yes

Cybersecurity

39,000 Br
access until 12/31/22
This course does not have any sections.
Share this Training: