Elysium Academy Security Certification Training Course
Professional Courses

Security Essential

Course Description

elysium_academy_securityesstial_course
Professional Courses

Security Essential Certified Course

Introduction

The Security essential certification covers the most important foundational principles for securing a network and managing risk. Access control, identity management and cryptography are important topics on the exam, as well as selection of appropriate mitigation and deterrent techniques to address network attacks and vulnerabilities. The Security essential is a strong endorsement of an organization's commitment to best practices for information, personnel, and environmental security. The CompTIA Security essential certificated professional has been verified as operating under the guidelines of the best practices detailed in the CompTIA Security Control Framework.

Register Now

Course Outline

Our advanced professional certification programs and high-quality mock courses serve as a gateway for the learners interested in starting their career in the Global IT sector.
1802.11
The candidate will demonstrate an understanding of the different 802.11 protocols, as well as an understanding of common wireless attacks and how to prevent them.
2Access Control Theory
The candidate will demonstrate an understanding of the fundamental theory of access control.
3Alternate Network Mapping Techniques
The candidate will demonstrate a fundamental understanding of network mapping techniques an attacker might use to examine wireless networks, and public switched telephony networks. The candidate will also demonstrate an understanding of how to identify the basic penetration techniques at a high level.
4Authentication and Password Management
The candidate will demonstrate understanding of the role of authentication controls, how they are managed, and the methods used to control access to systems.
5Common Types of Attacks
The candidate will demonstrate the ability to identify the most common attack methods, as well as the basic strategies used to mitigate those threats.
6Contingency Planning
The candidate will demonstrate an understanding of the critical aspect of contingency planning with a Business Continuity Plan (BCP) and Disaster Recover Plan (DRP).
7Crypto Concepts
The candidate will demonstrate a high-level understanding of the mathematical concepts which contribute to modern cryptography.
8Crypto Fundamentals
The candidate will demonstrate an understanding of the core concepts of cryptography and the three main algorithms.
9Defense-in-Depth
The candidate will demonstrate an introductory understanding of the terminology and concepts of Risk and Defense-in-Depth, including threats and vulnerabilities.
10DNS
The candidate will demonstrate a high-level understanding of the Domain Name System architecture.
11Firewall Subversion
The candidate will demonstrate an understanding of how firewalls can be bypassed and why additional security measures are required.
12Firewalls
The candidate will demonstrate a fundamental understanding of firewalling technologies and techniques.
13HIDS Overview
The candidate will demonstrate a fundamental understanding of the techniques used by Host Based Intrusion Detection Systems.
14Honeypots
The candidate will demonstrate understanding of basic honeypot techniques and common tools used to set up honeypots.
15ICMP
The candidate will demonstrate an understanding of the structure and purpose of ICMP, as well as the fields in a ICMP datagram header.
16IDS Overview
The candidate will demonstrate an understanding of the overall concepts of Intrusion Detection.
17Incident Handling Fundamentals
The candidate will demonstrate an understanding of the concepts of incident handling and the six-step incident handling process.
18Information Warfare
The candidate will demonstrate an understanding of information warfare methods and defense.
19Introduction to OPSEC
The candidate will demonstrate an understanding of what OPSEC is and the threats and techniques used for protection in Operational Security.
20IP Packets
The candidate will demonstrate a fundamental understanding of how the IP protocol works.
21IPS Overview
The candidate will demonstrate a high-level understanding of how IPS systems operate.
22IPv6
The candidate will demonstrate a high-level understanding of the IPv6 protocol.
23Legal Aspects of Incident Handling
The candidate will demonstrate an understanding of the basic legal issues in incident and evidence handling.
24Linux/Unix Configuration Fundamentals
The candidate will demonstrate an understanding of Linux/Unix fundamental configuration settings, including file permissions, user accounts, groups, and passwords, and commands used to display information and run backups.
25Linux/Unix Logging and Log Management
The candidate will demonstrate an understanding of the various logging capabilities and log file locations common to Linux operating systems.
26Linux/Unix OS Security Tools and Utilities
The candidate will demonstrate an understanding of how to use key security utilities and tools that are available for Linux/Unix systems, including file integrity, host firewalls, and applications such as SELinux.
27Linux/Unix Overview
The candidate will demonstrate familiarity with the different variants of Linux/Unix, the Linux file system, and important commands.
28Linux/Unix Patch Management
The candidate will demonstrate an understanding of the process of patch management, best practices, and common patch management tools and techniques for Linux/Unix systems.
29Linux/Unix Process and Service Management
The candidate will demonstrate an understanding of how to manage Linux/Unix processes, run levels, and services, and best practices for common processes and services.
30Mitnick-Shimomura
