THE INTERNET TECHNOLOGY TRAINERS

CompTIA Real LIVE Practice-Labs: Security+ Certification Exam (cont.)

Try out your new skills as you learn without purchasing expensive software or equipment!

Microsoft certification training speacial sale  Save hundred of dollars with RTEK 2000!
for only USD$195.00
Get bigger discount if you combine it with the training course.
Don't buy software and hardware: practice online for 12 months!

CompTIA Security+: Sample Lab Objectives:
  • Trojans and Malware Protection: Learn how to activiate, exploit and block the Trojan, deploy malware protection, and using anti-virus software.
  • Network Vulnerabilities: Learn about network footprinting, packet sniffing, MitM with ARP spoofing and denial of service.
  • Vulnerability Scanning: Learn how to set up OpenVAS and run a vulnerability scan.
  • Routing Protocols: Learn about configuring a network and authentication for RIP packets, sniffing routing traffic, and injecting poison routes.
  • Firewall and Intrusion Detection Systems: Understand how to configure firewalls and IDS.
  • Attacks against DHCP and DNS: Learn about DHCP starvation, HOSTS files, spoofing a DNS server and exploring DNS server vulnerabilities.
  • Steganography: Gain understanding in hiding information within a file, detecting steganography, and alternating data streams.
  • Configuring Certificate Services: Learn how to explore the certificate server, configure key recovery agents and key archival, use encryption and perform key recovery.
  • HTTP and HTTPS: Learn about securing HTTP and sniffing SSL traffic with Ettercap.
  • Web Application Vulnerabilities: Gain an understanding in web application vulnerabilities.
  • Telnet and FTP and SSH: Learn about Telnet, FTP and configuring SSH.
  • Password Sniffing: Understand keyloggers, Cain and Abel and Kerberos.
  • Baseline Security Analyzer: Understanding baseline security analyzer.
  • Network Access Protection: Learning about installing and testing network access protection.
  • VPNs: Learn how to configure and join a VPN, crack PPTP authentication and create a more secure VPN with SSL.
  • Data Leakage Prevention: Gain an understanding of installing rights managament services and exploring DLP options.
  • Computer Forensic Tools: Learning about the scene of the crime, booting the forensics disc, analyzing the image and creating a disk signature and disk image.