What is the use of Security + training course

All network operating systems (NOS) must provide adequate security to protect the network from unauthorized access. As more computer networks connect to the Internet, anyone anywhere in the world can break into your network. It even seems that in today’s world, hacking has become one of people’s hobbies.

The most basic layer of security is through user accounts, which give users access to network resources. This security layer controls the resources that users have access to. In fact, user accounts are secured by passwords; Therefore, a proper password policy can be considered as the cornerstone of network security.

Network security is the process of taking preventive physical and software measures to protect the network infrastructure from unauthorized access, malfunction, alteration, destruction or inappropriate disclosure. Ultimately, these activities create a secure platform for computers, users, and applications to perform critical functions in a secure environment.

The security + training course of the home school has been prepared for exactly this purpose. In this course, students learn the basic terms of security and different methods of securing the operating system and network along with the types of threats and how they work.

Headline of content

The path to take to get the Security+ certificate

Prerequisites and preparation

  • General concepts of security: introduction
  • General concepts of security: access control
  • General concepts of security: authentication
  • General concepts of security: unnecessary services and protocols
  • General concepts of security: attacks
  • General concepts of security: malicious codes
  • General concepts of security: social engineering
  • General concepts of security: inspection and follow-up of logs
  • Communication security: remote access
  • Communication security: e-mail
  • Communication security: Web
  • Communication security: directory
  • Communication security: file transfer
  • Communication security: wireless
  • Infrastructure security: devices
  • Infrastructure security: media
  • Infrastructure security: security technologies

It is not possible to post a comment