Business Accounting
Communication
Database
Document Management
e-Commerce
Networking
Office Suites
Personal Finance
Presentation
Project Management
Reports & Forms
Schedule & Contact Management
Spreadsheet
Tax Preparation
Training & Tutorials
Word Processing
|
|
CompTIA Security+ Curriculum CBT Training CDs |
List Price:
Your Price: |
|
|
|
Product Info |
Reviews |
<< 1 >>
Rating: Summary: CompTIA Security+ Curriculum CBT Training CDs Review: Course Overview
# This curriculum introduces the learner to general security concepts, communication security, infrastructure security considerations and covers cryptography and operational security. This curriculum consists of four courses: 14804 CompTia Security+ Part 1: Security Concepts;
# 14805 CompTia Security+ Part 2: Communication Security;
# 14806 CompTia Security+ Part 3: Infrastructure Security;
# 14807 CompTia Security+ Part 4: Cryptography and Operational Security
Learn To
See individual course descriptions for specific course objectives and scope.
Audience
This curriculum is targeted at IT professionals who wish to gain CompTIA Security+ certification. Participants should have a minimum of two years networking experience and possess a thorough knowledge of TCP/IP. CompTIA recommended that the Security+ test candidate have the knowledge and skills equivalent of those tested for in the CompTIA A+ and Network+ certification exams. The following Thomson NETg courses provide the required prerequisite knowledge: A+ courses 13838-13844 and Network+ courses 14181-14183.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
US English
Total Learning Time
24 to 32 hours
Objectives
Unit 24 - 32 hours
CompTia Security+ Part 1: Security Concepts Training CD
Course Overview
This course introduces the learner to general security concepts. It begins with an introduction to access control technologies including MAC, DAC, and RBAC. Authentication methods including CHAP, Kerberos, Certificates, Tokens, and Passwords are taught. The learner is stepped through methods to counteract various security attacks including Replay, TCP/IP hijacking, social engineering, password guessing, and malicious code attacks.
Learn To
# To identify security goals.
# To identify considerations for designing a network security strategy.
# To identify features of mandatory access control (MAC).
# To identify features of a buffer overflow attack.
# To identify features of a synchronization (SYN) flood attack.
# To identify features of spoofing.
Audience
This curriculum is targeted at IT professionals who wish to gain CompTIA Security+ certification. Participants should have a minimum of two years networking experience and possess a thorough knowledge of TCP/IP. CompTIA recommended that the Security+ test candidate have the knowledge and skills equivalent of those tested for in the CompTIA A+ and Network+ certification exams. The following Thomson NETg courses provide the required prerequisite knowledge: A+ courses 13838-13844 and Network+ courses 14181-14183.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Access, Authentication, and Auditing 3 - 4 hours
