CURSO DE SEGURIDAD INFORMÁTICA
El curso de Seguridad Informática TestOut Security Pro prepara a los estudiantes para el examen de certificación TestOut Security Pro y el examen de certificación CompTIA Security + SY0-401. Los estudiantes aprenden cómo proteger una red corporativa usando un modelo de seguridad en capas.
Aprobado por CompTIA
TestOut Security Pro posee contenido de calidad aprobado por CompTIA y se ha verificado que cubre el 100 % de los objetivos del examen de certificación CompTIA Security+ SY0-401.
Simulaciones de la vida real
LabSim imita $35 000 USD en hardware y software informático y desafía a los estudiantes con escenarios del mundo real. Los estudiantes que completan el curso están preparados con el conocimiento y las habilidades que necesitan para ser un exitoso administrador de seguridad de TI.
Enfoque de seguridad en capas
TestOut Security Pro enseña a los estudiantes cómo proteger correctamente una red usando un modelo de seguridad en capas. Los estudiantes aprenden y luego construyen una red segura, comenzando por medidas de seguridad física y progresando hasta las defensas de datos, al igual que harían en el trabajo.
Múltiples sistemas operativos
Durante el curso, los estudiantes adquieren experiencia con múltiples sistemas operativos e interfaces como Windows 7 Ultimate, Windows Server 2012 R2 Datacenter, iOS, Cisco CLI (enrutadores y conmutadores), Cisco Net Security Appliance y Linux CLI.
Exámenes ilimitados de práctica de certificación
TestOut Security Pro incluye exámenes de práctica para el examen de certificación TestOut Security Pro y el examen de certificación CompTIA Security+ SY0-401. Los estudiantes pueden adquirir confianza y habilidades de prueba al practicar todas las veces que lo deseen.
Este curso de Seguridad Informática va dirigido a toda persona que quiera obtener la certificación CompTIA Security+ SY0-401 o que busque convertirse en un especialista en seguridad, para desempeñar mejor sus funciones como administrador o encargado de sistemas de TI.
Temario del Curso de Seguridad Informática Security Pro
INTRODUCTION
Security Overview
- Security Challenges (8:22)
- Security Roles and Concepts (5:37)
- Threat Agent Types (8:20)
- Security Introduction
- General Attack Strategy (8:51)
- General Defense Strategy (18:25)
- Attack and Defense Strategy Overview
- Practice Questions - Section 1.1
Using the Simulator
- Using the Simulator (13:19)
- Configure a Security Appliance
- Install a Security Appliance
ACCESS CONTROL AND IDENTITY MANAGEMENT
Access Control Models
- Access Control Models (3:38)
- Access Control Facts
- Access Control Model Facts
- Access Control Model Examples
- Implementing Discretionary Access Control (6:09)
- Practice Questions - Section 2.1
Authentication
- Authentication Part 1 (11:26)
- Authentication Part 2 (8:53)
- Authentication Facts
- Using a Biometric Scanner (3:49)
- Using Single Sign-on (12:20)
- Single Sign-on Facts
- Practice Questions - Section 2.2
Authorization
- Authorization (5:15)
- Cumulative Access (9:32)
- Authorization Facts
- Examining the Access Token (9:08)
- Practice Questions - Section 2.3
Access Control Best Practices
- Access Control Best Practices (3:12)
- Viewing Implicit Deny (10:13)
- Best Practices Facts
- Practice Questions - Section 2.4
Active Directory Overview
- Active Directory Introduction (9:04)
- Active Directory Structure (9:25)
- Viewing Active Directory (8:05)
- Active Directory Facts
- Practice Questions - Section 2.5
Windows Domain Users and Groups
- Creating User Accounts (4:50)
