Nombre del Curso

SEGURIDAD INFORMÁTICA - SECURITY PRO

  
Objetivo

El curso de Seguridad Informática TestOut Security Pro prepara a los estudiantes para el examen de certificación TestOut Security Pro y el examen de certificación CompTIA Security + SY0-401. Los estudiantes aprenden cómo proteger una red corporativa usando un modelo de seguridad en capas.

Beneficios

Aprobado por CompTIA

TestOut Security Pro posee contenido de calidad aprobado por CompTIA y se ha verificado que cubre el 100 % de los objetivos del examen de certificación CompTIA Security+ SY0-401.

Simulaciones de la vida real

LabSim imita $35 000 USD en hardware y software informático y desafía a los estudiantes con escenarios del mundo real. Los estudiantes que completan el curso están preparados con el conocimiento y las habilidades que necesitan para ser un exitoso administrador de seguridad de TI.

Enfoque de seguridad en capas

TestOut Security Pro enseña a los estudiantes cómo proteger correctamente una red usando un modelo de seguridad en capas. Los estudiantes aprenden y luego construyen una red segura, comenzando por medidas de seguridad física y progresando hasta las defensas de datos, al igual que harían en el trabajo.

Múltiples sistemas operativos

Durante el curso, los estudiantes adquieren experiencia con múltiples sistemas operativos e interfaces como Windows 7 Ultimate, Windows Server 2012 R2 Datacenter, iOS, Cisco CLI (enrutadores y conmutadores), Cisco Net Security Appliance y Linux CLI.

Exámenes ilimitados de práctica de certificación

TestOut Security Pro incluye exámenes de práctica para el examen de certificación TestOut Security Pro y el examen de certificación CompTIA Security+ SY0-401. Los estudiantes pueden adquirir confianza y habilidades de prueba al practicar todas las veces que lo deseen.

Dirigido A

Este curso de Seguridad Informática va dirigido a toda persona que quiera obtener la certificación CompTIA Security+ SY0-401 o que busque convertirse en un especialista en seguridad, para desempeñar mejor sus funciones como administrador o encargado de sistemas de TI.

Temario

Temario del Curso de Seguridad Informática Security Pro

 

  1. INTRODUCTION

    1. Security Overview

      1. Security Challenges (8:22)
      2. Security Roles and Concepts (5:37)
      3. Threat Agent Types (8:20)
      4. Security Introduction
      5. General Attack Strategy (8:51)
      6. General Defense Strategy (18:25)
      7. Attack and Defense Strategy Overview
      8. Practice Questions - Section 1.1
    2. Using the Simulator

      1. Using the Simulator (13:19)
      2. Configure a Security Appliance
      3. Install a Security Appliance

  2. ACCESS CONTROL AND IDENTITY MANAGEMENT

    1. Access Control Models

      1. Access Control Models (3:38)
      2. Access Control Facts
      3. Access Control Model Facts
      4. Access Control Model Examples
      5. Implementing Discretionary Access Control (6:09)
      6. Practice Questions - Section 2.1
    2. Authentication

      1. Authentication Part 1 (11:26)
      2. Authentication Part 2 (8:53)
      3. Authentication Facts
      4. Using a Biometric Scanner (3:49)
      5. Using Single Sign-on (12:20)
      6. Single Sign-on Facts
      7. Practice Questions - Section 2.2
    3. Authorization

      1. Authorization (5:15)
      2. Cumulative Access (9:32)
      3. Authorization Facts
      4. Examining the Access Token (9:08)
      5. Practice Questions - Section 2.3
    4. Access Control Best Practices

      1. Access Control Best Practices (3:12)
      2. Viewing Implicit Deny (10:13)
      3. Best Practices Facts
      4. Practice Questions - Section 2.4
    5. Active Directory Overview

      1. Active Directory Introduction (9:04)
      2. Active Directory Structure (9:25)
      3. Viewing Active Directory (8:05)
      4. Active Directory Facts
      5. Practice Questions - Section 2.5
    6. Windows Domain Users and Groups

