Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

  • Be the first to comment

  • Be the first to like this


  1. 1. Security+ Course Outline<br />Course Length: 5 Days<br />Overview:This course will prepare students to pass the current CompTIA Security+ certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field.<br />Prerequisites:A+ CertificationNetwork+ Certification<br />Course Content<br />Lesson 1: Mitigating Threats <br />Core system maintenance<br />Virus and spyware management<br />Browser security<br />Social engineering threats<br />Lesson 2: Cryptography <br />Symmetric cryptography<br />Public Key cryptography<br />Lesson 3: Authentication Systems <br />Authentication <br />Hashing<br />Authentication systems<br />Lesson 4: Messaging Security <br />E-mail Security<br />Messaging and peer-to-peer security<br />Lesson 5: User and Role Based Security <br />Security policies<br />Securing file and print resources<br />Lesson 6: Public Key Infrastructure <br />Key management and life cycle<br />Setting up a certificate server<br />Web server security with PKI<br />Lesson 7: Access Security <br />Biometric systems <br />Physical access security <br />Peripheral and component security <br />Storage device security<br />Lesson 8: Ports and Protocols <br />TCP/IP review <br />Protocol-based attacks<br />Lesson 9: Network Security <br />Common network devices <br />Secure network topologies<br />Browser-related network security<br />Virtualization<br />Lesson 10: Wireless Security <br />Wi-Fi network security <br />Non-PC wireless devices<br />Lesson 11: Remote Access Security <br />Remote Access<br />Virtual private networks<br />Lesson 12: Auditing, Logging, and Monitoring <br />System logging <br />Server monitoring<br />Lesson 13: Network-to-Network Connections <br />Risk and vulnerability assessment <br />IDS and IPS<br />Forensics<br />Lesson 14: Organizational Security <br />Organizational policies<br />Education and training<br />Disposal and destruction<br />Lesson 15: Business Continuity <br />Redundancy planning<br />Backups<br />Environmental Controls<br />