SlideShare a Scribd company logo
Vision for future


                                   Security +
Course Description:

Security+™: A CompTIA Certification (Windows Server 2003) is the primary
course you will need to take if your job responsibilities include securing network
services, network devices, and network traffic. It is also the main course you will
take to prepare for the CompTIA Security+ examination (exam number SY0-101).
In this course, you'll build on your knowledge and professional experience with
computer hardware, operating systems, and networks as you acquire the specific
skills required to implement basic security services on any type of computer
network.

Course Objective:

      • Identify fundamental concepts of computer security.
      • Identify security threats.
      • Harden internal systems and services.
      • Harden internetwork devices and services
      • Secure network communications.
      • Manage public key infrastructure (PKI).
      • Manage certificates.
      • Enforce organizational security policies.
      • Monitor the security infrastructure.

Program Requirements :

 Basic Windows skills and fundamental understanding of computer and networking
concepts are required.

CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to
nine months experience in networking,

                    Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
               Tel : 048/9102897                 Customer Service : 0102502304
        Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

including experience configuring and managing TCP/IP, are strongly
recommended. Students can obtain this level of skill and knowledge by taking all
of the following courses:

           A+ Certification: Core Hardware Third Edition
           A CompTIA Certification A+ Certification Operating Systems Third
            Edition
           A CompTIA Certification Network+ Certification: 4th Edition
           A CompTIA Certification Additional introductory courses in operating
            system administration for Windows, UNIX, Linux, or NetWare

Curriculum

Lesson 1: Security Fundamentals
      Security Building Blocks
      Authentication Methods
      Cryptography Fundamentals
      Security Policy Fundamentals

Lesson 2: Security Threats
    Social Engineering
    Software-Based Threats
    Hardware-Based Threats

Lesson 3: Hardening Internal Systems and Services
      Harden Operating Systems
      Harden Directory Services
      Harden DHCP Servers
      Harden File and Print Servers

                     Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
                Tel : 048/9102897                 Customer Service : 0102502304
         Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future


Lesson 4: Hardening Internetwork Devices and Services
     Harden Internetwork Connection Devices
     Harden DNS and BIND Servers
     Harden Web Servers
     Harden File Transfer Protocol (FTP) Servers
     Harden Network News Transfer Protocol (NNTP)
     Servers
     Harden Email Servers
     Harden Conferencing and Messaging Servers

Lesson 5: Securing Network Communications
     Protect Network Traffic with IP Security (IPSec)
     Secure Wireless Traffic
     Harden a Web Browser
     Secure the Remote Access Channel

Lesson 6: Managing Public Key Infrastructure (PKI)
     Install a Certificate Authority (CA) Hierarchy
     Harden a Certificate Authority
     Back Up a CA
     Restore a CA

Lesson 7: Managing Certificates
     Enroll Certificates
     Secure Network Traffic by Using Certificates
     Renew Certificates
     Revoke Certificates

                    Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
               Tel : 048/9102897                 Customer Service : 0102502304
        Email : info@ideal-generation.com        Website: www.ideal-generation.com
Vision for future

   Back Up Certificates and Private Keys
   Restore Certificates and Private Keys

Lesson 8: Enforcing Organizational Security Policies
     Enforce Corporate Security Policy Compliance
     Enforce Legal Compliance
     Enforce Physical Security Compliance
     Educate Users

Lesson 9: Monitoring the Security Infrastructure
     Scan for Vulnerabilities
     Monitor for Intruders
     Set Up a Honeypot
     Respond to Security Incidents




                    Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom.
               Tel : 048/9102897                 Customer Service : 0102502304
        Email : info@ideal-generation.com        Website: www.ideal-generation.com

More Related Content

What's hot

Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
ScottBreadmore
 
Cyberoam layer8
Cyberoam layer8Cyberoam layer8
Cyberoam layer8
Aniruddha Mazumder
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
 
About Me
About MeAbout Me
About MeIrena90
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network security
qosnetworking
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network security
qosnetworking
 
Cscu exam-info-and-test-objective
Cscu exam-info-and-test-objectiveCscu exam-info-and-test-objective
Cscu exam-info-and-test-objective
Tiger Virani
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Ahmed
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU Program
ITpreneurs
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9Irsandi Hasan
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
ITpreneurs
 
Securing your Video Conferences: How to Minimize Risks of Hacking
Securing your Video Conferences: How to Minimize Risks of HackingSecuring your Video Conferences: How to Minimize Risks of Hacking
Securing your Video Conferences: How to Minimize Risks of Hacking
The Cloud Communications division of NTT Ltd.
 