      1. Creating User Accounts (4:50)
      2. Managing User Account Properties (7:45)
      3. Create User Accounts
      4. Manage User Accounts
      5. Managing Groups (5:05)
      6. Create a Group
      7. Create Global Groups
      8. User Account Management Facts
      9. Practice Questions - Section 2.6
    7. Linux Users

      1. Linux User and Group Overview (19:14)
      2. Managing Linux Users (9:28)
      3. Linux User Commands and Files
      4. Create a User Account
      5. Rename a User Account
      6. Delete a User
      7. Change Your Password
      8. Change a User´s Password
      9. Lock and Unlock User Accounts
      10. Practice Questions - Section 2.7
    8. Linux Groups

      1. Managing Linux Groups (3:15)
      2. Linux Group Commands
      3. Rename and Create Groups
      4. Add Users to a Group
      5. Remove a User from a Group
      6. Practice Questions - Section 2.8
    9. Linux User Security

      1. Linux User Security and Restrictions (9:53)
      2. Configuring Linux User Security and Restrictions (6:40)
      3. Linux User Security and Restriction Facts
      4. Practice Questions - Section 2.9
    10. Group Policy Overview

      1. Group Policy Overview (8:41)
      2. Viewing Group Policy (14:31)
      3. Group Policy Facts
      4. Create and Link a GPO
      5. Practice Questions - Section 2.10
    11. Hardening Authentication 1

      1. Hardening Authentication (19:31)
      2. Configuring User Account Restrictions (9:30)
      3. Configure User Account Restrictions
      4. Configuring Account Policies and UAC Settings (14:18)
      5. Configure Account Policies
      6. Hardening User Accounts (10:20)
      7. Restrict Local Accounts
      8. Secure Default Accounts
      9. Enforce User Account Control
      10. Hardening Authentication Facts
      11. Practice Questions - Section 2.11
    12. Hardening Authentication 2

      1. Configuring Smart Card Authentication (6:20)
      2. Configure Smart Card Authentication
      3. Smart Card Authentication Facts
      4. Using Fine-Grained Password Policies (7:00)
      5. Fine-Grained Password Policy Facts
      6. Create a Fine-Grained Password Policy
      7. Practice Questions - Section 2.12
    13. Remote Access

      1. Remote Access (8:44)
      2. Remote Access Facts
      3. RADIUS and TACACS+ (6:52)
      4. RADIUS and TACACS+ Facts
      5. Practice Questions - Section 2.13
    14. Network Authentication

      1. Network Authentication Protocols (14:09)
      2. Network Authentication via LDAP (10:31)
      3. Network Authentication Facts
      4. Controlling the Authentication Method (6:39)
      5. Configure Kerberos Policy Settings
      6. Browsing a Directory Tree via LDAP (6:38)
      7. Trusts and Transitive Access (5:34)
      8. Trusts and Transitive Access Facts
      9. Credential Management (10:06)
      10. Credential Management Facts
      11. Practice Questions - Section 2.14
    15. Identity Management

      1. Identity Management (16:31)
      2. Identity Management Facts
      3. Practice Questions - Section 2.15

  3. CRYPTOGRAPHY

    1. Cryptography

      1. Cryptography Concepts (4:30)
      2. Cryptography Facts
      3. Cryptographic Attacks (17:48)
      4. Cryptographic Attack Facts
      5. Practice Questions - Section 3.1
    2. Hashing

      1. Hashing (11:31)
      2. Hashing Facts
      3. Using Hashes (7:43)
      4. Practice Questions - Section 3.2
    3. Symmetric Encryption

      1. Symmetric Encryption (5:27)
      2. HMAC (6:14)
      3. Symmetric Encryption Facts
      4. Cracking a Symmetric Encryption Key (4:11)
      5. Practice Questions - Section 3.3
    4. Asymmetric Encryption

      1. Asymmetric Encryption (8:14)
      2. Asymmetric Encryption Facts
      3. Practice Questions - Section 3.4
    5. Public Key Infrastructure (PKI)

      1. Certificates (11:02)
      2. Managing Certificates (14:45)
      3. Manage Certificates
      4. Certificate Lifecycle Facts
      5. CA Implementation (5:17)
      6. Configuring a Subordinate CA (14:13)
      7. PKI Management Facts
      8. Practice Questions - Section 3.5
    6. Cryptography Implementations

