Logo de IMECAF - Instituto Mexicano de Contabilidad, Administración y Finanzas
INSTITUTO MEXICANO DE CONTABILIDAD, ADMINISTRACIÓN Y FINANZAS

CURSO DE SEGURIDAD INFORMÁTICA

TECNOLOGÍAS DE INFORMACIÓN
DURACIÓN

90 HRS.

INVERSIÓN

$5,829.00 + IVA

MODALIDAD

En Linea

DESCARGA


OBJETIVO

El curso de Seguridad Informática TestOut Security Pro prepara a los estudiantes para el examen de certificación TestOut Security Pro y el examen de certificación CompTIA Security + SY0-401. Los estudiantes aprenden cómo proteger una red corporativa usando un modelo de seguridad en capas.

BENEFICIOS

Aprobado por CompTIA

TestOut Security Pro posee contenido de calidad aprobado por CompTIA y se ha verificado que cubre el 100 % de los objetivos del examen de certificación CompTIA Security+ SY0-401.

Simulaciones de la vida real

LabSim imita $35 000 USD en hardware y software informático y desafía a los estudiantes con escenarios del mundo real. Los estudiantes que completan el curso están preparados con el conocimiento y las habilidades que necesitan para ser un exitoso administrador de seguridad de TI.

Enfoque de seguridad en capas

TestOut Security Pro enseña a los estudiantes cómo proteger correctamente una red usando un modelo de seguridad en capas. Los estudiantes aprenden y luego construyen una red segura, comenzando por medidas de seguridad física y progresando hasta las defensas de datos, al igual que harían en el trabajo.

Múltiples sistemas operativos

Durante el curso, los estudiantes adquieren experiencia con múltiples sistemas operativos e interfaces como Windows 7 Ultimate, Windows Server 2012 R2 Datacenter, iOS, Cisco CLI (enrutadores y conmutadores), Cisco Net Security Appliance y Linux CLI.

Exámenes ilimitados de práctica de certificación

TestOut Security Pro incluye exámenes de práctica para el examen de certificación TestOut Security Pro y el examen de certificación CompTIA Security+ SY0-401. Los estudiantes pueden adquirir confianza y habilidades de prueba al practicar todas las veces que lo deseen.

DIRIGIDO A

Este curso de Seguridad Informática va dirigido a toda persona que quiera obtener la certificación CompTIA Security+ SY0-401 o que busque convertirse en un especialista en seguridad, para desempeñar mejor sus funciones como administrador o encargado de sistemas de TI.

Temario del Curso de Seguridad Informática Security Pro

 

  1. INTRODUCTION

    1. Security Overview

      1. Security Challenges (8:22)
      2. Security Roles and Concepts (5:37)
      3. Threat Agent Types (8:20)
      4. Security Introduction
      5. General Attack Strategy (8:51)
      6. General Defense Strategy (18:25)
      7. Attack and Defense Strategy Overview
      8. Practice Questions - Section 1.1
    2. Using the Simulator

      1. Using the Simulator (13:19)
      2. Configure a Security Appliance
      3. Install a Security Appliance
  2. ACCESS CONTROL AND IDENTITY MANAGEMENT

    1. Access Control Models

      1. Access Control Models (3:38)
      2. Access Control Facts
      3. Access Control Model Facts
      4. Access Control Model Examples
      5. Implementing Discretionary Access Control (6:09)
      6. Practice Questions - Section 2.1
    2. Authentication

      1. Authentication Part 1 (11:26)
      2. Authentication Part 2 (8:53)
      3. Authentication Facts
      4. Using a Biometric Scanner (3:49)
      5. Using Single Sign-on (12:20)
      6. Single Sign-on Facts
      7. Practice Questions - Section 2.2
    3. Authorization

      1. Authorization (5:15)
      2. Cumulative Access (9:32)
      3. Authorization Facts
      4. Examining the Access Token (9:08)
      5. Practice Questions - Section 2.3
    4. Access Control Best Practices

      1. Access Control Best Practices (3:12)
      2. Viewing Implicit Deny (10:13)
      3. Best Practices Facts
      4. Practice Questions - Section 2.4
    5. Active Directory Overview