The candidate will demonstrate an understanding of the details of the famous Mitnick-Shimomura attack, as well as what we can learn from this attack to appropriately protect our networks today against these vulnerabilities. The candidate will also demonstrate an understanding of the strategies that would have prevented the Mitnick attack.
31Network Addressing
The candidate will demonstrate an understanding of the essentials of IP addressing, subnets, CIDR and netmasks.
32Network Design
The candidate will demonstrate an understanding of how to design basic network architectures using best practices.
33Network Hardware
The candidate will demonstrate an understanding of network hardware components, as well as how standard and cross-over network cabling is wired.
34Network Mapping and Scanning
The candidate will demonstrate a fundamental understanding of the common tools attackers use to scan systems and the techniques used to create a network map.
35Network Plumbing
The candidate will demonstrate an understanding of the different types of networks, topologies, and the most common network technologies in use today.
36Network Protocol
The candidate will demonstrate an understanding of the properties and functions of network protocols and network protocol stacks.
37NIDS Overview
The candidate will demonstrate an understanding of the techniques a NIDS uses to operate and understand their strengths and weaknesses.
38Physical Security
The candidate will demonstrate how to use protection mechanisms to secure and monitor restricted areas and physical perimeters.
39Policy Framework
The candidate will demonstrate an understanding of the purpose and components of policy.
40Protecting Data at Rest
The candidate will demonstrate an understanding of the functionality of PGP cryptosystems and how they operate.
41Public Key Infrastructure PKI
The candidate will demonstrate an understanding of how PKI works and the key components for managing keys.
42Reading Packets
The candidate will demonstrate an understanding of how to decode a packet from hexadecimal output.
43Risk Management
The candidate will demonstrate an understanding of the terminology and basic approaches to Risk Management.
44Safety Threats
The candidate will demonstrate the ability to identify and understand the most common threats to safety and identify why they are important to address.
45Securing Windows Server Services
The candidate will demonstrate an understanding of the basic measures in securing Windows IIS, SQL, and Terminal Servers.
46Steganography Overview
The candidate will demonstrate an understanding of the different methods of steganography, as well as some of the common tools used to hide data with steganography.
47TCP
The candidate will demonstrate an understanding of the structure and purpose of TCP, as well as the fields in a TCP datagram header.
48UDP
The candidate will demonstrate an understanding of the structure and purpose of UDP, as well as the fields in a UDP datagram header.
49Virtual Machines
The candidate will demonstrate an understanding of what virtual machines are and how to use them to create a virtual lab
50Virtual Private Networks VPNs
The candidate will demonstrate a high-level understanding of VPNs and be able to identify IPSec and non-IPSec protocols used for VPN communications.
51Viruses and Malicious Code
The candidate will demonstrate an understanding of what malicious code is, how it propagates and why it is such an expensive problem. Additionally, the candidate will demonstrate an understanding of the attack vectors leveraged by recent malicious code attacks.
52VoIP
The candidate will demonstrate an understanding of the functionality and architecture of VoIP.
53Vulnerability Management Overview
The candidate will demonstrate the ability to perform reconnaissance and resource protection to manage vulnerabilities, and address threats and vectors.
54Vulnerability Scanning
The candidate will demonstrate an understanding of how data generated from a port scanner like nmap, and vulnerability assessment tools like nessus can be used to examine systems, ports and applications in more depth to secure an environment.
55Web Application Security
The candidate will demonstrate an understanding of web application security and common vulnerabilities including CGI, cookies, SSL and active content.
56Windows Auditing
The candidate will demonstrate an understanding of the techniques and technologies used to audit Windows hosts.
57Windows Automation and Configuration
The candidate will demonstrate an understanding of the techniques and technologies used to automate configuration.
58Windows Family of Products
The candidate will demonstrate an understanding of the different types of Windows operating systems and the basic security features and concerns of each.
59Windows Network Security Overview
The candidate will demonstrate an understanding of the basic measures in securing a Windows host, including managing services and VPNs.
60Windows Permissions & User Rights
The candidate will demonstrate an understanding of how permissions are applied in the Windows NT File System, Shared Folder, Encrypting File System, Printer, Registry Key, Active Directory, and how User Rights are applied.
61Windows Security Templates & Group Policy
The candidate will demonstrate a high-level understanding of the features and functionality of Group Policy and best practices for locking down systems.
62Windows Service Packs, Hotfixes and Backups
The candidate will demonstrate an understanding of how to manage Windows Service Packs and Hotfixes, as well as backups and restoration for a network of Windows hosts.
63Windows Workgroups, Active Directory and Group Policy Overview
The candidate will demonstrate an understanding of the basic security infrastructure of local accounts, workgroups, Active Directory and Group Policy.
64Wireless Overview
The candidate will demonstrate a fundamental understanding of wireless technologies including Bluetooth and Zigbee

