Explore methods for conducting investigations and collecting evidence after a breach in security occurs.
Also learn to combat security threats to your IT infrastructure by understanding hacker attacks, managing risks and implementing security measures.
Understand digital forensics and the requirements and processes involved in an investigation.
Isolate and extract evidence in a live network environment.
Journey through the various stages of a hacking attack from initial information discovery through to privilege escalation and retaining access.
Understand how hackers bypass wireless security and the cryptographic principles behind the protocols and the attacks as well as learn how to implement wireless security measures.
This CompTIA certification is the benchmark for best practices in IT security. It covers the essential principles for network security and risk management.