CompTIA Real LIVE Practice-Labs: Security+ Certification Exam (cont.)
Try out your new skills as you learn without purchasing expensive software or equipment!
for only USD$195.00
Get bigger discount if you combine it with the training course.
Don't buy software and hardware: practice online for 12 months!
CompTIA Security+: Sample Lab Objectives:
Trojans and Malware Protection: Learn how to activiate, exploit and block the Trojan, deploy malware protection, and using anti-virus software.
Network Vulnerabilities: Learn about network footprinting, packet sniffing, MitM with ARP spoofing and denial of service.
Vulnerability Scanning: Learn how to set up OpenVAS and run a vulnerability scan.
Routing Protocols: Learn about configuring a network and authentication for RIP packets, sniffing routing traffic, and injecting poison routes.
Firewall and Intrusion Detection Systems: Understand how to configure firewalls and IDS.
Attacks against DHCP and DNS: Learn about DHCP starvation, HOSTS files, spoofing a DNS server and exploring DNS server vulnerabilities.
Steganography: Gain understanding in hiding information within a file, detecting steganography, and alternating data streams.
Configuring Certificate Services: Learn how to explore the certificate server, configure key recovery agents and key archival, use encryption and perform key recovery.
HTTP and HTTPS: Learn about securing HTTP and sniffing SSL traffic with Ettercap.
Web Application Vulnerabilities: Gain an understanding in web application vulnerabilities.
Telnet and FTP and SSH: Learn about Telnet, FTP and configuring SSH.
Password Sniffing: Understand keyloggers, Cain and Abel and Kerberos.
Network Access Protection: Learning about installing and testing network access protection.
VPNs: Learn how to configure and join a VPN, crack PPTP authentication and create a more secure VPN with SSL.
Data Leakage Prevention: Gain an understanding of installing rights managament services and exploring DLP options.
Computer Forensic Tools: Learning about the scene of the crime, booting the forensics disc, analyzing the image and creating a disk signature and disk image.