SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Course overview
g631eng Security+ Certification (2008
Objectives)
(g631eng)


Overview and objectives
  The aim of this course is to prepare students for CompTIA's Security+ exam. CompTIA Security+ validates
  knowledge of communication security, infrastructure security, cryptography, operational security, and
  general security concepts.
  On completion of this course, students will be able to:
    Identify network attack strategies and defenses.
    Understand the principles of organizational security and the elements of effective security policies.
    Know the technologies and uses of encryption standards and products.
    Identify network- and host-based security technologies and practices.
    Describe how remote access security is enforced.
    Describe the standards and products used to enforce security on web and communications
    technologies.
    Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery
  The course has been approved through the CompTIA Authorized Quality Curriculum program.


Certification track
  This course will prepare students to take the SY0-201 CompTIA Security+
  exam, for the objectives released in October 2008.
  Major corporations such as Sun, IBM/Tivoli Software Group, Symantec,
  Motorola, Hitachi Electronics Services and VeriSign value the CompTIA
  Security+ certification and recommend or require it of their IT employees.


Target audience
  This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed
  primarily at networking professionals, but because security is vital to all levels and job roles within an
  organization, it will also benefit PC support analysts, application developers, and senior managers in
  accounting, sales, product development, and marketing.
Course overview
g631eng Security+ Certification (2008
Objectives)
(g631eng)


Course prerequisites
  Ideally, students should have successfully completed CompTIA Network+ certification and have around 24
  months' experience of networking support. It is not necessary that students pass the CompTIA Network+
  exam before completing CompTIA Security+, but this is recommended.
  Regardless of whether students have passed CompTIA Network+, it is recommended that they have the
  following skills and knowledge before starting this course:
    Know the function and basic features of the components of a PC.
    Use Windows to create and manage files and use basic administrative features (Explorer, Control
    Panel and Management Consoles).
    Basic network terminology (such as OSI Model, Topology, Ethernet, TCP/IP).
    TCP/IP addressing, core protocols, and troubleshooting tools.


Course contents
  The course consists of two volumes, with a study volume, containing indexed notes and review questions,
  and a companion volume, containing exam objectives mapping, exam information, practical labs, answers
  to review questions, and a comprehensive glossary. The course also comes with two online practice
  exams.
  An instructor edition of the course is available with margin notes and tips for the trainer. Access to course
  resources on gtslearning's trainer portal (www.gtstrainer.com) is also available, subject to meeting
  minimum order requirements. gtstrainer.com hosts setup guides and data, PowerPoint slides, timetables,
  and extra exam information.

  Module 1 - Security Fundamentals
    Security Concepts • Why is Security Important? • Security Fundamentals • Access Control •
    Identification and Authentication • Accounting • Training
    Threats • Types and Sources of Threats • What Makes a Network Secure? • Social Engineering •
    Malware • Network Attack Strategies
    Operational Security • Corporate Security Policy • Risk Management • Privilege Policies • Disposal /
    Destruction Policy • HR Policy • Incident Response Policy

  Module 2 - Cryptography
    Cryptography • What is Cryptography? • Encryption Technologies • Cryptographic Attacks •
    Steganography
    Public Key Infrastructure • What is PKI? • Implementing PKI • Cryptographic Standards
Course overview
g631eng Security+ Certification (2008
Objectives)
(g631eng)

  Module 3 - Implementing Local Security
    Site Security • Physical Access Controls • Environmental Security
    Network Security • Secure Network Topologies • Virtual LANs (VLAN) • Network Address
    Translation • Tunneling • Network Interconnections • Switches • Routers • Firewalls • SNMP •
    Network Access Control
    Wireless Access Security • Wireless Technologies • Wireless LAN Security
    Operating System Security • Computer Hardening • Hardening Windows • Hardening Other OS •
    Virtualization Technologies • Services and Protocols • Hardware and Software Updates •
    Authentication Technologies • Directory Services
    Application Security • File and Print Services • Storage Security • Databases • DHCP Security •
    DNS Security
    Auditing and Intrusion Detection Systems • Systems and Performance Monitoring • Audit Logs •
    Vulnerability Assessments • Intrusion Detection Systems • Honeypots

  Module 4 - Implementing Remote Security
    Remote Access Security • What is Remote Access? • Remote Access Infrastructure • Remote
    Connectivity Protocols • Remote Access Server • Enterprise Remote Access Authentication •
    Remote Authentication Protocols • Hardening Remote Access Infrastructure
    Securing Email and Messaging Communications • Email Standards • Email Application Security •
    Email Authentication and Confidentiality • Instant Messaging and VoIP • File Transfer
    Securing Web Services • HTTP • SSL / TLS • Web Servers • Web Browsers • Desktop Security
    Applications

  Module 5 - Disaster Recovery and Business Continuity
    Disaster Recovery and Business Continuity • Disaster Recovery Planning • Business Continuity •
    Secure Recovery • Backup Strategies


CompTIA Certification Update Policy
  CompTIA's Certification Update Policy allows candidates holding certification under the previous exam
  objectives to update their certification by taking a special bridge exam.
  The instructor edition of this course contains extensive notes on the differences between the 2008 and
  2002 objectives, for those using the course to prepare students to take the bridge exam (BR0-001).


