|  
                         Course 
                          Description 
                          This course will prepare students to pass the  current CompTIA Security+ certification exam. After taking this course,  students will understand the field of network security and how it relates to  other areas of information technology. This course also provides the  broad-based knowledge necessary to prepare for further study in specialized  security fields, or it can serve as a capstone course that gives a general  introduction to the field. Comes with MeasureUp and CertBlaster exam prep  software (download), and a companion CBT program. 
                                                | 
                    
                     
                      | Course 
                        Content | 
                    
                     
                      |  
                         Lesson 
                          1:                         | 
                      Security overview | 
                    
                     
                      |  
                                               | 
                      Topic A: Introduction to network security 
Topic B: Understanding security threats 
Topic C: Creating a secure network strategy 
Topic D: Windows Server 2003 server access control | 
                    
                     
                      |  
                         Lesson 
                          2:                         | 
                      Authentication | 
                    
                     
                      |  
                                                 | 
                      Topic A: Introduction to authentication 
Topic B: Kerberos 
Topic C: Challenge Handshake Authentication Protocol 
Topic D: Digital certificates 
Topic E: Security tokens 
Topic F: Biometrics | 
                    
                     
                      |  
                         Lesson 
                          3:                        | 
                      Attacks and malicious code | 
                    
                     
                      |  
                                                 | 
                      Topic A: Denial of service attacks 
Topic B: Man-in-the-middle attacks 
Topic C: Spoofing 
Topic D: Replays 
Topic E: TCP session hijacking 
Topic F: Social engineering 
Topic G: Attacks against encrypted data 
Topic H: Software exploitation | 
                    
                     
                      |  
                         Lesson 
                          4:                        | 
                      Remote access | 
                    
                     
                      |  
                                                 | 
                      Topic A: Securing remote communications 
Topic B: Authentication 
Topic C: Virtual private networks 
Topic D: Telecommuting vulnerabilities | 
                    
                     
                      |  
                         Lesson 
                          5:                        | 
                      E-mail | 
                    
                     
                      |  
                                                 | 
                      Topic A: Secure e-mail and encryption 
Topic B: PGP and S/MIME encryption 
Topic C: E-mail vulnerabilities | 
                    
                     
                      |  
                         Lesson 
                          6:                        | 
                      Web security | 
                    
                     
                      |  
                                                 | 
                      Topic A: SSL/TLS protocol 
Topic B: Vulnerabilities of Web tools 
Topic C: Configuring Internet Explorer security | 
                    
                     
                      |  
                         Lesson 
                          7:                         | 
                      Directory and file transfer services | 
                    
                     
                      |  
                                                 | 
                      Topic A: Introduction to directory services 
Topic B: File transfer services 
Topic C: File sharing | 
                    
                     
                      |  
                         Lesson 
                          8:                        | 
                      Wireless and instant messaging | 
                    
                     
                      |  
                                                 | 
                      Topic A: IEEE 802.11 
Topic B: WAP 1.x and WAP 2.0 
Topic C: Wired equivalent privacy 
Topic D: Instant messaging | 
                    
                     
                      |  
                         Lesson 
                          9:                        | 
                      Network devices | 
                    
                    
                    
                      |   | 
                      Topic A: Understanding firewalls 
Topic B: Routers 
Topic C: Switches 
Topic D: Telecom, cable modem, and wireless devices 
Topic E: Securing remote access 
Topic F: Intrusion detection systems 
Topic G: Network monitoring | 
                    
                    
                      Lesson 
                      10:  | 
                      Transmission and storage media | 
                    
                    
                      |   | 
                      Topic A: Transmission media 
Topic B: Storage media | 
                    
                    
                      Lesson 
                      11:  | 
                      Network security topologies | 
                    
                    
                      |   | 
                      Topic A: Security topologies 
Topic B: Network Address Translation 
Topic C: Tunneling 
Topic D: Virtual Local Area Networks | 
                    
                    
                      Lesson 
                      12:  | 
                      Intrusion detection | 
                    
                    
                      |   | 
                      Topic A: Intrusion detection systems 
Topic B: Network-based and host-based IDS 
Topic C: Active and passive detection 
Topic D: Honeypots 
Topic E: Incident response | 
                    
                    
                      Lesson 
                      13:  | 
                      Security baselines | 
                    
                    
                      |   | 
                      Topic A: OS/NOS hardening 
Topic B: Network hardening 
Topic C: Application hardening 
Topic D: Workstations and servers | 
                    
                    
                      Lesson 
                      14:  | 
                      Cryptography | 
                    
                    
                      |   | 
                      Topic A: Concepts of cryptography 
Topic B: Public Key Infrastructure (PKI) 
Topic C: Key management and life cycle 
Topic D: Setting up a certificate server 
                       | 
                    
                    
                      Lesson 
                      15:  | 
                      Physical security | 
                    
                    
                      |   | 
                      Topic A: Access control 
Topic B: Environment | 
                    
                    
                      Lesson 
                      16:  | 
                      Disaster recovery and business continuity | 
                    
                    
                      |   | 
                      Topic A: Disaster recovery 
Topic B: Business continuity 
Topic C: Policies and procedures 
Topic D: Privilege management | 
                    
                    
                      Lesson 
                      17:  | 
                      Computer forensics and advanced topics | 
                    
                     
                      |  
                                                 | 
                      Topic A: Understanding computer forensics 
Topic B: Risk identification 
Topic C: Education and training 
Topic D: Auditing 
Topic E: Documentation |