Microsoft's Adminstering Windows 2000 Professional ... - TestOut

weepingwaterpickΑσφάλεια

23 Φεβ 2014 (πριν από 3 χρόνια και 1 μήνα)

309 εμφανίσεις














Lesson Plans



Security+


(Exam SY0
-
301)


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

1

Table of Contents


Section 0.1: Security Overview

................................
................................
.............

5

Section 0.2: Windows Networking

................................
................................
.........

8

Section 1.1: Access Control Models

................................
................................
...

10

Section 1.2: Authentication

................................
................................
.................

12

Section 1.3: User Accounts and

Passwords

................................
.......................

14

Section 1.4: Authorization

................................
................................
...................

16

Section 1.5: Physical Security

................................
................................
.............

18

Section 1.6: Access Control Best Practices

................................
........................

20

Section 2.1: Cryptography

................................
................................
..................

22

Section 2.2: Hashing

................................
................................
...........................

24

Section 2.3: Symmetric
Encryption

................................
................................
.....

26

Section 2.4: Asymmetric Encryption

................................
................................
...

28

Section 2.5: Public Key Infrastructure (PKI)

................................
........................

30

Section 2.6: Cryptography Implemen
tations

................................
.......................

32

Section 2.7: Secure Protocols

................................
................................
.............

35

Section 3.1: OSI Model Review

................................
................................
..........

37

Section 3.2: Protocols and Ports

................................
................................
.........

38

Section 3.3: IP Addressing

................................
................................
..................

40

Se
ction 3.4: Network Devices

................................
................................
.............

42

Section 3.5: Network Authentication

................................
................................
...

43

Section 3.6: Remote Access

................................
................................
...............

45

Section 3.7: RADIUS and TACACS+

................................
................................
..

48

Section 3.8: Wireless Networking

................................
................................
.......

50

Section 3.9: Cloud Computing

................................
................................
............

53

Section 4.1: Reconnaissance

................................
................................
.............

55

Section 4.2: Denial of Service

(DoS)

................................
................................
...

57

Section 4.3: Session and Spoofing Attacks

................................
........................

59

Section 4.4: DNS Attacks

................................
................................
....................

61

Section 4.5: Switch Attacks

................................
................................
.................

63

Section 4.6: Wireless Attacks

................................
................................
.............

64

Section 4.7: Network Device Vulnerabilities

................................
........................

66

Section 5.1: Firewalls

................................
................................
..........................

68

Section 5.2: Security Zones

................................
................................
................

70

Section 5.3: Intrusion Detection

................................
................................
..........

72

Section 5.4: Router and Switch Security

................................
.............................

75

Section 5.5: Security Solutions

................................
................................
...........

78

Section 5.6: Mobile Devices

................................
................................
................

80

Section 5.7: Telephony

................................
................................
.......................

82

Section 6.1: Malware

................................
................................
..........................

84

Section 6.2: Password Attacks

................................
................................
...........

86

Section 6.3: Operating System Hardening

................................
..........................

88

Section 6.4: Hardware Security
................................
................................
...........

90

Section 6.5 File Security

................................
................................
.....................

91

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

2

Section 7.1: Web Application Attacks

................................
................................
.

93

Section 7.2: Internet Explorer

................................
................................
.............

95

Section 7.3: E
-
mail

................................
................................
..............................

97

Section 7.4: Network Applications
................................
................................
.......

99

Section 7.5: Virtualization

................................
................................
.................

101

Section 7.
6: Application Development

................................
..............................

103

Section 8.1: Security Policies

................................
................................
............

10
5

Section 8.2: Business Continuity

................................
................................
......

108

Section 8.3: Redundancy

................................
................................
..................

110

Sect
ion 8.4: Backup and Restore
................................
................................
......

113

Section 8.5: Environmental Controls

................................
................................
.

115

Section 8.6: Social Engineering

................................
................................
........

117

Section 8.7: Incident
Response

................................
................................
........

119

Section 9.1: Risk Management

................................
................................
.........

121

Section 9.2: Vulnerability Assessment

................................
..............................

123

Section 9.3: Penetration Testing

................................
................................
.......

125

Section 9.4: Protocol Analyzers

................................
................................
........

128

Section 9.5: Logs and Audits

................................
................................
............

130

Practice Exams

................................
................................
................................
.

132

Appendix A: Approximate Time for the Course

................................
.................

133

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

3

Course Overview


This course
prepares students for

CompTIA’s Security+

Certification
Exam
:

SY0
-
3
01
.

It focuses on

controlling security, access, and
the
network

infrastructure
.


Module
0



Introduction

This module
introduces

the course
, recommended prerequisites, and basic
security
terms that will
be
referenced throughout the course
.

A review of
configuring Active Directory and Group policy to secure a Windows based
network is presented.

Module
1



Access Control

T
his module

provides an overview of access control models
, increasing s
ecurity
using authentication methods, configuring user accounts and passwords to
control and restrict access to network resources, and authorization concepts to
control access to resources. Students will also learn about controls that can be
used to physi
cally protect assets from threats and best practices for controlling
access to resources.

Module 2


C
ryptography

This module examines
the fundamentals of cryptography. Students will become
familiar with hashing, symmetric encryption, asymmetric encryption

concepts and
how they can be combined to take advantage of the strengths of each. Core
concepts of Public Key Infrastructure (PKI) are discussed as well as secure
protocols that can be used to provide security services to new or existing
protocols.

Modu
le 3


Network

Infrastructure

In t
his
module

students will learn

elements of the network infrastructure. A
review of the OSI Model is presented as well as the major protocols and ports
used for communication between network hosts.

Students will become familiar
with the characteristics of common network devices (hub, switch, and router) and
using network authentication to prove user identity before allowing access to
network resources. Implementing remote access and using RADIUS and

TACACS+ to centralize the administration of remote access policies are
discussed.
Students will learn how to connect a private network to the Internet
using Network Address Translation.
Wireless networking and cloud computing
are also presented.