      1. Combining Cryptographic Methods (10:30)
      2. Hardware Based Encryption Devices (7:13)
      3. Cryptographic Implementation Facts
      4. Practice Questions - Section 3.6

  4. POLICIES, PROCEDURES, AND AWARENESS

    1. Security Policies

      1. Security Policies (7:23)
      2. Data Privacy Laws (9:43)
      3. Security Policy Facts
      4. Security Documentation Facts
      5. Security Management Facts
      6. Information Classification (5:40)
      7. Information Classification Facts
      8. Data Retention Policies (11:40)
      9. Wiping a Hard Drive (12:58)
      10. Data Retention Facts
      11. Practice Questions - Section 4.1
    2. Manageable Network Plan

      1. Manageable Network Plan (16:49)
      2. Manageable Network Plan 2 (14:05)
      3. Manageable Network Plan Facts
      4. Practice Questions - Section 4.2
    3. Business Continuity

      1. Business Continuity (2:39)
      2. Succession Planning (5:23)
      3. Business Continuity Facts
      4. Practice Questions - Section 4.3
    4. Risk Management

      1. Risk Management (4:04)
      2. Security Controls (3:21)
      3. Data Loss Prevention (DLP) (4:57)
      4. Risk Management Facts
      5. Practice Questions - Section 4.4
    5. Incident Response

      1. First Responder (7:17)
      2. Basic Forensic Procedures (18:31)
      3. Using Forensic Tools (6:17)
      4. Creating a Forensic Drive Image (10:00)
      5. Incident Response Facts
      6. Forensic Investigation Facts
      7. Practice Questions - Section 4.5
    6. Social Engineering

      1. Social Engineering (4:40)
      2. Phishing Variations (13:04)
      3. Social Engineering Facts
      4. Investigating a Social Engineering Attack (9:45)
      5. Respond to Social Engineering
      6. Practice Questions - Section 4.6
    7. Certification and Accreditation

      1. Trusted Computing (10:01)
      2. Certification and Accreditation (4:46)
      3. Certification and Accreditation Facts
      4. Practice Questions - Section 4.7
    8. Development

      1. System Development Life Cycle (8:40)
      2. System Development Life Cycle 2 (7:49)
      3. SDLC Facts
      4. Software Development Models
      5. Practice Questions - Section 4.8
    9. Employee Management

      1. Employment Practices (13:45)
      2. Employee Management Facts
      3. Employee Documents Facts
      4. Ethics Facts
      5. Practice Questions - Section 4.9
    10. Third-Party Integration

      1. Third-Party Integration Security Issues (11:24)
      2. Third-Party Integration Security Facts
      3. Practice Questions - Section 4.10

  5. PHYSICAL SECURITY

    1. Physical Security

      1. Physical Security (18:39)
      2. Tailgating and Piggybacking (3:28)
      3. Physical Security Facts
      4. Hardware Security
      5. Hardware Security Guidelines (7:50)
      6. Breaking into a System (7:30)
      7. Hardware Security Facts
      8. Practice Questions - Section 5.2
    2. Environmental Controls

      1. Environmental Controls (6:00)
      2. Environmental Monitoring (11:33)
      3. Hot and Cold Aisles (5:17)
      4. Environmental Control Facts
      5. Fire Protection Facts
      6. Practice Questions - Section 5.3
    3. Mobile Devices

      1. Mobile Device Security (7:34)
      2. Mobile Device Security Facts
      3. BYOD Security Issues (9:33)
      4. BYOD Security Facts
      5. Securing Mobile Devices (10:20)
      6. Secure an iPad
      7. Practice Questions - Section 5.4
    4. Mobile Device Security Enforcement

      1. Enforcing Security Policies on Mobile Devices (7:57)
      2. Enrolling Devices and Performing a Remote Wipe (8:49)
      3. Mobile Device Security Enforcement Facts
      4. Mobile Application Security (9:00)
      5. Mobile Application Security Facts
      6. Practice Questions - Section 5.5
    5. Telephony

