Intermediate Certification

(HM-CPMT2399.AE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction

  • The Security+ Exam
  • What Does This Course Cover?
  • Exam SY0-601 Exam Objectives
  • SY0-601 Certification Exam Objective Map
2

Introduction to Security and Malicious Code

  • Cybersecurity Objectives
  • Data Breach Risks
  • Implementing Security Controls
  • Data Protection
  • Exploring Cybersecurity Threats
  • Threat Data and Intelligence
  • Malware
  • Malicious Code
  • Adversarial Artificial Intelligence
3

Social Engineering, Physical, and Password Attacks, Testing and Secure Coding

  • Social Engineering
  • Password Attacks
  • Physical Attacks
  • Vulnerability Management
  • Security Vulnerabilities
  • Penetration Testing
  • Training and Exercises
  • Software Assurance Best Practices
  • Designing and Coding for Security
  • Software Security Testing
  • Injection Vulnerabilities
  • Exploiting Authentication Vulnerabilities
  • Exploiting Authorization Vulnerabilities
  • Exploiting Web Application Vulnerabilities
  • Application Security Controls
  • Secure Coding Practices
4

Cryptography, Public Key Infrastructure and Access Management

  • An Overview of Cryptography
  • Goals of Cryptography
  • Cryptographic Concepts
  • Modern Cryptography
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Hash Functions
  • Digital Signatures
  • Public Key Infrastructure
  • Asymmetric Key Management
  • Cryptographic Attacks
  • Emerging Issues in Cryptography
  • Identity
  • Authentication and Authorization
  • Authentication Methods
  • Accounts
  • Access Control Schemes
5

Physical, Cloud, Virtualization, and Endpoint Security

  • Building Cybersecurity Resilience
  • Response and Recovery Controls
  • Physical Security Controls
  • Exploring the Cloud
  • Virtualization
  • Cloud Infrastructure Components
  • Cloud Security Issues
  • Cloud Security Controls
  • Protecting Endpoints
  • Service Hardening
  • Operating System Hardening
  • Securing Embedded and Specialized Systems
6

Network Security

  • Designing Secure Networks
  • Secure Protocols
  • Attacking and Assessing Networks
  • Network Reconnaissance and Discovery Tools and Techniques
7

Wireless and Mobile Security, Incident Response, and Digital Forensics

  • Building Secure Wireless Networks
  • Managing Secure Mobile Devices
  • Incident Response
  • Incident Response Data and Tools
  • Mitigation and Recovery
  • Digital Forensic Concepts
  • Conducting Digital Forensics
  • Reporting
  • Digital Forensics and Intelligence
8

Security Policies, Risk Management and Privacy

  • Understanding Policy Documents
  • Personnel Management
  • Third-Party Risk Management
  • Complying with Laws and Regulations
  • Adopting Standard Frameworks
  • Security Control Verification and Quality Control
  • Analyzing Risk
  • Managing Risk
  • Risk Analysis
  • Disaster Recovery Planning
  • Privacy

1

Introduction to Security and Malicious Code

  • Identifying Virus Threats
  • Detecting Rootkits
2

Social Engineering, Physical, and Password Attacks, Testing and Secure Coding

  • Using Social Engineering Techniques to Plan an Attack
  • Cracking a Linux Password Using John the Ripper
  • Conducting Vulnerability Scanning Using Nessus
  • Exploiting a Website Using SQL Injection
  • Conducting a Cross-Site Request Forgery Attack
  • Attacking a Website Using XSS Injection
  • Defending Against a Buffer Overflow Attack
3

Cryptography, Public Key Infrastructure and Access Management

  • Performing Symmetric Encryption
  • Examining Asymmetric Encryption
  • Observing an SHA-Generated Hash Value
  • Observing an MD5-Generated Hash Value
  • Examining PKI Certificates
  • Using Rainbow Tables to Crack Passwords
  • Examining Kerberos Settings
  • Installing a RADIUS Server
4

Physical, Cloud, Virtualization, and Endpoint Security

  • Configuring RAID 5
  • Using the chmod Command
  • Examining File Manipulation Commands
5

Network Security

  • Configuring a Standard ACL
  • Implementing Port Security
  • Configuring a BPDU Guard on a Switch Port
  • Configuring VLANs
  • Using Windows Firewall
  • Performing ARP Poisoning
  • Using the ifconfig Command
  • Using the traceroute Command
  • Capturing Packets Using Wireshark
  • Performing Reconnaissance on a Network
  • Using the theHarvester Tool to Gather Information about a Victim
  • Using the hping Program
  • Using Reconnaissance Tools
6

Wireless and Mobile Security, Incident Response, and Digital Forensics

  • Viewing Linux event logs
  • Using Event Viewer
  • Making Syslog Entries Readable
  • Using FTK Imager
7

Security Policies, Risk Management and Privacy

  • Configuring a Password Policy

Related Courses

All Courses
scroll to top