Module 4


Network Attacks

This mo
dule
teaches the
students
about different types of network attacks

and
the countermeasures to prevent them
.

Reconnaissance is used by an attacker to
gather information about an organization prior to an attack
. Denial of Service
(Do
S)
and Distributed Denial of Service (DDoS) attacks effect system availability.

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

4

Session attacks capture data that can be used at a later date. Spoofing

attacks
hide

the source of packets or redirect traffic to another location.

DNS attacks
redirect traffic

to fake Web sites. Switch attacks are perpetrated against switches.

Module 5


Network
Security

This module discusses

elements that can be used to increase network security;
firewalls, security zones
, router and

switch
security
features. Network security
s
olutions include proxy servers, Internet content filter, and Network Access
Control (NAC). Students will become familiar with security considerations for
wireless networking
,
mobile devices
, and telephony
.

Module 6


System Security

This module examines
s
ystem security concerns that the students will need to be
aware of; types of malware, best practices for protecti
on

against malware,
network device vulnerabilities, and recommendations for hardening systems and
securing removable media. Students will learn

how to employ security controls to
file resources.

Module 7


Application Security

In

this module students will learn how to establish application security
against

Web application

attack
s, e
-
mail, and network applications (peer
-
to
-
peer and
instant messag
ing). They will also learn the advantages and disadvantages of
using virtualization technology.



Module 8


Organizational Security

This module teaches the students

the elements that should be in place to secure
an organization; security policies, disa
ster recovery procedures, redundancy
planning
,

and
backup and restore procedures
. E
nvironmental controls

help to
protect computer systems from environmental concerns such as heat, humidity,
water and fire. Students will become familiar with different types of s
ocial
engineering

attacks and
countermeasures

to these attacks. They will also learn
the appropriat
e response to an incident to ensure that they can recover from the
current attack and protect against future attacks.

Module 9


Assessments and Audits

This module examines

assessments and audits that can be made on a system

to
help troubleshoot and secure

the system
. Assessments include; risk
management,
vulnerability assessments, and assessments by penetration
testing.
Protocol analyzers

can be used to identify security
-
related irregularities.
Procedures to implement logging and auditing on a system are
discussed.

Practice Exams

In
Practice Exams

students will
have the opportunity to

test themselves and
verify that they understand the concepts and are ready to take the certification
exam
.

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

5


Section 0.1:
Security
Overview

Summary

This section
provides an o
verview of this course which is designed to prepare
students for the CompTIA
20
11

Edition of the
Security+ Certification

Exam SY0
-
3
01
.
The
Security
+ certification is a vendor neutral
certification
designed to
recognize foundation level security skills and
knowledge
.


S
ecurity terms that are
commonly
used in the IT industry and will be used
throughout the course are defined in this section.



Recommended prerequisites

include:




CompTIA
Network
+ certification or equivalent knowledge and experience



A minimum
of two years working in network administration with a focus on
security


This section provides an overview of security. Concepts covered include:




Modern day security challenges include:

o

Sophistication of attacks

o

Proliferation of attack software

o

Scale and
velocity of attacks



Common security terms

o

Confidentiality

o

Integrity

o

Availability

o

Authentication

o

Authorization

o

Accounting

o

Non
-
repudiation



Additional terms that apply to multiple security goals:

o

CIA of Security

o

AAA (Authentication, Authorization, and Account
ing)



Key Security components:

o

Physical security

o

Users and administrators

o

Policies



Risk Management:

o

Asset

o

Threat

o

Threat agent

o

Vulnerability

o

Exploit



Types of threat agents

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

6

o

Employee

o

Spy

o

Hacker



Steps to attack strategies:

o

Reconnaissance

o

Breach

o

Escalate
privileges

o

Stage

o

Exploit



Defense methodologies:

o

Layering

o

Principle of least privilege

o

Variety

o

Randomness

o

Simplicity

Security+ Objectives



2.8 Exemplify the concepts of confidentiality, integrity and availability (CIA)


Lecture Focus Questions:




What is the difference between
integrity

and
non
-
repudiation
?



What process provides confidentiality by converting data into a form that it
is unlikely to be usable by an unintended recipient?



What are the three main goals of security for the

CIA of Secur
ity
?



Which security expression refers to verifying that someone is who they
say they are?



In security terms what does AAA

refer to?



Video/Demo






Time


0.1.1 Security Challenges





8:22

0.1.2 Security Roles and Concepts




5:37

0.1.3 Threat Age
nt Types





8:20

0.1.5 General Attack Strategy





8:5
2

0.1.6 General Defense Strategy



18:2
6



Total







49:3
7



©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

7

Number of Exam Questions

7

questions

Total Time

About
60

minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

8

Section
0.2
:
Windows Networking


Summary

This section
ensures

the students
will have the foundational knowledge they
need of Active Directory and Group policy to correctly configure and secure a
Windows based network. Active Directory consists of the following components:



Domain



Trees and Forests



Organization Unit
(OU)



Generic Containers



Objects



Domain Controller

Group Policy Objects (GPOs) are divided into two categories:



Computer configuration



User configuration

Students will learn how to:



Configure objects in Active Directory.



Create and link a new Group Policy

Object (GPO).

Security+ Objectives



5.3

Implement

appropriate security controls when performing account
management


o

Group
based
policies

o

User assigned privileges

Lecture Focus Questions:



How does the security of a workgroup differ from the security for Active
Directory?



What is the function of an organizational unit (OU) in organizing network
resources within a domain?



What is the difference between organizational units (OU) and generic
containers?



What are common objects identified within the Active Directory?



When are
computer

configuration policies initially applied? When are
user
configuration policies applied?

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

9

Video/Demo






Time


0.2.1
Active Directory Introduction




9:21

0.2.2 Active Directory Structure




9:25

0.2.3 Viewing Active Directory





3:59

0.2.5 Group Policy Overview





8:41

0.2.6 Viewing Group Policy





7:47



Total







39:13

Lab/Activity



Create and Link a GPO

Total Time

About
50

minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

10

Section 1.
1
:
Access Control Models


Summary

T
his section
provides
an overview of the following access control models:




Mandatory Access Control (MAC)



Discretionary Access Control (DAC)



Role
-
Based Access Control (RBAC)



Rule
-
Based Access Control


Students will learn how to:



Implement DAC by configuring a discretionary access control list (DACL).