      1. Telephony (15:00)
      2. Telephony Security Facts
      3. Practice Questions - Section 5.6

  6. PERIMETER DEFENSES

    1. Network Layer Protocol Review

      1. OSI Model (4:08)
      2. OSI Model Facts
      3. IP Addressing (17:22)
      4. IP Address Facts
      5. Configuring IPv6 (5:28)
      6. IP Subnetting (12:35)
      7. Configuring Subnetting (8:07)
      8. Subnetting Facts
      9. Practice Questions - Section 6.1
    2. Transport Layer Protocol Review

      1. Network Protocols (4:45)
      2. Network Protocol Facts
      3. Analyzing a TCP Three-way Handshake (2:14)
      4. TCP and UDP Ports (9:02)
      5. Common Ports
      6. Practice Questions - Section 6.2
    3. Perimeter Attacks 1

      1. Reconnaissance (2:40)
      2. Performing Reconnaissance (9:01)
      3. Reconnaissance Facts
      4. Denial of Service (DoS) (7:49)
      5. Xmas Tree Attacks (3:23)
      6. DoS Attack Facts
      7. Performing a UDP Flood Attack (3:54)
      8. Practice Questions - Section 6.3
    4. Perimeter Attacks 2

      1. Session and Spoofing Attacks (6:41)
      2. Session Based Attack Facts
      3. Performing ARP Poisoning (4:24)
      4. Spoofing Facts
      5. DNS Attacks (4:30)
      6. DNS Attack Facts
      7. Examining DNS Attacks (13:29)
      8. Prevent Zone Transfers
      9. Practice Questions - Section 6.4
    5. Security Appliances

      1. Security Solutions (4:02)
      2. Security Zones (5:32)
      3. Security Zone Facts
      4. All-In-One Security Appliances (4:30)
      5. Security Solution Facts
      6. Configuring Network Security Appliance Access (6:55)
      7. Configure Network Security Appliance Access
      8. Practice Questions - Section 6.5
    6. Demilitarized Zones (DMZ)

      1. Demilitarized Zones (9:49)
      2. Configuring a DMZ (5:42)
      3. Configure a DMZ
      4. DMZ Facts
      5. Practice Questions - Section 6.6
    7. Firewalls

      1. Firewalls (5:33)
      2. Firewall Facts
      3. Configuring a Perimeter Firewall (9:47)
      4. Configure a Perimeter Firewall
      5. Practice Questions - Section 6.7
    8. Network Address  Translation (NAT)

      1. Network Address Translation (15:57)
      2. Configuring NAT (5:11)
      3. NAT Facts
      4. Practice Questions - Section 6.8
    9. Virtual Private Networks (VPN)

      1. Virtual Private Networks (VPNs) (10:16)
      2. Configuring a VPN (4:25)
      3. Configure a Remote Access VPN
      4. Configure a VPN Connection iPad
      5. VPN Facts
      6. VPN Protocol Facts
      7. Practice Questions - Section 6.9
    10. Web Threat Protection

      1. Web Threat Protection (9:29)
      2. Configuring Web Threat Protection (4:26)
      3. Configure Web Threat Protection
      4. Web Threat Protection Facts
      5. Practice Questions - Section 6.10
    11. Network Access  Control (NAC)

      1. Network Access Protection (19:58)
      2. Implementing NAP with DHCP Enforcement (15:56)
      3. NAP Facts
      4. Practice Questions - Section 6.11
    12. Wireless Overview

      1. Wireless Networking Overview (5:35)
      2. Wireless Antenna Types (8:03)
      3. Wireless Networking Facts
      4. Wireless Encryption (6:46)
      5. Wireless Encryption Facts
      6. Configuring a Wireless Connection (12:22)
      7. Secure a Wireless Network
      8. Practice Questions - Section 6.12
    13. Wireless Attacks

      1. Wireless Attacks (13:29)
      2. Wireless Attack Facts
      3. Using Wireless Attack Tools (9:06)
      4. Detecting Rogue Hosts (7:37)
      5. Practice Questions - Section 6.13
    14. Wireless Defenses

