 |
Security+
Course Code: CT22-505
Outline |
Mitigating threats
Core system maintenance
Virus and spyware management
Browser security
Social engineering threats
Cryptography
Symmetric cryptography
Public key cryptography
Authentication systems
Authentication
Hashing
Authentication systems
Messaging security
E-mail security
Messaging and peer-to-peer security
User and role based security
Security policies
Securing file and print resources
Public key infrastructure
Key management and life cycle
Setting up a certificate server
Web server security with PKI
Access security
Biometric systems
Physical access security
Peripheral and component security
Storage device security
Ports and protocols
TCP/IP review
Protocol-based attacks |
Network security
Common network devices
Secure network topologies
Browser-related network security
Virtualization
Wireless security
Wi-Fi network security
Non-PC wireless devices
Remote access security
Remote access
Virtual private networks
Auditing, logging, and monitoring
System logging
Server monitoring
Vulnerability testing
Risk and vulnerability assessment
IDS and IPS
Forensics
Organizational security
Organizational policies
Education and training
Disposal and destruction
Business continuity
Redundancy planning
Backups
Environmental controls |
 |
 |
After completing this course, students will know how to:
- Mitigate threats to network security through core system maintenance, implement virus and spyware management tools, secure Web browsers, and identify social engineering threats.
- Identify cryptography concepts including algorithms, public keys, security certificates, and single- and dual-sided certificates.
- Implement authentication systems such as one-, two-, and three-factor authentication, prevent password cracking, and use authentication such as Kerberos and CHAP.
- Secure e-mail and messaging services.
- Create security policies to secure file and print resources.
- Install, enable, and configure public key infrastructure.
- Install and configure security systems including biometric systems, physical access controls, as well as access to peripherals, computer components, and storage devices.
- Assess vulnerability to security attacks against TCP/IP ports and protocols.
- Configure intranet and extranet security zones and use virtualization to protect network security, as well as identify common threats against network devices.
- Implement a secure wireless network.
- Create a secure remote access network using RADIUS, TACACS, LDAP, and VPNs.
- Use auditing, logging, and monitoring techniques to maintain a secure network.
- Conduct security risks and vulnerability assessment using IPS, IDS, MBSA, and OVAL tools.
- Establish organizational security through organizational policies, education and training, and the proper disposal and destruction of IT equipment.
- Create a business continuity plan that prepares the organization to deal with security threats and natural disasters.
|
|
Contact The Fourth R |
 |
 |
|
|