Course
Description
This course will prepare students to pass the current CompTIA Security+ certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field. Comes with MeasureUp and CertBlaster exam prep software (download), and a companion CBT program.
|
Course
Content |
Lesson
1: |
Security overview |
|
Topic A: Introduction to network security
Topic B: Understanding security threats
Topic C: Creating a secure network strategy
Topic D: Windows Server 2003 server access control |
Lesson
2: |
Authentication |
|
Topic A: Introduction to authentication
Topic B: Kerberos
Topic C: Challenge Handshake Authentication Protocol
Topic D: Digital certificates
Topic E: Security tokens
Topic F: Biometrics |
Lesson
3: |
Attacks and malicious code |
|
Topic A: Denial of service attacks
Topic B: Man-in-the-middle attacks
Topic C: Spoofing
Topic D: Replays
Topic E: TCP session hijacking
Topic F: Social engineering
Topic G: Attacks against encrypted data
Topic H: Software exploitation |
Lesson
4: |
Remote access |
|
Topic A: Securing remote communications
Topic B: Authentication
Topic C: Virtual private networks
Topic D: Telecommuting vulnerabilities |
Lesson
5: |
E-mail |
|
Topic A: Secure e-mail and encryption
Topic B: PGP and S/MIME encryption
Topic C: E-mail vulnerabilities |
Lesson
6: |
Web security |
|
Topic A: SSL/TLS protocol
Topic B: Vulnerabilities of Web tools
Topic C: Configuring Internet Explorer security |
Lesson
7: |
Directory and file transfer services |
|
Topic A: Introduction to directory services
Topic B: File transfer services
Topic C: File sharing |
Lesson
8: |
Wireless and instant messaging |
|
Topic A: IEEE 802.11
Topic B: WAP 1.x and WAP 2.0
Topic C: Wired equivalent privacy
Topic D: Instant messaging |
Lesson
9: |
Network devices |
|
Topic A: Understanding firewalls
Topic B: Routers
Topic C: Switches
Topic D: Telecom, cable modem, and wireless devices
Topic E: Securing remote access
Topic F: Intrusion detection systems
Topic G: Network monitoring |
Lesson
10: |
Transmission and storage media |
|
Topic A: Transmission media
Topic B: Storage media |
Lesson
11: |
Network security topologies |
|
Topic A: Security topologies
Topic B: Network Address Translation
Topic C: Tunneling
Topic D: Virtual Local Area Networks |
Lesson
12: |
Intrusion detection |
|
Topic A: Intrusion detection systems
Topic B: Network-based and host-based IDS
Topic C: Active and passive detection
Topic D: Honeypots
Topic E: Incident response |
Lesson
13: |
Security baselines |
|
Topic A: OS/NOS hardening
Topic B: Network hardening
Topic C: Application hardening
Topic D: Workstations and servers |
Lesson
14: |
Cryptography |
|
Topic A: Concepts of cryptography
Topic B: Public Key Infrastructure (PKI)
Topic C: Key management and life cycle
Topic D: Setting up a certificate server
|
Lesson
15: |
Physical security |
|
Topic A: Access control
Topic B: Environment |
Lesson
16: |
Disaster recovery and business continuity |
|
Topic A: Disaster recovery
Topic B: Business continuity
Topic C: Policies and procedures
Topic D: Privilege management |
Lesson
17: |
Computer forensics and advanced topics |
|
Topic A: Understanding computer forensics
Topic B: Risk identification
Topic C: Education and training
Topic D: Auditing
Topic E: Documentation |