Get $1 credit for every $25 spent!

The 2018 CompTIA Security Certification Bundle: Lifetime Access

Courses
3
Lessons
220
Enrolled
1,563

What's Included

Product Details

Access
Lifetime
Content
20 hours
Lessons
76

CompTIA Security+ SY0-501

Study to Pass One of the Most Important IT Certifications on Earth

By iCollege | in Online Courses

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

  • Access 76 lectures & 20 hours of content 24/7
  • Cover the essential principles for network security & risk management
  • Explore types of threats, attacks, & vulnerabilities
  • Discover networking technologies & tools
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Module 1 - Threats, Attacks, and Vulnerabilities
    • 1.1 Introduction
    • 1.2 Types Of Malware - Part 1
    • 1.3 Types Of Malware - Part 2
    • 1.4 Types Of Attacks - Part 1
    • 1.5 Types Of Attacks - Part 2
    • 1.6 Types Of Attacks - Part 3
    • 1.7 Types Of Attacks - Part 4
    • 1.8 Types Of Attacks - Part 5
    • 1.9 Threat Actors - Part 1
    • 1.10 Threat Actors - Part 2
    • 1.11 Penetration Testing And Vulnerability Scanning - Part 1
    • 1.12 Penetration Testing And Vulnerability Scanning - Part 2
    • 1.13 Impact Of Vulnerabilities - Part 1
    • 1.14 Impact Of Vulnerabilities - Part 2
  • Module 2 - Technologies and Tools
    • 2.1 Networking Hardware And Software - Part 1
    • 2.2 Networking Hardware And Software - Part 2
    • 2.3 Networking Hardware And Software - Part 3
    • 2.4 Networking Hardware And Software - Part 4
    • 2.5 Networking Hardware And Software - Part 5
    • 2.6 Networking Hardware And Software - Part 6
    • 2.7 Security Assessment - Part 1
    • 2.8 Security Assessment - Part 2
    • 2.9 Troubleshooting Issues - Part 1
    • 2.10 Troubleshooting Issues - Part 2
    • 2.11 Securing Mobile Devices - Part 1
    • 2.12 Securing Mobile Devices - Part 2
    • 2.13 Securing Mobile Devices - Part 3
    • 2.14 Securing Mobile Devices - Part 4
    • 2.15 Secure Protocols - Part 1
    • 2.16 Secure Protocols - Part 2
  • Module 3 - Architecture and Design
    • 3.1 Secure Network Architecture - Part 1
    • 3.2 Secure Network Architecture - Part 2
    • 3.3 Secure System Designs - Part 1
    • 3.4 Secure System Designs - Part 2
    • 3.5 Secure Staging Deployment Concepts
    • 3.6 Embedded Systems - Part 1
    • 3.7 Embedded Systems - Part 2
    • 3.8 Application Development And Deployment - Part 1
    • 3.9 Application Development And Deployment - Part 2
    • 3.10 Application Development And Deployment - Part 3
    • 3.11 Physical Security Controls - Part 1
    • 3.12 Physical Security Controls - Part 2
    • 3.13 Physical Security Controls - Part 3
    • 3.14 Cloud Virtualization - Part 1
    • 3.15 Cloud Virtualization - Part 2
  • Module 4 - Identity and Access Management
    • 4.1 Identity And Access Management - Part 1
    • 4.2 Identity And Access Management - Part 2
    • 4.3 Identity And Access Services - Part 1
    • 4.4 Identity And Access Services - Part 2
    • 4.5 Management Controls - Part 1
    • 4.6 Management Controls - Part 2
    • 4.7 Account Management Practices - Part 1
    • 4.8 Account Management Practices - Part 2
    • 4.9 Account Management Practices - Part 3
  • Module 5 - Risk Management
    • 5.1 Organizational Security - Part 1
    • 5.2 Organizational Security - Part 2
    • 5.3 Business Impact Analysis Concepts - Part 1
    • 5.4 Business Impact Analysis Concepts - Part 2
    • 5.5 Risk Management - Part 1
    • 5.6 Risk Management - Part 2
    • 5.7 Incident Response Procedures - Part 1
    • 5.8 Incident Response Procedures - Part 2
    • 5.9 Forensics - Part 1
    • 5.10 Forensics - Part 2
    • 5.11 Disaster Recovery - Part 1
    • 5.12 Disaster Recovery - Part 2
    • 5.13 Types Of Control - Part 1
    • 5.14 Types Of Control - Part 2
    • 5.15 Data Security And Privacy Practices - Part 1
    • 5.16 Data Security And Privacy Practices - Part 2
  • Module 6 - Cryptography and PKI
    • 6.1 Cryptographic Basics - Part 1
    • 6.2 Cryptographic Basics - Part 2
    • 6.3 Cryptographic Basics - Part 3
    • 6.4 Cryptographic Algorithms - Part 1
    • 6.5 Cryptographic Algorithms - Part 2
    • 6.6 Wireless Security - Part 1
    • 6.7 Wireless Security - Part 2
    • 6.8 Implementing PKI - Part 1
    • 6.9 Implementing PKI - Part 2
    • 6.10 Implementing PKI - Part 3
    • 6.11 Conclusion