      1. Wireless Security Considerations (12:54)
      2. Wireless Authentication (4:40)
      3. Wireless Authentication Facts
      4. Configuring a Wireless Access Point (19:54)
      5. Obscure a Wireless Network
      6. Configure a Wireless Profile
      7. Configuring a Captive Portal (12:02)
      8. Wireless Security Facts
      9. Practice Questions - Section 6.14

  7. NETWORK DEFENSES

    1. Network Devices

      1. Network Devices (5:51)
      2. Network Device Facts
      3. Practice Questions - Section 7.1
    2. Network Device Vulnerabilities

      1. Device Vulnerabilities (1:47)
      2. Device Vulnerability Facts
      3. Searching Defaultpasswords.com (1:23)
      4. Securing a Switch (3:21)
      5. Secure a Switch
      6. Practice Questions - Section 7.2
    3. Switch Attacks

      1. Switch Attacks (5:04)
      2. Switch Attack Facts
      3. Practice Questions - Section 7.3
    4. Router Security

      1. Router Security (8:57)
      2. Router Security Facts
      3. Practice Questions - Section 7.4
    5. Switch Security

      1. Switch Security (13:01)
      2. Switch Loop Protection (10:47)
      3. Switch Security Facts
      4. Configuring VLANs from the CLI (4:32)
      5. Explore VLANs from the CLI
      6. Configuring VLANs (3:32)
      7. Explore VLANs
      8. Hardening a Switch (14:10)
      9. Harden a Switch
      10. Secure Access to a Switch
      11. Secure Access to a Switch 2
      12. Practice Questions - Section 7.5
    6. Intrusion Detection and Prevention

      1. Intrusion Detection (7:14)
      2. Detection vs. Prevention Controls (7:50)
      3. IDS Facts
      4. Implementing Intrusion Monitoring (3:33)
      5. Implementing Intrusion Prevention (7:51)
      6. Implement Intrusion Prevention
      7. Practice Questions - Section 7.6
    7. SAN Security

      1. SAN Security Issues (14:32)
      2. Configuring an iSCSI SAN (9:57)
      3. SAN Security Facts
      4. Practice Questions - Section 7.7

  8. HOST DEFENSES

    1. Malware

      1. Malware (9:28)
      2. Malware Facts
      3. Malware Protection Facts
      4. Implementing Malware Protections (23:43)
      5. Using Windows Defender (14:22)
      6. Configure Windows Defender
      7. Practice Questions - Section 8.1
    2. Password Attacks

      1. Password Attacks (2:04)
      2. Password Attack Facts
      3. Using Rainbow Tables (4:48)
      4. Capturing Passwords (5:40)
      5. Practice Questions - Section 8.2
    3. Windows System Hardening

      1. Operating System Hardening (5:13)
      2. Hardening Facts
      3. Hardening an Operating System (6:41)
      4. Managing Automatic Updates (18:31)
      5. Configure Automatic Updates
      6. Configuring Windows Firewall (10:11)
      7. Configure Windows Firewall
      8. Configuring Windows Firewall Advanced Features (16:59)
      9. Configuring Parental Controls (18:21)
      10. Configure Parental Controls
      11. Practice Questions - Section 8.3
    4. Hardening Enforcement

      1. Hardening Enforcement with GPOs (1:50)
      2. Using Security Templates and Group Policy (6:53)
      3. Configuring GPOs to Enforce Security (15:24)
      4. Hardening Enforcement Facts
      5. Manage Services with Group Policy
      6. Practice Questions - Section 8.4
    5. File Server Security

      1. File Server Security (7:58)
      2. Scanning for Open Ports (3:52)
      3. File System Security Facts
      4. File Permission Facts
      5. Configuring NTFS Permissions (14:05)
      6. Configure NTFS Permissions
      7. Disable Inheritance
      8. Practice Questions - Section 8.5
    6. Linux Host Security

      1. Linux Host Security (7:10)
      2. Removing Unneeded Services and Scanning Ports (6:30)
      3. Network Security Facts
      4. Practice Questions - Section 8.6
    7. Static Environment Security

      1. Security Risks in Static Environments (4:26)
      2. Static Environment Security Facts
      3. Practice Questions - Section 8.7