Security+ Objectives



5
.2 Explain

the fundamental concepts and best practices related to
authentication, authorization, and access control


o

Access control

o

Mandatory access control

o

Discretionary access control

o

Role
/r
ule based access control


Lecture Focus Questions:




How does the discretionary access control (DAC) provide access control?



What type of entries does the discretionary access control list (DACL
)
contain?



What is the function of each of the two types of labels used by the
Mandatory Access Control (MAC) access model?



What is the difference between
role
-
based

access control and
rule
-
based

access control?



How are Rule
-
Based Access Control and Man
datory Access Control
(MAC) similar?

Video/Demo






Time

1.1.1 Access Control Models




3:42

1.1.3 Implementing Discretionary Access Control

1:3
5


Total







5:1
7

Number of
Exam Questions

10

questions

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

11

Total Time

About 15 minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

12

Section 1.
2
:
Authentication

Summary

This section discusses

the process of proving the identi
t
y of a user before they
are allowed to access the resources of a network. This process consists of two
parts:




Identification



Authentication


A user can prove identity to an a
uthentication server in the following ways:




Type 1 Something you know



Type 2 Something you have



Type 3 Something you are


Terms

used

to measure the effectiveness of authentication solutions

include
:




False negative



False positive



Crossover error rate



Processing rate


A c
ombination of authentication methods

that can be used to increase security
include:




Two
-
factor, three
-
factor, and multi
-
factor



Strong



One
-
factor



Mutual


When using biometrics remember that they must be




Unique



Combined with other authe
ntication methods for greater security



Accurate



Physically e
nrolled



Single Sign On (
SSO
)

allows a user to log in once to a network and access all
authorized resources on the network without additional login credentials or
passwords.

Students will lear
n the advantages and disadvantages of using
SSO

authentication in enterprise environments.

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

13

Students will learn how to:



Use a biometric scanner to enroll (record) fingerprints that can be used for
authentication.



Configure fingerprint settings to automate execution of an application.



Use single sign
-
on to access all authorized resources on the network.

Security+ Objectives



5.2 Explain the fundamental concepts and best practices related to
authentication, authoriza
tion, and access control


o

Identification vs. authentication

o

Authentication (single factor) and authorization

o

Multifactor authentication

o

Biometrics


Lecture Focus Questions:




What is the difference between
authentication

and
identification
?



Which authentica
tion type is the most common?



Which form of authentication is generally considered the strongest?



What is the difference between
synchronous

and
asynchronous

token
devices?

Which type of biometric processing error is more serious, a false positive or a
false negative? Why?



What is the difference between strong authentication, two
-
factor
authentication, and multi
-
factor authentication?



What are the main advantages of SSO authentication? Disadvantages?

Video/Demo





Time

1.2.1 Authentication




11:19

1.2.3 Using a Biometric Scanner



3:49

1.2.5 Using Single Sign
-
on




1:16



Total






16:24

Number of
Exam Questions

1
4

questions

Total Time

About 40 minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

14

Section 1.
3
:
User Accounts and Passwords

Summary

This section
explores

methods used on user

accounts and passwords to control
and restrict access to network resources. Methods used include:




Account lockout

o

Account lockout threshold

o

Account lockout duration

o

Reset account lockout counter after



Account restrictions



Account (password) policies


St
udents will become familiar with:




Methods administrators use to control user account and password security



Methods hackers use to discover passwords



Strategies to protect against password attacks


Students will learn how to:



Control logical access by configuring user account and account lockout
policies.



Configure day/
t
ime

restrictions, computer restrictions, and expiration dates
for user accounts.



Enable and disable user accounts.



Configure the password policy for a domain
.



View system logon activity by using a key logger tool.



Using Group Policy Management, configure security settings such as
password policy settings to define requirements for user passwords.



Using Group Policy Management, configure user right assignment
s to
identify actions users can perform on a system.

Security+ Objectives



5.2 Explain the fundamental concepts and best practices related to
authentication, authorization, and access control

o

Time of day restrictions



5.3 Implement appropriate security contr
ols when performing account
management


o

Account policy enforcement



Password complexity



Expiration



Recovery

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

15



Length



Disablement



Lockout

Lecture Focus Questions:



What characteristics on a Microsoft system typically define a
complex

password?



What is the
clipping level

and how does it affect an account login?



What does the
minimum password age

setting prevent?



What setting lets you take actions for a specified number of incorrect
logon attempts?



As a best practice, what should you do to user accounts th
at will not be
used for an extended period of
t
ime
?

Video/Demo







Time

1.3.1
User Accounts and Passwords





5
:
4
1

1.
3
.3
Configuring User and Password Restrictions



4
:
30


Total








10:
11

Lab/Activity



Configure User Account Restrictions



Configure Account Policies

Number of
Exam Questions

9

questions

Total Time

About
3
0 minutes


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

16


Section
1.4
:
Authorization

Summary

In t
h
is section
students will learn
that authorization is the process of controlling
access to resources. The following
concepts are examined:




Group



Access Control List (ACL)



Discretionary Access List (DACL

)



System Access List (SACL)



Assigning permissions to a group



User rights



Security principal



Security ID (SID)



Access Token


Students
will learn how to:




Create a group and add members to the group.



Examine the elements of an access token using
whoami /all
.





After changes to user privileges, gain access to newly assigned resources
by creating a new access token (logging on again).

Security+ Objectives



5.
2 Explain the fundamental concepts and best practices related to
authentication, authorization, and access control

o

ACLs

o

Access control


o

Discretionary access control




5.3 Implement appropriate security controls when performing account
management


o

Mitigates issues associated with users with multiple account/roles

o

Group based privileges


o

User assigned privileges


Lecture Focus Questions:



What three types of information make up an access token?