View Full Curriculum


Access
Lifetime
Content
18 hours
Lessons
70

CompTIA CSA+

Study to Pass the CompTIA CSA+ Certification Exam

By iCollege | in Online Courses

CompTIA Cybersecurity Analyst (CSA+) is an international, vendor-neutral cybersecurity certification that applies behavioral analytics to improve the overall state of IT security. CSA+ validates critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.

  • Access 70 lectures & 18 hours of content 24/7
  • Identify & combat malware
  • Learn advanced persistent threats
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Access
Lifetime
Content
19 hours
Lessons
74

CompTIA Advanced Security Practitioner

Study to Pass the CompTIA CASP Certification Exam

By iCollege | in Online Courses

CompTIA's CASP (CompTIA Advanced Security Practitioner) is a vendor-neutral certification that validates IT professionals with advanced-level security skills and knowledge. This certification course covers the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments.

  • Access 74 lectures & 19 hours of content 24/7
  • Apply critical thinking & judgment across a broad spectrum of security disciplines
  • Learn how to propose & implement solutions that map to enterprise drivers, while managing risk
iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

iCollege is a collaborative venture between XpertSkills and XpertEase Software.

The synergistic result of their joint venture enables them to provide sophisticated, innovative, relevant, flexible and cost-effective learning solutions.

Their collective knowledge and experience in education and training provision sets the standard for service delivery in learning solutions. For more details on this course and instructor, click here.

