Contact US

Call us : +1-800-543-5571
Mail us : training@itlearn360.com

About the Academy

What Will I Learn? The Security+ teaches you information security theory, as well as reinforces theory with hands-on exercises. You will learn how to configure and operate many different technical security controls over the course. This course will cover ...
  1. Network Security (21% of security+ certification exam)
  2. Compliance and Operational Security (18% security+ certification exam)
  3. Threats and Vulnerabilities (21% security+ certification exam)
  4. Application, Data and Host Security (16% security+ certification exam)
  5. Access Control and Identity Management (13% security+ certification exam)
  6. Cryptography (11% security+ certification exam)
Requirements
  • Experience in IT administration with a focus on security
  • Broad knowledge of security concerns and implementation
Who is the target audience? This course is targeted toward an Information Technology (IT) professional
  • Who has a career in networking and administrative
  • Who want to pursue a career in IT by acquiring a knowledge of security topics; prepare for the CompTIA Security+ Certification examination;
  • Use Security+ as the foundation for advanced security certifications or career roles.
  • Who is beginning a career in cyber security with responsibilities related to securing network devices, network services, and network traffic.

Curriculum


Module 1: General Security Concepts Information Security

  • 1.1  Physical Security
  • 1.2  Operational Security
  • 1.3  Management and Policies
  • 1.4  Goals of Information Security
  • 1.5  The Security Process
  • 1.6  Antivirus Software
  • 1.7  Access Control
  • 1.8  Authentication
  • 1.9  Services and Protocols
  • 1.10  Security Topologies
  • 1.11  Design Goals
  • 1.12  Security Zones
  • 1.13  Technologies
  • 1.14  Business Concerns

Module 2: Know Your Enemy Attack Strategies

  • 2.1  Access Attacks
  • 2.2  Modification and Repudiation Attacks
  • 2.3  Denial of Service Attacks (DoS)
  • 2.4  Common Attacks
  • 2.5  Security Concerns and TCP/IP
  • 2.6  The TCP/IP Protocol Suite
  • 2.7  Application Layer
  • 2.8  Host-to-Host or Transport Layer
  • 2.9  Internet Layer
  • 2.10  Network Interface Layer
  • 2.11  Encapsulation
  • 2.12  Protocols and Services
  • 2.13  TCP/IP Attacks
  • 2.14  Software Exploitation
  • 2.15  Surviving Malicious Code
  • 2.16  Viruses
  • 2.17  Trojan Horses
  • 2.18  Logic Bombs
  • 2.19  Worms
  • 2.20  Antivirus Software
  • 2.21  Social Engineering
  • 2.22  Auditing Processes and Files

Module 3: Infrastructure and Connectivity Infrastructure Security

  • 3.1  Hardware Components
  • 3.2  Software Components
  • 3.3  Devices
  • 3.4  Firewalls
  • 3.5  Routers
  • 3.6  Switches
  • 3.7  Wireless Access Points
  • 3.8  Modems
  • 3.9  Remote Access Services
  • 3.10  Telecom/PBX Systems
  • 3.11  Virtual Private Network
  • 3.12  Network Monitoring and Diagnostics
  • 3.13  Workstations
  • 3.14  Servers
  • 3.15  Mobile Devices
  • 3.16  Remote Access
  • 3.17  Serial Line Internet Protocol
  • 3.18  Point-to-Point Protocol
  • 3.19  Tunneling Protocols
  • 3.20  Internet Connections
  • 3.21  Ports and Sockets
  • 3.22  E-Mail
  • 3.23  Web
  • 3.24  File Transfer Protocol
  • 3.25  SNMP and Other TCP/IP Protocols
  • 3.26  Cabling
  • 3.27   Wires
  • 3.28   and Communications
  • 3.29  Coax

Module 4: Monitoring Communications Activity Network Monitoring

  • 4.1  Types of Network Traffic
  • 4.2  Network Monitoring Systems
  • 4.3  Intrusion Detection Systems
  • 4.4  Network-Based IDS
  • 4.5  Host-Based IDS
  • 4.6  Honey Pots
  • 4.7  Incident Response
  • 4.8  Incident Identification
  • 4.9  Investigating the Incident
  • 4.10  Repairing the Damage
  • 4.11  Documenting the Response
  • 4.12  Adjusting the Procedures
  • 4.13  Wireless Systems

Module 5: Implementing and Maintaining a Secure Network Overview of Network Security Threats