      1. Active Directory Introduction (9:04)
      2. Active Directory Structure (9:25)
      3. Viewing Active Directory (8:05)
      4. Active Directory Facts
      5. Practice Questions - Section 2.5
    6. Windows Domain Users and Groups

      1. Creating User Accounts (4:50)
      2. Managing User Account Properties (7:45)
      3. Create User Accounts
      4. Manage User Accounts
      5. Managing Groups (5:05)
      6. Create a Group
      7. Create Global Groups
      8. User Account Management Facts
      9. Practice Questions - Section 2.6
    7. Linux Users

      1. Linux User and Group Overview (19:14)
      2. Managing Linux Users (9:28)
      3. Linux User Commands and Files
      4. Create a User Account
      5. Rename a User Account
      6. Delete a User
      7. Change Your Password
      8. Change a User´s Password
      9. Lock and Unlock User Accounts
      10. Practice Questions - Section 2.7
    8. Linux Groups

      1. Managing Linux Groups (3:15)
      2. Linux Group Commands
      3. Rename and Create Groups
      4. Add Users to a Group
      5. Remove a User from a Group
      6. Practice Questions - Section 2.8
    9. Linux User Security

      1. Linux User Security and Restrictions (9:53)
      2. Configuring Linux User Security and Restrictions (6:40)
      3. Linux User Security and Restriction Facts
      4. Practice Questions - Section 2.9
    10. Group Policy Overview

      1. Group Policy Overview (8:41)
      2. Viewing Group Policy (14:31)
      3. Group Policy Facts
      4. Create and Link a GPO
      5. Practice Questions - Section 2.10
    11. Hardening Authentication 1

      1. Hardening Authentication (19:31)
      2. Configuring User Account Restrictions (9:30)
      3. Configure User Account Restrictions
      4. Configuring Account Policies and UAC Settings (14:18)
      5. Configure Account Policies
      6. Hardening User Accounts (10:20)
      7. Restrict Local Accounts
      8. Secure Default Accounts
      9. Enforce User Account Control
      10. Hardening Authentication Facts
      11. Practice Questions - Section 2.11
    12. Hardening Authentication 2

      1. Configuring Smart Card Authentication (6:20)
      2. Configure Smart Card Authentication
      3. Smart Card Authentication Facts
      4. Using Fine-Grained Password Policies (7:00)
      5. Fine-Grained Password Policy Facts
      6. Create a Fine-Grained Password Policy
      7. Practice Questions - Section 2.12
    13. Remote Access

      1. Remote Access (8:44)
      2. Remote Access Facts
      3. RADIUS and TACACS+ (6:52)
      4. RADIUS and TACACS+ Facts
      5. Practice Questions - Section 2.13
    14. Network Authentication

      1. Network Authentication Protocols (14:09)
      2. Network Authentication via LDAP (10:31)
      3. Network Authentication Facts
      4. Controlling the Authentication Method (6:39)
      5. Configure Kerberos Policy Settings
      6. Browsing a Directory Tree via LDAP (6:38)
      7. Trusts and Transitive Access (5:34)
      8. Trusts and Transitive Access Facts
      9. Credential Management (10:06)
      10. Credential Management Facts
      11. Practice Questions - Section 2.14
    15. Identity Management

      1. Identity Management (16:31)
      2. Identity Management Facts
      3. Practice Questions - Section 2.15
  3. CRYPTOGRAPHY

    1. Cryptography

      1. Cryptography Concepts (4:30)
      2. Cryptography Facts
      3. Cryptographic Attacks (17:48)
      4. Cryptographic Attack Facts
      5. Practice Questions - Section 3.1
    2. Hashing

      1. Hashing (11:31)
      2. Hashing Facts
      3. Using Hashes (7:43)
      4. Practice Questions - Section 3.2
    3. Symmetric Encryption

      1. Symmetric Encryption (5:27)
      2. HMAC (6:14)
      3. Symmetric Encryption Facts
      4. Cracking a Symmetric Encryption Key (4:11)
      5. Practice Questions - Section 3.3
    4. Asymmetric Encryption

      1. Asymmetric Encryption (8:14)
      2. Asymmetric Encryption Facts
      3. Practice Questions - Section 3.4
    5. Public Key Infrastructure (PKI)