- Managing User Account Properties (7:45)
- Create User Accounts
- Manage User Accounts
- Managing Groups (5:05)
- Create a Group
- Create Global Groups
- User Account Management Facts
- Practice Questions - Section 2.6
Linux Users
- Linux User and Group Overview (19:14)
- Managing Linux Users (9:28)
- Linux User Commands and Files
- Create a User Account
- Rename a User Account
- Delete a User
- Change Your Password
- Change a User´s Password
- Lock and Unlock User Accounts
- Practice Questions - Section 2.7
Linux Groups
- Managing Linux Groups (3:15)
- Linux Group Commands
- Rename and Create Groups
- Add Users to a Group
- Remove a User from a Group
- Practice Questions - Section 2.8
Linux User Security
- Linux User Security and Restrictions (9:53)
- Configuring Linux User Security and Restrictions (6:40)
- Linux User Security and Restriction Facts
- Practice Questions - Section 2.9
Group Policy Overview
- Group Policy Overview (8:41)
- Viewing Group Policy (14:31)
- Group Policy Facts
- Create and Link a GPO
- Practice Questions - Section 2.10
Hardening Authentication 1
- Hardening Authentication (19:31)
- Configuring User Account Restrictions (9:30)
- Configure User Account Restrictions
- Configuring Account Policies and UAC Settings (14:18)
- Configure Account Policies
- Hardening User Accounts (10:20)
- Restrict Local Accounts
- Secure Default Accounts
- Enforce User Account Control
- Hardening Authentication Facts
- Practice Questions - Section 2.11
Hardening Authentication 2
- Configuring Smart Card Authentication (6:20)
- Configure Smart Card Authentication
- Smart Card Authentication Facts
- Using Fine-Grained Password Policies (7:00)
- Fine-Grained Password Policy Facts
- Create a Fine-Grained Password Policy
- Practice Questions - Section 2.12
Remote Access
- Remote Access (8:44)
- Remote Access Facts
- RADIUS and TACACS+ (6:52)
- RADIUS and TACACS+ Facts
- Practice Questions - Section 2.13
Network Authentication
- Network Authentication Protocols (14:09)
- Network Authentication via LDAP (10:31)
- Network Authentication Facts
- Controlling the Authentication Method (6:39)
- Configure Kerberos Policy Settings
- Browsing a Directory Tree via LDAP (6:38)
- Trusts and Transitive Access (5:34)
- Trusts and Transitive Access Facts
- Credential Management (10:06)
- Credential Management Facts
- Practice Questions - Section 2.14
Identity Management
- Identity Management (16:31)
- Identity Management Facts
- Practice Questions - Section 2.15
CRYPTOGRAPHY
Cryptography
- Cryptography Concepts (4:30)
- Cryptography Facts
- Cryptographic Attacks (17:48)
- Cryptographic Attack Facts
- Practice Questions - Section 3.1
Hashing
- Hashing (11:31)
- Hashing Facts
- Using Hashes (7:43)
- Practice Questions - Section 3.2
Symmetric Encryption
- Symmetric Encryption (5:27)
- HMAC (6:14)
- Symmetric Encryption Facts
- Cracking a Symmetric Encryption Key (4:11)
- Practice Questions - Section 3.3
Asymmetric Encryption
- Asymmetric Encryption (8:14)
- Asymmetric Encryption Facts
- Practice Questions - Section 3.4
Public Key Infrastructure (PKI)
- Certificates (11:02)
- Managing Certificates (14:45)
- Manage Certificates
- Certificate Lifecycle Facts
- CA Implementation (5:17)
- Configuring a Subordinate CA (14:13)
- PKI Management Facts
- Practice Questions - Section 3.5
Cryptography Implementations
- Combining Cryptographic Methods (10:30)
- Hardware Based Encryption Devices (7:13)
- Cryptographic Implementation Facts
- Practice Questions - Section 3.6
POLICIES, PROCEDURES, AND AWARENESS
