PROGRAM DESCRIPTION
This course will teach you the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation. This course prepares the student for the CompTIA Security+ certification exam.
This online course is self paced and interactive, it also consists of many other features such as videos, performance based assessments, flash cards and more.
At successful completion of the program the student will be awarded with a Certificate of Completion.
PROGRAM MODULES OUTLINE
PROGRAM OUTLINE OF COMPTIA Security+ (SY0-501)
Lesson 1: Comparing and Contrasting Attacks
Lesson 2: Comparing and Contrasting Security Controls
Lesson 3: Assessing Security Posture with Software Tools
Lesson 4: Explaining Basic Cryptography Concepts
Lesson 5: Implementing a Public Key Infrastructure
Lesson 6: Implementing Identity and Access Management Controls
Lesson 7: Managing Access Services and Accounts
Lesson 8: Implementing a Secure Network Architecture
Lesson 9: Installing and Configuring Security Appliances
Lesson 10: Installing and Configuring Wireless and Physical Access Security
Lesson 11: Deploying Secure Host, Mobile, and Embedded Systems
Lesson 12: Implementing Secure Network Access Protocols
Lesson 13: Implementing Secure Network Applications
Lesson 14: Explaining Risk Management and Disaster Recovery Concepts
Lesson 15: Summarizing Secure Application Development Concepts
Lesson 16: Explaining Organizational Security Concepts
Note: IT Certification industry keeps updating their content. We at Americation Training and Career School will update our content aligning with CompTIA certification.
PROGRAM KEY DETAILS
DURATION
2 Months
PROGRAM PACE
Self Paced
START DATES
1st & 15th of Every Month
ACCESS
24/7
REGISTRATION
Online or Oncampus
CLASS SIZE
Under 15
DELIVERY
Online
LANGUAGE
English
PROGRAM ONLINE LEARNING FEATURES
LEARNING PATH
All programs have a learning path that students can follow without getting off track.
TEXT TO SPEECH
If you don't feel like reading the material, you can activate the audio reader in the program.
MODULE BASED
Each program is broken down into modules to simply the contents in a section.
DASHBOARD
You can view the overall program outline from 1 single dashboard without having to switch screens.
ONLINE ATTENDANCE
When you attend the online programs, you will be able to see the duration of time spent.
STUDY TOOLS
Majority programs is equipped with study tools such as flash cards, crosswords etc.
PROGRESS TRACKER
Now you have the ease of tracking your progress while you are in the program.
ORIENTATION
All programs come with an orientation towards your program to assist you.
PROGRAM LEARNING OBJECTIVES & KEY TERMS
-
Identify strategies developed by cyber adversaries to attack networks and hosts and the countermeasures deployed to defend them.
-
Understand the principles of organizational security and the elements of effective security policies.
-
Know the technologies and uses of cryptographic standards and products.
-
Install and configure network- and host-based security technologies.
-
Describe how wireless and remote access security is enforced.
-
Describe the standards and products used to enforce security on web and communications technologies.
-
Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
-
Summarize application and coding vulnerabilities and identify development and deployment methods designed to mitigate them.
PROGRAM COMPLETION REWARDS
1
DIGITAL BADGE
At successful completion, you will receive digital badges that can be used online to display your achievements.
2
CERTIFICATE
At the completion of the program, you will be awarded with a program completion certificate.
3
CAREER HOURS
With the completion of this program, you will also be awarded with Career Enhancement Clock Hours (CECH), that may be displayed on your resume.
4
TRANSCRIPT
Your completion also comes with a dedicated transcript that shows your areas of grades for each course you attended.