Security+ Certification (2008 Objectives)

Level
Total time

Security+ Certification (2008 Objectives)

Perpetual Solutions
Logo Perpetual Solutions
Provider rating: starstarstarstarstar 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.
  • View related products with starting dates: Security.

Description

Prerequisites:

CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP. Students can obtain this level of skill and knowledge by taking the following courses:

- A+ Certification: Core Hardware A+ Certification: Operating Systems
- Network+ Certification

Students can obtain additional TCP/IP knowledge in course Hands On TCP/IP and Internet Protocols.

Although not required, students might find it helpful to obtain foundational information from introductory operating system administration courses.

Course Description:

CompTIA Security+ validates knowledge of communication security, infrastru…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Prerequisites:

CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP. Students can obtain this level of skill and knowledge by taking the following courses:

- A+ Certification: Core Hardware A+ Certification: Operating Systems
- Network+ Certification

Students can obtain additional TCP/IP knowledge in course Hands On TCP/IP and Internet Protocols.

Although not required, students might find it helpful to obtain foundational information from introductory operating system administration courses.

Course Description:

CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. This practical "hands-on" 5-day course will teach students the fundamental principles of installing and configuring computer and network security systems. This course will prepare students to take the SY0-201 CompTIA Security+ Certification exam, for the objectives released in October 2008. This course has been approved through the CompTIA Authorized Quality Curriculum program.

This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing.

Upon successful completion of this course, students will be able to:

  • Identify network attack strategies and defenses.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and uses of encryption standards and products.
  • Identify netork- and host-based security technologies and practices.
  • Describe how remote access security is enforced.
  • Describe the standards and products used to enforce security on web and communications technologies.
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.

Please note – this course does not include the exam. This can be booked through Thompson Prometic .

This course includes the following modules:

Security Concepts

  • Why is Security Important?
  • Security Fundamentals
  • Access Control
  • Identification and Authentication
  • Accounting
  • Training

Threats

  • Types and Sources of Threats
  • What Makes a Network Secure?
  • Social Engineering
  • Malware
  • Network Attack Strategies

Operational Security

  • Corporate Security Policy
  • Risk Management
  • Privilege Policies
  • Disposal / Destruction Policy
  • HR Policy
  • Incident Response Policy

Cryptography

  • What is Cryptography?
  • Encryption Technologies
  • Cryptographic Attacks
  • Steganography

Managing Public Key Infrastructure (PKI)

  • What is PKI?
  • Implementing PKI
  • Cryptographic Standards

Site Security

  • Physical Access Controls
  • Environmental Security

Network Security

  • Secure Network Topologies
  • Virtual LANs (VLAN)
  • Network Address Translation
  • Tunneling
  • Network Interconnections
  • Switches
  • Routers
  • Firewalls
  • SNMP
  • Network Access Control

Wireless Access Security

  • Wireless Technologies
  • Wireless LAN Security

Operating System Security

  • Computer Hardening
  • Hardening Windows
  • Hardening Other OS
  • Virtualization Technologies
  • Services and Protocols
  • Hardware and Software Updates
  • Authentication Technologies
  • Directory Services

Application Security

  • File and Print Services
  • Storage Security
  • Databases
  • DHCP Security
  • DNS Security

Auditing and Intrusion Detection Systems

  • Systems and Performance Monitoring
  • Audit Logs
  • Vulnerability Assessments
  • Intrusion Detection Systems
  • Honeypots

Remote Access Security

  • What is Remote Access?
  • Remote Access Infrastructure
  • Remote Connectivity Protocols
  • Remote Access Server
  • Enterprise Remote Access Authentication
  • Remote Authentication Protocols
  • Hardening Remote Access Infrastructure

Securing Email and Messaging Communications

  • Email Standards
  • Email Application Security
  • Email Authentication and Confidentiality
  • Instant Messaging and VoIP
  • File Transfer

Securing Web Services

  • HTTP
  • SSL / TLS
  • Web Servers
  • Web Browsers
  • Desktop Security Applications

Disaster Recovery and Business Continuity

  • Disaster Recovery Planning
  • Business Continuity
  • Secure Recovery
  • Backup Strategies

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

There are no reviews yet.
  • View related products with reviews: Security.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.