Essentials of Information Security (Security+)

5 Day Course
Hands On
Code GK9808

This course has been retired. Delegates are advised to attend the official CompTIA Security+ course.

Modules

Hide all

Attack Methods (5 topics)

  • Information Gathering
  • Unauthorized Access
  • Malicious Code
  • Back Door Denial of Service
  • Security Intelligence

Security Assessment (4 topics)

  • Risk Assessment
  • Who are the Attackers?
  • Legal Issues
  • Insurance Against Losses

Security Policies (3 topics)

  • Security Policy Characteristics
  • Types of Policies
  • General Security Policy Guidelines

Vulnerability Assessment and Audit (5 topics)

  • Vulnerability Detection and Audit Policy
  • Vulnerability Assessment
  • Types of Vulnerability Scanners
  • Desirable Scanner Features
  • Reasons to Audit

Intrusion Detection and Incident Response (7 topics)

  • Intrusion Detection Systems (IDSs)
  • Types of IDS Devices
  • Typical IDS Features
  • Centralization and Placement
  • IDS Issues
  • Incident Response
  • Incident Response Policy

Host Security (3 topics)

  • Types of Hosts
  • General Configuration Guidelines Special Considerations
  • Security Baselines

Network Components (6 topics)

  • Network Media
  • General Network Devices
  • Firewalls
  • Firewall Methods
  • Stateful Inspection
  • Hybrid Firewalls

Access Control Lists and Firewall Configuration (2 topics)

  • Access Control Lists
  • Firewall Configuration

Architecture Integration (6 topics)

  • Security Topologies
  • The DMZ
  • Device Relationships
  • Filtering Inbound/Outbound Traffic
  • Extenuating Circumstances
  • Modifying and Maintaining the Architecture

Authentication (6 topics)

  • What is Authentication?
  • Authenticators
  • Authentication Placement
  • Issues
  • Enhancements
  • Centralized Authentication Methods

Cryptographic Functions and Applications (2 topics)

  • Features of Secure Communications Certificates and Certificate Authorities Key Management and Certificate Life
  • Cycles Applications of Cryptography

Communications Security (3 topics)

  • Virtual Private Networks (VPNs) using IPSec
  • Wireless Security
  • Telecommunications Security

Sections