  9. APPLICATION DEFENSES

    1. Web Application Attacks

      1. Web Application Attacks (2:49)
      2. Cross-site Request Forgery (XSRF) Attack (10:51)
      3. Injection Attacks (14:30)
      4. Header Manipulation (9:01)
      5. Zero Day Application Attacks (6:59)
      6. Client Side Attacks (6:22)
      7. Web Application Attack Facts
      8. Preventing Cross-site Scripting (4:05)
      9. Practice Questions - Section 9.1
    2. Internet Browsers

      1. Managing Security Zones and Add-ons (20:26)
      2. Configuring IE Enhanced Security (9:11)
      3. Managing Cookies (12:38)
      4. Configure Cookie Handling
      5. Clearing the Browser Cache (9:28)
      6. Clear the Browser Cache
      7. Implementing Popup Blockers (7:26)
      8. Configure IE Popup Blocker
      9. Internet Explorer Security Facts
      10. Enforcing IE Settings through GPO (12:47)
      11. Enforce IE Settings through GPO
      12. Configure IE Preferences in a GPO
      13. Practice Questions - Section 9.2
    3. E-mail

      1. E-mail Security (4:43)
      2. E-mail Security Facts
      3. Protecting a Client from Spam (10:29)
      4. Securing an E-mail Server (2:45)
      5. Configure E-mail Filters
      6. Securing E-mail on iPad (5:52)
      7. Secure E-mail on iPad
      8. Practice Questions - Section 9.3
    4. Network Applications

      1. Network Application Security (2:19)
      2. Spim (3:43)
      3. Using Peer-to-peer Software (3:04)
      4. Securing Windows Messenger (2:48)
      5. Configuring Application Control Software (9:05)
      6. Network Application Facts
      7. Practice Questions - Section 9.4
    5. Virtualization

      1. Virtualization Introduction (4:01)
      2. Virtualization Benefits (3:08)
      3. Load Balancing with Virtualization (10:40)
      4. Creating Virtual Machines (4:22)
      5. Managing Virtual Machines (5:09)
      6. Create Virtual Machines
      7. Adding Virtual Network Adapters (1:30)
      8. Creating Virtual Switches (3:26)
      9. Create Virtual Switches
      10. Virtualization Facts
      11. Practice Questions - Section 9.5
    6. Application Development

      1. Secure Coding Concepts (16:18)
      2. Application Hardening (11:02)
      3. Application Development Security Facts
      4. Hardening Applications on Linux (4:26)
      5. Implementing Application Whitelisting with AppLocker (13:03)
      6. Implement Application Whitelisting with AppLocker
      7. Implementing Data Execution Preventions (DEP) (4:01)
      8. Implement Data Execution Preventions (DEP)
      9. Hardening Applications Facts
      10. NoSQL Security (5:18)
      11. NoSQL Security Facts
      12. Practice Questions - Section 9.6

  10. DATA DEFENSES

    1. Redundancy

      1. Redundancy (4:55)
      2. Redundancy Measurement Parameters (5:12)
      3. Redundancy Facts
      4. RAID (7:27)
      5. Implementing RAID (6:16)
      6. RAID Facts
      7. Configure Fault Tolerant Volumes
      8. Clustering (9:06)
      9. Clustering Facts
      10. Practice Questions - Section 10.1
    2. Backup and Restore

      1. Backup and Restore (13:27)
      2. Backup and Restore Facts
      3. Backup Management Facts
      4. Backing Up Workstations (6:18)
      5. Back Up a Workstation
      6. Restoring Workstation Data from Backup (2:19)
      7. Back Up a Domain Controller
      8. Restoring Server Data from Backup (2:12)
      9. Practice Questions - Section 10.2
    3. File Encryption

      1. Encrypting File System (EFS) (11:47)
      2. Securing Files using EFS (11:45)
      3. Encrypt Files with EFS
      4. PGP and GPG (4:34)
      5. Encrypting Files with GPG (4:58)
      6. BitLocker and Database Encryption (13:02)
      7. Configuring BitLocker (6:17)
      8. Configure BitLocker with a TPM
      9. File Encryption Facts
      10. Practice Questions - Section 10.3
    4. Secure Protocols

