CompTIA Security+

4 out of 5
4
6 reviews
RedHat Certified System Administrator RHCSA

The primary goal of this quick start guide is to introduce you to Unreal Engine 4`s (UE4) development environment. By the end of this guide, you`ll know how to set up and develop C++ Projects in UE4. This guide shows you how to create a new Unreal Engine project, add a new C++ class to it, compile the project, and add an instance of a new class to your level. By the time you reach the end of this guide, you`ll be able to see your programmed Actor floating above a table in the level.

This quick start guide shows you how to add assets to your Unreal Engine (UE4) games. By the end of this guide, you`ll know how to use the Project Browser to create new projects and navigate the Content Browser to find and add content. You`ll also know where to find information on the FBX Content Pipeline while learning how to use the Material Editor to modify Materials before applying them to a Static Mesh Actor.

Main Features

  • Achieve Hollywood best quality visuals out of the box.
  • With complete C++ source code access, you can study.
  • Comes with designer-friendly Blueprint visual scripting.
  • Unreal Engine provides Robust Multiplayer Framework.
  • The built-in Cascade visual effects editor enables particles.
  • Unreal Engine 4`s Material Editor makes use of physically-based.

What is the target audience?

  • You might be thinking, all of the above – and that is fine. But as a complete beginner learning Unreal Engine 4.
  • The rendering system in Unreal Engine 4 is an all-new, DirectX 11 pipeline that includes deferred shading.

Learning a new game engine as a complete beginner is very intimidating. There are a lot of tutorials, documentation and advice already out but how do you start and proceed with learning Unreal Engine 4 is unclear. You get pulled into many different directions and end up confused and overwhelmed.

I have spent a lot of time deconstructing what it takes to learn a game engine from scratch. What it is that you should focus on first and what you should avoid until later.

Understanding Security Fundamentals

1
CTS – Security Fundamentals
2
CTS – Comparing Control Types
3
CTS – Physical Security Controls
4
CTS – Understanding Digital Forensics

Implementing Public Key Infrastructure

1
CTS – PKI Concepts
2
CTS – Asymmetric and Symmetric Encryption
3
CTS – Key Stretching Algorithms
4
CTS – Salting Passwords
5
CTS – Cipher Modes
6
CTS – Quantum Computing
7
CTS – Blockchain and the Public Ledger
8
CTS – Hashing and Data Integrity
9
CTS – Comparing and Contrasting the Basic Concepts of Cryptography
10
CTS – Basic Cryptographic Terminologies
11
CTS – Common Use Cases for Cryptography

Investigating Identity and Access Management

1
CTS – Understanding Identity and Access Management Concepts
2
CTS – Identity Types
3
CTS – Account Types
4
CTS – Authentication Types
5
CTS – Implementing Authentication and Authorization Solutions
6
CTS – Summarizing Authentication and Authorization Design Concepts
7
CTS – Cloud versus On-Premises Authentication
8
CTS – Common Account Management Policies
9
CTS – Practical Exercise – Password Policy

Exploring Virtualization and Cloud Concepts

1
CTS – Overview of Cloud Computing
2
CTS – Implementing Different Cloud Deployment Models
3
CTS – Understanding Cloud Service Models
4
CTS – Understanding Cloud Computing Concepts
5
CTS – Understanding Cloud Storage Concepts
6
CTS – Selecting Cloud Security Controls
7
CTS – Exploring the Virtual Network Environments

Monitoring | Scanning and Penetration Testing

1
CTS – Penetration Testing Concepts
2
CTS – Passive and Active Reconnaissance
3
CTS – Exercise Types
4
CTS – Vulnerability Scanning Concepts
5
CTS – Syslog/Security Information and Event Management
6
CTS – Security Orchestration, Automation, and Response

Understanding Secure and Insecure Protocols

1
CTS – Introduction to Protocols
2
CTS – Insecure Protocols and Their Use Cases
3
CTS – Secure Protocols and Their Use Cases
4
CTS – Additional Use Cases and Their Protocols

Delving into Network and Security Concepts

1
CTS – Installing and Configuring Network Components
2
CTS – Remote Access Capabilities
3
CTS – Secure Network Architecture Concepts
4
CTS – Network Reconnaissance and Discovery
5
CTS – Forensic Tools
6
CTS – IP Addressing

Securing Wireless and Mobile Solutions

1
CTS – Implementing Wireless Security
2
CTS – Wireless Access Point Controllers
3
CTS – Deploying Mobile Devices Securely
4
CTS – Mobile Device Connection Methods

Identifying Threats | Attacks and Vulnerabilities

1
CTS – Virus and Malware Attacks
2
CTS – Social Engineering Attacks
3
CTS – Threat Actors
4
CTS – Advanced Attacks

Governance | Risk and Compliance

1
CTS – Risk Management Processes and Concepts
2
CTS – Threat Actors, Vectors, and Intelligence Concepts
3
CTS – The Importance of Policies for Organizational Security
4
CTS – Regulations, Standards, and Legislation
5
CTS – Privacy and Sensitive Data Concepts

Managing Application Security

1
CTS – Implementing Host or Application Security
2
CTS – Understanding the Security Implications of Embedded and Specialist Systems
3
CTS – Understanding Secure Application Development, Deployment, and Automation

Dealing with Incident Response Procedures

1
CTS – Incident Response Procedures
2
CTS – Utilizing Data Sources to Support Investigations
3
CTS – Knowing How to Apply Mitigation Techniques or Controls to Secure an Environment
4
CTS – Implementing Cybersecurity Resilience
4
4 out of 5
6 Ratings

Detailed Rating

Stars 5
3
Stars 4
0
Stars 3
3
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review
Add to Wishlist
Enrolled: 0 students
Lectures: 67

Archive

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
CompTIA Security+
Category:
4 out of 5
4
6 reviews
Price:
Free