CompTIA

IT sauga. Pasirengimas CompTIA Security+ sertifikacijai

Spalio 4 – 8 d. vietų nėra!

Trukmė Kalba Miestas Kaina Data ir registracija kursui
5 dienos lietuvių Nuotoliniai 1200 EUR
5 dienos lietuvių Vilnius 1200 EUR


Jau laukiame jūsų ir auditorijose su „Galimybių pasais“!

Naujasis Security+ atveria duris į kibernetinio saugumo karjerą!

Kibernetinių atakų vis daugėja. Šis 5 dienų kursas klausytojams suteiks žinių, reikalingų pasirengti CompTIA Security+ sertifikacijos egzaminui ir padės įgyti pagrindinius įgūdžius, reikalingus saugumo funkcijoms atlikti. Specialistai, kurie išlaikė šį egzaminą, sugeba identifikuoti ir spręsti iškilusias saugos problemas.


Mokymai padeda pasiruošti naujam SY0-601 egzaminui! Daugiau apie CompTIA Security sertifikaciją

Lektorius

Laurynas Žiedas – CompTIA Security+| LPIC-2 | CISSP | CompTIA Server+ | ITIL | CCNA R&S |

Laurynas - aukščiausio lygio sistemų inžinerijos ekspertas, šioje srityje dirbantis daugiau nei 17 metų. Puikiai išmano infrastruktūrų saugumo kontrolę bei nuolat gilina savo žinias šioje srityje. Lektorius ypač vertinamas dėl didelės praktinės patirties ir sukauptų žinių. Puikiai geba užmegzti ryšį su auditorija, atsako į visus iškilusius klausimus, pateikia daug praktinių pavyzdžių. Dalinamės keletu puikių atsiliepimų apie Lauryną:

„Dėstytojas labai įdomiai pasakojo, išlaiko ribą tarp dėstytojo ir kolegos, kuris pataria.“

Balys R


„Dėstytojas įdomiai pateikia mokymų medžiagą, o jo sugalvoti praktiniai užsiėmimai padeda ją geriau įsisavinti. Džiugu, kad mokymų metu išdėstoma ne tik mokymų medžiaga (pagal knygą), bet ir pasidalinama sukaupta patirtimi ties tam tikru klausimu.“

Ramūnas B.



Kursas skirtas

Kursas Security+  yra skirtas kompiuterinio tinklo priežiūros specialistams, kurie atsakingi už Windows sistemų bei tinklų administravimą, taip pat yra susipažinę su kitomis operacinėmis sistemomis, tokiomis kaip OS X, Unix ar Linux . Kursas yra naudingas ir kitiems IT specialistams norintiems pagilinti ar įgyti žinių IT saugumo srityje.

Kurso turinys

  1. Comparing Security Roles and Security Controls
  2. Explaining Threat Actors and Threat Intelligence
  3. Performing Security Assessments
  4. Identifying Social Engineering and Malware
  5. Summarizing Basic Cryptographic Concepts
  6. Implementing Public Key Infrastructure
  7. Implementing Authentication Controls
  8. Implementing Identity and Account Management Controls
  9. Implementing Secure Network Designs
  10. Implementing Network Security Appliances
  11. Implementing Secure Network Protocols
  12. Implementing Host Security Solutions
  13. Implementing Secure Mobile Solutions
  14. Summarizing Secure Application Concepts
  15. Implementing Secure Cloud Solutions
  16. Explaining Data Privacy and Protection Concepts
  17. Performing Incident Response
  18. Explaining Digital Forensics
  19. Summarizing Risk Management Concepts
  20. Implementing Cybersecurity Resilience
  21. Explaining Physical Security