How is the access token used to control access to reso
urces?



On a Microsoft system, when is the access token generated?



What types of objects are considered security principals?



What is the difference between a
discretionary

access list (DACL) and a
system

access list (SACL)?

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

17

Video/Demo






Time

1.4.1
Au
thorization






5:
1
6

1.4.2
Cumulative Access





9
:
3
4

1.4.4
Examining the Access Token




4:2
6


Total







19:1
6

Lab/Activity



Create a Group

Number of
Exam Questions

8

questions

Total Time

About
3
5

minutes


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

18

Section
1.5
:
Physical Security


Summary

In this section students will learn
about
physically protecting assets from threats.
Physical control measures discussed include:




Perimeter barriers



Close
-
circuit television (CCTV)



Doors



Door locks



Physical access logs



Physical access controls


Students
will become familiar with the




The sequence for deploying physical security.



Implementing a layer
ed

defense system.



Performing physical inspections and addressing violations.

Security+ Objectives



3.6
Analyze and differentiate among types of mitigation and

deterrent
techniques


o

Physical security




Hardware locks



Mantraps




Video surveillance




Fencing




Proximity readers




Access list


Lecture Focus Questions:



What types of physical controls can be implemented to protect the
perimeter of a building?



What is t
he difference between a
mantrap
and a
double entry

door?



What types of doors are effective deterrents to piggybacking?



How does an anti
-
passback system work?



What types of devices are best suited for interior motion detection?
Perimeter motion detection
?



How do physical access logs help to increase the security of a facility?

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

19

Video/Demo





Time

1.5.1 Physical Security




2:5
8

Number of
Exam Questions

1
2

questions

Total Time

About
2
0 minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

20

Section
1.6
:
Access Control Best Practices

Summary

This
section examines

best practices for controlling access

to resources. The
following security principles are presented:




Principle of least privilege



Need to know



Separation of duties



Job rotation



Defense
-
in
-
depth



Students will learn how to:



Enable and di
sable User Account Control (UAC).



Use alternate credentials to run programs that require elevated privileges.

Security+ Objectives



1.2 Apply and implement secure network administration principles

o

Implicit deny



5.2 Explain the fundamental concepts and be
st practices related to
authentication, authorization, and access control

o

Least privilege

o

Separation of duties

o

Implicit deny

o

Job rotation


Lecture Focus Questions:



What is the difference between
implicit deny
and
explicit allow
?



What is the difference between
implicit

deny and
explicit

deny? Which is
the strongest?



How does implementing the principle of separation of duties increase the
security in an organization?



What aspects of security does job rotation provide?



How do cree
ping privileges occur?



©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

21

Video/Demo






Time

1.6.1 Access Control Best Practices



3:1
2

1.6.3 Viewing Implicit Deny




3:26


Total







6:3
8

Number of
Exam Questions

8

questions

Total Time

About
15

minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

22

Section
2.
1
:
C
ryptography

Summary

T
his section
provides

the fundamentals of
using cryptography to secure a
message during transmission.
Security services provided by cryptographic
systems include:




Confidentiality



Integrity



Authentication



Non
-
repudiation


Students will become familiar with

the following terms related to cryptography:




Plaintext



Cipher text



Cryptographer



Cryptanalysis



Cryptosystem



Cryptology



Key



Algorithm



Encryption



Decryption



Steganography



Quantum cryptography


Security+ Objectives



6.1 Summarize general cryptography concept
s


o

Non
-
repudiation

o

Steganography

o

Use of proven technologies

o

Elliptic curve and quantum cryptography



6.2 Use and apply appropriate cryptographic tools and products

o

One
-
time
-
pads


Lecture Focus Questions:




From a security standpoint, what is the difference between integrity and
non
-
repudiation of data?



What is a legitimate use for cryptanalysis?



How is the strength of a cryptosystem related to the length of the key?

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

23



Which of the following is typically kep
t secret, the encryption algorithm or
the key (or both)?



What is the difference between a transposition cipher and a substitution
cipher?



What is a legitimate use of steganography?

Video/Demo





Time

2.1.1

Cryptography Concepts



4
:
30

Number of
Exam
Questions

7

questions

Total Time

About 1
5

minutes


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

24

Section
2.
2
:
Hashing

Summary

This section discusses

using hashing to ensure the data integrity of files
in
transit. Hashing data produces a hash value that will change dramatically even if
a very minor change is made to the data. Both the sender and receiver use the
same hashing algorithm on the data. When the hashes match, the receiver can
be assured that t
he data has not be modified.


Predominate hashing algorithms in use today are:




MD
-
5
which
generates a message digest of 128 bits.



SHA
-
1
which
generates a message digest of 160 bits.



RIPEMD
which
generates a message digest of 128, 160, 256, or 320 bits.


Use hashing for the following:




File integrity



Secure logon credential exchange


The following concepts about hashes are discussed:




Strong hashes



High amplification



Collision



Collision resistance



Birthday attack


Students will learn how to
:




Generate a ha
sh value for a file.



Compare hash values to verify message integrity.



Analyze the strength of passwords by using a rainbow table to perform a
cryptanalysis attack on the hashed values of passwords.

Security+ Objectives



6.1 Summarize general cryptography concepts

o

Hashing



6.2 Use and apply appropriate cryptographic tools and products


o

MD5


o

SHA


o

RIPEMD


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

25

Lecture Focus Questions:



What security goal or function is provided by hashes?



Why doesn't a hash provide message encr
yption?



When comparing MD
-
5 and SHA
-
1, which method provides greater
security? Why?



What is a
collision

and why is this condition undesirable in a hashing
algorithm?



Why is
high amplification

an indicator of a good hashing algorithm?

Video/Demo





Tim
e

2.2.1 Hashing





11:31

2.2.3 Using Hashes





7:43


Total






19:14

Number of
Exam Questions

8

questions

Total Time

About 30 minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

26

Section
2
.
3
:
Symmetric Encryption


Summary

Th
is section
presents
information
about
using symmetric encryption to
secure
data by encrypting and decrypting the data. Symmetric key encryption:



Uses only one key.