      1. Certificates (11:02)
      2. Managing Certificates (14:45)
      3. Manage Certificates
      4. Certificate Lifecycle Facts
      5. CA Implementation (5:17)
      6. Configuring a Subordinate CA (14:13)
      7. PKI Management Facts
      8. Practice Questions - Section 3.5
    6. Cryptography Implementations

      1. Combining Cryptographic Methods (10:30)
      2. Hardware Based Encryption Devices (7:13)
      3. Cryptographic Implementation Facts
      4. Practice Questions - Section 3.6
  4. POLICIES, PROCEDURES, AND AWARENESS

    1. Security Policies

      1. Security Policies (7:23)
      2. Data Privacy Laws (9:43)
      3. Security Policy Facts
      4. Security Documentation Facts
      5. Security Management Facts
      6. Information Classification (5:40)
      7. Information Classification Facts
      8. Data Retention Policies (11:40)
      9. Wiping a Hard Drive (12:58)
      10. Data Retention Facts
      11. Practice Questions - Section 4.1
    2. Manageable Network Plan

      1. Manageable Network Plan (16:49)
      2. Manageable Network Plan 2 (14:05)
      3. Manageable Network Plan Facts
      4. Practice Questions - Section 4.2
    3. Business Continuity

      1. Business Continuity (2:39)
      2. Succession Planning (5:23)
      3. Business Continuity Facts
      4. Practice Questions - Section 4.3
    4. Risk Management

      1. Risk Management (4:04)
      2. Security Controls (3:21)
      3. Data Loss Prevention (DLP) (4:57)
      4. Risk Management Facts
      5. Practice Questions - Section 4.4
    5. Incident Response

      1. First Responder (7:17)
      2. Basic Forensic Procedures (18:31)
      3. Using Forensic Tools (6:17)
      4. Creating a Forensic Drive Image (10:00)
      5. Incident Response Facts
      6. Forensic Investigation Facts
      7. Practice Questions - Section 4.5
    6. Social Engineering

      1. Social Engineering (4:40)
      2. Phishing Variations (13:04)
      3. Social Engineering Facts
      4. Investigating a Social Engineering Attack (9:45)
      5. Respond to Social Engineering
      6. Practice Questions - Section 4.6
    7. Certification and Accreditation

      1. Trusted Computing (10:01)
      2. Certification and Accreditation (4:46)
      3. Certification and Accreditation Facts
      4. Practice Questions - Section 4.7
    8. Development

      1. System Development Life Cycle (8:40)
      2. System Development Life Cycle 2 (7:49)
      3. SDLC Facts
      4. Software Development Models
      5. Practice Questions - Section 4.8
    9. Employee Management

      1. Employment Practices (13:45)
      2. Employee Management Facts
      3. Employee Documents Facts
      4. Ethics Facts
      5. Practice Questions - Section 4.9
    10. Third-Party Integration

      1. Third-Party Integration Security Issues (11:24)
      2. Third-Party Integration Security Facts
      3. Practice Questions - Section 4.10
  5. PHYSICAL SECURITY

    1. Physical Security

      1. Physical Security (18:39)
      2. Tailgating and Piggybacking (3:28)
      3. Physical Security Facts
      4. Hardware Security
      5. Hardware Security Guidelines (7:50)
      6. Breaking into a System (7:30)
      7. Hardware Security Facts
      8. Practice Questions - Section 5.2
    2. Environmental Controls

      1. Environmental Controls (6:00)
      2. Environmental Monitoring (11:33)
      3. Hot and Cold Aisles (5:17)
      4. Environmental Control Facts
      5. Fire Protection Facts
      6. Practice Questions - Section 5.3
    3. Mobile Devices

      1. Mobile Device Security (7:34)
      2. Mobile Device Security Facts
      3. BYOD Security Issues (9:33)
      4. BYOD Security Facts
      5. Securing Mobile Devices (10:20)
      6. Secure an iPad
      7. Practice Questions - Section 5.4
    4. Mobile Device Security Enforcement