Fire walls
Fire wallsFire walls
Fire walls
Smit Panchal
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
Information Technology
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
Sophos
 
Security Basics
Security BasicsSecurity Basics
Security Basics
Rishi Prasath
 
Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack Chain
IBM Security
 
Introduction to cybersecurity certificate
Introduction to cybersecurity certificateIntroduction to cybersecurity certificate
Introduction to cybersecurity certificate
Khizar Farooq
 

What's hot (20)

Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
ITE - Chapter 10
ITE - Chapter 10ITE - Chapter 10
ITE - Chapter 10
 
Cyberoam layer8
Cyberoam layer8Cyberoam layer8
Cyberoam layer8
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
About Me
About MeAbout Me
About Me
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network security
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network security
 
Cscu exam-info-and-test-objective
Cscu exam-info-and-test-objectiveCscu exam-info-and-test-objective
Cscu exam-info-and-test-objective
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)
 
Mohamed-Fathy
Mohamed-FathyMohamed-Fathy
Mohamed-Fathy
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU Program
 
CCNA Security - Chapter 9
CCNA Security - Chapter 9CCNA Security - Chapter 9
CCNA Security - Chapter 9
 
EC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and CertificationsEC-Council Cyber Security Training and Certifications
EC-Council Cyber Security Training and Certifications
 
Securing your Video Conferences: How to Minimize Risks of Hacking
Securing your Video Conferences: How to Minimize Risks of HackingSecuring your Video Conferences: How to Minimize Risks of Hacking
Securing your Video Conferences: How to Minimize Risks of Hacking
 
Fire walls
Fire wallsFire walls
Fire walls
 
Ch01 Introduction to Security
Ch01 Introduction to SecurityCh01 Introduction to Security
Ch01 Introduction to Security
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack Chain
 
Introduction to cybersecurity certificate
Introduction to cybersecurity certificateIntroduction to cybersecurity certificate
Introduction to cybersecurity certificate
 

Similar to Security+

Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008elshiekh1980
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Bryan Len
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Global Online Trainings
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administrationelshiekh1980
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
CRAW CYBER SECURITY PVT LTD
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Edureka!
 
Datasheet
DatasheetDatasheet
Datasheet
Carlos urrea
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
Calvin Sam
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
xKinAnx
 
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016Ahmed Morsy
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)Jason Chapman
 
Upgrade your cyber-security and IT skills
Upgrade your cyber-security and IT skillsUpgrade your cyber-security and IT skills
Upgrade your cyber-security and IT skills
eshartns25
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 

Similar to Security+ (20)

N+
N+N+
N+
 
Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008Mcitp enterprise administrator 2008
Mcitp enterprise administrator 2008
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Red hat linux networking and security administration
Red hat linux networking and security administrationRed hat linux networking and security administration
Red hat linux networking and security administration
 
Diploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In DelhiDiploma In Information Security Training and Certification Details In Delhi
Diploma In Information Security Training and Certification Details In Delhi
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Chandrasekar
ChandrasekarChandrasekar
Chandrasekar
 
A+
A+A+
A+
 
Michael_J_Ventimiglia
Michael_J_VentimigliaMichael_J_Ventimiglia
Michael_J_Ventimiglia
 
IT System Admin2
IT System Admin2IT System Admin2
IT System Admin2
 
Datasheet
DatasheetDatasheet
Datasheet
 
SALMANB
SALMANBSALMANB
SALMANB
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
El Sisi
El SisiEl Sisi
El Sisi
 
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)
 
Upgrade your cyber-security and IT skills
Upgrade your cyber-security and IT skillsUpgrade your cyber-security and IT skills
Upgrade your cyber-security and IT skills
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 

More from elshiekh1980

Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diplomaelshiekh1980
 
Web design diploma
Web design diplomaWeb design diploma
Web design diplomaelshiekh1980
 
Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administrationelshiekh1980
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentialselshiekh1980
 
Oracle 11g with sql
Oracle 11g with sqlOracle 11g with sql
Oracle 11g with sqlelshiekh1980
 
Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)elshiekh1980
 
Oracle 11g rac administration
Oracle 11g rac administrationOracle 11g rac administration
Oracle 11g rac administrationelshiekh1980
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database securityelshiekh1980
 
Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)elshiekh1980
 
Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)elshiekh1980
 
Mcitp server administrator 2008
Mcitp server administrator 2008Mcitp server administrator 2008
Mcitp server administrator 2008elshiekh1980
 

More from elshiekh1980 (20)