Is well suited for bulk encryption



Requires both parties
to
exchange the secret key using a secure channel.



Requires a unique shared key for each pair of comm
unicating entities



Uses two algorithm types

o

Block ciphers

o

Stream ciphers



Includes the following
cryptography
methods:

o

Rivest Cipher (RC)

o

International Data Encryption Algorithm (IDEA)

o

Carlisle Adams Stafford Tavares (CAST)

o

Twofish

o

Blowfish

o

Data Encryption
Standard (DES)

o

Triple DES (
3
DES)

o

Advanced Encryption Standard (AES)



The role of the Hashed Keyed Message Authentication Code (HMAC)

S
tudents will learn how to:



Perform a brute force analysis of encrypted data to recover original data.


Security+ Objectives



6.1 Summarize general cryptography concepts

o

Symmetric vs. asymmetric

o

Fundamental differences and encryption methods



6.2
Use and apply appropriate cryptographic tools and products


o

AES


o

DES


o

3DES


o

HMAC

o

RC4


o

Blowfish


o

TwoFish


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

27

Lecture Focus Questions:



A user needs to communicate security with 5 other users using symmetric
key encryption. How many keys are required?



How are symmetric keys typically exchanged between communication
partners?



What is an advantage of increasing the number of bits in the key? What is
a disadvantage?



Why are symmetric key stream ciphers considered to be slower than
symmetric key block ciphers?



Considering symmetric key stream ciphers and block ciphers, which wou
ld
you select to process large amounts of data? Why?



How does 3DES differ from DES?

Video/Demo






Time

2.3.1 Symmetric Encryption





5:2
8

2.3.2 HMAC







6:1
4

2.3.4 Cracking a Symmetric Encryption Key



4:11


Total







15:5
3

Number of
Exam Qu
estions

7

questions

Total Time

About 2
5

minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

28

Section
2.4
:
Asymmetric Encryption


Summary

This section examines

using asymmetric encryption to secure data. Asymmetric
encryption:




Uses two keys
that are mathematically related

o

Public key



made available to anyone

o

Private key



is kept secret



Is

created by a local security authority



Requires high CPU usage



Requires only two keys per user



Provides confidentiality, strong authentication, and non
-
repudiation used
for:

o

Data encryption

o

Digital

signing

o

Key exchange



Uses the following asymmetric encryption protocols

o

Diffie
-
Hellman

o

ElGamal

o

Elliptic curve cryptography (ECC)

o

RSA



Uses the following protocols:

o

SSL/TLS

o

IPSec

o

VPNs (PPTP, L2TP, SSTP)

o

S/MIME and PGP for e
-
mail security

o

SSH tunnels

Securit
y+ Objectives



6.1 Summarize general cryptography concepts

o

Symmetric vs. asymmetric


o

Non
-
repudiation


o

Digital signatures


o

Use of proven technologies


o

Elliptic curve and quantum cryptography




6.2 Use and apply appropriate cryptographic tools and products

o

RSA



6.3 Explain the core concepts of public key infrastructure


o

Public key


o

Private key


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

29

Lecture Focus Questions:



How do public keys differ from private keys? What is the relationship
between the two?



For which type of environment is asymmetric cryptogr
aphy best suited?



Why does asymmetric encryption require fewer keys than symmetric
encryption?



What services are provided by the cryptographic service provider (CSP)?



What is the main use for the Diffie
-
Hellman protocol?

Video/Demo





Time

2.
4
.1
As
ymm
etric Encryption



8
:
56

Number of
Exam Questions

5

questions

Total Time

About
15

minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

30

Section
2.5
:
Public Key Infrastructure (PKI)


Summary

In this section students will
explore
information
about
managing certificates and
Public Key Infrastructure.
The following concepts are discussed
:




Using a d
igital certificate

to provide non
-
repudiation



Using a p
ublic key infrastructure

to manage certificates



Using SSL and certificates to secure Web transactions


Terms the students will learn include:




Certific
ate Authority (CA)



Certificate Practice Statement (CPS)



Cryptographic Service Provider (CSP)



Online Certificate Status Protocol (OCSP)



Certificate Revocation List (CRL)



Registration Authority (RA)



X.509



Enrollment agent


Students will
learn how to:




Manag
e certificates by requesting, approving, and installing certificates.



Revoke a certificate and publish it to the CRL.



Create and configure a subordinate CA.



Manage certificate templates by deploying certificates for different
purposes.



Create and issue custom certificate templates.

Security+
Objectives



6.3 Explain the core concepts of public key infrastructure


o

Certificate authorities and digital certificates




CA




CRLs


o

PKI


o

Recovery agent


o

Public key


o

Private key


o

Registration


o

Key esc
row


o

Trust models


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

31

Lecture Focus Questions:



Who authorizes subordinate CAs? Why is this important?



What does the issuance policy on a CA control?



How does a client verify the information in an SSL certificate to determine
if it trusts the certificate?



What is the difference between a CSP and a CPS?



What is the role of the Registration Authority (RA)?



What is the difference between key
archival

and key
escrow
?



How are revoked certificates identified? Under what circumstances would
a certificate

be revoked?



What security advantage do dual key pairs provide?

Video/Demo





Time

2.5.1 Certificates





11:02

2.5.2 Managing Certificates




8:43

2.5.5 CA Implementation




5:16

2.5.6 Configuring a Subordinate CA



8:29


Total






33:30

Lab/Activity



Manage Certificates

Number of
Exam Questions

1
4

questions

Total Time

About
60

minutes


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

32

Section
2.6
:
Cryptography Implementations

Summary

This section discusses
implementing cryptography by combining the strengths of
hashing, symmetric and a
symmetric encryption. Some of the applications for
cryptography include:




Encrypting File System (EFS)



Digital signatures



Digital envelope



Trusted Platform Module (TPM)



Hardware Security Modules (HSM)



Whole disk encryption (BitLocker)



GNU Privacy Guard
(GPG) and Pretty Good Privacy (PGP)



Students will learn how to:



Encrypt a file to secure data using EFS.