      1. Enforcing Security Policies on Mobile Devices (7:57)
      2. Enrolling Devices and Performing a Remote Wipe (8:49)
      3. Mobile Device Security Enforcement Facts
      4. Mobile Application Security (9:00)
      5. Mobile Application Security Facts
      6. Practice Questions - Section 5.5
    5. Telephony

      1. Telephony (15:00)
      2. Telephony Security Facts
      3. Practice Questions - Section 5.6
  6. PERIMETER DEFENSES

    1. Network Layer Protocol Review

      1. OSI Model (4:08)
      2. OSI Model Facts
      3. IP Addressing (17:22)
      4. IP Address Facts
      5. Configuring IPv6 (5:28)
      6. IP Subnetting (12:35)
      7. Configuring Subnetting (8:07)
      8. Subnetting Facts
      9. Practice Questions - Section 6.1
    2. Transport Layer Protocol Review

      1. Network Protocols (4:45)
      2. Network Protocol Facts
      3. Analyzing a TCP Three-way Handshake (2:14)
      4. TCP and UDP Ports (9:02)
      5. Common Ports
      6. Practice Questions - Section 6.2
    3. Perimeter Attacks 1

      1. Reconnaissance (2:40)
      2. Performing Reconnaissance (9:01)
      3. Reconnaissance Facts
      4. Denial of Service (DoS) (7:49)
      5. Xmas Tree Attacks (3:23)
      6. DoS Attack Facts
      7. Performing a UDP Flood Attack (3:54)
      8. Practice Questions - Section 6.3
    4. Perimeter Attacks 2

      1. Session and Spoofing Attacks (6:41)
      2. Session Based Attack Facts
      3. Performing ARP Poisoning (4:24)
      4. Spoofing Facts
      5. DNS Attacks (4:30)
      6. DNS Attack Facts
      7. Examining DNS Attacks (13:29)
      8. Prevent Zone Transfers
      9. Practice Questions - Section 6.4
    5. Security Appliances

      1. Security Solutions (4:02)
      2. Security Zones (5:32)
      3. Security Zone Facts
      4. All-In-One Security Appliances (4:30)
      5. Security Solution Facts
      6. Configuring Network Security Appliance Access (6:55)
      7. Configure Network Security Appliance Access
      8. Practice Questions - Section 6.5
    6. Demilitarized Zones (DMZ)

      1. Demilitarized Zones (9:49)
      2. Configuring a DMZ (5:42)
      3. Configure a DMZ
      4. DMZ Facts
      5. Practice Questions - Section 6.6
    7. Firewalls

      1. Firewalls (5:33)
      2. Firewall Facts
      3. Configuring a Perimeter Firewall (9:47)
      4. Configure a Perimeter Firewall
      5. Practice Questions - Section 6.7
    8. Network Address  Translation (NAT)

      1. Network Address Translation (15:57)
      2. Configuring NAT (5:11)
      3. NAT Facts
      4. Practice Questions - Section 6.8
    9. Virtual Private Networks (VPN)

      1. Virtual Private Networks (VPNs) (10:16)
      2. Configuring a VPN (4:25)
      3. Configure a Remote Access VPN
      4. Configure a VPN Connection iPad
      5. VPN Facts
      6. VPN Protocol Facts
      7. Practice Questions - Section 6.9
    10. Web Threat Protection

      1. Web Threat Protection (9:29)
      2. Configuring Web Threat Protection (4:26)
      3. Configure Web Threat Protection
      4. Web Threat Protection Facts
      5. Practice Questions - Section 6.10
    11. Network Access  Control (NAC)

      1. Network Access Protection (19:58)
      2. Implementing NAP with DHCP Enforcement (15:56)
      3. NAP Facts
      4. Practice Questions - Section 6.11
    12. Wireless Overview

      1. Wireless Networking Overview (5:35)
      2. Wireless Antenna Types (8:03)
      3. Wireless Networking Facts
      4. Wireless Encryption (6:46)
      5. Wireless Encryption Facts
      6. Configuring a Wireless Connection (12:22)
      7. Secure a Wireless Network
      8. Practice Questions - Section 6.12
    13. Wireless Attacks

      1. Wireless Attacks (13:29)
      2. Wireless Attack Facts
      3. Using Wireless Attack Tools (9:06)
      4. Detecting Rogue Hosts (7:37)
      5. Practice Questions - Section 6.13
    14. Wireless Defenses

