Security+ Certification (2008 Objectives)
Starting dates and places
Description
Prerequisites:
CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP. Students can obtain this level of skill and knowledge by taking the following courses:- A+ Certification: Core Hardware A+ Certification: Operating Systems
- Network+ Certification
Students can obtain additional TCP/IP knowledge in course Hands On TCP/IP and Internet Protocols.
Although not required, students might find it helpful to obtain foundational information from introductory operating system administration courses.
Course Description:
CompTIA Security+ validates knowledge of communication security, infrastru…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP. Students can obtain this level of skill and knowledge by taking the following courses:- A+ Certification: Core Hardware A+ Certification: Operating Systems
- Network+ Certification
Students can obtain additional TCP/IP knowledge in course Hands On TCP/IP and Internet Protocols.
Although not required, students might find it helpful to obtain foundational information from introductory operating system administration courses.
Course Description:
CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. This practical "hands-on" 5-day course will teach students the fundamental principles of installing and configuring computer and network security systems. This course will prepare students to take the SY0-201 CompTIA Security+ Certification exam, for the objectives released in October 2008. This course has been approved through the CompTIA Authorized Quality Curriculum program.
This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing.
Upon successful completion of this course, students will be able to:
- Identify network attack strategies and defenses.
- Understand the principles of organizational security and the elements of effective security policies.
- Know the technologies and uses of encryption standards and products.
- Identify netork- and host-based security technologies and practices.
- Describe how remote access security is enforced.
- Describe the standards and products used to enforce security on web and communications technologies.
- Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Please note – this course does not include the exam. This can be booked through Thompson Prometic .
This course includes the following modules:
Security Concepts
- Why is Security Important?
- Security Fundamentals
- Access Control
- Identification and Authentication
- Accounting
- Training
Threats
- Types and Sources of Threats
- What Makes a Network Secure?
- Social Engineering
- Malware
- Network Attack Strategies
Operational Security
- Corporate Security Policy
- Risk Management
- Privilege Policies
- Disposal / Destruction Policy
- HR Policy
- Incident Response Policy
Cryptography
- What is Cryptography?
- Encryption Technologies
- Cryptographic Attacks
- Steganography
Managing Public Key Infrastructure (PKI)
- What is PKI?
- Implementing PKI
- Cryptographic Standards
Site Security
- Physical Access Controls
- Environmental Security
Network Security
- Secure Network Topologies
- Virtual LANs (VLAN)
- Network Address Translation
- Tunneling
- Network Interconnections
- Switches
- Routers
- Firewalls
- SNMP
- Network Access Control
Wireless Access Security
- Wireless Technologies
- Wireless LAN Security
Operating System Security
- Computer Hardening
- Hardening Windows
- Hardening Other OS
- Virtualization Technologies
- Services and Protocols
- Hardware and Software Updates
- Authentication Technologies
- Directory Services
Application Security
- File and Print Services
- Storage Security
- Databases
- DHCP Security
- DNS Security
Auditing and Intrusion Detection Systems
- Systems and Performance Monitoring
- Audit Logs
- Vulnerability Assessments
- Intrusion Detection Systems
- Honeypots
Remote Access Security
- What is Remote Access?
- Remote Access Infrastructure
- Remote Connectivity Protocols
- Remote Access Server
- Enterprise Remote Access Authentication
- Remote Authentication Protocols
- Hardening Remote Access Infrastructure
Securing Email and Messaging Communications
- Email Standards
- Email Application Security
- Email Authentication and Confidentiality
- Instant Messaging and VoIP
- File Transfer
Securing Web Services
- HTTP
- SSL / TLS
- Web Servers
- Web Browsers
- Desktop Security Applications
Disaster Recovery and Business Continuity
- Disaster Recovery Planning
- Business Continuity
- Secure Recovery
- Backup Strategies
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.