Authorize additional users who can access files encrypted with EFS.



Protect hard drive contents with BitLocker.



Configure settings to control BitL
ocker using Group Policy.

Security+ Objectives



4.3 Explain the importance of data security


o

Data encryption




Full disk




Database




Individual files




Removable media




Mobile devices


o

Hardware based encryption devices




TPM




HSM




USB encryption




Hard drive




6.1 Summarize general cryptography concepts

o

Use of proven technologies



6.2 Use and apply appropriate cryptographic tools and products


o

MD5


o

SHA


o

AES


o

3DES


o

RSA


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

33

o

Blowfish


o

PGP/GPG


o

Whole disk encryption




6.4
Implement PKI, certificate management and assoc
iated components

o

Certificate authorities and digital certificates




CA




CRLs


o

PKI


o

Recovery agent


o

Public key


o

Private key


o

Registration


o

Key escrow


o

Trust models


Lecture Focus Questions:



What are the advantages of asymmetric over symmetric encryption? What
are the disadvantages?



How are asymmetric encryption and hashing combined to create digital
signatures?



What is the difference between digital
signatures

and digital
envelopes
?



With E
FS, how is data encrypted? How is the encryption key protected
and kept from unauthorized use?



What role does the TPM play when using BitLocker? How does using
BitLocker without a TPM modify the configuration options available?



How does the protection of
fered by Bitlocker differ from EFS?

Video/Demo






Time

2.6.1 Combining Cryptographic Methods


10:30

2.6.2 Hardware Based Encryption Devices



7:14

2.6.3 BitLocker and Database Encryption


13:0
3

2.6.4 PGP and GPG






4:34

2.6.6 Securing Files
using EFS




5:01

2.6.8 Configuring BitLocker





6:
20

2.6.9 Encrypting Files with GPG




4:5
9



Total







51:
41

Lab/Activity



Encrypt Files

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

34

Number of
Exam Questions

1
4

questions

Total Time

About
7
5

minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

35

Section
2.7
:
Secure Protocols

Summary

This section examines
using secure protocols to provide security services to new
or existing protocols that were designed with

little or no security controls. Details
include:



Secur
ity services are often added to new or existing protocols using one of
the

following secur
e protocols
:

o

S
ecure Sockets Layer (SSL)

o

Transport Layer Security (TLS)

o

Secure Shell (SSH)



Hyper Text Transfer Protocol (HTTP) is an unsecured protocol commonly
used for exchanging Web content. The following protocols are used to
secure HTTP
:

o

Hyper Text Transfer Protocol Secure (HTTPS)

o

Secure Hypertext Transfer Protocol (S
-
HTTP)



IP Security (IPSec) is used to provide secure data transmission over
unprotected TCP/IP networks. IPSec includes two protocols:

o

Authentication Header (AH)

o

Encapsulati
ng Security Payload (ESP)



Two modes of operation can be implemented with IPSec:

o

Transport mode

o

Tunnel mode



A Security Association (SA) supports secure communications and is
established through the Internet Key Exchange (IKE) protocol.



Use NAT
-
Traversal (NA
T
-
T) to eliminate communication problems that
can be caused by using Network Address Translation (NAT).

Students will learn how to:



Add SSL bindings to a Web site to support secure connections.



Modify Web site settings to require SSL.



Use SSL from a browser to create a secure connection.



Enforce the use of IPSec through Connection Security Rules.

Security+ Objectives



1.4 Implement and use common protocols


o

IPSec


o

SSH


o

TLS


o

SSL


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

36

o

HTTPS




6.2 Use and apply appropriate cryptographic tools
and products


o

Use of algorithms with transport encryption




SSL




TLS




IPSec




SSH




HTTPS


Lecture Focus Questions:



How does SSL verify authentication credentials?



What protocol is the successor to SSL 3.0?



How can you tell that a session with a Web server is using SSL?



What is the difference between HTTPS and S
-
HTTP?



What does it mean when HTTPS is referenced as being
stateful
?



What is the difference between IPSec
tunnel

mode and
transport

mode?

Video/De
mo






Time

2.7.1 Secure Protocols





10:33

2.7.3 Adding SSL to a Web Site




5:23

2.7.5 IPSec







5:14

2.7.7 Requiring IPSec for Communications



7:1
7


Total







28
:
2
7

Lab/Activity



Allow SSL Connections

Number of
Exam Questions

1
6

questions

Total Time

About 5
5

minutes


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

37

Section
3.1
:
OSI Model Review

Summary

T
his section
provides a review of the Open Systems Interconnection (OSI)

model.

It is important for students to understand the OSI model because network
security devices and solutions are often described based on the OSI model.
Facts about the following layers are presented:




Application (Layer 7)



Presentation (Layer 6)



Session (Lay
er 5)



Transport (Layer 4)



Network (Layer 3)



Data Link (Layer 2)



Physical (Layer 1)


Lecture Focus Questions:



What is the OSI model and why is it important in understanding
networking?



What are the advantages of using a theoretical model to describe
netwo
rking?



What is the name of Layer 3 in the OSI model? Layer 5?



What security features are associated with the Presentation layer?



What functions are performed by the Data Link layer?

Video/Demo




Time

3.1.1

OSI Model




4
:
18

Total Time

About
10

minute
s




©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

38

Section
3.2
:
Protocols and Ports

Summary

This section ex
plores protocols and ports used for communication between
network hosts.
Major protocols include:




Transmission Control Protocol (TCP)



User Datagram Protocol (UDP)



Internet Protocol (IP)



Internetwork Packet Exchange (IPX)



Network Basic Input/Output System (NetBIOS)



Internet Control Message Protocol (ICMP)



Address Resolution Protocol (ARP)



Domain Name System (DNS)



SNMP


Ports

are logical connections that the TCP/IP protocol stack

uses to determine
what protocol incoming traffic should be directed to. The
Internet Corporation for
Assigning Names and Numbers (ICANN) specifies three categories and ranges
for ports:




Well known ports range from 0 to 1023



Registered ports range from 10
24 to 49
,
151



Dynamic ports range from 49,152 to 65,535


Students will become familiar with
a long list of
well
-
known TCP and UDP ports
that correspond to common Internet services.


Students will learn how to:



View and analyze captured traffic using a network analyzer.



Perform a port scan on a system using
netstat

to determine connections
and listening ports.



Perform a port scan using
nmap

to find all the open ports on a remote
system.

Security+

Objectives



1.4

Implement and use common protocols


o

IPSec


o

SNMP


o

DNS


o

TCP/IP


o

ICMP


©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

39



1.5 Identify commonly used default network ports

o

FTP

o

SFTP

o

FTPS

o

TFTP

o

TELNET

o

HTTP

o

HTTPS

o

SCP

o

SSH

o

NetBIOS


Lecture Focus Questions:



How does a computer identify messages sent to a specific service?



What are the major differences between TCP and UDP?



How can ICMP messages be used to provide a valuable security tool?



What threat does an antiquated protocol pose? What would be the best

practice when dealing with an antiquated protocol?



What is the best practice when deciding which protocol ports to allow
through a network firewall?



Why would an administrator find it important to run a port scanner on the
system?

Video/Demo






Time

3.2.1 Network Protocols







4:45

3.2.3 Analyzing a TCP Three
-
way Handshake


2:1
5

3.2.4 TCP and UDP Ports





9:04

3.2.6 Scanning for Open Ports





3:52


Total







19
:
5
6

Number of
Exam Questions

14

questions

Total Time

About
4
0 minutes



©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

40

Section
3.3
:
IP Addressing


Summary

This section discusses

the following details about IPv4 and IPv6 addressing
standards
:




IPv4

o

32
-
bit binary number represented as four octets (four 8
-
bit
numbers)

o

Subnet mask

o

Details about the
IPv4 class ranges



A



B



C



D



E

o

Using a Network Address Translation (NAT) router to translate
multiple private addresses into
a

single registered address
.

o

Address ranges that have been reserved for private use:



10.0.0.0 to 10.255.255.255



172.16.0.0. to 172.31. 255.255



192.168.0.0 to 192.
168.255.255

o

Dynamic NAT

o

Static NAT



IPv6

o

32 hexadecimal numbers organized into 8 quartets separated by
colons

o

Leading zeros can be omitted in each section

o

Consecutive zeros can be substituted with a double
-
colon

o

Parts of the 128
-
bit address:



Prefix



Interfac
e ID

o

Local loopback address



Subnetting to divide a large network into smaller networks


Students will learn how to:



Install and configure the Network Address Translation (NAT) IP routing
protocol on a router.



Configure the NAT router to act as a DHCP server.



Configure the NAT router to act as a DNS proxy.



©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

41

Security+ O
b
jectives



1.3 Distinguish and differentiate network design elements and compounds

o

Subnetting

o

NAT



1.4
Implement and use common protocols


o

IPv4

vs
.

IPv6


Lecture Focus Questions:



What
t
ype of network would the 192.168.174.34 address represent
?



How does a Network Address Translation (NAT) router translate multiple
private addresses into a single registered IP address?



What are the two parts of an

IPv6 address? What do they represent?



Under what conditions would you choose to
subnet

a network?



What is the difference between
subnetting

and
supernetting
?



What is the difference between
classless

and
classful

addresses?

Video/Demo





Time

3.3.1 IP
Addressing




17:23

3.3.3 Configuring a NAT Router



6:1
4

3.3.5 Configuring IPv6





2:39

3.3.6 IP Subnetting




12:35

3.3.8 Configuring Subnetting




8:07


Total






46
:
5
8

Lab/Activity



Configure NAT

Number of
Exam Questions

13

questions

Total Time

About
70

minutes



©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

42

Section 3.4: Network Devices

Summary

In this section students will learn characteristics of the following network devices:




Hub



Switch



Router

Security+ Objectives



1.1 Explain the security function and purpose of network devices and
technologies

o

Routers

o

Switches

Lecture Focus Questions:



What are the security advantages of using switches over hubs?



What security problems could static routing pose on a large netwo
rk?



What security threat do broadcasts allow?



What information does a router ACL use to allow or reject packets?

Video/Demo





Time

3.
4
.1
Network Devices




5
:
50

Number of
Exam Questions

4

questions

Total Time

About 10 minutes




©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

43

Section
3.
5
:
Network

Authentication

Summary

This section discusses
using network authentication to prove user identity before
allowing access to network resources.

Authentication concepts covered include:




The risk

of authenticating using a clear text password



The three
-
way

handshake process



M
ethods used for network authentication

o

LAN Manager (LANMAN or LM)

o

NT LAN Manager (NTLM)

o

Kerberos



Lightweight Directory Access Protocol (LDAP)

supports the following
authentication modes when binding to a directory service:

o

Anonymous

o

Simple

o

Simple Authentication and Security Layer (SASL)



Trusts

o

Direction of trusts



One
-
way trust



Two
-
way trust

o

Transitivity



Transitive trust



Non
-
transitive trust

o

Transitive access attack


S
tudents will learn how to:



Edit Kerberos Policy settings using Group Policy Management.



Provide authentication backwards compatibility for pre
-
Windows 2000
clients using Group Policy.

Security+ Objectives



3.2 Analyze and differentiate among types of attacks

o

Transitive access



5.1
Explain the function and purpose of authentication services

o

Kerberos

o

LDAP



©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

44

Lecture Fo
c
us Questions:




Using a challenge/response process, what information is exchanged over
the network during logon? How does this provide security for logon
credentials?



What is the difference between authentication with LAN Manager and NT
LAN Manager?



What security vulnerabilities should an administrator be aware of when
using Kerberos for authentication?



What two entities are combined to make up the KDC?



Why does Kerberos require clock synchronization between devices?



Which authentication method is used with LDAP when Simple
Authentication and Security Layer (SASL) is used?

Video/Demo






Time

3.5.1 Network Authentication Protocols


14:09

3.5.2 Networ
k Authentication via LDAP


10:31

3.5.4 Controlling the Authentication Method



3:51

3.5.6 Browsing a Directory Tree via LDAP



6:38

3.5.7 Trusts and Transitive Access




5:3
4


Total







40
:
4
3

Lab/Activity



Configure Kerberos Policy Settings

Number of
Exam Questions

11

questions

Total Time

About
55

minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

45

Section
3.
6
:
Remote Access


Summary

This section provides
information
about creating and configuring remote access
to allow a host to remotely connect and access resources. Implementing r
emote
access consists of the following processes:




Connection to a remote access server through one of the following types:

o

Dialup connection

o

Virtual private network (VPN)



Authentication using one of the following protocols:

o

Password Authentication
Protocol (PAP)

o

Challenge Handshake Authentication protocol (CHAP)

o

Microsoft Challenge Handshake Authentication Protocol (MS
-
CHAP)

o

Extensible Authentication Protocol (EAP)



Authorization



Accounting



VPN tunneling protocols:

o

Point
-
to
-
Point Tunneling Protocol (
PPTP)

o

Layer 2 Forwarding (L2F)

o

Layer Two Tunneling Protocol (L2TP)

o

Internet Protocol Security (IPSec)

o

Secure Sockets Layer (SSL)

VPN concepts covered include:




VPNs use a tunneling protocol to encrypt IP traffic.



Common VPN tunneling protocols include:

o

Poi
nt
-
to
-
Point Tunneling Protocol (PPTP)

o

Layer 2 Forwarding (L2F)

o

Layer Two Tunneling Protocol (L2TP)

o

Internet Protocol Security (IPSec)

o

Secure Sockets Layer (SSL)


Student
s

will learn
how to
:




Configure a remote access server to accept remote access connections.



Control remote access authorization using network policies.



Configure ports on a VPN server to allow VPN connections.



Configure a VPN client connection.

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

46

Security+ Objectives



1.1 Expla
in the security function and purpose of network devices and
technologies

o

VPN concentrators



1.3 Distinguish and differentiate network design elements and compounds

o

Remote Access



6.2 Use and apply appropriate cryptographic tools and products


o

CHAP


o

PAP


o

Use of algorithms with transport encryption




SSL




IPSec


Lecture Focus Questions:



Why should PPP instead of SLIP be used with remote access
authentication?



How does EAP differ from CHAP or MS
-
CHAP?



What is the difference between
authentication

and
authorization
?



How does tunneling protect packets in transit through an unsecured
network?



Which IPSec protocol provides data encryption?



How does tunnel mode differ from transport mode with IPSec?



Why is using SSL for a VPN connection often a better s
olution than using
other VPN protocols?

Video/Demo






Time

3.6.1 Remote Access






8:45

3.6.3 Configuring a Remote Access Server



9:31

3.6.5 Creating a Remote Access Connection


5:0
9

3.6.8
Configuring a VPN Connection




5:5
3


Total







29
:
1
8

Lab/Activity



Configure a Remote Access Server



Configure a Remote Access Connection



Configure a VPN Connection



©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

47

Number of
Exam Questions

1
4

questions

Total Time

About 6
5

minutes

©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

48

Section
3.
7
:
R
ADIUS and TACACS+


Summary

In t
his section

students will learn

the basics of using

RADIUS and TACACS+ to
centralize the administration o
f

remote access policies by using an AAA
(authentication, authorization, and accounting server).


Common AAA server solutions discussed include:




Remote Authentic
ation Dial
-
In User Service (RADIUS)



Terminal Access Controller Access
-
Control System Plus (TACACS+)


Students will learn

how to
:



Configure a RADIUS server to perform authentication and authorization
for RADIUS clients.



Configure a remote access server to
forward authentication, authorization,
and accounting requests to a RADIUS server.

Security+ Objectives



5.1 Explain the function and purpose of authentication services

o

RADIUS

o

TACACS

o

TACACS+


o

XTACACS

Lecture Focus Questions:



What is an advantage of using RADIUS or TACACS+ in your remote
access solution?



How does RADIUS differ from TACACS+?



When comparing RADIUS and TACACS+, which is more secure? Which
performs better?



What is the difference between a RADIUS server and a RAD
IUS client?



What are common vulnerabilities of RADIUS and TACACS+?



©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

49

Video/Demo






Time

3.7.1 RADIUS and TQACACS+




7
:
05

3.7.3 Configuring a RADIUS Solution




6
:
5
3


Total







1
3
:
58

Lab/Activity



Configure a RADIUS Server



Configure a RADIUS Client

Number of
Exam Questions

10

questions

Total Time

About 3
5

minutes



©2011 TestOut Corporation (Rev 8/11)



Security+ (SY0
-
301)

50

Section 3.8: Wireless Networking

Summary

In this section students will learn the basics of
wireless networking. Details
include:




Security considerations with

wireless networks:

o

SSID broadcast

o

MAC address filtering

o

Antenna placement, power level, and orientation



Methods to authenticate wireless networks:

o

Open

o

Shared key

o

802.1x



Standards for wireless networking:

o

Wired Equivalent Privacy (WEP)

o

Wi
-
Fi Protected Acc
ess (WPA)

o

Wi
-
Fi Protected Access 2 (WPA2) or 802.11i


Students will learn how to:



Configure a wireless access point by disabling the SSID broadcast and
enabling security.



Configure a wireless network profile to automatically connect even if the
SSID broad
cast is turned off.



Scan a network to detect wireless access points and determine if the
access points are secure.

Security+ Objectives



1.2 Apply and implement secure network administration principles

o

802.1x




1.6 Implement wireless network in a secure manner

o

WPA

o

WPA2

o

WEP

o

EAP

o

PEAP

o

LEAP

o

MAC filter

o

SSID broadcast

o

TKIP

o

CCMP

o

Antenna Placement

o

Power level controls


©2011 TestOut Corporation (Rev 8/11)