Course Description
Course Overview
This course will prepare students to take the SY0-301 CompTIA
Security+ Certification exam, for the most current exam objectives.
After taking this course, students will understand the field of network
security and how it relates to other areas of information technology.
This course also provides the broad-based knowledge necessary to prepare
for further study in specialized security fields, or it can serve as a
capstone course that gives a general introduction to the field.
Objectives
CompTIA Security+ validates knowledge of communication security,
infrastructure security, cryptography, operational security, and general
security concepts. This practical “hands-on” 5-day course will teach
students the fundamental principles of installing and configuring
computer and network security systems. On course completion, students
will be able to:
- Identify network attack strategies and defenses.
- Understand the principles of organizational security and the elements of effective security policies.
- Know the technologies and uses of encryption standards and products.
- Identify network- and host-based security technologies and practices.
- Describe how remote access security is enforced.
- Describe the standards and products used to enforce security on web and communications technologies.
- Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Prerequisites
Ideally, students should have successfully completed CompTIA Network+
Certification and have around 24 months’ experience of networking
support. It is not necessary that students pass the CompTIA Network+
exam before completing CompTIA Security+, but this is recommended. It is
also recommended but not required for students to complete the CompTIA
A+ Certification course.
Regardless of whether students have passed CompTIA Network+, it is
recommended that they have the following skills and knowledge before
starting this course:
- Know the function and basic features of the components of a PC.
- Use Windows to create and manage files and use basic administrative features (Explorer, Control Panel and Management Consoles).
- Basic network terminology (such as OSI Model, Topology, Ethernet, TCP/IP).
- TCP/IP addressing, core protocols, and troubleshooting tools
Topics
The course consists of two volumes, with a study volume, containing
indexed notes and review questions, and a companion volume, containing
exam objectives mapping, exam information, practical labs, answers to
review questions, and a comprehensive glossary. The course also comes
with two online practice exams.
Module 1 – Security Fundamentals
Security Concepts
Why is Security Important?
Security Controls
Identification and Authentication
Authorization
Accounting
Threats
Types and Sources of Threats
Social Engineering
Malware
Preventing Virus Infection
Network Vulnerabilities
Network Fundamentals
Network Attack Strategies
Layer 2 Attacks
IP Spoofing and Hijacking
Denial of Service Attacks
Application Layer Attacks
Module 2 – Network Security
Penetration Testing
Vulnerability Assessments and Penetration Tests
Vulnerability Scanners
Honeypots and Honeynets
Secure Network Design
Secure Network Topologies
Network Device Exploitation
Switches and VLANs
Routers
Security Appliances and Software
Firewalls
Proxy Servers and Gateways
Intrusion Detection Systems
Audit Logs
Network Application Security
DHCP Security
DNS Security
SNMP Security
Module 3 – Internet Security
Cryptography
What is Cryptography?
Encryption Technologies
Cryptographic Attacks
Steganography
Public Key Infrastructure
What is PKI?
Implementing PKI
Cryptographic Standards
Securing Web Services
HTTP
SSL / TLS
Web Servers
Securing Web Applications
Web Browsers
File Transfer
Module 4 – Access Control
Authentication
LAN Manager / NTLM
Kerberos
PAP and CHAP
Password Management Policy
Token-based Authentication
Biometric Authentication
Extensible Authentication Protocol (EAP)
Authorization
Privilege Policies
Directory Services
Lightweight Directory Access Protocol (LDAP)
Operating System Security
Computer Hardening
OS Hardening
Hardware and Software Updates
Network Access Control
Remote Access Security
What is Remote Access?
Remote Connectivity Protocols
Remote Access Servers
Remote Administration Tools
Hardening Remote Access Infrastructure
Wireless Access Security
Wireless LAN Security
Bluetooth
Module 5 – Organizational Security
Site Security
Physical Access Controls
Environmental Security
Mobile Device Security
Telephony
Disaster Recovery and Business Continuity
Disaster Recovery Planning
Business Continuity and Risk Management
Fault Tolerance
Backup Strategies
Incident Response and Forensics
Incident Response Policy
Forensic Investigations
Operational Security
Corporate Security Policy
Data Handling
HR Policies
Next Generation Networks
Virtualization Defined
Virtual Platform Applications
Virtualization Security and Best Practice
Cloud Computing
IPv4 versus IPv6