              © gtslearning 1998-2008. All rights reserved. All trademarks are the property of their respective owners.

Contenu connexe

Tendances

How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? PECB
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2ShivamSharma909
 
Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Rogerio Ferraz
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 PresentationAmy McMullin
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security TrainingBryan Len
 
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkKevin Fealey
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseAdrian Mikeliunas
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security ProfessionalHelen Njuguna
 
UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiBL4CKSWAN Srl
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Examkoidis
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingKnoldus Inc.
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systemsTonex
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsurancePriyanka Aash
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityDr. Ahmed Al Zaidy
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsPECB
 

Tendances (20)

How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
 
Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)Comptia security-sy0-601-exam-objectives-(2-0)
Comptia security-sy0-601-exam-objectives-(2-0)
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Software Security Training
Software Security TrainingSoftware Security Training
Software Security Training
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy Course
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - Guasconi
 
How to Prepare for the CISSP Exam
How to Prepare for the CISSP ExamHow to Prepare for the CISSP Exam
How to Prepare for the CISSP Exam
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat Modelling
 
Project cyper
Project cyperProject cyper
Project cyper
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
A New Security Management Approach for Agile Environments
A New Security Management Approach for Agile EnvironmentsA New Security Management Approach for Agile Environments
A New Security Management Approach for Agile Environments
 
CISSP Summary V1.1
CISSP Summary V1.1CISSP Summary V1.1
CISSP Summary V1.1
 

Similaire à Security+ Course Overview (2008)

Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001kmperkins85
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتeng_SamMoh
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationKoenig Solutions Ltd.
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401pgupta101
 
Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWithum
 
Dowless Corp Cap 12 06 08
Dowless  Corp Cap  12 06 08Dowless  Corp Cap  12 06 08
Dowless Corp Cap 12 06 08jdowless
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Kusumadihardja
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)Jason Chapman
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use CasesJason Singh
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ SagarNegi10
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+CompTIA
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineExamcollection
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 

Similaire à Security+ Course Overview (2008) (20)

Sec+ start guide #30001
Sec+ start guide #30001Sec+ start guide #30001
Sec+ start guide #30001
 
محتويات مادة آمن الشبكات
محتويات مادة آمن الشبكاتمحتويات مادة آمن الشبكات
محتويات مادة آمن الشبكات
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
How to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical Information
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401
 
Webinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST ComplianceWebinar: Critical Steps For NIST Compliance
Webinar: Critical Steps For NIST Compliance
 
Dowless Corp Cap 12 06 08
Dowless  Corp Cap  12 06 08Dowless  Corp Cap  12 06 08
Dowless Corp Cap 12 06 08
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Network Security Expert Professional (002)
Network Security Expert Professional (002)Network Security Expert Professional (002)
Network Security Expert Professional (002)
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use Cases
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+Meeting Today’s IT Support Challenges with CompTIA A+
Meeting Today’s IT Support Challenges with CompTIA A+
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
CompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE OutlineCompTIA CAS-002 VCE Outline
CompTIA CAS-002 VCE Outline
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 

Plus de GTS Learning, Inc.

CompTIA Lifetime Certification Expires December 31, 2010
CompTIA Lifetime Certification Expires December 31, 2010CompTIA Lifetime Certification Expires December 31, 2010
CompTIA Lifetime Certification Expires December 31, 2010GTS Learning, Inc.
 
GTS Learning - CompTIA Strata Green IT Support Skills
GTS Learning - CompTIA Strata Green IT Support SkillsGTS Learning - CompTIA Strata Green IT Support Skills
GTS Learning - CompTIA Strata Green IT Support SkillsGTS Learning, Inc.
 
CompTIA Certifications Approved for Directive 8570.1
CompTIA Certifications Approved for Directive 8570.1CompTIA Certifications Approved for Directive 8570.1
CompTIA Certifications Approved for Directive 8570.1GTS Learning, Inc.
 

Plus de GTS Learning, Inc. (6)

CompTIA CEU Activity Chart
CompTIA CEU Activity ChartCompTIA CEU Activity Chart
CompTIA CEU Activity Chart
 
CompTIA Lifetime Certification Expires December 31, 2010
CompTIA Lifetime Certification Expires December 31, 2010CompTIA Lifetime Certification Expires December 31, 2010
CompTIA Lifetime Certification Expires December 31, 2010
 
Ms office 2010 courseware
Ms office 2010 coursewareMs office 2010 courseware
Ms office 2010 courseware
 
GTS Learning - CompTIA Strata Green IT Support Skills
GTS Learning - CompTIA Strata Green IT Support SkillsGTS Learning - CompTIA Strata Green IT Support Skills
GTS Learning - CompTIA Strata Green IT Support Skills
 
