Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:01
Hello and welcome back in this I bury 2019 cop T A Security plus certification preparation course.
00:09
The first item Arjuna would be the address. The following enquiries. First of all, what does 2019 Compton executed, plus certification Prep course cover
00:19
this particular prep course? Cover a number of different items such as enterprise policy Framework,
00:26
network security,
00:28
identity management and last but not so use of which instant response. So that begs the question. What are the benefits
00:36
for those of you who hoping to improve your probability? Having a world class recognised qualification will be the key to raising your profile
00:47
Set bags, of course, in Who is the target audience?
00:51
The security plus certification is aimed at I t security professionals who have a minimal two years experience in RT administration with a focus on security
01:00
day to day technical information security experience. That's what is a broad knowledge of security concerns and imitation, including topics in the domain lists
01:12
that brings us to the course goals.
01:15
By the end of this course, you as a participant should be able to conceptualize, engineer, integrate and implement secure solutions across complex environments to support a resilient
01:26
enterprise
01:29
you be. We also apply critical thinking and judgment across a broad spectrum of security disciplines. To propose, implement and advocate sustainable security solutions that map to your organization of strategies. Balance security requirements with business, as was your regulatory requirements,
01:46
and analyze your risk impact in response to
01:49
security incidents.
01:52
The exam measure ability to accomplish the technical task. Listen above
01:57
the heart of a city indicates a relative weight of each major topic. Area on exam, the heart of percentage, the more courses you like to see on that content area.
02:08
The following topics to be addressed will be threats, attacks and more abilities.
02:13
Technology and tools,
02:15
architecture and design,
02:17
identity and access management,
02:21
risk management and last but not least of which photography and p k I.
02:28
I'm gonna walk you through several question topics pertain to the camp tier Security plus certification.
02:35
This presentation would be laying the foundation for the entire course.
02:44
Let's turn our attention toward the exam specifics.
02:47
In terms of the Compton secretive plus certification, the number of courses are about 90 questions. The type, of course, and that you respect. The ceiling exam will be multiple choice
02:58
as well as performance base. You need a pass. The school of 750.
03:02
The time limit on exam is about 90 minutes. So that begs the question. What is next?
03:09
How do I passed exam the first time I'm gonna offer your number. Different recommendations. First of all,
03:16
review the cyber. Its allies
03:19
studied the material.
03:22
When you're dressing on, answer any question. Make sure you select the best response
03:28
and equally as important, focus on the key concepts.
03:32
Chris is included at the end of each model of our individual assessment of the knowledge presented in each lesson.
03:40
So let's take a look at a simple question
03:43
and the question res as follows.
03:46
Which of the following practices most likely implored doing E discovery is a legal hole and chain of custody.
03:53
Be risk mitigation and policy generation
03:57
See network in admiration and fingerprint or D data duplication and hashing.
04:03
In this case, if you select the AU absolutely correct because it's actually legal hole and chain of custody.
04:13
In our upcoming video, we continue our discussion by first are taking a look at marginal one, which is the main one threats, attacks and vulnerabilities. And again I look for to see you in a very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor