Your Career
Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

  • Instant Access
    From Anywhere
  • Unlimited
  • 6-12 Months
    To Complete


Security mechanisms and account management are important parts of creating a secure networking environment. This course examines different authentication services and protocols along with biometric security mechanisms and other access security mechanisms such as tokens and smart cards. This course also examines how LDAP can be used to create security in an environment along with risk reduction mechanisms such as policies for mandatory vacations, job rotation and separation of duties. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
  • recognize the key characteristics of Kerberos and what its vulnerabilities are
  • recognize how CHAP works with remote access protocols
  • describe the advantages and disadvantages of various types of biometrics
  • identify the considerations for implementing biometric authentication
  • recognize how tokens can be used for authentication
  • determine the authentication methods to implement, in a given scenario
  • recognize how LDAP-based account management works in Windows and Linux
  • recognize the key elements of a security policy
  • recognize how to implement various aspects of a security policy
  • choose security policies to implement, for a given scenario
Securing the networking environment is the most important job role that a Security specialist will perform. This course examines the methods, tools, and applications that can be used to secure the data, mobile devices, and operating systems, as well as how to deploy environmental controls and physical access controls. This course looks at locking mechanisms - application and physical - along with encryption schemes for data on servers and mobile devices. This course also examines the different environmental and physical controls that can be used to secure an IT environment. This course helps prepare the learner to write the CompTIA Security+ Certification SYO-301.
  • recognize how to secure telephony systems and mobile devices
  • identify the considerations for computer hardening and patch management
  • recognize security concerns for hosts and operating systems
  • identify the considerations for environmental controls
  • identify the key principles of site security
  • recognize the appropriate use of various alarm types
  • identify the advantages of video surveillance
  • recognize how to deploy environmental and physical access controls
Guaranteeing end-to-end security in communication, document, and database infrastructures is incredibly important in internetworking environments. This course examines cryptography and the different algorithms, ciphers and tools that can be used to secure information, and to protect against attacks. Symmetric and asymmetric algorithms are examined, along with block and stream ciphers, one-time pads, and steganography. This course also examines message authentication, digital signatures, Public Key Infrastructures and certification authorization and revocation. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
  • define key cryptographic terms
  • identify the characteristics of quantum cryptography
  • describe symmetric key algorithms
  • distinguish between types of asymmetric algorithms
  • determine the appropriate use for a given message format
  • recognize types of ciphers
  • describe various types of cryptanalytic attacks
  • distinguish between types of algorithms, message formats, ciphers, and cryptanalytic attacks
  • determine the appropriate cryptography implementation for a given scenario
  • determine the appropriate hash algorithm to use in a given scenario
  • recognize characteristics of message authentication codes
  • identify the characteristics of digital signatures
  • identify guidelines for key management and distribution
  • identify characteristics of the XKMS
  • recognize the appropriate application of the split knowledge method of key management
  • recognize methods of key distribution
  • determine the appropriate hashing algorithm to use in a given scenario
  • evaluate the actions of an individual who is practicing key management
  • recognize examples of key management methods
Web servers, web applications, virtualization, and cloud computing are becoming standard parts of corporate infrastructures. This course examines the communications standards and protocols that are used in the web server environment, along with the ways to harden web servers and web browsers. This course also examines the different types of attacks that web servers and web-based applications can face. Finally, this course looks at virtualized environments, along with cloud computing and the different types of services and challenges that each can offer. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
  • identify the risks of web communication protocols
  • recognize how to harden web browsers
  • recognize how to harden web servers
  • identify the features of load balancers
  • identify common web application exploits
  • describe key secure programming techniques
  • recognize how to use reviews to audit web applications
  • recognize how to secure web applications and servers
  • recognize when to use various types of virtualization technologies
  • recognize the risks of virtualized environments
  • describe virtualization best practices
  • identify the security considerations for cloud computing
  • recognize the uses and security considerations for virtualization and cloud computing
Business continuity, disaster recovery, and computer forensics go hand in hand when a security professional trains on ways to create, maintain, and repair network security. This course examines business continuity plans along with risk assessment techniques and the strategies used when creating a risk management process. This course also examines security training for end users and the methodologies and tools used when performing computer forensics. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.
  • identify activities that occur during the project initiation phase of business continuity planning
  • perform a business impact analysis on given business functions
  • recognize key considerations when conducting a business impact analysis
  • identify best practices for user habits
  • identify the best practices for data handling
  • distinguish between the results of qualitative and quantitative risk assessments
  • match stages of the risk assessment process with corresponding descriptions
  • label examples of actions taken by a company in response to a risk as either avoidance, transfer, mitigation, or acceptance
  • identify key considerations for fault tolerance
  • describe key considerations for the various backup methods
  • describe the ways in which you can verify backups
  • recognize how to mitigate IT-related risk for an organization
  • recognize how to manage IT-related risk through incident response and computer forensics
  • recognize how to implement incident response and computer forensics

Join The 50,000+ Companies That Have Purchased Training from

  • 50K+ Companies Trained

    Including 90% Of Fortune 500 Companies Have Purchased Training With

  • 300K+ Courses & Videos

    Live Instructor-Led (Classroom & Virtual), Self-Paced E-learning & Custom OnSite Training Solutions From Leading Training Providers

  • 800+ Expert Instructors

    Industry-Leading Subject Matter Experts (SMEs).Tenured &
    Award-Winning Instructor Network

Get the latest industry news, recommended courses, & promotions from sent straight to your inbox.