contact@ubslao.com +856 20 57959555 +856 20 55881787 +856 20 59720444 +856 20 57935999

CompTIA Security+

ຫຼັກສູດ CompTIA Security+ (​ຝຶກ​ອົບ​ຮົມ​ແລະ​ສອບ​ເສັງ​)

ຄວາມກ້າວຫນ້າທາງດ້ານເຕັກໂນໂລຊີຂໍ້ມູນຂ່າວສານ ແລະ ການສື່ສານ ລວມທັງເຄືອຂ່າຍສັງຄົມຕ່າງໆ ໄດ້ມີບົດບາດສໍາຄັນໃນຊີວິດປະຈໍາວັນຂອງປະຊາຊົນເພີ່ມຫຼາຍຂຶ້ນ ໃນຂະນະດຽວກັນໄດ້ພົບເຫັນວ່າບັນຫາຄວາມປອດໄພທາງອິນເຕີເນັດໄດ້ມີຄວາມຮຸນແຮງເພີ່ມຫຼາຍຂຶ້ນ ເນື່ອງຈາກໄພຂົ່ມຂູ່ທາງອິນເຕີເນັດມີຜົນກະທົບທັງລະດັບຊາດ ແລະ ລະດັບອົງການຈັດຕັ້ງ, ອົງການຈັດຕັ້ງຕ້ອງພັດທະນາແຮງງານຂອງທ່ານໃຫ້ມີຄວາມຮູ້ ແລະ ຄວາມສາມາດທີ່ຈະປົກປັກຮັກສາອົງການຈັດຕັ້ງຂອງທ່ານຈາກຮູບແບບຕ່າງໆຂອງການຂົ່ມຂູ່ທາງອິນເຕີເນັດ ເຊິ່ງ CompTIA Security+ ເປັນການຢັ້ງຢືນທົ່ວໂລກກວມເອົາລະດັບຄວາມກ້ວາງຂອງໄພຂົ່ມຂູ່ທາງອິນເຕີເນັດ ການອອກແບບລະບົບເຕັກໂນໂລຊີຂໍ້ມູນຂ່າວສານຂອງອົງການຈັດຕັ້ງເພື່ອຄວາມປອດໄພ ການຕອບໂຕ້ເປັນຈຸດເລີ່ມຕົ້ນຂອງທັກສະດ້ານຄວາມປອດໄພດ້ານໄອທີທີ່ເປັນມືອາຊີບ.

* ສາມາດນຳຄວາມຮູ້ທີ່ໄດ້ຈາກ Course ນີ້ໄປເປັນພຶ້ນຖານເພື່ອຕໍ່ຍອດໃນການສອບເສັງ Certified in Cybersecurity (CC) ຂອງ ISC2 ໄດ້ນຳ (ປັດຈຸບັນສາມາດສອບເສັງໄດ້ຝີຣ)

** ສ່ວນຫຼຸດ 20% ສຳລັບບຸກຄະລາກອນທາງການສຶກສາ

// Course //
01
ຝຶກອົບຮົມ
  • ຝຶກອົບຮົມ 5 ມື້ (Mon-Fri)
  • 9:00 AM. - 4:00 PM.
02
ເໝາະສໍາລັບ
  • Beginner (ລະດັບຂັ້ນຕົ້ນ)
  • Intermediate (ລະດັບປານກາງ)
03
ສິ່ງ​ທີ່​ທ່ານ​ຈະ​ໄດ້​ຮັບ
  • Official student guide / materials
  • ອາ​ຫານ​ທ່ຽງ ​ແລະ ຊ່ວງ​ເວລາພັກ​ຜ່ອນ​
04
ລາຄາຝຶກອົບຮົມ (ລາຄາໂປຣໂມຊັນ !)
  • 21,999,900 KIP ເຂົ້າຮ່ວມ ແລະ ສອບເສັງ (Exam Voucher Included)
  • 11,999,900 KIP ຝຶກອົບຮົມຢ່າງດຽວ (ໄດ້ຮັບ attendance certification)
05
ອາຈານສອນ
  • CompTIA Certified Classroom Trainer (CTT+), SecurityX (CASP+), PenTest+, CySA+, Security+
  • CISSP, CSSLP, CCSP, C|EH, C|BP, E|CSS, Associate C|CISO

ຕາຕະລາງຝຶກອົບຮົມ

3–7 ມີນາ 2025
(Finished)
7-11 ເມສາ 2025
(Finished)
12-16 ພຶດສະພາ 2025
(Full)
9-13 ມິຖຸນາ 2025
(Opening)
11-15 ສິງຫາ 2025
6-10 ຕຸລາ 2025

ເນື້ອໃນການຝຶກອົບຮົມ (SY0-701)

○ Lesson 1: Summarizing Fundamental Security Concepts
Security Concepts
Security Controls
○ Lesson 2: Comparing Threat Types
Threat Actors
Attack Surface
Social Engineering
○ Lesson 3: Explaining Appropriate Cryptographic Solutions
Cryptographic Algorithms
Public Key Infrastructure
Cryptographic Solutions
○ Lesson 4: Implement Identity and Access Management
Authentication
Access Management
Identity Management
○ Lesson 5: Maintain Enterprise Campus Network Architecture
Enterprise Network Architecture
Network Security Appliances
Virtual Private Networks
○ Lesson 6: Secure Cloud Network Architecture
Cloud Infrastructure
Embedded Systems and Zero Trust Architecture
○ Lesson 7: Explain Resiliency and Site Security Concepts
Asset Management
Redundancy Strategies
Physical Security
○ Lesson 8: Explain Vulnerability Management
Device and OS Vulnerabilities
Application and Cloud Vulnerabilities
Vulnerability Identification Methods
Vulnerability Analysis and Remediation
○ Lesson 9: Evaluate Network Security Capabilities
Network Security Baselines
Network Security Capability Enhancement
○ Lesson 10: Assess Endpoint Security Capabilities
Implement Endpoint Security
Mobile Device Hardening
○ Lesson 11: Enhance Application Security Capabilities
Application Protocol Security Baselines
Cloud and Web Application Security Concepts
○ Lesson 12: Explain Alerting and Monitoring Concepts
Incident Response
Digital Forensics
Data Sources
Alerting and Monitoring Tools
○ Lesson 13: Analyze Indicators of Malicious Activity
Malware Attack Indicators
Physical and Network Attack Indicators
Application Attack Indicators
○ Lesson 14: Summarize Security Governance Concepts
Policies, Standards, and Procedures
Change Management
Automation and Orchestration
○ Lesson 15: Explain Risk Management Processes
Risk Management Processes and Concepts
Vendor Management Concepts
Audits and Assessments
○ Lesson 16: Summarize Data Protection and Compliance Concepts
Data Classification and Compliance
Personnel Policies