Imate žicu za učenje?

Overview/Description Security is a concern of everyone from the home user to the network administrator of a large enterprise. Although the threats and mitigation of threats are similar for both, the scale in which protections and solutions need to be applied is not. Everyone, regardless of their role, should be familiar with the different threats and attacks they may encounter and how to protect against them or clean up an infection. This course describes many of the threats that may be encountered in wired and wireless networks and how to mitigate those threats. This course prepares the...
Overview/Description Firewalls are a critical part of the defense of all PCs and networks. Firewalls can be either software- or hardware-based, but all firewalls are intended to restrict the connections and types of connection into and out of a host or network. Firewalls can't be the only defense used to guard against the increasing number of threats to computers and networks. Additional security appliances and programs, such as IPS and IDS, port and network scanners, as well as a variety of vulnerability assessment tools should be deployed to ensure that as many precautions as possible are...
Overview/Description Networks are the basic interconnections for all computers from home computer systems to multinational businesses to the Internet. In order to understand how networks function, you need to start at the beginning and learn the fundamental building blocks of networks and how data travels from one point to another. This course introduces the basic concepts of networking, including network models, such as the OSI model and the TCP/IP model and the protocols and applications that function within these models. This course also explains the basics of routing and switching...
Overview/Description With everything that need to function correctly and together in networks, there are an equal number of things that can go wrong. This course describes the protocols used on most networks today and the troubleshooting methodology that is recommended when problems arise. This course also explains virtual networking and how it can help reduce costs and ease the burden of administration and recovery when things go wrong. This course prepares the learner for the CompTIA Network+ 2012 certification exam N10-005. Network+ is sometimes referred to as N+ or Net+. Target Audience...
Overview/Description Security mechanisms and account management are important parts of creating a secure networking environment. This course examines different authentication services and protocols along with biometric security mechanisms and other access security mechanisms such as tokens and smart cards. This course also examines how LDAP can be used to create security in an environment along with risk reduction mechanisms such as policies for mandatory vacations, job rotation and separation of duties. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-...
Overview/Description Business continuity, disaster recovery, and computer forensics go hand in hand when a security professional trains on ways to create, maintain, and repair network security. This course examines business continuity plans along with risk assessment techniques and the strategies used when creating a risk management process. This course also examines security training for end users and the methodologies and tools used when performing computer forensics. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301. Target Audience Individuals who...
Overview/Description Understanding the types of threats that exist in an IT infrastructure is incredibly important when you are attempting to control access to network assets and secure an internetwork environment. This course examines control types, authentication, authorization, and access control strategies, along with the various types of malware, social engineering and spam/phishing attacks that a network can face. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301. Target Audience Individuals who have day to day technical information security...
Overview/Description Guaranteeing end-to-end security in communication, document, and database infrastructures is incredibly important in internetworking environments. This course examines cryptography and the different algorithms, ciphers and tools that can be used to secure information, and to protect against attacks. Symmetric and asymmetric algorithms are examined, along with block and stream ciphers, one-time pads, and steganography. This course also examines message authentication, digital signatures, Public Key Infrastructures and certification authorization and revocation. This course...
Overview/Description Security professionals must understand the hardware and software mechanisms that can be used to secure a network environment. This course examines the different types of firewalls, NIDS and NIPS, proxy servers, all-in-one security appliances, and other mechanisms that can be put in place to make a network environment secure. This course also discusses mitigation and deterrent techniques, security log analysis, and methods to secure DHCP and DNS servers. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301. Target Audience Individuals...
Overview/Description Network security professionals must have a firm understanding of the transport mechanisms and attacks faced by traffic entering and exiting a network environment. This course examines the TCP/IP protocol suite, the OSI model, and the different protocols that operate within the layers of these models. This course also examines various attacks that protocols and ports can face, along with the tools that can be used to detect these attacks. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301. Target Audience Individuals who have day to...

Koraci do učenja

1Prijavi se

Prijavite se, a ako nemate korisničko ime, registrirajte se.

2Pronađi i upiši program

Pronađite edukacijske programe u Katalogu i Certifikaciji, ili koristite polje za pretragu.

3Uči

Upisani programi dostupni su u meniju Korisnik, Moji tečajevi.

»Detaljne upute

Trebate pomoć?