CompTIA Secure Cloud Professional (CSCP)

$129.00

SKU comptia-cscp Categories , ,
 

Course overview

30  HOURS OF TRAINING
134 VIDEOS
13  SKILLS
304 PRACTICE QUESTIONS

The CompTIA CSCP is a stackable certification by CompTIA. It is designed for IT professionals with 2 to 5 years of experience. The ITU Certification Path for the CompTIA CSCP certification consists of the learning materials to allow you to study for and pass the CompTIA Security+ and CompTIA Cloud+ exams.

Get an exceptional deal on this course at a lower price.  View our Master CompTIA Training Series which includes this course.

Completing this path and passing the two exams means you end of with two CompTIA certifications and are a designated a CompTIA Secure Cloud Professional (CSCP). The two courses contained in this path are:

About The Exams for CompTIA CSCP

For the CompTIA Security+ certification, you must pass the following exam.

For CompTIA Cloud+ certification, you are required to pass one exam:

Important Note: The current CompTIA Cloud+ courses provided by ITU does not cover the updated exam provided by CompTIA. Using our CompTIA Cloud+ courses for the intent of meeting exam objectives is not currently recommended but remains a valuable learning resource for learning the foundation needed for certification.

Upon successfully passing the applicable exams provided by CompTIA, you will earn the CSCP certification badge.

For more information on CompTIA Stackable Certifications, visit the CompTIA website. Pricing charged by CompTIA varies by exam. For details on current pricing, visit CompTIA Pricing on their website.

CompTIA Security+ SY0-501 Course Outline

Module 1: Threats, Attacks and Vulnerabilities
  •    Module 1 Workbook
  •    Introduction
  •    Types Of Malware-Part 1
  •    Types Of Malware-Part 2
  •    Types Of Attacks-Part 1
  •    Types Of Attacks-Part 2
  •    Types Of Attacks-Part 3
  •    Types Of Attacks-Part 4
  •    Types Of Attacks-Part 5
  •    Threat Actors-Part 1
  •    Threat Actors-Part 2
  •    Penetration Testing And Vulnerability Scanning-Part 1
  •    Penetration Testing And Vulnerability Scanning-Part 2
  •    Impact Of Vulnerabilities-Part 1
  •    Impact Of Vulnerabilities-Part 2
Module 2: Technologies and Tools
  •    Module 2 Workbook
  •    Networking Hardware And Software-Part 1
  •    Networking Hardware And Software-Part 2
  •    Networking Hardware And Software-Part 3
  •    Networking Hardware And Software-Part 4
  •    Networking Hardware And Software-Part 5
  •    Networking Hardware And Software-Part 6
  •    Security Assessment-Part 1
  •    Security Assessment-Part 2
  •    Troubleshooting Issues-Part 1
  •    Troubleshooting Issues-Part 2
  •    Securing Mobile Devices-Part 1
  •    Securing Mobile Devices-Part 2
  •    Securing Mobile Devices-Part 3
  •    Securing Mobile Devices-Part 4
  •    Secure Protocols-Part 1
  •    Secure Protocols-Part 2
Module 3: Architecture and Design
  •    Module 3 Workbook
  •    Secure Network Architecture-Part 1
  •    Secure Network Architecture-Part 2
  •    Secure System Designs-Part 1
  •    Secure System Designs-Part 2
  •    Secure Staging Deployment Concepts
  •    Embedded Systems-Part 1
  •    Embedded Systems-Part 2
  •    Application Development And Deployment-Part 1
  •    Application Development And Deployment-Part 2
  •    Application Development And Deployment-Part 3
  •    Physical Security Controls-Part 1
  •    Physical Security Controls-Part 2
  •    Physical Security Controls-Part 3
  •    Cloud Virtualization-Part 1
  •    Cloud Virtualization-Part 2
Module 4: Identity and Access Management
  •    Module 4 Workbook
  •    Identity And Access Management-Part1
  •    Identity And Access Management-Part2
  •    Identity And Access Services-Part1
  •    Identity And Access Services-Part2
  •    Management Controls-Part1
  •    Management Controls-Part2
  •    Account Management Practices-Part1
  •    Account Management Practices-Part2
  •    Account Management Practices-Part3
Module 5: Risk Management
  •    Module 5 Workbook
  •    Organizational Security-Part1
  •    Organizational Security-Part2
  •    Business Impact Analysis Concepts-Part1
  •    Business Impact Analysis Concepts-Part2
  •    Risk Management-Part1
  •    Risk Management-Part2
  •    Incident Response Procedures-Part1
  •    Incident Response Procedures-Part2
  •    Forensics-Part1
  •    Forensics-Part2
  •    Disaster Recovery-Part1
  •    Disaster Recovery-Part2
  •    Types Of Control-Part1
  •    Types Of Control-Part2
  •    Data Security And Privacy Practices-Part1
  •    Data Security And Privacy Practices-Part2
Module 6: Cryptography and PKI
  •    Module 6 Workbook
  •    Cryptographic Basics-Part1
  •    Cryptographic Basics-Part2
  •    Cryptographic Basics-Part3
  •    Cryptographic Algorithms-Part1
  •    Cryptographic Algorithms-Part2
  •    Wireless Security-Part1
  •    Wireless Security-Part2
  •    Implementing PKI-Part1
  •    Implementing PKI-Part2
  •    Implementing PKI-Part3
  •    Conclusion

