May-2023-Class

Welcome to Softafrique’s eLearning program aligned with the Security plus course outline designed by CompTIA. The course is to prepare candidates to combat emerging threats, help to identify attacks and vulnerabilities to mitigate them before they infiltrate victims network. Understand secure virtualization, secure application deployment, and automation concepts. The course duration is sixteen weeks (16) and classes are held on weekends (Saturdays and Sundays) between 2:00pm to 4:00pm EST. The following are the course domains that will be covered during the class session.

  • Attacks, Threats and Vulnerabilities:- Focusing on more threats, attacks, and vulnerabilities on the Internet from newer custom devices that must be mitigated, such as IoT and embedded devices, newer DDoS attacks, and social engineering attacks based on current events.

  • Architecture and Design:- Includes coverage of enterprise environments and reliance on the cloud, which is growing quickly as organizations transition to hybrid networks.

  • Implementation:- Expanded to focus on administering identity, access management, PKI, basic cryptography, wireless, and end-to-end security.

  • Operations and Incident Response:- Covering organizational security assessment and incident response procedures, such as basic threat detection, risk mitigation techniques, security controls, and basic digital forensics.

  • Governance, Risk and Compliance:- Expanded to support organizational risk management and compliance to regulations, such as PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST, and CCPA.

we provide our students the opportunity to gain hands on training and experience. We have all the leading tools in the industry at our disposal and we train our students on how to use them.

 

 

 

 

 

 

 

 

 

Chapter - 1

1
401 Chaos
2
Assignment 1
3
Lecture — 1
4
Lecture — 2
5
Blame Game
6
Lecture — 3
7
Lecture — 4
8
You Never Call… (Business Email Compromise)
9
Quiz 1-Security Plus
20 questions

Chapter - 2

1
Lecture — 5
2
Lecture — 6
3
A compromising crash – BEC cyberattack
4
Lecture — 7
5
Lecture — 8
6
Lesson 4 Assignment 1
7
2-Factor Account Takeover
8
Lecture — 9
9
Lecture — 10
10
Stored Document Integrity
11
Lecture — 11
12
Lecture — 12
13
Cracked Email Extortion
14
Quiz 4 (Chapter 4)
20 questions
15
Wire Fraud Assignment

Chapter-3

1
Lecture — 13
2
Lecture — 14
3
Email Misdelivery
4
Group Presentation
5
Lecture — 15
6
Lecture –16
7
GLBA Compliance
8
Smishing
9
Lecture — 17
10
Lecture — 18
11
Rogue USB Device
12
Lecture — 19
13
Lecture — 20
14
HIPAA Compliance
15
Lecture — 21
16
Lecture — 22
17
Hook Line and Spoofer – Telephone Scams
18
Ex-CEO of breached pyschotherapy clinic gets prison sentence for bad data security
19
QR Code Phishing
20
Lecture — 23
21
Lecture — 24
22
Physical Security and Data Protection Overview
23
April-Group Presentation
24
Lecture — 25
25
Lecture — 26
26
Phishing Interactive
27
Quiz 5
99 questions

Chapter -- 4

1
Lecture — 27
2
Lecture — 28
3
Macro Malware
4
Digital Signature Quiz
30 questions
5
Lecture – 29
6
Lecture — 30
7
Passphrase For Days
8
Digital Envelops
9
Lecture — 31
10
Lecture — 32
11
Quiz 6
20 questions
12
Lecture — 33
13
Lecture — 34

Be the first to add a review.

Please, login to leave a review
Get course
Enrolled: 21 students
Lectures: 34

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed