Security+ Certification - GBSI Training

belchertownshuffleΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

70 εμφανίσεις



Security
+ Certification
Course ID

TIA
8
00
Course Description

CompTIA Security+ validates knowledge of communication security, infrastructure
security,
cryptogra
phy,
operational security, and general security concepts. This pract
ical hands
-
on
course will teach
students the fundamental principles of installing and configuring computer
and network security systems
.

Prerequisites

An introd
uctory course in a Windows operating system, or equivalent skills and knowledge, is
required. CompTIA A+ certification, or the equivalent skills and knowledge, is helpful but not
required.

Audience

This course is intended for students wishing to
qualify with CompTIA Securi
ty+. The
qualification is aimed
primarily at networking professionals, but because security is vital to all

levels and job roles within an
organization, it will also benefit PC support analysts, application
developers, and senior

man
agers in
accounting, sales, product development, and marketing.
.

Duration

5 days

Course Content

Security Fundamentals

Security Concepts



Why is Security Important?



Security Controls



Identification and

Authentication



Authorization



Accounting


Threats



Types and Sources of Threats



Social Engineering



Malware



Preventing Virus Infection

Network Vulnerabilities



Network Fundamentals



Network Attack Strategies



Layer 2 Attacks



IP Spoofing and Hijacking



Denial of Service Attacks



Application Layer Attacks

Network Security

Penetration Testing



Vulnerability Assessments and Penetration Tests



Vulnerability Scanners



Honeypots and Honeynets

Secure Network Design



Secure Network Topologies



Network Device Exp
loitation



Switches and VLANs



Routers

Security Appliances and Software



Firewalls



Proxy Servers and Gateways



Intrusion Detection Systems



Audit Logs

Network Application Security



DHCP Security



DNS Security



SNMP Security



Internet Security

Cryptography



What is Cryptography?



Encryption Technologies



Cryptographic Attacks



Steganography

Public Key Infrastructure



What is PKI?



Implementing PKI



Cryptographic Standards

Securing Web Services



HTTP



SSL / TLS



Web Servers



Securing Web Applicat
ions



Web Browsers



File Transfer

Access Control

Authentication



LAN Manager / NTLM



Kerberos



PAP and CHAP



Password Management Policy



Token
-
based Authentication



Biometric Authentication



Extensible Authentication Protocol (EAP)

Authorization



Privilege
Policies



Directory Services



Lightweight Directory Access Protocol (LDAP)


Operating System Security



Computer Hardening



OS Hardening



Hardware and Software Updates



Network Access Control

Remote Access Security



What is Remote Access?



Remote Connectivity

Protocols



Remote Access Servers



Remote Administration Tools



Hardening Remote Access Infrastructure

Wireless Access Security



Wireless LAN Security



Bluetooth

Organizational Security

Site Security



Physical Access Controls



Environmental Security



Mobile Device Security



Telephony

Disaster Recovery and Business Continuity



Disaster Recovery Planning



Business Continuity and Risk Management



Fault Tolerance



Backup Strategies

Incident Response and Forensics



Incident Response Policy



Forensic Investi
gations

Operational Security



Corporate Security Policy



Data Handling




HR Policies

Next Generation Networks



Virtualization Defined



Virtual Platform Applications



Virtualization

Security and Best Practice



Cloud Computing



IPv4 versus IPv6