# Identify security goals.
# Identify considerations for designing a network security strategy.
# Identify features of mandatory access control (MAC).
# Identify features of discretionary access control (DAC).
# Identify features of role-based access control (RBAC).
# Identify guidelines for safeguarding usernames and passwords.
# Identify features of Kerberos.
# Identify features of Challenge Handshake Authentication Protocol (CHAP).
# Identify features of certificates.
# Identify features of tokens.
# Identify factors used in multi-factor authentication.
# Identify features of mutual authentication.
# Identify types of biometrics.
# Identify guidelines of system audits.
# Identify functions of system scanning.
# Identify functions of logs.
# Identify guidelines for disabling non-essential services.
Unit 2: Security Attacks 3 - 4 hours
# Identify features of a buffer overflow attack.
# Identify features of a synchronization (SYN) flood attack.
# Identify features of spoofing.
# Identify features of a man-in-the-middle (MITM) attack.
# Identify features of a replay attack.
# Identify features of a TCP/IP hijacking.
# Identify guidelines for counteracting social engineering.
# Identify features of a backdoor attack.
# Identify features of a Denial of Service (DoS) attack.
# Identify features of a Distributed Denial of Service (DDoS) attack.
# Identify features of port scanning tools.
# Identify features of sniffing tools.
# Identify features of Network Mapper (Nmap).
# Identify features of Netcat.
# Identify features of NetBus Pro.
# Run SMBdie.
# Match encrypted data attacks with their descriptions.
# Sort features of password attacks according to the type of attack.
# Match virus types with their descriptions.
# Identify features of a Trojan horse.
# Identify features of a logic bomb.
# Identify features of a worm.
CompTia Security+ Part 2: Communication Security Training CD
Course Overview
This course introduces the learner to communication security. Remote Access technologies including VPN, RADIUS, TACAS+, L2TP, and SSH are covered. The course then moves onto Web, e-mail, and instant messaging vulnerabilities such as Spam, hoaxes, and packet sniffing. Directory and file transfer technologies are covered. Finally, the learner is stepped through wireless considerations such as WEP and WAP.
Learn To
# To identify features of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard.
# To identify features of a virtual private network (VPN).
# To identify features of Point to Point Protocol (PPP) and Point to Point Tunneling Protocol (PPTP).
# To identify features of Instant Messaging (IM).
# To identify vulnerabilities of Instant Messaging (IM).
# To identify features of directory services.
# To identify features of Institute of the Electrical and Electronics Engineers (IEEE) 802.11 standards.
# To identify features of Wired Equivalent Privacy (WEP).
# To identify wireless vulnerabilities.
Audience
This curriculum is targeted at IT professionals who wish to gain CompTIA Security+ certification. Participants should have a minimum of two years networking experience and possess a thorough knowledge of TCP/IP. CompTIA recommended that the Security+ test candidate have the knowledge and skills equivalent of those tested for in the CompTIA A+ and Network+ certification exams. The following Thomson NETg courses provide the required prerequisite knowledge: A+ courses 13838-13844 and Network+ courses 14181-14183.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Remote Access, e-Mail, and Web 2 - 3 hours
# Identify features of the Institute of Electrical and Electronics Engineers (IEEE) 802.1x standard.
# Identify features of a virtual private network (VPN).
# Identify features of Point to Point Protocol (PPP) and Point to Point Tunneling Protocol (PPTP).
# Identify features of Layer Two Tunneling Protocol (L2TP).
# Identify features of the IP Security (IPSec) protocol.
# Sequence the steps of the Remote Authentication Dial In User Service (RADIUS) authentication process.
# Identify features of Terminal Access Controller Access Control System Plus (TACACS+).
# Identify features of Secure Shell (SSH).
# Identify vulnerabilities of remote access.
# Identify features of e-mail security.
# Identify features of Secure Multipurpose Internet Mail Extensions (S/MIME).
# Identify features of Pretty Good Privacy (PGP).
# Identify features of Simple Mail Transfer Protocol (SMTP) relay.
# Identify features of naming conventions.
# Identify vulnerabilities of e-mail.
# Identify consequences of spam and hoaxes.
# Identify features of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols.
# Identify features of Hypertext Transfer Protocol over Secure Socket Layer (HTTP/S).
# Identify Web vulnerabilities.
# Identify vulnerabilities of JavaScript code.
# Identify vulnerabilities of ActiveX.
# Identify vulnerabilities of a cookie.
# Identify vulnerabilities of a signed applet.
# Identify features of Common Gateway Interface (CGI).
Unit 2: IM, Directory Services and FTP 2 - 3 hours
# Identify features of Instant Messaging (IM).
# Identify characteristics of File Transfer Protocol (FTP).
# Identify features of anonymous and blind File Transfer Protocol (FTP).
# Identify risks of file sharing.
# Identify File Transfer Protocol (FTP) vulnerabilities.
# Identify vulnerabilities of Instant Messaging (IM).
# Identify features of directory services.
# Identify features of Lightweight Directory Access Protocol (LDAP).
Unit 3: Wireless 2 hours
# Identify features of Institute of the Electrical and Electronics Engineers (IEEE) 802.11 standards.
# Identify features of Wired Equivalent Privacy (WEP).
# Identify wireless vulnerabilities.
# Identify features and functions of a Wireless Local Area Network (WLAN) site survey.
# Identify features of the Wireless Application Protocol (WAP).
# Identify features of the Wireless Transport Layer Security (WTLS) protocol.
CompTia Security+ Part 3: Infrastructure Security Training CD
Course Overview
In this course, the learner is introduced to infrastructure security considerations. Security considerations for technologies including firewalls, servers, and mobile devices are covered. The learner is stepped through security issues surrounding cable and removable media. Security topologies including DMZs, and VLANs are also taught. Finally, participants learn about security baseline issues including OS/NOS hardening, network hardening, and application hardening.
