Course code: C01187
This course is aimed at:
- Candidates who want to demonstrate their skills and knowledge in the field of cybersecurity and threat detection.
- Cybersecurity professionals who want to deepen their cybersecurity knowledge and become advanced security practitioners.
Modules and topics covered:
CompTIA Security+ SY0-701
SY0-701 – CompTIA Security+: Security Goals & Controls
SY0-701 – CompTIA Security+: Fundamental Security Concepts
SY0-701 – CompTIA Security+: Practical Cryptography
SY0-701 – CompTIA Security+: Threat Actors & Vectors
SY0-701 – CompTIA Security+: Survey of Malicious Activities
SY0-701 – CompTIA Security+: Mitigation Techniques
SY0-701 – CompTIA Security+: Architecture & Infrastructure Concepts
SY0-701 – CompTIA Security+: Enterprise Infrastructure Security Principles
SY0-701 – CompTIA Security+: Data Protection Concepts & Strategies
SY0-701 – CompTIA Security+: Resilience & Recovery
SY0-701 – CompTIA Security+: Computing Resources Security Techniques
SY0-701 – CompTIA Security+: Vulnerability Management
SY0-701 – CompTIA Security+: Security Monitoring & Alerting
SY0-701 – CompTIA Security+: Enterprise Security Capabilities
SY0-701 – CompTIA Security+: Identity and Access Management
SY0-701 – CompTIA Security+: Automation, Orchestration, & Incident Response
SY0-701 – CompTIA Security+: Effective Security Governance
SY0-701 – CompTIA Security+: Risk Management
SY0-701 – CompTIA Security+: Security Compliance & Third-Party Risk
SY0-701 – CompTIA Security+: Audits, Assessments, & Awareness
CompTIA PenTest+ (PTO-002)
CompTIA PenTest+ (PTO-002): Scoping & Engagement
CompTIA PenTest+ (PTO-002): Professionalism & Integrity
CompTIA PenTest+ (PTO-002): Passive Reconnaissance
CompTIA PenTest+ (PTO-002): Active Reconnaissance
CompTIA PenTest+ (PTO-002): Vulnerability Scanning
CompTIA PenTest+ (PTO-002): Network Attacks & Exploits
CompTIA PenTest+ (PTO-002): Wireless Attacks
CompTIA PenTest+ (PTO-002): Application-based Attacks
CompTIA PenTest+ (PTO-002): Attacks on Cloud Technologies
CompTIA PenTest+ (PTO-002): Attacks on Specialized Systems
CompTIA PenTest+ (PTO-002): Social Engineering Attacks
CompTIA PenTest+ (PTO-002): Post-Exploitation Techniques
CompTIA PenTest+ (PTO-002): Written Reports
CompTIA PenTest+ (PTO-002): Communication & Post-Report Activities
CompTIA PenTest+ (PTO-002): Analyzing Tool & Script Output
CompTIA PenTest+ (PTO-002): Penetration Testing Tools
CompTIA Advanced Security Practitioner: CASP+ (CAS-004)
CompTIA CASP CAS-004: Business and Industry Influences and Risks
CompTIA CASP CAS-004: Organizational Security and Privacy Policies
CompTIA CASP CAS-004: Risk Mitigation Strategies and Controls
CompTIA CASP CAS-004: Risk Metric Scenarios for Enterprise Security
CompTIA CASP CAS-004: Integrating Network and Security Components, Concepts, and Architectures
CompTIA CASP CAS-004: Integrating Security Controls for Host Devices
CompTIA CASP CAS-004: Integrating Controls for Mobile and Small Form Factor Devices
CompTIA CASP CAS-004: Selecting Software Security Controls
CompTIA CASP CAS-004: Conducting Security Assessments
CompTIA CASP CAS-004: Implementing Incident Response and Recovery
CompTIA CASP CAS-004: Integrating Hosts, Storage, and Applications in the Enterprise
Ethical Hacker
Cybersecurity Concepts, Attacks, and Information Warfare
Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
Risk Management, Cyber Threat Intelligence, and Threat Modeling
Incident Management, ML, AI, and Regulations
Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
Footprinting, Google Dorks, Search Engines, and Subdomains
Recon Tools and Tactics
Footprinting and Social Engineering Recon and Countermeasures
Network Scanning, TCP, Host Discovery, and Port/Service Scanning
Nmap TCP Scans
Nmap IDLE IPID, UDP, and SCTP Scans
Scan Optimization, OS Identification, and IDS/Firewall Evasion
NetBIOS, SMB, SNMP, and LDAP Enumeration
NTP, NFS, SMTP, and FTP Enumeration
Vulnerability Assessment, Management, and Classification
Vulnerability Assessment Types, Models, Tools, and Reports
Windows Authentication
Passwords Attacks, Extraction, and Cracking
Buffer Overflows, Privilege Escalation, and System Access
Steganography and Avoiding Detection
AD Enumeration, Mimikatz, and Pivoting Techniques
Malware, Threats, Trojans, and Viruses
Fileless Malware, Malware Analysis, and Countermeasures
Sniffing and Poisoning
Social Engineering, Insider Threats, and Identity Theft
DoS, DDoS, Volumetric, and Protocol Attacks
App Layer Attacks, Botnets, and DoS Countermeasures
Hijacking Concepts and Countermeasures
Intrusion Detection and Prevention, Firewalls, and Honeypots
Web Server Hacking, Attacks, and Attack Methodologies
Web Application Attacks and Vulnerabilities
Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
SQL Injection Concepts and Attacks
SQL Injection and SQLMap
Wireless Concepts, Threats, and Hacking Tools
Wireless Hacking and Countermeasures
Mobile Hacking, OS Security, and Device Management
IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
Operational Technology Concepts, Attack Tools, and Countermeasures
Cloud Computing, Containers, Hacking, and Security Controls
Cryptography, Algorithms, Implementations, and Tools
PKI, Cryptanalysis, and Attack Countermeasures
Certified Information Systems Auditor® (CISA®)
CISA 2022: Information Systems Auditing
CISA 2022: Auditing, Data Analysis, & Controls
CISA 2022: IT Management Frameworks, Regulations, & Standards
CISA 2022: IT Resources & Monitoring
CISA 2022: Projects, Development, & Testing
CISA 2022: Information Systems Management
CISA 2022: Information Systems Development & Implementation
CISA 2022: Data Privacy
CISA 2022: IAM & Data Classification
CISA 2022: Securing Networks & IT Assets
CISA 2022: Protecting Information Assets
CISA 2022: Virtualization & Cloud Computing
CISA 2022: Auditing Scenarios