  1. Comparing Security Roles and Security Controls.
    • Compare and Contrast Information Security Roles
    • Compare and Contrast Security Control and Framework Types
  2. Explaining Threat Actors and Threat Intelligence
    • Explain Threat Actor Types and Attack Vectors
    • Explain Threat Intelligence Sources
  3. Performing Security Assessments
    • Assess Organizational Security with Network Reconnaissance Tools
    • Explain Security Concerns with General Vulnerability Types
    • Summarize Vulnerability Scanning Techniques
    • TExplain Penetration Testing Concepts
  4. Identifying Social Engineering and Malware
    • Compare and Contrast Social Engineering Techniques
    • Analyze Indicators of Malware-Based Attacks
  5. Summarizing Basic Cryptographic Concepts
    • Compare and Contrast Cryptographic Ciphers
    • Summarize Cryptographic Modes of Operation
    • Summarize Cryptographic Use Cases and Weaknesses.
    • Summarize Other Cryptographic Technologies
  6. Implementing Public Key Infrastructure
    • Implement Certificates and Certificate Authorities
    • Implement PKI Management
  7. Implementing Authentication Controls
    • Summarize Authentication Design Concepts
    • Implement Knowledge-Based Authentication
    • Implement Authentication Technologies
    • Summarize Biometrics Authentication Concepts
  8. Implementing Identity and Account Management Controls
    • Implement Identity and Account Types
    • Implement Account Policies
    • Implement Authorization Solutions
    • Explain the Importance of Personnel Policies
  9. Implementing Secure Network Designs
    • Implement Secure Network Designs
    • Implement Secure Switching and Routing
    • Implement Secure Wireless Infrastructure
    • Implement Load Balancers
  10. Implementing Network Security Appliances
    • Implement Firewalls and Proxy Servers
    • Implement Network Security Monitoring
    • Summarize the Use of SIEM
  11. Implementing Secure Network Protocols
    • Implement Secure Network Operations Protocols
    • Implement Secure Application Protocols
    • Implement Secure Remote Access Protocols
  12. Implementing Host Security Solutions
    • Implement Secure Firmware
    • Implement Endpoint Security
    • Explain Embedded System Security Implications
  13. Implementing Secure Mobile Solutions
    • Implement Mobile Device Management
    • Implement Secure Mobile Device Connections
  14. Summarizing Secure Application Concepts
    • Analyze Indicators of Application Attacks
    • Analyze Indicators of Web Application Attacks
    • Summarize Secure Coding Practices
    • Implement Secure Script Environments
    • Summarize Deployment and Automation Concepts
  15. Implementing Secure Cloud Solutions
    • Summarize Secure Cloud and Virtualization Services
    • Apply Cloud Security Solutions
    • Summarize Infrastructure as Code Concepts
  16. Explaining Data Privacy and Protection Concepts
    • Explain Privacy and Data Sensitivity Concepts
    • Explain Privacy and Data Protection Controls
  17. Performing Incident Response
    • Summarize Incident Response Procedures
    • Utilize Appropriate Data Sources for Incident Response
    • Apply Mitigation Controls
  18. Explaining Digital Forensics
    • Explain Key Aspects of Digital Forensics Documentation
    • Explain Key Aspects of Digital Forensics Evidence Acquisition
  19. Summarizing Risk Management Concepts
    • Explain Risk Management Processes and Concepts
    • Explain Business Impact Analysis Concepts
  20. Implementing Cybersecurity Resilience.
    • Implement Redundancy Strategies
    • Implement Backup Strategies
    • Implement Cybersecurity Resiliency Strategies
  21. Explaining Physical Security
    • Explain the Importance of Physical Site Security Controls
    • Explain the Importance of Physical Host Security Controls

SY0-601 CompTIA Security+ Exam. Į kurso kainą egzamino laikymas neįtrauktas. Kainos teiraukitės testai@bka.lt arba telefonu 85 2780500. Egzaminas laikomas Pearson Vue sistemoje.

Testą sudaro maksimum 90 klausimų, trukmė 90 min. Testas išlaikytas surinkus 750 taškų (vertinimo skalė nuo 100 iki 900 taškų).