Learn To
# To identify features of a firewall.
# To identify features of a packet filtering firewall.
# To identify features of a stateful inspection firewall.
# To identify security vulnerabilities of a coaxial cable.
# To identify security vulnerabilities of an unshielded twisted pair (UTP) and a shielded twisted pair (STP) cable.
# To identify security vulnerabilities of a fiber-optic cable.
# To identify considerations when implementing perimeter security.
# To identify features of a demilitarized zone (DMZ).
# To sort features of an intranet and an extranet.
# To identify guidelines for establishing security baselines.
# To identify guidelines for operating system/Network Operating System (OS/NOS) hardening.
# To identify guidelines for setting file system permissions.
Audience
This curriculum is targeted at IT professionals who wish to gain CompTIA Security+ certification. Participants should have a minimum of two years networking experience and possess a thorough knowledge of TCP/IP. CompTIA recommended that the Security+ test candidate have the knowledge and skills equivalent of those tested for in the CompTIA A+ and Network+ certification exams. The following Thomson NETg courses provide the required prerequisite knowledge: A+ courses 13838-13844 and Network+ courses 14181-14183.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Devices 1.5 - 2 hours
# Identify features of a firewall.
# Identify features of a packet filtering firewall.
# Identify features of a stateful inspection firewall.
# Identify features of a proxy firewall.
# Identify features of a personal firewall.
# Identify security vulnerabilities of a router.
# Identify security vulnerabilities of a switch.
# Identify security vulnerabilities of a wireless access point (AP).
# Identify security vulnerabilities of a modem.
# Identify security vulnerabilities of a Remote Access Service (RAS).
# Identify security vulnerabilities of a telecom/private branch exchange (PBX) system.
# Identify security vulnerabilities of a virtual private network (VPN).
# Identify features of a network monitoring system.
# Identify security vulnerabilities of a workstation.
# Identify security vulnerabilities of a server.
# Identify security vulnerabilities of mobile devices.
Unit 2: Media-Based Security 1.5 - 2 hours
# Identify security vulnerabilities of a coaxial cable.
# Identify security vulnerabilities of unshielded twisted pair (UTP) and shielded twisted pair (STP) cables.
# Identify security vulnerabilities of a fiber-optic cable.
# Identify security vulnerabilities of magnetic and optical media.
# Identify security vulnerabilities of solid state media.
Unit 3: Topologies and Intrusion Detection 1.5 - 2 hours
# Identify considerations when implementing perimeter security.
# Identify features of a demilitarized zone (DMZ).
# Distinguish between an intranet and an extranet.
# Identify features of a virtual local area network (VLAN).
# Identify features of network address translation (NAT).
# Identify features and functions of tunneling.
# Identify features of Intrusion Detection Systems (IDSs).
# Identify features of a network-based intrusion detection system (NIDS).
# Identify features of a host-based intrusion detection system.
# Identify security issues associated with an Intrusion Detection System (IDS).
# Identify features of a honey pot.
# Identify features of an incident response policy.
Unit 4: Hardening Systems 1.5 - 2 hours
# Identify guidelines for establishing security baselines.
# Identify guidelines for operating system/Network Operating System (OS/NOS) hardening.
# Identify guidelines for setting file system permissions.
# Identify features of operating system (OS) updates.
# Identify guidelines for network hardening.
# Identify guidelines for implementing filtering through Access Control Lists (ACLs).
# Identify guidelines for hardening a Web server.
# Identify guidelines for hardening an e-mail server.
# Identify guidelines for hardening a File Transfer Protocol (FTP) server.
# Identify guidelines for hardening a Domain Name Service (DNS) server.
# Identify guidelines for hardening a Network News Transfer Protocol (NNTP) server.
# Identify guidelines for hardening a file and print server.
# Identify guidelines for securing a Dynamic Host Configuration Protocol (DHCP) server.
# Identify guidelines for hardening a database server.
CompTia Security+ Part 4: Cryptography and Operational Security Training CD
Course Overview
