Course Overview
TOPScheduled Classes
TOPWhat You'll Learn
TOPOutline
TOPLESSON 1: COMPARING AND CONTRASTING ATTACKS
Topic A: Compare and Contrast Information Security Roles
Topic B: Explain Threat Actor Types
Topic C: Compare and Contrast Social Engineering Attack Types
Topic D: Determine Malware Types
LESSON 2: COMPARING AND CONTRASTING SECURITY CONTROLS
Topic A: Compare and Contrast Security Control and Framework Types
Topic B: Follow Incident Response Procedures
LESSON 3: ASSESSING SECURITY POSTURE WITH SOFTWARE TOOLS
Topic A: Explain Penetration Testing Concepts
Topic B: Assess Security Posture with Topology Discovery Software Tools
Topic C: Assess Security Posture with Fingerprinting and Sniffing Software Tools
Topic D: Assess Security Posture with Vulnerability Scanning Software Tools
LESSON 4: EXPLAINING BASIC CRYPTOGRAPHY CONCEPTS
Topic A: Compare and Contrast Basic Concepts of Cryptography
Topic B: Explain Hashing and Symmetric Cryptographic Algorithms
Topic C: Explain Asymmetric Cryptographic Algorithms
LESSON 5: IMPLEMENTING A PUBLIC KEY INFRASTRUCTURE
Topic A: Implement Certificates and Certificate Authorities
Topic B: Implement PKI Management
LESSON 6: IMPLEMENTING IDENTITY AND ACCESS MANAGEMENT CONTROLS
Topic A: Compare and Contrast Identity and Authentication Concepts
Topic B: Install and Configure Authentication Protocols
Topic C: Implement Multifactor Authentication
LESSON 7: MANAGING ACCESS SERVICES AND ACCOUNTS
Topic A: Install and Configure Authorization and Directory Services
Topic B: Implement Access Management Controls
Topic C: Differentiate Account Management Practices
Topic D: Implement Account Auditing and Recertification
LESSON 8: IMPLEMENTING A SECURE NETWORK ARCHITECTURE
Topic A: Implement Secure Network Architecture Concepts
Topic B: Install and Configure a Secure Switching Infrastructure
Topic C: Install and Configure Network Access Control
Topic D: Install and Configure a Secure Routing and NAT Infrastructure
LESSON 9: INSTALLING AND CONFIGURING SECURITY APPLIANCES
Topic A: Install and Configure Firewalls and Proxies
Topic B: Install and Configure Load Balancers
Topic C: Install and Configure Intrusion Detection/Prevention Systems
Topic D: Install and Configure Data Loss Prevention (DLP) Systems
Topic E: Install and Configure Logging and SIEM Systems
LESSON 10: INSTALLING AND CONFIGURING WIRELESS AND PHYSICAL ACCESS SECURITY
Topic A: Install and Configure a Wireless Infrastructure
Topic B: Install and Configure Wireless Security Settings
Topic C: Explain the Importance of Physical Security Controls
LESSON 11: DEPLOYING SECURE HOST, MOBILE, AND EMBEDDED SYSTEMS
Topic A: Implement Secure Hardware Systems Design
Topic B: Implement Secure Host Systems Design
Topic C: Implement Secure Mobile Device Systems Design
Topic D: Implement Secure Embedded Systems Design
LESSON 12: IMPLEMENTING SECURE NETWORK ACCESS PROTOCOLS
Topic A: Implement Secure Network Operations Protocols
Topic B: Implement Secure Remote Access Protocols
Topic C: Implement Secure Remote Administration Protocols
LESSON 13: IMPLEMENTING SECURE NETWORK APPLICATIONS
Topic A: Implement Secure Web Services
Topic B: Implement Secure Communications Services
Topic C: Summarize Secure Virtualization Infrastructure
Topic D: Summarize Secure Cloud Services
LESSON 14: EXPLAINING RISK MANAGEMENT AND DISASTER RECOVERY CONCEPTS
Topic A: Explain Risk Management Processes and Concepts
Topic B: Explain Resiliency and Automation Strategies
Topic C: Explain Disaster Recovery and Continuity of Operation Concepts
Topic D: Summarize Basic Concepts of Forensics
LESSON 15: SUMMARIZING SECURE APPLICATION DEVELOPMENT CONCEPTS
Topic A: Explain the Impact of Vulnerability Types
Topic B: Summarize Secure Application Development Concepts
LESSON 16: EXPLAINING ORGANIZATIONAL SECURITY CONCEPTS
Topic A: Explain the Importance of Security Policies
Topic B: Implement Data Security and Privacy Practices
Topic C: Explain the Importance of Personnel Management
Prerequisites
TOPTo ensure your success in this course, you should have basic Windows user skills and a fundamental understanding of computer and networking concepts.
CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months' experience in networking, including configuring security parameters, are strongly recommended. Students can obtain this level of skill and knowledge by taking any of the following Official
CompTIA courses:
The Official CompTIA A+: Core 1 (Exam 220-1001)
The Official CompTIA A+: Core 2 (Exam 220-1002)
The Official CompTIA Network+ (Exam N10-007)