Daugiau informacijos apie testą

Lesson 1: Comparing Security Roles and Security Controls.
Topic 1A: Compare and Contrast Information Security Roles
Topic 1B: Compare and Contrast Security Control and Framework Types
Lesson 2: Explaining Threat Actors and Threat Intelligence
Topic 2A: Explain Threat Actor Types and Attack Vectors
Topic 2B: Explain Threat Intelligence Sources
Lesson 3: Performing Security Assessments
Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
Topic 3B: Explain Security Concerns with General Vulnerability Types
Topic 3C: Summarize Vulnerability Scanning Techniques
Topic 3D: Explain Penetration Testing Concepts
Lesson 4: Identifying Social Engineering and Malware
Topic 4A: Compare and Contrast Social Engineering Techniques
Topic 4B: Analyze Indicators of Malware-Based Attacks
Lesson 5: Summarizing Basic Cryptographic Concepts
Topic 5A: Compare and Contrast Cryptographic Ciphers
Topic 5B: Summarize Cryptographic Modes of Operation
Topic 5C: Summarize Cryptographic Use Cases and Weaknesses.
Topic 5D: Summarize Other Cryptographic Technologies
Lesson 6: Implementing Public Key Infrastructure
Topic 6A: Implement Certificates and Certificate Authorities
Topic 6B: Implement PKI Management
Lesson 7: Implementing Authentication Controls
Topic 7A: Summarize Authentication Design Concepts
Topic 7B: Implement Knowledge-Based Authentication
Topic 7C: Implement Authentication Technologies
Topic 7D: Summarize Biometrics Authentication Concepts
Lesson 8: Implementing Identity and Account Management Controls
Topic 8A: Implement Identity and Account Types
Topic 8B: Implement Account Policies
Topic 8C: Implement Authorization Solutions
Topic 8D: Explain the Importance of Personnel Policies
Lesson 9: Implementing Secure Network Designs
Topic 9A: Implement Secure Network Designs
Topic 9B: Implement Secure Switching and Routing
Topic 9C: Implement Secure Wireless Infrastructure
Topic 9D: Implement Load Balancers
Lesson 10: Implementing Network Security Appliances
Topic 10A: Implement Firewalls and Proxy Servers
Topic 10B: Implement Network Security Monitoring
Topic 10C: Summarize the Use of SIEM
Lesson 11: Implementing Secure Network Protocols
Topic 11A: Implement Secure Network Operations Protocols
Topic 11B: Implement Secure Application Protocols
Topic 11C: Implement Secure Remote Access Protocols
Lesson 12: Implementing Host Security Solutions
Topic 12A: Implement Secure Firmware
Topic 12B: Implement Endpoint Security
Topic 12C: Explain Embedded System Security Implications
Lesson 13: Implementing Secure Mobile Solutions
Topic 13A: Implement Mobile Device Management
Topic 13B: Implement Secure Mobile Device Connections
Lesson 14: Summarizing Secure Application Concepts
Topic 14A: Analyze Indicators of Application Attacks
Topic 14B: Analyze Indicators of Web Application Attacks
Topic 14C: Summarize Secure Coding Practices
Topic 14D: Implement Secure Script Environments
Topic 14E: Summarize Deployment and Automation Concepts
Lesson 15: Implementing Secure Cloud Solutions
Topic 15A: Summarize Secure Cloud and Virtualization Services
Topic 15B: Apply Cloud Security Solutions
Topic 15C: Summarize Infrastructure as Code Concepts
Lesson 16: Explaining Data Privacy and Protection Concepts
Topic 16A: Explain Privacy and Data Sensitivity Concepts
Topic 16B: Explain Privacy and Data Protection Controls
Lesson 17: Performing Incident Response
Topic 17A: Summarize Incident Response Procedures
Topic 17B: Utilize Appropriate Data Sources for Incident Response
Topic 17C: Apply Mitigation Controls
Lesson 18: Explaining Digital Forensics
Topic 18A: Explain Key Aspects of Digital Forensics Documentation
Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
Lesson 19: Summarizing Risk Management Concepts
Topic 19A: Explain Risk Management Processes and Concepts
Topic 19B: Explain Business Impact Analysis Concepts
Lesson 20: Implementing Cybersecurity Resilience.
Topic 20A: Implement Redundancy Strategies
Topic 20B: Implement Backup Strategies
Topic 20C: Implement Cybersecurity Resiliency Strategies
Lesson 21: Explaining Physical Security
Topic 21A: Explain the Importance of Physical Site Security Controls
Topic 21B: Explain the Importance of Physical Host Security Controls
Appendix A: Mapping Course Content to CompTIA Security+ (Exam SY0-601)