      1. Wireless Security Considerations (12:54)
      2. Wireless Authentication (4:40)
      3. Wireless Authentication Facts
      4. Configuring a Wireless Access Point (19:54)
      5. Obscure a Wireless Network
      6. Configure a Wireless Profile
      7. Configuring a Captive Portal (12:02)
      8. Wireless Security Facts
      9. Practice Questions - Section 6.14
  7. NETWORK DEFENSES

    1. Network Devices

      1. Network Devices (5:51)
      2. Network Device Facts
      3. Practice Questions - Section 7.1
    2. Network Device Vulnerabilities

      1. Device Vulnerabilities (1:47)
      2. Device Vulnerability Facts
      3. Searching Defaultpasswords.com (1:23)
      4. Securing a Switch (3:21)
      5. Secure a Switch
      6. Practice Questions - Section 7.2
    3. Switch Attacks

      1. Switch Attacks (5:04)
      2. Switch Attack Facts
      3. Practice Questions - Section 7.3
    4. Router Security

      1. Router Security (8:57)
      2. Router Security Facts
      3. Practice Questions - Section 7.4
    5. Switch Security

      1. Switch Security (13:01)
      2. Switch Loop Protection (10:47)
      3. Switch Security Facts
      4. Configuring VLANs from the CLI (4:32)
      5. Explore VLANs from the CLI
      6. Configuring VLANs (3:32)
      7. Explore VLANs
      8. Hardening a Switch (14:10)
      9. Harden a Switch
      10. Secure Access to a Switch
      11. Secure Access to a Switch 2
      12. Practice Questions - Section 7.5
    6. Intrusion Detection and Prevention

      1. Intrusion Detection (7:14)
      2. Detection vs. Prevention Controls (7:50)
      3. IDS Facts
      4. Implementing Intrusion Monitoring (3:33)
      5. Implementing Intrusion Prevention (7:51)
      6. Implement Intrusion Prevention
      7. Practice Questions - Section 7.6
    7. SAN Security

      1. SAN Security Issues (14:32)
      2. Configuring an iSCSI SAN (9:57)
      3. SAN Security Facts
      4. Practice Questions - Section 7.7
  8. HOST DEFENSES

    1. Malware

      1. Malware (9:28)
      2. Malware Facts
      3. Malware Protection Facts
      4. Implementing Malware Protections (23:43)
      5. Using Windows Defender (14:22)
      6. Configure Windows Defender
      7. Practice Questions - Section 8.1
    2. Password Attacks

      1. Password Attacks (2:04)
      2. Password Attack Facts
      3. Using Rainbow Tables (4:48)
      4. Capturing Passwords (5:40)
      5. Practice Questions - Section 8.2
    3. Windows System Hardening

      1. Operating System Hardening (5:13)
      2. Hardening Facts
      3. Hardening an Operating System (6:41)
      4. Managing Automatic Updates (18:31)
      5. Configure Automatic Updates
      6. Configuring Windows Firewall (10:11)
      7. Configure Windows Firewall
      8. Configuring Windows Firewall Advanced Features (16:59)
      9. Configuring Parental Controls (18:21)
      10. Configure Parental Controls
      11. Practice Questions - Section 8.3
    4. Hardening Enforcement

      1. Hardening Enforcement with GPOs (1:50)
      2. Using Security Templates and Group Policy (6:53)
      3. Configuring GPOs to Enforce Security (15:24)
      4. Hardening Enforcement Facts
      5. Manage Services with Group Policy
      6. Practice Questions - Section 8.4
    5. File Server Security

      1. File Server Security (7:58)
      2. Scanning for Open Ports (3:52)
      3. File System Security Facts
      4. File Permission Facts
      5. Configuring NTFS Permissions (14:05)
      6. Configure NTFS Permissions
      7. Disable Inheritance
      8. Practice Questions - Section 8.5
    6. Linux Host Security

      1. Linux Host Security (7:10)
      2. Removing Unneeded Services and Scanning Ports (6:30)
      3. Network Security Facts
      4. Practice Questions - Section 8.6
    7. Static Environment Security