Security Policies
- Security Policies (7:23)
- Data Privacy Laws (9:43)
- Security Policy Facts
- Security Documentation Facts
- Security Management Facts
- Information Classification (5:40)
- Information Classification Facts
- Data Retention Policies (11:40)
- Wiping a Hard Drive (12:58)
- Data Retention Facts
- Practice Questions - Section 4.1
Manageable Network Plan
- Manageable Network Plan (16:49)
- Manageable Network Plan 2 (14:05)
- Manageable Network Plan Facts
- Practice Questions - Section 4.2
Business Continuity
- Business Continuity (2:39)
- Succession Planning (5:23)
- Business Continuity Facts
- Practice Questions - Section 4.3
Risk Management
- Risk Management (4:04)
- Security Controls (3:21)
- Data Loss Prevention (DLP) (4:57)
- Risk Management Facts
- Practice Questions - Section 4.4
Incident Response
- First Responder (7:17)
- Basic Forensic Procedures (18:31)
- Using Forensic Tools (6:17)
- Creating a Forensic Drive Image (10:00)
- Incident Response Facts
- Forensic Investigation Facts
- Practice Questions - Section 4.5
Social Engineering
- Social Engineering (4:40)
- Phishing Variations (13:04)
- Social Engineering Facts
- Investigating a Social Engineering Attack (9:45)
- Respond to Social Engineering
- Practice Questions - Section 4.6
Certification and Accreditation
- Trusted Computing (10:01)
- Certification and Accreditation (4:46)
- Certification and Accreditation Facts
- Practice Questions - Section 4.7
Development
- System Development Life Cycle (8:40)
- System Development Life Cycle 2 (7:49)
- SDLC Facts
- Software Development Models
- Practice Questions - Section 4.8
Employee Management
- Employment Practices (13:45)
- Employee Management Facts
- Employee Documents Facts
- Ethics Facts
- Practice Questions - Section 4.9
Third-Party Integration
- Third-Party Integration Security Issues (11:24)
- Third-Party Integration Security Facts
- Practice Questions - Section 4.10
PHYSICAL SECURITY
Physical Security
- Physical Security (18:39)
- Tailgating and Piggybacking (3:28)
- Physical Security Facts
- Hardware Security
- Hardware Security Guidelines (7:50)
- Breaking into a System (7:30)
- Hardware Security Facts
- Practice Questions - Section 5.2
Environmental Controls
- Environmental Controls (6:00)
- Environmental Monitoring (11:33)
- Hot and Cold Aisles (5:17)
- Environmental Control Facts
- Fire Protection Facts
- Practice Questions - Section 5.3
Mobile Devices
- Mobile Device Security (7:34)
- Mobile Device Security Facts
- BYOD Security Issues (9:33)
- BYOD Security Facts
- Securing Mobile Devices (10:20)
- Secure an iPad
- Practice Questions - Section 5.4
Mobile Device Security Enforcement
- Enforcing Security Policies on Mobile Devices (7:57)
- Enrolling Devices and Performing a Remote Wipe (8:49)
- Mobile Device Security Enforcement Facts
- Mobile Application Security (9:00)
- Mobile Application Security Facts
- Practice Questions - Section 5.5
Telephony
- Telephony (15:00)
- Telephony Security Facts
- Practice Questions - Section 5.6
PERIMETER DEFENSES
Network Layer Protocol Review
- OSI Model (4:08)
- OSI Model Facts
- IP Addressing (17:22)
- IP Address Facts
- Configuring IPv6 (5:28)
- IP Subnetting (12:35)
- Configuring Subnetting (8:07)
- Subnetting Facts
- Practice Questions - Section 6.1
Transport Layer Protocol Review
- Network Protocols (4:45)
- Network Protocol Facts
- Analyzing a TCP Three-way Handshake (2:14)
- TCP and UDP Ports (9:02)
- Common Ports
- Practice Questions - Section 6.2
Perimeter Attacks 1
- Reconnaissance (2:40)
- Performing Reconnaissance (9:01)
