CompTIA Security+ Official Training & Certification Program
Details
This course, will prepare students to pass the current CompTIA Security+ certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field.
Prerequisite: there is no prerequisite, but it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience, with an emphasis on security. Because human error is the number one cause for a network security breach, CompTIA Security+ is recognized by the technology community as a valuable credential that proves competency with information security.
Outline
Lesson 1: Security overview
· Topic A: Introduction to network security
· Topic B: Understanding security threats
· Topic C: Creating a secure network strategy
· Topic D: Windows Server 2003 server access control
Lesson 2: Authentication
· Topic A: Introduction to authentication
· Topic B: Kerberos
· Topic C: Challenge Handshake Authentication Protocol
· Topic D: Digital certificates
· Topic E: Security tokens
· Topic F: Biometrics
Lesson 3: Attacks and malicious code
· Topic A: Denial of service attacks
· Topic B: Man-in-the-middle attacks
· Topic C: Spoofing
· Topic D: Replays
· Topic E: TCP session hijacking
· Topic F: Social engineering
· Topic G: Attacks against encrypted data
· Topic H: Software exploitation
Lesson 4: Remote access
· Topic A: Securing remote communications
· Topic B: Authentication
· Topic C: Virtual private networks
· Topic D: Telecommuting vulnerabilities
Lesson 5: E-mail
· Topic A: Secure e-mail and encryption
· Topic B: PGP and S/MIME encryption
· Topic C: E-mail vulnerabilities
Lesson 6: Web security
· Topic A: SSL/TLS protocol
· Topic B: Vulnerabilities of Web tools
· Topic C: Configuring Internet Explorer security
Lesson 7: Directory and file transfer services
· Topic A: Introduction to directory services
· Topic B: File transfer services
· Topic C: File sharing
Lesson 8: Wireless and instant messaging
· Topic A: IEEE 802.11
· Topic B: WAP 1.x and WAP 2.0
· Topic C: Wired equivalent privacy
· Topic D: Instant messaging
Lesson 9: Network devices
· Topic A: Understanding firewalls
· Topic B: Routers
· Topic C: Switches
· Topic D: Telecom, cable modem, and wireless devices
· Topic E: Securing remote access
· Topic F: Intrusion detection systems
· Topic G: Network monitoring
Lesson 10: Transmission and storage media
· Topic A: Transmission media
· Topic B: Storage media
Lesson 11: Network security topologies
· Topic A: Security topologies
· Topic B: Network Address Translation
· Topic C: Tunneling
· Topic D: Virtual Local Area Networks
Lesson 12: Intrusion detection
· Topic A: Intrusion detection systems
· Topic B: Network-based and host-based IDS
· Topic C: Active and passive detection
· Topic D: Honeypots
· Topic E: Incident response
Lesson 13: Security baselines
· Topic A: OS/NOS hardening
· Topic B: Network hardening
· Topic C: Application hardening
· Topic D: Workstations and servers
Lesson 14: Cryptography
· Topic A: Concepts of cryptography
· Topic B: Public Key Infrastructure (PKI)
· Topic C: Key management and life cycle
· Topic D: Setting up a certificate server
Lesson 15: Physical security
· Topic A: Access control
· Topic B: Environment
Lesson 16: Disaster recovery and business continuity
· Topic A: Disaster recovery
· Topic B: Business continuity
· Topic C: Policies and procedures
· Topic D: Privilege management
Lesson 17: Computer forensics and advanced topics
· Topic A: Understanding computer forensics
· Topic B: Risk identification
· Topic C: Education and training
· Topic D: Auditing
· Topic E: Documentation
Global KMC is a private training company that certifies individuals in various IT and business skills. It is an Authorized Training Center for the International Council of E-Commerce Consultants (EC-Council) - the owner and developer of the world famous Certified Ethical Hacker (CEH) course, Computer Hacking Forensics Investigators (CHFI) program, License Penetration Tester (LPT) program and various other programs offered in over 60 countries around the globe. It is an authority in Digital Forensics training and solutions including multi-media and mobile forensics. The company is also anAuthorized Training Partner for CompTia offering Security+, A+, Project+, Mobile+, Network+, Cloud+. Global also offers various technical training on Cisco (CCNA, CCNP); Microsoft (MCSA, MCSE, Desktop Technician, etc); Linux (Fundamentals, System Admin, Network Admin); CISSP; ITIL; IBM-i2 Analysts Notebook, to name a few.
For the Softskills training, Global is known in areas of: Project Management (PMP); Six Sigma (Yellow Belt, Green Belt, Black Belt); Communication; Train-the-Trainers; Risk Management, etc. ...