Types of malwares and attacks
Threat actor types and attributes
Penetration testing
Vulnerability scanning
Types of vulnerabilities
Through this course, students learn the fundamental skills to install and configure cybersecurity controls, incident response, and risk mitigation. Students are also provided with an overview of different types of threats, attacks, and vulnerabilities. They learn about architecture and design, core concepts such as identity and risk, in addition to access management and cryptography. This course prepares professionals for the official CompTIA Security+ certification.
* Morning, evening, weekends
Professionals work in a wide array of companies, from startups to global organizations. The annual salary range for cybersecurity-related jobs is between $42,282 and $97,290.
Systems, network and security administrators
IT professionals with a minimum of one-year, hands-on experience in IT administration with a focus on security
Professionals with knowledge of security concerns and implementation
Professionals interested in switching their career to networking
Big Data Developer
Java Developer
BI Developer
STQA
Performing penetration testing
Analyzing and understanding vulnerability scanning concepts
Understanding different types of attacks
Installing and configuring network components(hardware and software)
Troubleshooting issues and support organizational security
Configuring a secure network architecture
System design, physical security, cloud concepts
Installing and configuring identity and access services
Management controls
Risk management best practices and business impact analysis
Data security and privacy techniques
Cryptography algorithms
Installing and configuring wireless security
Implementing public key infrastructure
CompTIA Security+
Types of malwares and attacks
Threat actor types and attributes
Penetration testing
Vulnerability scanning
Types of vulnerabilities
Installing and configuring hardware, software network components
Assessing security using software tools
Troubleshooting security issues
Analyzing security technology
Deploying mobile devices securely
Implement secure network architecture
Implement secure system design
Secure staging deployment
Security implications of embedded systems.
Cloud and virtualization concepts
Physical security controls
Installing and configuring identity and access services
Implementing identity and access management controls
Account management practices
Introduction to policies in organizational security
Business impact analysis
Risk management process and concepts
Forensics and disaster recovery
Types of controls
Data security and privacy practices
SY0-501 - CompTIA Security+ Certification
I am an Engineering grad (Diploma) from Morocco, I discovered MCIT during my master’s at the Technology University Montreal. Studying at MCIT helped me open my Career prospects many folds.
Sihame Benhlima — BI Student