Courses for Success
Add to basket or enquire
Start Now To Learn The CompTIA® Security+ Certification Prep 1 Online Course
The U.S. Department of Labor forecasts that information security analysts will be among the fastest-growing occupations through 2022. CompTIA's Security+ certificate is widely regarded as the entry-level certificate for this fast-growing field. Getting that certificate requires passing CompTIA's challenging SY0-401 exam.
This course covers the key terminology and concepts you need to know to ace the exam, all in a condensed format for rapid reading. The course provides helpful study tools including crossword puzzles, games, and practice questions to aid with learning. All of the content is geared toward helping you pass the SY0-401 exam so you can leave the test center with your Security+ certificate in hand.
Please note that if you received your Comp TIA Security+ certification before 1/1/2011, you will be a lifetime credential holder not subject to credential renewals. However, if you achieve your certification after 1/1/2011, you are subject to a CompTIA Security+ renewal process every three years.
Course Revised November 2014
Course Fast Facts:
- Learn The CompTIA® Security+ Certification Prep 1 Online Course in only 6 weeks
- Approximately only 2 to 4 hours per week of study is required
- This course is delivered 100% on-line and is accessible 24/7 from any computer or smartphone
- Instructors lead each course and you will be able to interact with them and ask questions
- You can study from home or at work at your own pace in your own time
- You can download printer friendly course material or save for viewing off line
- You will be awarded a certificate at completion of this course
How is the The CompTIA® Security+ Certification Prep 1 Online Course Studied?
Upon enrolment an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. New courses start every month to ensure that we have the correct ratio of students to tutors available, please ensure you select a starting date when you go through our shopping cart, at checkout. The course is easy to follow and understand.
Through well-crafted lessons, expert online instruction and interaction with your tutor, participants in these courses gain valuable knowledge at their convenience. They have the flexibility to study at their own pace combined with enough structure and support to complete the course. And they can access the classroom 24/7 from anywhere with an Internet connection.
New sessions of each course run every month. They last six weeks, with two new lessons being released weekly (for a total of 12). The courses are entirely Web-based with comprehensive lessons, quizzes, and assignments. A dedicated professional instructor facilitates every course; pacing learners, answering questions, giving feedback, and facilitating discussions.
Recognition & Accreditation
All students who complete the course receive a certificate of completion with a passing score (for the online assessment) and will be issued a certificate via email.
Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining! (Value £300)
The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
The Personal Success Training Program consists of 3 Comprehensive Courses:
- Course 1: Create Personal Success Online Certificate Course
- Course 2 - Certificate in Organizational Skills Online Course
- Course 3 - Certificate in Goal Setting & Getting Things Done Online Course
- How to layout a Success Plan.
- Get where you want to be in life.
- How to unclutter your mind to succeed.
- Achieve your dreams using your imagination.
- How to have faith in yourself.
- 12 month online access, 24/7 anywhere.
- Complement your individual course purchase.
- Internationally recognized by the IAOTS.
- Thousands of positive reviews.
- Limited Time Offer - Ends Soon.
There are 12 units of study
The Security+ Exam and Basic Network Security
Computer security and related computer-support specialties are among today's fastest-growing occupations. Getting a CompTIA Security+ credential is your first step to gaining entrance into this exciting, fast-paced field. By the time you finish this first lesson, you'll know what you need to do to achieve a Security+ credential. You'll also understand the basic goals, tools, and techniques of computer security.
Network Security Administration
In this lesson, we'll review the tasks and actions a secure network administrator performs, including setting up security rules and ensuring secure device configurations. We'll also cover what you need to consider in the design of a secure network. You'll learn the definitions, structures, and methods that combine to create a secure network environment.
Network Security Protocols
In Lesson 3, we'll explore the common network security protocols and ports in use on secure networks, and we'll discuss which ones are most likely to show up on the Security+ exam. You'll learn the purpose and function of each of the protocols and features in this lesson. This knowledge will help you not only pass the exam, but also work as a successful secure network administrator.
Compliance and Operational Security: Part 1
If you work as a secure network administrator, you'll spend most of your days focusing on risk. Risk comes in many forms, and identifying, mitigating, and reducing risk is what network security is all about. In this lesson, you'll get a broad overview of how we deal with risks. We'll explore security policies, risk analysis, risk control methods, and the duties of risk administration.
