Comptia Security+


Published on


  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Comptia Security+

  1. 1. CompTIA Security+CertificationTopic-Level Outline Period: 4-6weeks Prerequisites: CompTIA A+ Certification: Core Hardware, 2003 Objectives, CompTIA A+ Certification: OS Technologies, 2003 Objectives, or equivalent experience, or CompTIA A+ Certification: Essentials and CompTIA A+ Certification: 220-602, or CompTIA A+Certification: IT Technician Fast Track, or equivalent experience and CompTIA Network+ Certification, 2005 Objectives, or equivalent experience Unit 1: Security overview Topic A: Introduction to network security Topic B: Understanding security threats Topic C: Creating a secure network strategy Topic D: Windows Server 2003 server access control Unit 2: Authentication Topic A: Introduction to authentication Topic B: Kerberos Topic C: Challenge Handshake Authentication Protocol Topic D: Digital certificates Topic E: Security tokens Topic F: Biometrics Unit 3: Attacks and malicious code Topic A: Denial of service attacks Topic B: Man-in-the-middle attacks Topic C: Spoofing Topic D: Replays Topic E: TCP session hijacking
  2. 2. Topic F: Social engineering Topic G: Attacks against encrypted data Topic H: Software exploitation Unit 4: Remote access Topic A: Securing remote communications Topic B: Authentication Topic C: Virtual private networks Topic D: Telecommuting vulnerabilities Unit 5: E-mail Topic A: Secure e-mail and encryption Topic B: PGP and S/MIME encryption Topic C: E-mail vulnerabilities Unit 6: Web security Topic A: SSL/TLS protocol Topic B: Vulnerabilities of Web tools Topic C: Configuring Internet Explorer security Unit 7: Directory and file transfer services Topic A: Introduction to directory services Topic B: File transfer services Topic C: File sharing Unit 8: Wireless and instant messaging Topic A: IEEE 802.11 Topic B: WAP 1.x and WAP 2.0 Topic C: Wired equivalent privacy Topic D: Instant messaging Unit 9: Network devices Topic A: Understanding firewalls Topic B: Routers Topic C: Switches Topic D: Telecom, cable modem, and wireless devices Topic E: Securing remote access Topic F: Intrusion detection systems Topic G: Network monitoringUnit 10: Transmission and storage media
  3. 3. Topic A: Transmission media Topic B: Storage mediaUnit 11: Network security topologies Topic A: Security topologies Topic B: Network Address Translation Topic C: Tunneling Topic D: Virtual Local Area NetworksUnit 12: Intrusion detection Topic A: Intrusion detection systems Topic B: Network-based and host-based IDS Topic C: Active and passive detection Topic D: Honeypots Topic E: Incident responseUnit 13: Security baselines Topic A: OS/NOS hardening Topic B: Network hardening Topic C: Application hardening Topic D: Workstations and serversUnit 14: Cryptography Topic A: Concepts of cryptography Topic B: Public Key Infrastructure (PKI) Topic C: Key management and life cycle Topic D: Setting up a certificate serverUnit 15: Physical security Topic A: Access control Topic B: EnvironmentUnit 16: Disaster recovery and business continuity Topic A: Disaster recovery Topic B: Business continuity Topic C: Policies and procedures Topic D: Privilege managementUnit 17: Computer forensics and advanced topics Topic A: Understanding computer forensics Topic B: Risk identification
  4. 4. Topic C: Education and training Topic D: Auditing Topic E: DocumentationAppendix A: Certification exam objectives map Topic A: Comprehensive exam objectives