IT Security Expert
(ITSEC-EXP.AA1) / ISBN : 978-1-64459-555-8
Über diesen Kurs
Der Kurs „IT Security Expert“ ist ein fortgeschrittenes Schulungsprogramm, das Fachleuten fundiertes Wissen und praktische Fähigkeiten im Bereich Cybersicherheit vermitteln soll. Dieser Kurs behandelt Themen wie Penetrationstests, Reaktion auf Vorfälle, Kryptografie und erweiterte Bedrohungserkennung und bereitet Teilnehmer darauf vor, komplexe Sicherheitsherausforderungen in der sich entwickelnden Bedrohungslandschaft von heute anzugehen. In praktischen Übungen und unter Anleitung von Experten erwerben die Teilnehmer das erforderliche Fachwissen, um Organisationen vor komplexen Cyberbedrohungen zu schützen und Sicherheitsrisiken wirksam zu minimieren.
Fähigkeiten, die Sie erwerben werden
Holen Sie sich die Unterstützung, die Sie brauchen. Melden Sie sich für unseren Kurs mit Lehrer an.
Unterricht
15+ Unterricht | 266+ Übungen | 100+ Tests | 133+ Karteikarten | 133+ Glossar der Begriffe
Testvorbereitung
90+ Fragen vor der Beurteilung | 2+ Ausführliche Tests | 120+ Testfragen zur Praxis
Praktische Übungen
36+ LiveLab | 35+ Videoanleitungen | 01:29+ Hours
Key topics
Prepares for Certifications Exams
uCertify IT Security Expert
The uCertify IT Security Expert certification validates expertise in safeguarding digital assets against cyber threats and implementing effective security measures. It demonstrates proficiency in identifying vulnerabilities and developing strategies to protect data integrity and confidentiality.
View more!CompTIA Security+ Certification Training
CompTIA Security+ exam validates foundational cybersecurity skills through a comprehensive assessment covering network security, compliance, threats, and access control, crucial for pursuing IT security careers.
View more!Introduction
- What Is the Security Expert Certification?
Security fundamentals
- Module A: Security concepts
- Module B: Understanding threats
- Module C: Enterprise security strategy
- Summary
Risk management
- Module A: Risk management programs
- Module B: Security audits
- Module C: Conducting security assessments
- Summary
Organizational security
- Module A: Social engineering
- Module B: Security policies
- Module C: User roles and training
- Summary
Cryptography
- Module A: Cryptography concepts
- Module B: Public key infrastructure
- Summary
Network connectivity
- Module A: Network attacks
- Module B: Packet flow
- Summary
Secure network configuration
- Module A: Network security components
- Module B: Secure network protocols
- Module C: Hardening networks
- Summary
Authentication
- Module A: Authentication factors
- Module B: Authentication protocols
- Summary
Access control
- Module A: Access control principles
- Module B: Account management
- Summary
Enterprise architecture
- Module A: System vulnerabilities
- Module B: System architecture
- Summary
Secure assets
- Module A: Physical security and safety
- Module B: Securing data
- Summary
Securing specialized systems
- Module A: Securing hosts
- Module B: Mobile security
- Summary
Secure applications
- Module A: Application attacks
- Module B: Securing applications
- Summary
Disaster planning and recovery
- Module A: Secure operations
- Module B: Resilience and recovery
- Summary
Threat detection and response
- Module A: Security monitoring
- Module B: Incident response procedures
- Summary
Risk management
- Gathering Site Information
- Footprinting a Website
Organizational security
- Using Anti-phishing Tools
Cryptography
- Using Symmetric Encryption
- Creating Asymmetric Key Pairs
- Creating File Hashes
- Examining PKI Certificates
- Creating Certificates with OpenSSL
Network connectivity
- Launching a DoS Attack
- Capturing Credentials On-path
- Cracking Passwords
- Using Uncomplicated Firewall in Linux
- Configuring a Network Firewall
Secure network configuration
- Requesting PKI Certificates
- Securing a Wi-Fi Hotspot
- Scanning the Network
Authentication
- Installing a RADIUS Server
- Examining Kerberos Settings
- Examining Active Directory Objects
Access control
- Delegating Control in Active Directory
- Enforcing Password Policies
- Creating a Windows Domain User
- Creating Linux Users and Groups
Enterprise architecture
- Examining Spyware
- Detecting Virtualization
Secure assets
- Assigning NTFS Permissions
Securing specialized systems
- Creating a Security Template
- Enforcing a Security Template
Secure applications
- Exploiting an Overflow Vulnerability
- Exploiting a TOCTOU Vulnerability
- Performing SQL Injection in DVWA
- Performing an XSS Attack in DVWA
- Examining Application Vulnerabilities
Disaster planning and recovery
- Scheduling a Server Backup
Threat detection and response
- Viewing Windows Event Logs
- Viewing Linux Event Logs
Haben Sie Fragen? Schauen Sie sich die FAQs an
Sie haben noch unbeantwortete Fragen und möchten Kontakt aufnehmen?
Kontaktiere uns jetztuCertify
Multiple-Choice-Fragen
Die Prüfung umfasst 40 Fragen.
80 Minuten
700