About
About Us
Help
Privacy Policy
Terms of Service
LearnDesk
Learn
Academics
Business
Creative
Health and Fitness
Lifestyle
Personal Development
Software
Topics
Admissions
Engineering
Hardware
Hospitality
Humanities
Chinese
Languages
Maths
Pharma
View All Topics
Topics
Accounting
Advertising
Analysis
Analytics
Business Communication
eCommerce
Entrepreneurship
Finance
Finance - India
Freelancing
View All Topics
Topics
Arts & Crafts
Audio Editing
Audio Production
Dance
Design
Film Production
Music
Photography
Video Production
Writing
View All Topics
Topics
Dieting
Fitness
Food Safety
Games
Medical
Medical Professionals
Meditation
Mental Health
Pregnancy
Safety & First Aid
View All Topics
Topics
Beauty & Makeup
Food
Fashion
Gaming
Home Improvement
Parenting
Pet Care & Training
Relationships
Sustainable Living
View All Topics
Topics
Career Development
Learning
Religion and Spirituality
Self-Improvement
View All Topics
Topics
Accounting
Amazon Web Services
App Development
Continuous Integration
Backup Software
Business Automation
Computational Fluid Dynamics
Business Intelligence
Computer Aided Design (CAD)
View All Topics
Teach
Teach Online
Schedule
Items
Billing
Users
Marketing
Analytics
Settings
Change School
Account
Log In
Sign Up
CompTIA Security+ Certification (SY0-501)
Introduction to Security+ SY0-501
Introduction
Preview
CompTIA Security+ SYO-501 Exam Objectives
Chapter 1 - Risk Management
The CIA of Security
What is Risk?
Threat Actors
Managing Risk
Using Guides for Risk Assessment
Security Controls
Interesting Security Controls
Defense in Depth
IT Security Governance
Security Policies
Frameworks
Quantitative Risk Calculations
Business Impact Analysis
Organizing Data
Security Training
Third-Party Agreements
Chapter 2 - Cryptography
Cryptography Basics
Cryptographic Methods
Symmetric Cryptosystems
Symmetric Block Modes
RSA Cryptosystems
Diffie-Hellman
PGP/GPG
Hashing
HMAC
Stenography
Certificates and Trust
Public Key Infastucture
Cryptographic Attacks
Chapter 3 - Identity and Access Management
Identification
Authorization Concepts
Access Control List
Password Security
Linux File Permissions
Windows File Permissions
User Account Management
AAA
Authentication Methods
Single Sign-On
Chapter 4 - Tools of the Trade
OS Utilties, Part 1
OS Utilties, Part 2
Network Scanners
Protocol Analyzers
SNMP
Logs
Chapter 5 - Securing Individual Systems
Denial of Service
Host Threats
Man-in-the-Middle
System Resiliency
RAID
NAS and SAN
Physical Hardening
RFI, EMI, and ESD
Host Hardening
Data and System Security
Disk Encryption
Hardware/Firmware Security
Secure OS Types
Securing Peripherals
Malware
Analyzing Output
IDS and IPS
Automation Strategies
Data Destruction
Chapter 6 - The Basic LAN
LAN Review
Network Topologies Review
Network Zone Review
Network Access Controls
The Network Firewall
Proxy Servers
Honeypots
Virtual Private Networks
IPSec
NIDS/NIPS
SIEM (Security Information and Event Management)
Chapter 7 - Beyond the Basic LAN
Wireless Review
Living in Open Networks
Vulnerabilities with Wireless Access Points
Cracking 802.11, WEP
Cracking 802.11, WPA and WPA2
Cracking 802.11, WPS
Wireless Hardening
Wireless Access Points
Virtualization Basics
Virtual Security
Containers
Infrastucture as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Deployment Models
Static Hosts
Mobile Connectivity
Deploying Mobile Devices
Mobile Enforcement
Mobile Device Management
Physical Controls
HVAC
Fire Suppression
Chapter 8 - Secure Protocols
Secure Encryption Applications and Protocols
Network Models
Know Your Protocols - TCP/IP
Know Your Protocols - Applications
Transport Layer Security (TLS)
Internet Service Hardening
Protecting Your Servers
Secure Code Development
Secure Deployment Concepts
Code Quality and Testing
Chapter 9 - Testing Your Infrastructure
Vulnerability Scanning Tools
Vulnerability Scanning Assessment
Social Engineering Principles
Social Engineering Attacks
Attacking Applications
Attacking Web Sites
Exploiting a Target
Vulnerability Impact
Chapter 10 - Dealing with Incidents
Incident Response
Digital Forensics
Contingency Planning
Backups
Chapter 6 - The Basic LAN
CompTIA Security+ Certification (SY0-501)
By:
Total Seminars
Share
Share the link to this page
Copied
Facebook
Twitter
WhatsApp
LinkedIn
Email
Add to Calendar
Add the class to your calendar
Add to Google Calendar
Add to Apple Calendar
Add to Yahoo Calendar
Add to Outlook Calendar
Print
Completed
We'll cover the following topics in this section:
LAN Review
Network Topologies Review
Network Zone Review
Network Access Controls
The Network Firewall
Proxy Servers
Honeypots
Virtual Private Networks
IPSec
NIDS/NIPS
SIEM (Security Information and Event Management)
Previous
Next
Sign Up
Signup to access thousands of classes
Continue with Facebook
Continue with Google
OR
Continue with Email
Already a member?
Log In
By registering for a LearnDesk account, you agree to our
Terms of Service
and
Privacy Policy
.
Share
Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.
Share with Google Contacts