  • 5.1  Security Baselines
  • 5.2  OS/NOS Hardening
  • 5.3  Network Protocol Configuration
  • 5.4  Microsoft Windows 9x
  • 5.5  Microsoft Windows NT 4
  • 5.6  Microsoft Windows 2000
  • 5.7  Microsoft Windows XP
  • 5.8  Windows .NET Server 2003
  • 5.9  UNIX/Linux
  • 5.10  Novell NetWare
  • 5.11  IBM
  • 5.12  Apple Macintosh
  • 5.13  File Systems
  • 5.14  Operating System Updates
  • 5.15  Network Hardening
  • 5.16  Network Device Updates
  • 5.17  Configuring Network Devices
  • 5.18  Application Hardening

Module 6: Working with a Secure Network Physical Security

  • 6.1  Access Control
  • 6.2  Social Engineering
  • 6.3  Environment
  • 6.4  Business Continuity Planning
  • 6.5  Business Impact Analysis
  • 6.6  Risk Assessment
  • 6.7  Policies
  • 6.8   Standards
  • 6.9   and Guidelines
  • 6.10  Policies
  • 6.11  Standards
  • 6.12  Guidelines
  • 6.13  Security Standards and ISO 17799
  • 6.14  Information Classification
  • 6.15  Public Information
  • 6.16  Private Information
  • 6.17  Government and Military Classifications
  • 6.18  Roles in the Security Process
  • 6.19  Information Access Controls

Module 7: Cryptography Basics and Methods Overview of Cryptography

  • 7.1  Physical Cryptography
  • 7.2  Mathematical Cryptography
  • 7.3  Quantum Cryptography
  • 7.4  The Myth of Unbreakable Codes
  • 7.5  Cryptographic Algorithms
  • 7.6  Hashing
  • 7.7  Symmetric Algorithms
  • 7.8  Asymmetric Algorithms
  • 7.9  Using Cryptographic Systems
  • 7.10  Confidentiality
  • 7.11  Integrity
  • 7.12  Authentication
  • 7.13  Non-Repudiation
  • 7.14  Access Control
  • 7.15  Public Key Infrastructure
  • 7.16  Certificate Authority
  • 7.17  RAs and LRAs
  • 7.18  Certificates
  • 7.19  Certificate Revocation
  • 7.20  Trust Models
  • 7.21  Cryptographic Attacks

Module 8: Cryptography Standards Cryptography Standards and Protocols

  • 8.1  Origins of Encryption Standards
  • 8.2  PKIX/PKCS
  • 8.3  X.509
  • 8.4  SSL
  • 8.5  TLS
  • 8.6  ISAKMP
  • 8.7  CMP
  • 8.8  S/MIME
  • 8.9  SET
  • 8.10  SSH
  • 8.11  PGP
  • 8.12  HTTPS
  • 8.13  S-HTTP
  • 8.14  IPSec
  • 8.15  FIPS
  • 8.16  Common Criteria
  • 8.17  WTLS
  • 8.18  WEP
  • 8.19  ISO 17799

Module 9: Security Policies and Procedures Business Continuity

  • 9.1  Utilities
  • 9.2  High Availability
  • 9.3  Disaster Recovery
  • 9.4  Vendor Support
  • 9.5  Service Level Agreements
  • 9.6  Code Escrow
  • 9.7  Policies and Procedures
  • 9.8  Personnel Policies
  • 9.9  Business Policies
  • 9.10  Certificate Policies
  • 9.11  Incident Response Policies
  • 9.12  Privilege Management
  • 9.13  User and Group Role Management
  • 9.14  Single Sign-On
  • 9.15  Privilege Decision Making
  • 9.16  Auditing
  • 9.17  Access Control

Module 10: Security Management Computer Forensics

  • 10.1  Methodology of a Forensic Investigation
  • 10.2  Chain of Custody
  • 10.3  Preservation of Evidence
  • 10.4  Collection of Evidence
  • 10.5  Security Management
  • 10.6  Best Practices and Documentation
  • 10.7  Change Management
  • 10.8  Systemic Change
  • 10.9  Understanding the Roles in a Change Process
  • 10.10  Justifying the Need for Change
  • 10.11  Scheduling Changes
  • 10.12  Change Staging
  • 10.13  Change Documentation
  • 10.14  Change Notification
  • 10.15  Security Awareness and Education
Request a detailed syllabus.

Get Answers (Answering their questions)

What kind of learning does ITlearn360.com provide?

ITlearn360.com offers instructor-led online live sessions and classroom-based corporate trainings and bootcamps for various courses and certifications to the learners.

Who are the instructors @ITlearn360.com?

@ITlearn360.com, we have an instructor community of industry professionals who are working in leading organizations and are veterans in their respective fields. These experts belong to various industries and are willing to share their talent with learners like you.

Are classes @ITlearn360.com conducted through online video streaming?

Yes, the classes @ITlearn360.com are conducted through online video streaming where there is two-way communication between users and instructors. The users can speak by using a microphone, chat by sending a message through a chat window and share their screens with an instructor. For better understanding, users also get recorded video of the class.

Sign for next demo class