


What You Will Learn
CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on trouble-shooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them.
Objectives
Upon completion of this program, participants should be able to:
-
Understand the security settings
-
Know how to encrypt and decrypt files
-
Know how to restore registry
-
Configure internet content access
-
Use P2P networks securely
Prerequisite
A and network or equivalent knowledge, and six to nine month experience in Networking, including experience configuring and managing TCP/IP.
Methodology
This program will be conducted with interactive lectures, PowerPoint presentation, discussion and practical exercise.
Modules
Identifying Social Security Threats
-
Identify social engineering attacks
-
Classify software attacks
-
Identify hardware attacks
Hardening Internal Systems And Services
-
Harden base operating systems
-
Harden directory services
-
Harden DHCP servers
-
Harden network file and print servers
Hardening Internetwork Devices And Services
-
Harden internet work connection devices
-
Harden DNS and BIND servers
-
Harden web servers
-
Harden FTP servers
-
Harden Network News Transport Protocol (NNTP) servers
-
Harden email servers
-
Harden conferencing and messaging servers
Securing Network Communications
-
Secure Network Traffic Using IP Security(IPSec)
-
Secure wireless traffic
-
Secure client internet access
-
Secure the remote access channel
Managing Public Key Infrastructure (PKI)
-
Install a Certificate Authority (CA) hierarchy
-
Harden a Certificate Authority
-
Back up Certificate Authorities
-
Restore a Certificate Authority
Managing Certificates
-
Enroll certificates for entities
-
Secure network traffic using certificates
-
Renew certificates
-
Revoke certificates
-
Back up certificates and private keys
-
Restore certificates and private keys
Enforcing Organization Security Policy
-
Enforce corporate security policy compliance
-
Enforce legal compliance
-
Enforce physical security compliance
-
Educate users
Monitoring The Security Infrastructure
-
Scan for vulnerabilities
-
Monitor for intruders
-
Set up a Honeypot
-
Respond to security Incidents


