AtHand Logo

 

COURSE LOGIN
Username:
Password:   
FEATURED CUSTOMERS
FEATURED SOLUTION
AtHand Learning System
Total E-Learning Solution


Built-In LMS
Learning Management
Testing Solutions that address the issues you face now.

CompTIA Security+

Print Version

Security+ certification is recognized around the world as the benchmark for foundation level security professionals. Incorporating a comprehensive range of security knowledge areas, Security+ was developed with input from industry, government, academia, and front-line practitioners, so you can be assured of its relevance.




5 lessons - 153 modules - 15 learning hours

 

Available Options

EXAMPACK: CompTIA Security+ (5 levels + ExamPrep)
Makau Course Cover - Box Shot  
DVD-ROMs, e-Study Guides, Practice Exams$499.00Add To Cart
1 YR ONLINE, e-Study Guides, Practice Exams$499.00Add To Cart
CD-ROMs, e-Study Guides, Practice Exams$499.00Add To Cart
SINGLE USER: CompTIA Security+ (5 levels)
Makau Course Cover - Box Shot  
DVD-ROMs, e-Study Guides$399.00Add To Cart
1 YR ONLINE, e-Study Guides$399.00Add To Cart
CD-ROMs, e-Study Guides$399.00Add To Cart
MULTI USER: CompTIA Security+ (5 levels)
Makau Course Cover - Box Shot  
DVD-ROMs, e-Study Guides$798.00Add To Cart
CD-ROMs, e-Study Guides$798.00Add To Cart
For additional licensing options. pricing and information, call 877-752-3529

Course Instructor: Kevin Wolford

Kevin Wolford started his computer career in 1983. He has been a technical writer, network administrator, and trainer. Kevin spent many years with Novell and is a CNI and Master CNE. In 1998 Kevin founded Tech Training, giving him a chance to test his training concepts on live labs. He is also an MCSE, MCT, and is certified in SMS, SQL Server, TCP/IP, NT Workstation, NT Server, Exchange Server, Windows 9x and 2000. Kevin has authored Microsoft certification books for New Riders and Sybex. He also owns a consulting company dedicated to teaching complex technical topics in a simple way.

Course Outline

Level 1: General Security Concepts
Access control
  • Foundation of a secure network
  • Access Control methods
Authentication
  • Overview
  • Kerberos
  • CHAP
  • Certificates
  • Username/Password
  • Tokens
  • Multi-Factor
  • Mutual Authentication
  • Biometrics
  • Auditing
Protecting Your Network
  • Non-essential services & protocols disabling unnecessary systems/process/attacks
  • Attacks
  • Malicious Code
  • Social Engineering
Auditing
  • Logging & System Scanning
Level 2: Communication Security
Remote Access
  • 802.1x
  • VPN
  • RADIUS
  • TACACS/+
  • L2TP/PPTP
  • SSH
  • IPSEC
  • Vulnerabilities
E-mail
  • S/MIME
  • PGP
  • Vulnerabilities
Web
  • SSL/TLS
  • HTTP/S
  • Instant Messaging
Directory Services
  • SSL/TLS
  • LDAP
File Transfer
  • S/FTP
  • Blind FTP/Anonymous
  • File Sharing
  • Vulnerabilities
Wireless
  • WTLS
  • 802.1x
  • WEP/WAP
  • Vulnerabilities
Level 3: Infrastructure Security
Devices
  • Firewalls
  • Routers
  • Switches
  • Wireless
  • Modems
  • RAS
  • Telecom/PBX
  • VPN
  • IDS
  • Network Monitoring/Diagnostic
  • Workstation
  • Servers
  • Mobile Devices
Media
  • Coax
  • UTP/STP
  • Fiber
  • Removable Media
Security Topologies
  • Security Zones
  • VLANs
  • NAT
  • Tunneling
Intrusion Detection
  • Network Based
  • Host based
  • Active Detection
  • Honey Pots
  • Incident Response
Security
  • OS/NOS Hardening (Concepts & Processes)
  • Network Hardening
  • Application Hardening
Level 4: Basics of Cryptography
Algorithms
  • Hashing
  • Symmetric
  • Asymmetric
Concepts of Cryptography
  • Confidentiality
  • Integrity
  • Authentication
  • Non-Repudiation
  • Access Control
PKI
  • Distinguishing Certificates
  • Revocation
  • Trust Models
Standard & Protocols

Key Management/Certificate Lifecycle
  • Centralized vs. Decentralized
  • Storage
  • Escrow
  • Expiration
  • Revocation
  • Suspension
  • Recovery
  • Renewal
  • Destruction
  • Key Usage
Level 5: Operational/Organizational Security
Physical Security
  • Access Control
  • Social Engineering
  • Environment
Disaster Recovery
  • Backups
  • Secure Recovery
  • Disaster Recovery Plan
Business Continuity
  • Utility
  • High Availability/Fault Tolerance
  • Backups
Policy & Procedure
  • Security Policy
  • Incident Response Policy
Privilege Management
  • User/Group/Role Management
  • Single Sign-on
  • Centralized vs. Decentralized
  • Auditing (Privilege, Usage, Escalation)
  • MAC/DAC/RBAC
Forensic (Awareness, Conceptual Knowledge & Understanding-knowing your role
  • Chain of Custody
  • Preservation of Evidence
  • Collection of Evidence
Risk Identification
  • Asset Identification
  • Risk Assessment
  • Threat Identification
  • Vulnerabilities
Education-training of end-users, executives, & HR
  • Communication
  • User Awareness
  • Education
  • Online Resources
Documentation
  • Standard and Guidelines
  • System Architecture
  • Change Documentation
  • Logs and Inventories
  • Classification
  • Retention/Storage
  • Destruction