AmeriTeach - Computer Training Microsoft Partner Gold Learning

 

CompTIA Security+

Course Security+ : Five days; Instructor-Led

 

 

Course Description

Course Objective: You will implement and monitor security on networks, applications, and operating systems, and respond to security breaches.

Target Student: This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks and familiarity with other operating systems, such as Mac OS® X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

Prerequisites: Basic Windows skills and a fundamental understanding of computer and networking concepts are required. Students can obtain this level of skill and knowledge by taking the following Element K courses: Introduction to Networks and the Internet and any one or more of the following:

·         Introduction to Personal Computers: Using Windows 7

·         Microsoft® Windows® 7: Level 1

CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including experience configuring and managing TCP/IP, are strongly recommended. Students can obtain this level of skill and knowledge by taking any of the following Element K courses:

·         CompTIA® A+® Certification: A Comprehensive Approach for all 2009 Exam Objectives (Windows® 7)

·         CompTIA® Network+® Certification (2009 Objectives)

Additional introductory courses or work experience in application development and programming or in network and operating system administration for any software platform or system are helpful but not required.

Course Objectives

Upon successful completion of this course, students will be able to:

·         identify the fundamental concepts of computer security.

·         identify security threats and vulnerabilities.

·         examine network security.

·         manage application, data, and host security.

·         identify access control and account management security measures.

·         manage certificates.

·         identify compliance and operational security measures.

·         manage risk.

·         manage security incidents.

·         develop a BCP and DRP.

Course Content

Lesson 1: Security Fundamentals

 

Topic 1A: The Information Security Cycle

Topic 1B: Information Security Controls

Topic 1C: Authentication Methods

Topic 1D: Cryptography Fundamentals

Topic 1E: Security Policy Fundamentals

 

Lesson 2: Security Threats and Vulnerabilities

 

Topic 2A: Social Engineering

Topic 2B: Physical Threats and Vulnerabilities

Topic 2C: Network-Based Threats

Topic 2D: Wireless Threats and Vulnerabilities

Topic 2E: Software-Based Threats

 

Lesson 3: Network Security

 

Topic 3A: Network Devices and Technologies

Topic 3B: Network Design Elements and Components

Topic 3C: Implement Networking Protocols

Topic 3D: Apply Network Security Administration Principles

Topic 3E: Secure Wireless Traffic

 

Lesson 4: Managing Application, Data, and Host Security

 

Topic 4A: Establish Device/Host Security

Topic 4B: Application Security

Topic 4C: Data Security

Topic 4D: Mobile Security

 

Lesson 5: Access Control, Authentication, and Account Management

 

Topic 5A: Access Control and Authentication Services

Topic 5B: Implement Account Management Security Controls

 

Lesson 6: Managing Certificates

 

Topic 6A: Install a CA Hierarchy

Topic 6B: Enroll Certificates

Topic 6C: Secure Network Traffic by Using Certificates

Topic 6D: Renew Certificates

Topic 6E: Revoke Certificates

Topic 6F: Back Up and Restore Certificates and Private Keys

 

Lesson 7: Compliance and Operational Security

 

Topic 7A: Physical Security

Topic 7B: Legal Compliance

Topic 7C: Security Awareness and Training

 

Lesson 8: Risk Management

 

Topic 8A: Risk Analysis

Topic 8B: Implement Vulnerability Assessment Tools and Techniques

Topic 8C: Scan for Vulnerabilities

Topic 8D: Mitigation and Deterrent Techniques

 

Lesson 9: Managing Security Incidents

 

Topic 9A: Respond to Security Incidents

Topic 9B: Recover from a Security Incident

 

Lesson 10: Business Continuity and Disaster Recovery Planning

 

Topic 10A: Business Continuity

Topic 10B: Plan for Disaster Recovery

Topic 10C: Execute DRPs and Procedures

 

Appendix A: Mapping Course Content to the CompTIA® Security+® (Exam SY0-301) Objectives

 

 

 
 

For more information call 720.346.1710 or visit: www.ameriteach.com

7800 E. Dorado Place, Greenwood Village, CO 80111