This course covers cryptography and operational security. The course begins with an introduction to algorithms, and hashing. Then, participants are introduced to PKI, certificates, standards, and key management. Participants will also learn about physical security considerations, and how to deal with disaster recovery and business continuity. Guidelines for establishing security, HR, and incident response policies are taught. Finally, the learner will acquire a deeper understanding of their role in preserving and collection evidence and the management of documentation.
Learn To
# To identify features of encryption.
# To identify types of symmetric encryption.
# To identify features of asymmetric encryption.
# To identify considerations for securing physical access to an area.
# To identify considerations for securing an environment.
# To identify considerations for making a backup.
# To identify considerations for performing a forensic examination.
# To identify considerations for preserving a chain of custody.
# To identify guidelines for preserving evidence.
Audience
This curriculum is targeted at IT professionals who wish to gain CompTIA Security+ certification. Participants should have a minimum of two years networking experience and possess a thorough knowledge of TCP/IP. CompTIA recommended that the Security+ test candidate have the knowledge and skills equivalent of those tested for in the CompTIA A+ and Network+ certification exams. The following Thomson NETg courses provide the required prerequisite knowledge: A+ courses 13838-13844 and Network+ courses 14181-14183.
Deployment Options
e-Learning
Accreditation
NASBA credits: 4 CPE Credits
CEU credits: 0.70 CEUs
Language Options
US English
Total Learning Time
6 to 8 hours
Objectives
Unit 1: Cryptography, PKI, and Certificates 2 - 3 hours
# Identify features of encryption.
# Identify types of symmetric encryption.
# Identify features of asymmetric encryption.
# Identify types of hashing technology.
# Identify features of digital signatures.
# Identify components of Public Key Infrastructure (PKI).
# Match X.509 standard certificate elements with their descriptions.
# Identify features of certificate polices and Certificate Practices Statements (CPSs).
# Identify reasons for certificate revocation.
# Match trust models with their features.
# Identify standards for Public Key Infrastructure (PKI).
# Sort features of centralized and decentralized key management.
# Identify guidelines for key storage.
# Identify features of key escrow.
# Identify reasons for terminating the use of a certificate.
# Identify reasons for recovery and renewal of a key.
# Identify features of a multiple key pair.
Unit 2: Operational and Organizational Security 2 - 3 hours
# Identify considerations for securing physical access to an area.
# Identify considerations for securing an environment.
# Identify considerations for making a backup.
# Identify considerations for secure recovery from a disaster.
# Identify considerations for creating a disaster recovery plan.
# Identify features of a business continuity plan.
# Identify considerations for substituting utility supply.
# Identify considerations for fault tolerance.
# Identify features of a security policy.
# Identify features of Service Level Agreements (SLAs).
# Identify considerations for the disposal and destruction of data and equipment.
# Identify considerations for creating a Human Resources (HR) policy that supports security.
# Identify considerations for planning an incident response policy.
# Identify considerations for user, group, and role privilege management.
# Identify features of single sign-on.
# Sort features of centralized and decentralized privilege management.
Unit 3: Forensics and Documentation 2 hours
# Identify considerations for performing a forensic examination.
# Identify considerations for preserving a chain of custody.
# Identify guidelines for preserving evidence.
# Identify guidelines for collecting evidence.
# Identify considerations for identifying assets.
# Identify considerations for risk assessment.
# Identify considerations for identifying and preventing threats.
# Identify considerations for dealing with vulnerabilities.
# Identify methods for enhancing security through education.
# Identify considerations for creating documentation.
# Identify considerations for formulating classification and notification procedures.
# Identify considerations for formulating retention and destruction procedures.
<< 1 >>
|
|
|
|