Security+ training seminars presented by Netcom Learning register now on FindaSeminar.com

findaseminar logo balls FindaSeminar.com
event search registration and marketing services since 2002
Advanced Search
 
 

Security+  

 Email information about this seminar Security+ by Netcom Learning to yourself your manager or associates Email this event... View and register for other training seminars like Security+ by Netcom Learning on FindaSeminar.com Find similar training.. Find and register for other training seminars by Netcom Learning on FindaSeminar.com Other seminars from Netcom Learning

By:

Netcom Learning   

For:

This course is designed for IT professionals who have networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as NetWare, Macintosh, UNIX/Linux, and OS/2.

Cost:   

see Registration info for seminar cost, group discount etc.

Seminar Summary:

In this course, students will build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network. (see full course description)

 

 Seminar / Training class dates & locations

 

No seminar dates for this event are currently scheduled.  Please use the seminars search box above or choose one of the following additional training search options to find similar training.

security+security%2Bcomptia+OS training seminars workshops conferences online training

Providers course catalog

Find seminars by state

Find seminars by city

Request on site training

Use Advanced Search

NEW  Don't miss training you want to attend

Receive a personal Training Alert when training you want to attend comes to your area. Create a personal Training Alert now  it's Free and only takes a minute!


 

 

 

share this page 

print the agenda print agenda for the Security+ seminar

 

 

Training Course Syllabus:


Description
Security+ Certification is the primary course you will need to take if your job responsibilities include securing network services, network devices, and network traffic. It is also the main course you will take to prepare for the CompTIA Security+ examination. In this course, you will build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network.

Audience
IT professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as NetWare, Macintosh, UNIX/Linux, and OS/2, who wants to: further a career in Information Technology by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ examination; or use Security+ as the foundation for advanced security certifications or career roles.

Objectives
·  Identify security threats
·  Harden internal systems and services.
·  Harden internetwork devices and services.
·  Secure network communications.
·  Manage a PKI
·  Manage certificates.
·  Enforce an organizational security policy.
·  Monitor the security infrastructure.
·  Respond to network attacks.
·  Respond to software-based attacks.

Required Prerequisites
 ·  A+ Certification: Core Hardware
 ·  A+ Certification: Operating Systems
 ·  Network+ Certification

Exams
 ·  SY0-101 : Security+

Next Steps
 ·  CCSA: Check Point NG with Application Intelligence - Management I
 ·  CCSE: Check Point NG with Application Intelligence - Management II
 ·  CCSE Plus: Check Point NG with Application Intelligence - Management III

Outline
    1. Security overview
      1. Introduction to network security
      2. Understanding security threats
      3. Creating a secure network strategy
      4. Windows 2000 server access control
    2. Authentication
      1. Introduction to authentication
      2. Kerberos
      3. Challenge Handshake Authentication Protocol
      4. Digital certificates
      5. Security tokens
      6. Biometrics
    3. Attacks and malicious code
      1. Denial of service attacks
      2. Man-in-the-middle attacks
      3. Spoofing
      4. Replays
      5. TCP session hijacking
      6. Social engineering
      7. Attacks against encrypted data
      8. Software exploitation
    4. Remote access
      1. Securing remote communications
      2. Authentication
      3. Virtual private networks
      4. Telecommuting vulnerabilities
    5. E-mail
      1. Secure e-mail and encryption
      2. PGP and S/MIME encryption
      3. E-mail vulnerabilities
    6. Web security
      1. SSL/TLS protocol
      2. Instant messaging
      3. Vulnerabilities of Web tools
      4. Configuring Internet Explorer security
    7. Directory and file transfer services
      1. Introduction to directory services
      2. File transfer services
      3. File sharing
    8. Wireless and instant messaging
      1. IEEE 802.11
      2. WAP 1.x and WAP 2.0
      3. Wired equivalent privacy
      4. Instant messaging
    9. Network devices
      1. Understanding firewalls
      2. Routers
      3. Switches
      4. Telecom, cable modem, and wireless devices
      5. Securing remote access
      6. Intrusion detection systems
      7. Workstations and servers
    10. Transmission and storage media
      1. Transmission media
      2. Storage media
    11. Network security topologies
      1. Security topologies
      2. Network Address Translation
      3. Tunneling
      4. Virtual Local Area Networks
    12. Intrusion detection
      1. Intrusion detection systems
      2. Network-based and host-based IDS
      3. Active and passive detection
      4. Honeypots
      5. Incident response
    13. Security baselines
      1. OS/NOS hardening
      2. Network hardening
      3. Application hardening
    14. Cryptography
      1. Concepts of cryptography
      2. Public Key Infrastructure (PKI)
      3. Key management and life cycle
      4. Setting up a certificate server
    15. Physical security
      1. Access control
      2. Environment
    16. Disaster recovery and business continuity
      1. Disaster recovery
      2. Business continuity
      3. Policies and procedures
      4. Privilege management
    17. Computer forensics and advanced topics
      1. Understanding computer forensics
      2. Risk identification
      3. Education and training
      4. Auditing
      5. Documentation

    Seminar Summary:

    In this course, students will build on your knowledge and professional experience with computer hardware, operating systems, and networks as you acquire the specific skills required to implement basic security services on any type of computer network. (see full course description)

    print this agenda print agenda for the Security+ training seminar

     view dates and locations for this seminar

     

     

     

    Custom Search