      1. Security Risks in Static Environments (4:26)
      2. Static Environment Security Facts
      3. Practice Questions - Section 8.7
  9. APPLICATION DEFENSES

    1. Web Application Attacks

      1. Web Application Attacks (2:49)
      2. Cross-site Request Forgery (XSRF) Attack (10:51)
      3. Injection Attacks (14:30)
      4. Header Manipulation (9:01)
      5. Zero Day Application Attacks (6:59)
      6. Client Side Attacks (6:22)
      7. Web Application Attack Facts
      8. Preventing Cross-site Scripting (4:05)
      9. Practice Questions - Section 9.1
    2. Internet Browsers

      1. Managing Security Zones and Add-ons (20:26)
      2. Configuring IE Enhanced Security (9:11)
      3. Managing Cookies (12:38)
      4. Configure Cookie Handling
      5. Clearing the Browser Cache (9:28)
      6. Clear the Browser Cache
      7. Implementing Popup Blockers (7:26)
      8. Configure IE Popup Blocker
      9. Internet Explorer Security Facts
      10. Enforcing IE Settings through GPO (12:47)
      11. Enforce IE Settings through GPO
      12. Configure IE Preferences in a GPO
      13. Practice Questions - Section 9.2
    3. E-mail

      1. E-mail Security (4:43)
      2. E-mail Security Facts
      3. Protecting a Client from Spam (10:29)
      4. Securing an E-mail Server (2:45)
      5. Configure E-mail Filters
      6. Securing E-mail on iPad (5:52)
      7. Secure E-mail on iPad
      8. Practice Questions - Section 9.3
    4. Network Applications

      1. Network Application Security (2:19)
      2. Spim (3:43)
      3. Using Peer-to-peer Software (3:04)
      4. Securing Windows Messenger (2:48)
      5. Configuring Application Control Software (9:05)
      6. Network Application Facts
      7. Practice Questions - Section 9.4
    5. Virtualization

      1. Virtualization Introduction (4:01)
      2. Virtualization Benefits (3:08)
      3. Load Balancing with Virtualization (10:40)
      4. Creating Virtual Machines (4:22)
      5. Managing Virtual Machines (5:09)
      6. Create Virtual Machines
      7. Adding Virtual Network Adapters (1:30)
      8. Creating Virtual Switches (3:26)
      9. Create Virtual Switches
      10. Virtualization Facts
      11. Practice Questions - Section 9.5
    6. Application Development

      1. Secure Coding Concepts (16:18)
      2. Application Hardening (11:02)
      3. Application Development Security Facts
      4. Hardening Applications on Linux (4:26)
      5. Implementing Application Whitelisting with AppLocker (13:03)
      6. Implement Application Whitelisting with AppLocker
      7. Implementing Data Execution Preventions (DEP) (4:01)
      8. Implement Data Execution Preventions (DEP)
      9. Hardening Applications Facts
      10. NoSQL Security (5:18)
      11. NoSQL Security Facts
      12. Practice Questions - Section 9.6
  10. DATA DEFENSES

    1. Redundancy

      1. Redundancy (4:55)
      2. Redundancy Measurement Parameters (5:12)
      3. Redundancy Facts
      4. RAID (7:27)
      5. Implementing RAID (6:16)
      6. RAID Facts
      7. Configure Fault Tolerant Volumes
      8. Clustering (9:06)
      9. Clustering Facts
      10. Practice Questions - Section 10.1
    2. Backup and Restore

      1. Backup and Restore (13:27)
      2. Backup and Restore Facts
      3. Backup Management Facts
      4. Backing Up Workstations (6:18)
      5. Back Up a Workstation
      6. Restoring Workstation Data from Backup (2:19)
      7. Back Up a Domain Controller
      8. Restoring Server Data from Backup (2:12)
      9. Practice Questions - Section 10.2
    3. File Encryption

      1. Encrypting File System (EFS) (11:47)
      2. Securing Files using EFS (11:45)
      3. Encrypt Files with EFS
      4. PGP and GPG (4:34)
      5. Encrypting Files with GPG (4:58)
      6. BitLocker and Database Encryption (13:02)
      7. Configuring BitLocker (6:17)
      8. Configure BitLocker with a TPM
      9. File Encryption Facts
      10. Practice Questions - Section 10.3
    4. Secure Protocols

