This course will prepare students to pass the current CompTIA Security+ SY0-301 certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialised security fields, or it can serve as a capstone course that gives a general introduction to the field.
Target Audience:
Students interested in network security and its relationship to other IT areas will be most interested in this course. This course provides a broad introduction to computer and network security. It provides the knowledge needed to implement security measures and provides a foundation for additional study of more specific security areas. This course is ideal for those working in database development and administration, as well as those administering network devices and infrastructures.
Pre-requisites:
Students taking this course should be familiar with personal computers and the use of a keyboard and a mouse. Furthermore, this course assumes that students have completed the following courses or have equivalent experience:
After completing this course, students will know how to:
Mitigate threats to network security through core system maintenance; identify threats to application security; identify methods to increase physical security and access controls; implement virus and spyware management tools; and identify social engineering threats
Identify cryptography concepts, including algorithms, public keys, security certificates, and single- and dual-key certificates
Implement authentication systems, using one-, two-, and three-factor authentication; prevent password cracking; and use authentication protocols, such as Kerberos and CHAP
Create security policies to secure network resources
Secure storage devices, peripherals, computer components, and mobile devices
Install, enable, and configure a public key infrastructure
Secure e-mail and messaging services
Assess your network’s vulnerability to attacks against TCP/IP ports and protocols
Identify common threats against network devices; configure intranet and extranet security zones; and use virtualisation to protect network security
Implement a secure wireless network.
Create a secure remote-access network by using RADIUS, TACACS+, LDAP, and VPNs
Assess the vulnerability of your network; use auditing, logging, and monitoring techniques to maintain a secure network; use intrusion detection and prevention systems; and conduct a forensic analysis after a security incident
Establish organisational security through organisational policies, education and training, and the proper disposal and destruction of IT equipment
Create a business continuity plan that prepares the organisation to deal with security threats and natural disasters