Adavanced maintenance diploma
Adavanced maintenance diplomaAdavanced maintenance diploma
Adavanced maintenance diploma
 
Web design diploma
Web design diplomaWeb design diploma
Web design diploma
 
Sql server 2005
Sql server 2005Sql server 2005
Sql server 2005
 
Red hat linux system administration
Red hat linux system administrationRed hat linux system administration
Red hat linux system administration
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentials
 
Php
PhpPhp
Php
 
Oracle 11g with sql
Oracle 11g with sqlOracle 11g with sql
Oracle 11g with sql
 
Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)Oracle 11g structured query language (sql)
Oracle 11g structured query language (sql)
 
Oracle 11g rac administration
Oracle 11g rac administrationOracle 11g rac administration
Oracle 11g rac administration
 
Oracle 11g database security
Oracle 11g database securityOracle 11g database security
Oracle 11g database security
 
Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)Oracle 11g certified professional (ocp)
Oracle 11g certified professional (ocp)
 
Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)Oracle 11g certified associate (oca)
Oracle 11g certified associate (oca)
 
Mcse security
Mcse securityMcse security
Mcse security
 
Mcse messaging
Mcse messagingMcse messaging
Mcse messaging
 
Mcsa security
Mcsa securityMcsa security
Mcsa security
 
Mcitp server administrator 2008
Mcitp server administrator 2008Mcitp server administrator 2008
Mcitp server administrator 2008
 
Maintenance
MaintenanceMaintenance
Maintenance
 
Jsp
JspJsp
Jsp
 
Java with android
Java with androidJava with android
Java with android
 
J2 se
J2 seJ2 se
J2 se
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Security+

  • 1. Vision for future Security + Course Description: Security+™: A CompTIA Certification (Windows Server 2003) is the primary course you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It is also the main course you will take to prepare for the CompTIA Security+ examination (exam number SY0-101). In this course, you'll build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network. Course Objective: • Identify fundamental concepts of computer security. • Identify security threats. • Harden internal systems and services. • Harden internetwork devices and services • Secure network communications. • Manage public key infrastructure (PKI). • Manage certificates. • Enforce organizational security policies. • Monitor the security infrastructure. Program Requirements : Basic Windows skills and fundamental understanding of computer and networking concepts are required. CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 2. Vision for future including experience configuring and managing TCP/IP, are strongly recommended. Students can obtain this level of skill and knowledge by taking all of the following courses:  A+ Certification: Core Hardware Third Edition  A CompTIA Certification A+ Certification Operating Systems Third Edition  A CompTIA Certification Network+ Certification: 4th Edition  A CompTIA Certification Additional introductory courses in operating system administration for Windows, UNIX, Linux, or NetWare Curriculum Lesson 1: Security Fundamentals  Security Building Blocks  Authentication Methods  Cryptography Fundamentals  Security Policy Fundamentals Lesson 2: Security Threats  Social Engineering  Software-Based Threats  Hardware-Based Threats Lesson 3: Hardening Internal Systems and Services  Harden Operating Systems  Harden Directory Services  Harden DHCP Servers  Harden File and Print Servers Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 3. Vision for future Lesson 4: Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices  Harden DNS and BIND Servers  Harden Web Servers  Harden File Transfer Protocol (FTP) Servers  Harden Network News Transfer Protocol (NNTP)  Servers  Harden Email Servers  Harden Conferencing and Messaging Servers Lesson 5: Securing Network Communications  Protect Network Traffic with IP Security (IPSec)  Secure Wireless Traffic  Harden a Web Browser  Secure the Remote Access Channel Lesson 6: Managing Public Key Infrastructure (PKI)  Install a Certificate Authority (CA) Hierarchy  Harden a Certificate Authority  Back Up a CA  Restore a CA Lesson 7: Managing Certificates  Enroll Certificates  Secure Network Traffic by Using Certificates  Renew Certificates  Revoke Certificates Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com
  • 4. Vision for future  Back Up Certificates and Private Keys  Restore Certificates and Private Keys Lesson 8: Enforcing Organizational Security Policies  Enforce Corporate Security Policy Compliance  Enforce Legal Compliance  Enforce Physical Security Compliance  Educate Users Lesson 9: Monitoring the Security Infrastructure  Scan for Vulnerabilities  Monitor for Intruders  Set Up a Honeypot  Respond to Security Incidents Al Baraka-2 Tower Mogamaa Elmawakef St, Shebin El-Kom. Tel : 048/9102897 Customer Service : 0102502304 Email : info@ideal-generation.com Website: www.ideal-generation.com