      1. Secure Protocols (8:44)
      2. Secure Protocols 2 (15:26)
      3. Secure Protocols Facts
      4. Adding SSL to a Web Site (5:23)
      5. Allow SSL Connections
      6. IPSec (5:14)
      7. IPSec Facts
      8. Requiring IPSec for Communications (14:22)
      9. Practice Questions - Section 10.4
    5. Cloud Computing

      1. Cloud Computing Introduction (15:59)
      2. Cloud Computing Security Issues (6:32)
      3. Cloud Computing Facts
      4. Practice Questions - Section 10.5
  11. ASSESSMENTS AND AUDITS

    1. Vulnerability Assessment

      1. Vulnerability Assessment (4:55)
      2. Vulnerability Assessment Facts
      3. Scanning a Network with Nessus (18:26)
      4. Scanning a Network with Retina (12:12)
      5. Scanning for Vulnerabilities Using MBSA (6:02)
      6. Review a Vulnerability Scan 1
      7. Review a Vulnerability Scan 2
      8. Review a Vulnerability Scan 3
      9. Performing Port and Ping Scans (2:36)
      10. Checking for Weak Passwords (9:21)
      11. Practice Questions - Section 11.1
    2. Penetration Testing

      1. Penetration Testing (2:32)
      2. Penetration Testing Facts
      3. Exploring Penetration Testing Tools (11:22)
      4. Practice Questions - Section 11.2
    3. Protocol Analyzers

      1. Protocol Analyzers (3:07)
      2. Protocol Analyzer Facts
      3. Analyzing Network Traffic (6:50)
      4. Practice Questions - Section 11.3
    4. Log Management

      1. Logs (3:25)
      2. Log Facts
      3. Logging Events with Event Viewer (3:52)
      4. Windows Event Subscriptions (10:36)
      5. Configuring Source-initiated Subscriptions (4:50)
      6. Configuring Remote Logging on Linux (8:23)
      7. Remote Logging Facts
      8. Practice Questions - Section 11.4
    5. Audits

      1. Audits (3:13)
      2. Audit Facts
      3. Auditing the Windows Security Log (11:41)
      4. Configure Advanced Audit Policy
      5. Auditing Device Logs (6:57)
      6. Enable Device Logs
      7. Practice Questions - Section 11.5
Por el momento no hay fechas Disponibles
Por el momento no hay opiniones sobre el curso
VER TODAS LAS OPINIONES
Por el momento no hay videos sobre el curso
SOLICITAR INFORMES

¿Desea obtener más información?
Mándenos sus datos y comentarios y lo atenderemos con gusto.


INSCRÍBASE AHORA

¿Quiere inscribirse a este curso ?
¡Hágalo ahora mismo usando PayPal*!

Elija las personas, fecha y opción de pago**:


*Si prefiere otra forma de pago, puede utilizar transferencia electrónica o depósito bancario. Contáctenos para ayudarlo con este proceso.

Paseo Virtual de la Plataforma de E-Learning

A continuación se muestra un video para que se familiarice con la plataforma de e-Learning a utilizarse en este curso:

Mecánica para Participar en este Curso en Línea

1
Inscribirse y realizar el pago correspondiente. Puede hacerlo aquí utilizando PayPal o elegir otra forma de pago, como transferencia electrónica, depósito bancario o tarjeta de crédito.
2
Proporcionar sus datos completos para su matriculación así como un correo electrónico válido llenando este formato, al menos 5 días hábiles antes de querer comenzar su curso, para dar tiempo a su matriculación.
3
Recibirá en dicha cuenta de email la información para el acceso al curso en línea, con su usuario, contraseña y el enlace desde el cuál podrá entrar al mismo.
4
Dispondrá de un periodo de 10 meses para poder completar el programa, después del cual recibirá el diploma correspondiente, considerando que haya aprobado cuando menos el 75% de las evaluaciones realizadas.
BUSCADOR DE CURSOS
Publicado en TI | Etiquetado como: seguridad, informatica, curso, cursos, network security, comptia, security+, security plus