      1. Secure Protocols (8:44)
      2. Secure Protocols 2 (15:26)
      3. Secure Protocols Facts
      4. Adding SSL to a Web Site (5:23)
      5. Allow SSL Connections
      6. IPSec (5:14)
      7. IPSec Facts
      8. Requiring IPSec for Communications (14:22)
      9. Practice Questions - Section 10.4
    5. Cloud Computing

      1. Cloud Computing Introduction (15:59)
      2. Cloud Computing Security Issues (6:32)
      3. Cloud Computing Facts
      4. Practice Questions - Section 10.5

  11. ASSESSMENTS AND AUDITS

    1. Vulnerability Assessment

      1. Vulnerability Assessment (4:55)
      2. Vulnerability Assessment Facts
      3. Scanning a Network with Nessus (18:26)
      4. Scanning a Network with Retina (12:12)
      5. Scanning for Vulnerabilities Using MBSA (6:02)
      6. Review a Vulnerability Scan 1
      7. Review a Vulnerability Scan 2
      8. Review a Vulnerability Scan 3
      9. Performing Port and Ping Scans (2:36)
      10. Checking for Weak Passwords (9:21)
      11. Practice Questions - Section 11.1
    2. Penetration Testing

      1. Penetration Testing (2:32)
      2. Penetration Testing Facts
      3. Exploring Penetration Testing Tools (11:22)
      4. Practice Questions - Section 11.2
    3. Protocol Analyzers

      1. Protocol Analyzers (3:07)
      2. Protocol Analyzer Facts
      3. Analyzing Network Traffic (6:50)
      4. Practice Questions - Section 11.3
    4. Log Management

      1. Logs (3:25)
      2. Log Facts
      3. Logging Events with Event Viewer (3:52)
      4. Windows Event Subscriptions (10:36)
      5. Configuring Source-initiated Subscriptions (4:50)
      6. Configuring Remote Logging on Linux (8:23)
      7. Remote Logging Facts
      8. Practice Questions - Section 11.4
    5. Audits

      1. Audits (3:13)
      2. Audit Facts
      3. Auditing the Windows Security Log (11:41)
      4. Configure Advanced Audit Policy
      5. Auditing Device Logs (6:57)
      6. Enable Device Logs
      7. Practice Questions - Section 11.5
Duración:
México, DF
90 HRS.
Inversión:
$8,699.00 + IVA
Modalidad:
En Línea
Formato de Contacto
¿Desea obtener más información? Mándenos sus datos y comentarios y lo atenderemos con gusto.





Acepto términos y condiciones. Ver Aviso de Privacidad

Inscríbase Ahora o Aparte su Lugar
¿Quiere inscribirse a este curso? ¡Hágalo ahora mismo usando PayPal*!

Elija el número de participantes:



Clave de descuento:

*Si prefiere otra forma de pago, puede utilizar tarjeta de crédito, transferencia electrónica o depósito bancario. Contáctenos para ayudarlo con este proceso.
** Antes de realizar su pago verifique por favor con un ejecutivo si se abrirá la fecha seleccionada.
Paseo Virtual de la Plataforma de E-Learning
A continuación se muestra un video para que se familiarice con la plataforma de e-Learning a utilizarse en este curso:

Mecánica para Participar en este Curso en Línea
1
Inscribirse y realizar el pago correspondiente. Puede hacerlo aquí utilizando PayPal o elegir otra forma de pago, como transferencia electrónica, depósito bancario o tarjeta de crédito.
2
Proporcionar sus datos completos para su matriculación así como un correo electrónico válido llenando este formato, al menos 5 días hábiles antes de querer comenzar su curso, para dar tiempo a su matriculación.
3
Recibirá en dicha cuenta de email la información para el acceso al curso en línea, con su usuario, contraseña y el enlace desde el cuál podrá entrar al mismo.
4
Dispondrá de un periodo de 10 meses para poder completar el programa, después del cual recibirá el diploma correspondiente, considerando que haya aprobado cuando menos el 75% de las evaluaciones realizadas.
Publicado en TI | Etiquetado como: seguridad, informatica, curso, cursos, network security, comptia, security+, security plus.