- Reconnaissance Facts
- Denial of Service (DoS) (7:49)
- Xmas Tree Attacks (3:23)
- DoS Attack Facts
- Performing a UDP Flood Attack (3:54)
- Practice Questions - Section 6.3
Perimeter Attacks 2
- Session and Spoofing Attacks (6:41)
- Session Based Attack Facts
- Performing ARP Poisoning (4:24)
- Spoofing Facts
- DNS Attacks (4:30)
- DNS Attack Facts
- Examining DNS Attacks (13:29)
- Prevent Zone Transfers
- Practice Questions - Section 6.4
Security Appliances
- Security Solutions (4:02)
- Security Zones (5:32)
- Security Zone Facts
- All-In-One Security Appliances (4:30)
- Security Solution Facts
- Configuring Network Security Appliance Access (6:55)
- Configure Network Security Appliance Access
- Practice Questions - Section 6.5
Demilitarized Zones (DMZ)
- Demilitarized Zones (9:49)
- Configuring a DMZ (5:42)
- Configure a DMZ
- DMZ Facts
- Practice Questions - Section 6.6
Firewalls
- Firewalls (5:33)
- Firewall Facts
- Configuring a Perimeter Firewall (9:47)
- Configure a Perimeter Firewall
- Practice Questions - Section 6.7
Network Address Translation (NAT)
- Network Address Translation (15:57)
- Configuring NAT (5:11)
- NAT Facts
- Practice Questions - Section 6.8
Virtual Private Networks (VPN)
- Virtual Private Networks (VPNs) (10:16)
- Configuring a VPN (4:25)
- Configure a Remote Access VPN
- Configure a VPN Connection iPad
- VPN Facts
- VPN Protocol Facts
- Practice Questions - Section 6.9
Web Threat Protection
- Web Threat Protection (9:29)
- Configuring Web Threat Protection (4:26)
- Configure Web Threat Protection
- Web Threat Protection Facts
- Practice Questions - Section 6.10
Network Access Control (NAC)
- Network Access Protection (19:58)
- Implementing NAP with DHCP Enforcement (15:56)
- NAP Facts
- Practice Questions - Section 6.11
Wireless Overview
- Wireless Networking Overview (5:35)
- Wireless Antenna Types (8:03)
- Wireless Networking Facts
- Wireless Encryption (6:46)
- Wireless Encryption Facts
- Configuring a Wireless Connection (12:22)
- Secure a Wireless Network
- Practice Questions - Section 6.12
Wireless Attacks
- Wireless Attacks (13:29)
- Wireless Attack Facts
- Using Wireless Attack Tools (9:06)
- Detecting Rogue Hosts (7:37)
- Practice Questions - Section 6.13
Wireless Defenses
- Wireless Security Considerations (12:54)
- Wireless Authentication (4:40)
- Wireless Authentication Facts
- Configuring a Wireless Access Point (19:54)
- Obscure a Wireless Network
- Configure a Wireless Profile
- Configuring a Captive Portal (12:02)
- Wireless Security Facts
- Practice Questions - Section 6.14
NETWORK DEFENSES
Network Devices
- Network Devices (5:51)
- Network Device Facts
- Practice Questions - Section 7.1
Network Device Vulnerabilities
- Device Vulnerabilities (1:47)
- Device Vulnerability Facts
- Searching Defaultpasswords.com (1:23)
- Securing a Switch (3:21)
- Secure a Switch
- Practice Questions - Section 7.2
Switch Attacks
- Switch Attacks (5:04)
- Switch Attack Facts
- Practice Questions - Section 7.3
Router Security
- Router Security (8:57)
- Router Security Facts
- Practice Questions - Section 7.4
Switch Security
- Switch Security (13:01)
- Switch Loop Protection (10:47)
- Switch Security Facts
- Configuring VLANs from the CLI (4:32)
- Explore VLANs from the CLI
- Configuring VLANs (3:32)
- Explore VLANs
- Hardening a Switch (14:10)
- Harden a Switch
- Secure Access to a Switch
- Secure Access to a Switch 2
- Practice Questions - Section 7.5
Intrusion Detection and Prevention
- Intrusion Detection (7:14)
- Detection vs. Prevention Controls (7:50)