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Module 1: Threat Management
    • 1.1 Introduction
    • 1.2 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 1
    • 1.3 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 2
    • 1.4 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 3
    • 1.5 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 4
    • 1.6 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 5
    • 1.7 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 6
    • 1.8 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 7
    • 1.9 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 8
    • 1.10 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes - Part 9
    • 1.11 Given a scenario, analyze the results of a network reconnaissance - Part 1
    • 1.12 Given a scenario, analyze the results of a network reconnaissance - Part 2
    • 1.13 Given a scenario, analyze the results of a network reconnaissance - Part 3
    • 1.14 Given a scenario, analyze the results of a network reconnaissance - Part 4
    • 1.15 Given a scenario, analyze the results of a network reconnaissance - Part 5
    • 1.16 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 1
    • 1.17 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 2
    • 1.18 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 3
    • 1.19 Given a network-based threat, implement or recommend the appropriate response and countermeasure - Part 4
    • 1.20 Explain the purpose of practices used to secure a corporate environment - Part 1
    • 1.21 Explain the purpose of practices used to secure a corporate environment - Part 2
    • 1.22 Explain the purpose of practices used to secure a corporate environment - Part 3
    • 1.23 Explain the purpose of practices used to secure a corporate environment - Part 4
  • Module 2: Vulnerability Management
    • 2.1 Given a scenario, implement an information security vulnerability management process - Part 1
    • 2.2 Given a scenario, implement an information security vulnerability management process - Part 2
    • 2.3 Given a scenario, implement an information security vulnerability management process - Part 3
    • 2.4 Given a scenario, implement an information security vulnerability management process - Part 4
    • 2.5 Given a scenario, implement an information security vulnerability management process - Part 5
    • 2.6 Given a scenario, implement an information security vulnerability management process - Part 6
    • 2.7 Given a scenario, implement an information security vulnerability management process - Part 7
    • 2.8 Given a scenario, analyze the output resulting from a vulnerability scan - Part 1
    • 2.9 Given a scenario, analyze the output resulting from a vulnerability scan - Part 2
    • 2.10 Compare and contrast common vulnerabilities found in the following targets within an organization - Part 1
    • 2.11 Compare and contrast common vulnerabilities found in the following targets within an organization - Part 2
    • 2.12 Compare and contrast common vulnerabilities found in the following targets within an organization - Part 3
  • Module 3: Cyber Incident Response
    • 3.1 Given a scenario, distinguish threat data or behavior to determine the impact of an incident - Part 1
    • 3.2 Given a scenario, distinguish threat data or behavior to determine the impact of an incident - Part 2
    • 3.3 Given a scenario, distinguish threat data or behavior to determine the impact of an incident - Part 3
    • 3.4 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 1
    • 3.5 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 2
    • 3.6 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 3
    • 3.7 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 4
    • 3.8 Given a scenario, prepare a toolkit and use appropriate forensic tools during an investigation - Part 5
    • 3.9 Explain the importance of communications during the incident response process
    • 3.10 Given a scenario, analyze common symptoms to select the best course of action to support incident response - Part 1
    • 3.11 Given a scenario, analyze common symptoms to select the best course of action to support incident response - Part 2
    • 3.12 Given a scenario, analyze common symptoms to select the best course of action to support incident response - Part 3
    • 3.13 Given a scenario, analyze common symptoms to select the best course of action to support incident response - Part 4
    • 3.14 Summarize the incident recovery and post-incident response process - Part 1
    • 3.15 Summarize the incident recovery and post-incident response process - Part 2
    • 3.16 Summarize the incident recovery and post-incident response process - Part 3
    • 3.17 Summarize the incident recovery and post-incident response process - Part 4
  • Module 4: Security Architecture and Tool Sets
    • 4.1 Explain the relationship between frameworks, common policies, controls, and procedures - Part 1
    • 4.2 Explain the relationship between frameworks, common policies, controls, and procedures - Part 2
    • 4.3 Explain the relationship between frameworks, common policies, controls, and procedures - Part 3
    • 4.4 Explain the relationship between frameworks, common policies, controls, and procedures - Part 4
    • 4.5 Given a scenario, use data to recommend remediation of security issues related to identity and access management - Part 1
    • 4.6 Given a scenario, use data to recommend remediation of security issues related to identity and access management - Part 2
    • 4.7 Given a scenario, use data to recommend remediation of security issues related to identity and access management - Part 3
    • 4.8 Given a scenario, use data to recommend remediation of security issues related to identity and access management - Part 4
    • 4.9 Given a scenario, review security architecture and make recommendations to implement compensating controls - Part 1
    • 4.10 Given a scenario, review security architecture and make recommendations to implement compensating controls - Part 2
    • 4.11 Given a scenario, review security architecture and make recommendations to implement compensating controls - Part 3
    • 4.12 Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) - Part 1
    • 4.13 Given a scenario, use applications security best practices while participating in the Software Development Life Cycle (SDLC) - Part 2
    • 4.14 Overview
    • 4.15 Conclusion

View Full Curriculum



Terms

  • Instant digital redemption