CompTIA Security+ 2008 Certification Training Course

cmptia.jpg
cmptia.jpg

CompTIA Security+ 2008 Certification Training Course

39.95

CompTIA Security+ 2008 Certification Training Course

CompTIA Security+ 2008 validates your knowledge of communication security, infrastructure security, cryptography, operational security and general security concepts and is an international, vendor-neutral certification. Our self-study CompTIA Security+ training course is taught by the IT industry's leading subject matter experts who have years of experience on the topic and will successfully pass down all their knowledge down to you in our dynamic Security+ 2008 certification training videos. Once done with the Security+ 2008 training course, you will be more than qualified to pass the accompanying Security+ certification exam needed to become the security professional you have always wanted to become.

Security+ Exam Number

    • SY0-201
  •  

CompTIA Security+ Certification Training Outline:

1.0 Security Basics

Introduction
Network Security Concepts
Where to Begin
Understanding Network Security Terms
Access Control Methods
Administrative Security Concepts
Understanding Authentication
Understanding Kerberos Authentication
Understanding Authentication
Cryptography Basics
Security Policy Fundamentals
Security Policies
Change Management
Summary

2.0 Understanding Threats to Network Security

Introduction
Social Engineering
Understanding Attackers
Malicious Software
Understanding Software Based Attacks
Types of Malicious Code
Common Software Attacks
Password Attacks
Network Threats
Network Reconnaissance Threats
Active Network Threats
Hardware Threats
Summary

3.0 Security Hardening Fundamentals

Introduction
Understanding Security Hardening Concepts
Hardening Operating Systems
Operating System Hardening Fundamentals
Patch Management
Utilizing Security Auditing
Creating Audit Policies and Managing Events
Service Hardening
Security Templates
Using Security Templates
Hardening Windows Systems
Hardening Network Services
Directory Services
Understanding Directory Services
Lightweight Directory Access Protocol
Directory Services Vulnerabilities
Hardening Active Directory
DHCP Services
Hardening DHCP
File and Print Servers
Hardening File Servers
Name Resolution Services
Hardening DNS Servers
Messaging Services
Web Services
FTP Services
Summary

4.0 Securing Network Communications

Introduction
Securing the Network Infrastructure
Securing Network Devices
Securing Infrastructure using Network Devices
Security for Cabling
Network Segmentation
Perimeter Networks
Network Protection Devices
Protecting Network Traffic with IPSec
Understanding IP Security
IPSec Protocols and Processes
Windows IPSec Implementation
Creating and Configuring Connection Security Rules
Wireless Security
Wireless Standards and Security
Wireless Vulnerabilities
Guidelines for Securing Wireless Communication
Securing Remote Access
Remote Access Authentication Protocols
Virtual Private Networks
Centralizing Authentication and Authorization
Summary

5.0 Public Key Infrastructures

Introduction
Fundamentals of a Public Key Infrastructure
Understanding a Public Key Infrastructure
Certificate Authorities
Introducing Active Directory Certificate Services
Deploying Certificate Authorities
Decision Factors for CA Hierarchy
CA Hierarchy Roles
Best Practices for CA Hierarchy
Installing AD CS
Installing Root CAs
Installing a Root CA
Installing Subordinate CAs
Overview of the CA Administrative Console
Configuring CAs
Understanding CRLs
Publishing AIA
Publishing the CRL
Deploying and Managing Certificates
Overview of Certificates and Certificate Templates
Managing and Modifying Certificate Templates
Deploying Certificates to Clients
Enrollment Options
Manually Requesting a Certificate
Automating Enrollment
Configuring Auto-Enrollment
Managing Revocation and Distribution
Configuring an Online Responder
Configuring Certificate Recovery
Importance of Key Archival and Recovery
Understanding Archival Methods
Enabling Key Archival
Recovering Lost Keys
Recovering Lost Keys
Summary

6.0 Understanding Organizational Security Policies

Introduction
Risk Assessments
Corporate Security Policies
Importance of Security Policies
Types of Security Policies
Awareness and Education
Handling User Education
Planning for Disaster Recovery and High Availability
Understanding DR and HA
Creating and Maintaining the DR plan
Security Audits
Summary

Add To Cart