CompTIA Certifications Approved for Directive 8570.1
CompTIA Certifications Approved for Directive 8570.1CompTIA Certifications Approved for Directive 8570.1
CompTIA Certifications Approved for Directive 8570.1
 
A+ 2009 Course Overview
A+ 2009 Course OverviewA+ 2009 Course Overview
A+ 2009 Course Overview
 

Dernier

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 

Dernier (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

Security+ Course Overview (2008)

  • 1. Course overview g631eng Security+ Certification (2008 Objectives) (g631eng) Overview and objectives The aim of this course is to prepare students for CompTIA's Security+ exam. CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts. On completion of this course, students will be able to: Identify network attack strategies and defenses. Understand the principles of organizational security and the elements of effective security policies. Know the technologies and uses of encryption standards and products. Identify network- and host-based security technologies and practices. Describe how remote access security is enforced. Describe the standards and products used to enforce security on web and communications technologies. Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery The course has been approved through the CompTIA Authorized Quality Curriculum program. Certification track This course will prepare students to take the SY0-201 CompTIA Security+ exam, for the objectives released in October 2008. Major corporations such as Sun, IBM/Tivoli Software Group, Symantec, Motorola, Hitachi Electronics Services and VeriSign value the CompTIA Security+ certification and recommend or require it of their IT employees. Target audience This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing.
  • 2. Course overview g631eng Security+ Certification (2008 Objectives) (g631eng) Course prerequisites Ideally, students should have successfully completed CompTIA Network+ certification and have around 24 months' experience of networking support. It is not necessary that students pass the CompTIA Network+ exam before completing CompTIA Security+, but this is recommended. Regardless of whether students have passed CompTIA Network+, it is recommended that they have the following skills and knowledge before starting this course: Know the function and basic features of the components of a PC. Use Windows to create and manage files and use basic administrative features (Explorer, Control Panel and Management Consoles). Basic network terminology (such as OSI Model, Topology, Ethernet, TCP/IP). TCP/IP addressing, core protocols, and troubleshooting tools. Course contents The course consists of two volumes, with a study volume, containing indexed notes and review questions, and a companion volume, containing exam objectives mapping, exam information, practical labs, answers to review questions, and a comprehensive glossary. The course also comes with two online practice exams. An instructor edition of the course is available with margin notes and tips for the trainer. Access to course resources on gtslearning's trainer portal (www.gtstrainer.com) is also available, subject to meeting minimum order requirements. gtstrainer.com hosts setup guides and data, PowerPoint slides, timetables, and extra exam information. Module 1 - Security Fundamentals Security Concepts • Why is Security Important? • Security Fundamentals • Access Control • Identification and Authentication • Accounting • Training Threats • Types and Sources of Threats • What Makes a Network Secure? • Social Engineering • Malware • Network Attack Strategies Operational Security • Corporate Security Policy • Risk Management • Privilege Policies • Disposal / Destruction Policy • HR Policy • Incident Response Policy Module 2 - Cryptography Cryptography • What is Cryptography? • Encryption Technologies • Cryptographic Attacks • Steganography Public Key Infrastructure • What is PKI? • Implementing PKI • Cryptographic Standards
  • 3. Course overview g631eng Security+ Certification (2008 Objectives) (g631eng) Module 3 - Implementing Local Security Site Security • Physical Access Controls • Environmental Security Network Security • Secure Network Topologies • Virtual LANs (VLAN) • Network Address Translation • Tunneling • Network Interconnections • Switches • Routers • Firewalls • SNMP • Network Access Control Wireless Access Security • Wireless Technologies • Wireless LAN Security Operating System Security • Computer Hardening • Hardening Windows • Hardening Other OS • Virtualization Technologies • Services and Protocols • Hardware and Software Updates • Authentication Technologies • Directory Services Application Security • File and Print Services • Storage Security • Databases • DHCP Security • DNS Security Auditing and Intrusion Detection Systems • Systems and Performance Monitoring • Audit Logs • Vulnerability Assessments • Intrusion Detection Systems • Honeypots Module 4 - Implementing Remote Security Remote Access Security • What is Remote Access? • Remote Access Infrastructure • Remote Connectivity Protocols • Remote Access Server • Enterprise Remote Access Authentication • Remote Authentication Protocols • Hardening Remote Access Infrastructure Securing Email and Messaging Communications • Email Standards • Email Application Security • Email Authentication and Confidentiality • Instant Messaging and VoIP • File Transfer Securing Web Services • HTTP • SSL / TLS • Web Servers • Web Browsers • Desktop Security Applications Module 5 - Disaster Recovery and Business Continuity Disaster Recovery and Business Continuity • Disaster Recovery Planning • Business Continuity • Secure Recovery • Backup Strategies CompTIA Certification Update Policy CompTIA's Certification Update Policy allows candidates holding certification under the previous exam objectives to update their certification by taking a special bridge exam. The instructor edition of this course contains extensive notes on the differences between the 2008 and 2002 objectives, for those using the course to prepare students to take the bridge exam (BR0-001). © gtslearning 1998-2008. All rights reserved. All trademarks are the property of their respective owners.