- IDS Facts
- Implementing Intrusion Monitoring (3:33)
- Implementing Intrusion Prevention (7:51)
- Implement Intrusion Prevention
- Practice Questions - Section 7.6
SAN Security
- SAN Security Issues (14:32)
- Configuring an iSCSI SAN (9:57)
- SAN Security Facts
- Practice Questions - Section 7.7
HOST DEFENSES
Malware
- Malware (9:28)
- Malware Facts
- Malware Protection Facts
- Implementing Malware Protections (23:43)
- Using Windows Defender (14:22)
- Configure Windows Defender
- Practice Questions - Section 8.1
Password Attacks
- Password Attacks (2:04)
- Password Attack Facts
- Using Rainbow Tables (4:48)
- Capturing Passwords (5:40)
- Practice Questions - Section 8.2
Windows System Hardening
- Operating System Hardening (5:13)
- Hardening Facts
- Hardening an Operating System (6:41)
- Managing Automatic Updates (18:31)
- Configure Automatic Updates
- Configuring Windows Firewall (10:11)
- Configure Windows Firewall
- Configuring Windows Firewall Advanced Features (16:59)
- Configuring Parental Controls (18:21)
- Configure Parental Controls
- Practice Questions - Section 8.3
Hardening Enforcement
- Hardening Enforcement with GPOs (1:50)
- Using Security Templates and Group Policy (6:53)
- Configuring GPOs to Enforce Security (15:24)
- Hardening Enforcement Facts
- Manage Services with Group Policy
- Practice Questions - Section 8.4
File Server Security
- File Server Security (7:58)
- Scanning for Open Ports (3:52)
- File System Security Facts
- File Permission Facts
- Configuring NTFS Permissions (14:05)
- Configure NTFS Permissions
- Disable Inheritance
- Practice Questions - Section 8.5
Linux Host Security
- Linux Host Security (7:10)
- Removing Unneeded Services and Scanning Ports (6:30)
- Network Security Facts
- Practice Questions - Section 8.6
Static Environment Security
- Security Risks in Static Environments (4:26)
- Static Environment Security Facts
- Practice Questions - Section 8.7
APPLICATION DEFENSES
Web Application Attacks
- Web Application Attacks (2:49)
- Cross-site Request Forgery (XSRF) Attack (10:51)
- Injection Attacks (14:30)
- Header Manipulation (9:01)
- Zero Day Application Attacks (6:59)
- Client Side Attacks (6:22)
- Web Application Attack Facts
- Preventing Cross-site Scripting (4:05)
- Practice Questions - Section 9.1
Internet Browsers
- Managing Security Zones and Add-ons (20:26)
- Configuring IE Enhanced Security (9:11)
- Managing Cookies (12:38)
- Configure Cookie Handling
- Clearing the Browser Cache (9:28)
- Clear the Browser Cache
- Implementing Popup Blockers (7:26)
- Configure IE Popup Blocker
- Internet Explorer Security Facts
- Enforcing IE Settings through GPO (12:47)
- Enforce IE Settings through GPO
- Configure IE Preferences in a GPO
- Practice Questions - Section 9.2
E-mail
- E-mail Security (4:43)
- E-mail Security Facts
- Protecting a Client from Spam (10:29)
- Securing an E-mail Server (2:45)
- Configure E-mail Filters
- Securing E-mail on iPad (5:52)
- Secure E-mail on iPad
- Practice Questions - Section 9.3
Network Applications
- Network Application Security (2:19)
- Spim (3:43)
- Using Peer-to-peer Software (3:04)
- Securing Windows Messenger (2:48)
- Configuring Application Control Software (9:05)
- Network Application Facts
- Practice Questions - Section 9.4
Virtualization
- Virtualization Introduction (4:01)
- Virtualization Benefits (3:08)
- Load Balancing with Virtualization (10:40)
- Creating Virtual Machines (4:22)
- Managing Virtual Machines (5:09)
- Create Virtual Machines
- Adding Virtual Network Adapters (1:30)