Exam Feature & Intro Video


Features
Exam Number SY0-301 & JK0-018
Associated Comptia
Duration 60 Hours
Register Pearson VUE

Course Features

  • Robust Support

  • High-tech Lab

  • Proficient Faculties

  • Ample Experience

  • Live seminars

  • Reliable Certification

  • No 1: Masters

  • Unrelenting Dedication

  • From Top Level Industry

  • Personalized Learning

  • Placement assistance

  • Innovative Courseware

Pre-Requirement Skills

Skill Needs

  • Basic Computer knowledge 70%
  • Basic hardware knowledge60%

Opening Hours

We are open to serve the learners from Monday to Sunday, during the business hours.
  • 8am - 7pm
  • 9am - 2pm

Content Include

  • Course Certificate
  • Course Material
  • Video Tutorial
  • Exam Guidance
  • Industrial Visit
"WE SHAPE YOUR FUTURE ON EVERY STEP OUR WAY"

Join One of the Leading Academy !

Technical Knowledge Delivery

EA aims to impart high quality technical education to the learners, through our novel certified courses, innovative teaching methodologies and interactive sessions.



Topic Highlights


In every firm for sure can find a Security Engineer. Because deliberately it’s required to secure the data’s and resources they hold on. Security Certification Training Course helps you to get knowledge about this. But the question is where one can do? Here you go with the answer Elysium Academy Security Certification center is giving stupendous training.More over Security Essential Certification Training Course has higher credits

Elysium Academy Security Certification Training Course

In this course we covers the foundational principles for securing a network and managing risk. Identity management cryptography and identity management. We provide best guidance to students. Moreover will Emphasis your knowledge. Because in this competitive world Knowledge attaining is Indispensable and worth having.
Indeed, Join hands with Elysium Academy to rejuvenate your life style and career.


Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Chat with us on WhatsApp
Your Name
Your Mobile Number
Your E-Mail ID
*All information provided will be kept confidential.
*Terms & Conditions Apply
Your Name
Your Mobile Number
Your E-Mail ID
*All information provided will be kept confidential.
*Terms & Conditions Apply
Elysium groups Support Center