CompTIA CV0-001: CompTIA Cloud + Course Outline

Module 1
  •    Introduction
  •    Models-Part 1
  •    Models-Part 2
  •    Service And Delivery Models
  •    Terms And Characteristics
  •    Objects Storage Concepts
Module 2
  •    Virtualization
  •    Install Configure Manage VM And Devices
  •    Backups
  •    Virtual Disks
  •    Virtual Switches
  •    Virtual Resource Migration
  •    Benefits Of Virtualization In A Cloud Environment
  •    Compare And Contrast Virtua lEnvironment
Module 3
  •    Infrastructure
  •    Different Access Protocols
  •    Explain Storage Configuration
  •    File Systems Types
  •    Executing Storage Provisioning
  •    Network Share Demo
  •    Implement Appropriate Network Configurations
  •    Importance Of Network Optimization
  •    Troubleshoot Basic Network Configuration-Part 1
  •    Troubleshoot Basic Network Configuration-Part 2
  •    Troubleshoot Commands-Part 1
  •    Troubleshoot Commands-Part 2
  •    Troubleshoot Commands-Part 3
  •    Explain Common Network Protocols
  •    Common Hardware Resources
Module 4
  •    Resource Management-Part 1
  •    Resource Management-Part 2
  •    Establishing Baselines And Thresholds
  •    Appropriately Allocate Physical Host Resources-Part 1
  •    Appropriately Allocate Physical Host Resources-Part 2
  •    Appropriately Allocate Virtual Guest Resources-Part 1
  •    Appropriately Allocate Virtual Guest Resources-Part 2
  •    Use Appropriate Tools For Remote Access
Module 5
  •    Security-Part 1
  •    Security-Part 2
  •    Storage Security Concepts And Methods
  •    Different Encryption Technologies
  •    Identify Access Control Methods
Module 6
  •    Systems Management-Part 1
  •    Systems Management-Part 2
  •    Diagnose Remediate And Optimize-Part 1
  •    Diagnose Remediate And Optimize-Part 2
  •    Common Performance Concepts-Part 1
  •    Common Performance Concepts-Part 2
  •    Testing Techniques
Module 7
  •    Business Continuity In Cloud-Part 1
  •    Business Continuity In Cloud-Part 2
  •    Solutions To Meet Availability Requirements
  •    Conclusion
ITU Learning Management System Image