Despite your best efforts, there are times when a security incident will occur. In this lesson, you'll learn how to respond to an incident. We'll explore the forensic processes you can use to gather evidence after an incident, and we'll go over the procedures you'll use to report and record the outcome of your investigation. With thorough incident response, you'll be able to minimize the damage from an incident and find out how you can prevent similar incidents from happening in the future.
Compliance and Operational Security: Part 2
In this lesson, we'll explore some topics important to keeping your network secure and performing at its best. We'll start with user awareness. When it comes to preventing security incidents, how can you make an organization's employees your allies instead of your enemies? We'll look at some compliance procedures that can help. We'll also discuss how we classify information according to its sensitivity and then apply security protections accordingly. Next, we'll investigate some physical and logical security options. Finally, we'll talk about how to secure the network's environment from hazards such as weather, fire, and high heat or humidity. There's a lot to think about when securing a network, but you'll get a good grasp on the ins and outs in this lesson.
Threat Awareness, User Behaviors, and Business Continuity
Many of the threats that face a secure network come from sources you might not expect. Network users can be unknowingly creating vulnerabilities every day. The Web provides avenues to attackers who wish to infect networks with viruses, phishing attacks, and other types of exploits. The expansion of social networking and even simple peer-to-peer file sharing across a network can also add new types of threats to your network. While these threats can affect the network, they can also interrupt the continuity of your business operations. In this lesson, we'll investigate each potential threat and how you can keep threats at bay.
Redundancy, Fault Tolerance, and Resiliency
Even the best security designs and implementations are only in effect if an entire system is up and running. If part of a system or network fails, its security measures could also fail simply because they aren't running. In this lesson, we'll look at the various methods and technologies that help to ensure that a system or network remains up and running. We'll explore redundancy and fault tolerance, and how RAID can help us achieve them. We'll also look at high availability, clustering, load balancing, failover, and network resiliency. By the end of this lesson, you'll have a good understanding of how these technologies help prevent network downtime.
Malware, Network, and Social Engineering Attacks
This is the first of three lessons in which we'll focus on threats and vulnerabilities. In Lesson 9, we'll cover the various types of malware, the different types of attacks that threaten your network, and the variety of social engineering attacks that seek to gain information about you, your users, your organization, and your network. Once you know your enemy, you'll be better prepared to protect your network.
Wireless Threats and Vulnerabilities
So far, we've talked about many threats that affect wired networks. But wireless networks have their own unique set of threats and vulnerabilities. In this lesson, we'll look at these wireless threats and vulnerabilities. You'll find out the strategies behind many wireless attacks, including client-to-client attacks, war jacking, interception attacks, and more. Finally, you'll see how to design a wireless network for maximum security and mitigation of these threats.
Application and Injection Attacks
In this lesson, we'll continue our exploration of the many types of threats and vulnerabilities that can hurt a network with a look at application and injection attacks. This time, we'll also focus on the actions of attackers, the types of attacks they can launch, and the mitigation methods we can use to determine the nature and damage of an attack. By the end of this lesson, you'll not only be well-informed about the types of attacks you can expect to see while working in network security, but you'll also know what methods you can use to prevent and minimize damage from attacks.
In the final lesson of the course, we'll explore a few methods and security measures that you can apply to a network to reduce its vulnerabilities. First, we'll talk about the hardening process, which includes tasks such as securing accounts, removing unnecessary accounts, and applying port security. Then we'll look at different types of intrusion detection and prevention systems. We'll wrap up with a discussion of the tools and processes some of these systems use. I'll show you how you can put some of the concepts you've been learning throughout this course into practice on a network.
Who is this course for?
Upon course completion, students will receive a certificate that will serve as proof of their study in this field.
Students must have basic literacy and numeracy skills.
Open entry. Previous schooling and academic achievements are not required for entry into this course.
Students will need access to a computer and the internet.
Minimum specifications for the computer are:
Microsoft Windows XP, or later
OSX/iOS 6 or later
Internet bandwidth of 1Mb or faster
Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)
Students will also need access the following applications:
Adobe Acrobat Reader
Questions and answers
Currently there are no Q&As for this course.Be the first to ask a question.
Rating and reviews
There haven't been any reviews for this course yet.Leave a review
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.