CompTIA Security+ 2008 Certification Training Course


CompTIA Security+ 2008 Certification Training Course


CompTIA Security+ 2008 Certification Training Course

CompTIA Security+ 2008 validates your knowledge of communication security, infrastructure security, cryptography, operational security and general security concepts and is an international, vendor-neutral certification. Our self-study CompTIA Security+ training course is taught by the IT industry's leading subject matter experts who have years of experience on the topic and will successfully pass down all their knowledge down to you in our dynamic Security+ 2008 certification training videos. Once done with the Security+ 2008 training course, you will be more than qualified to pass the accompanying Security+ certification exam needed to become the security professional you have always wanted to become.

Security+ Exam Number

    • SY0-201

CompTIA Security+ Certification Training Outline:

1.0 Security Basics

Network Security Concepts
Where to Begin
Understanding Network Security Terms
Access Control Methods
Administrative Security Concepts
Understanding Authentication
Understanding Kerberos Authentication
Understanding Authentication
Cryptography Basics
Security Policy Fundamentals
Security Policies
Change Management

2.0 Understanding Threats to Network Security

Social Engineering
Understanding Attackers
Malicious Software
Understanding Software Based Attacks
Types of Malicious Code
Common Software Attacks
Password Attacks
Network Threats
Network Reconnaissance Threats
Active Network Threats
Hardware Threats

3.0 Security Hardening Fundamentals

Understanding Security Hardening Concepts
Hardening Operating Systems
Operating System Hardening Fundamentals
Patch Management
Utilizing Security Auditing
Creating Audit Policies and Managing Events
Service Hardening
Security Templates
Using Security Templates
Hardening Windows Systems
Hardening Network Services
Directory Services
Understanding Directory Services
Lightweight Directory Access Protocol
Directory Services Vulnerabilities
Hardening Active Directory
DHCP Services
Hardening DHCP
File and Print Servers
Hardening File Servers
Name Resolution Services
Hardening DNS Servers
Messaging Services
Web Services
FTP Services

4.0 Securing Network Communications

Securing the Network Infrastructure
Securing Network Devices
Securing Infrastructure using Network Devices
Security for Cabling
Network Segmentation
Perimeter Networks
Network Protection Devices
Protecting Network Traffic with IPSec
Understanding IP Security
IPSec Protocols and Processes
Windows IPSec Implementation
Creating and Configuring Connection Security Rules
Wireless Security
Wireless Standards and Security
Wireless Vulnerabilities
Guidelines for Securing Wireless Communication
Securing Remote Access
Remote Access Authentication Protocols
Virtual Private Networks
Centralizing Authentication and Authorization

5.0 Public Key Infrastructures

Fundamentals of a Public Key Infrastructure
Understanding a Public Key Infrastructure
Certificate Authorities
Introducing Active Directory Certificate Services
Deploying Certificate Authorities
Decision Factors for CA Hierarchy
CA Hierarchy Roles
Best Practices for CA Hierarchy
Installing AD CS
Installing Root CAs
Installing a Root CA
Installing Subordinate CAs
Overview of the CA Administrative Console
Configuring CAs
Understanding CRLs
Publishing AIA
Publishing the CRL
Deploying and Managing Certificates
Overview of Certificates and Certificate Templates
Managing and Modifying Certificate Templates
Deploying Certificates to Clients
Enrollment Options
Manually Requesting a Certificate
Automating Enrollment
Configuring Auto-Enrollment
Managing Revocation and Distribution
Configuring an Online Responder
Configuring Certificate Recovery
Importance of Key Archival and Recovery
Understanding Archival Methods
Enabling Key Archival
Recovering Lost Keys
Recovering Lost Keys

6.0 Understanding Organizational Security Policies

Risk Assessments
Corporate Security Policies
Importance of Security Policies
Types of Security Policies
Awareness and Education
Handling User Education
Planning for Disaster Recovery and High Availability
Understanding DR and HA
Creating and Maintaining the DR plan
Security Audits

Add To Cart