- Creating Virtual Switches (3:26)
- Create Virtual Switches
- Virtualization Facts
- Practice Questions - Section 9.5
Application Development
- Secure Coding Concepts (16:18)
- Application Hardening (11:02)
- Application Development Security Facts
- Hardening Applications on Linux (4:26)
- Implementing Application Whitelisting with AppLocker (13:03)
- Implement Application Whitelisting with AppLocker
- Implementing Data Execution Preventions (DEP) (4:01)
- Implement Data Execution Preventions (DEP)
- Hardening Applications Facts
- NoSQL Security (5:18)
- NoSQL Security Facts
- Practice Questions - Section 9.6
DATA DEFENSES
Redundancy
- Redundancy (4:55)
- Redundancy Measurement Parameters (5:12)
- Redundancy Facts
- RAID (7:27)
- Implementing RAID (6:16)
- RAID Facts
- Configure Fault Tolerant Volumes
- Clustering (9:06)
- Clustering Facts
- Practice Questions - Section 10.1
Backup and Restore
- Backup and Restore (13:27)
- Backup and Restore Facts
- Backup Management Facts
- Backing Up Workstations (6:18)
- Back Up a Workstation
- Restoring Workstation Data from Backup (2:19)
- Back Up a Domain Controller
- Restoring Server Data from Backup (2:12)
- Practice Questions - Section 10.2
File Encryption
- Encrypting File System (EFS) (11:47)
- Securing Files using EFS (11:45)
- Encrypt Files with EFS
- PGP and GPG (4:34)
- Encrypting Files with GPG (4:58)
- BitLocker and Database Encryption (13:02)
- Configuring BitLocker (6:17)
- Configure BitLocker with a TPM
- File Encryption Facts
- Practice Questions - Section 10.3
Secure Protocols
- Secure Protocols (8:44)
- Secure Protocols 2 (15:26)
- Secure Protocols Facts
- Adding SSL to a Web Site (5:23)
- Allow SSL Connections
- IPSec (5:14)
- IPSec Facts
- Requiring IPSec for Communications (14:22)
- Practice Questions - Section 10.4
Cloud Computing
- Cloud Computing Introduction (15:59)
- Cloud Computing Security Issues (6:32)
- Cloud Computing Facts
- Practice Questions - Section 10.5
ASSESSMENTS AND AUDITS
Vulnerability Assessment
- Vulnerability Assessment (4:55)
- Vulnerability Assessment Facts
- Scanning a Network with Nessus (18:26)
- Scanning a Network with Retina (12:12)
- Scanning for Vulnerabilities Using MBSA (6:02)
- Review a Vulnerability Scan 1
- Review a Vulnerability Scan 2
- Review a Vulnerability Scan 3
- Performing Port and Ping Scans (2:36)
- Checking for Weak Passwords (9:21)
- Practice Questions - Section 11.1
Penetration Testing
- Penetration Testing (2:32)
- Penetration Testing Facts
- Exploring Penetration Testing Tools (11:22)
- Practice Questions - Section 11.2
Protocol Analyzers
- Protocol Analyzers (3:07)
- Protocol Analyzer Facts
- Analyzing Network Traffic (6:50)
- Practice Questions - Section 11.3
Log Management
- Logs (3:25)
- Log Facts
- Logging Events with Event Viewer (3:52)
- Windows Event Subscriptions (10:36)
- Configuring Source-initiated Subscriptions (4:50)
- Configuring Remote Logging on Linux (8:23)
- Remote Logging Facts
- Practice Questions - Section 11.4
Audits
- Audits (3:13)
- Audit Facts
- Auditing the Windows Security Log (11:41)
- Configure Advanced Audit Policy
- Auditing Device Logs (6:57)
- Enable Device Logs
- Practice Questions - Section 11.5
¿Desea obtener más información?
Mándenos sus datos y comentarios y lo atenderemos con gusto.
¿Quiere inscribirse a este curso ?
¡Hágalo ahora mismo usando PayPal*!
Elija las personas, fecha y opción de pago**:
*Si prefiere otra forma de pago, puede utilizar transferencia electrónica o depósito bancario. Contáctenos para ayudarlo con este proceso.