• Technical IT

    Solutions delivered throughout the UK
  • Business Applications

    Solutions delivered throughout the UK
  • Professional Best Practice

    Solutions delivered throughout the UK
  • Professional Development

    Solutions delivered throughout the UK

CompTIA Network + Certification Support Skills (2011 Objectives)

  • Price £1,645.00
  • Duration 5 day(s)
All major credit cards accepted

Description

CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography,
operational security, and general security concepts. This practical “hands-on” 5-day course will teach students the fundamental principles of installing and configuring computer and network security systems. 

Prerequisites

This course is intended for students wishing to qualify with CompTIA Security+. The qualification is aimed primarily at networking professionals, but because security is vital to all levels and job roles within an organization, it will also benefit PC support analysts, application developers, and senior managers in accounting, sales, product development, and marketing. 

Assumed Knowledge

Ideally, students should have successfully completed CompTIA Network+ certification and have around
24 months' experience of networking support. It is not necessary that students pass the CompTIA
Network+ exam before completing CompTIA Security+, but this is recommended.
Regardless of whether students have passed CompTIA Network+, it is recommended that they have the
following skills and knowledge before starting this course:

  • Know the function and basic features of the components of a PC.
  • Use Windows to create and manage files and use basic administrative features (Explorer, Control
  • Panel and Management Consoles).
  • Basic network terminology (such as OSI Model, Topology, Ethernet, TCP/IP).
  • TCP/IP addressing, core protocols, and troubleshooting tools. 

Skills

On course completion, students will be able to:

  • Identify network attack strategies and defenses.
  • Understand the principles of organizational security and the elements of effective security policies.
  • Know the technologies and uses of encryption standards and products.
  • Identify network- and host-based security technologies and practices.
  • Describe how remote access security is enforced.
  • Describe the standards and products used to enforce security on web and communications technologies.
  •  Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery. 

Course Content

Module 1 - Security Fundamentals

  • Security Concepts • Why is Security Important? • Security Controls • Identification and
  • Authentication • Authorization • Accounting
  • Threats • Types and Sources of Threats • Social Engineering • Malware • Preventing Virus Infection
  • Network Vulnerabilities • Network Fundamentals • Network Attack Strategies • Layer 2 Attacks • IP
  • Spoofing and Hijacking • Denial of Service Attacks • Application Layer Attacks

Module 2 – Network Security

  • Penetration Testing • Vulnerability Assessments and Penetration Tests • Vulnerability Scanners •
  • Honeypots and Honeynets
  • Secure Network Design • Secure Network Topologies • Network Device Exploitation • Switches and
  • VLANs • Routers
  • Security Appliances and Software • Firewalls • Proxy Servers and Gateways • Intrusion Detection
  • Systems • Audit Logs
  • Network Application Security • DHCP Security • DNS Security • SNMP Security

Module 3 – Internet Security

  • Cryptography • What is Cryptography? • Encryption Technologies • Cryptographic Attacks •
  • Steganography
  • Public Key Infrastructure • What is PKI? • Implementing PKI • Cryptographic Standards
  • Securing Web Services • HTTP • SSL / TLS • Web Servers • Securing Web Applications • Web
  • Browsers • File Transfer

Module 4 – Access Control

  • Authentication • LAN Manager / NTLM • Kerberos • PAP and CHAP • Password Management
  • Policy • Token-based Authentication • Biometric Authentication • Extensible Authentication Protocol
  • (EAP)
  • Authorization • Privilege Policies • Directory Services • Lightweight Directory Access Protocol
  • (LDAP)
  • Operating System Security • Computer Hardening • OS Hardening • Hardware and Software
  • Updates • Network Access Control
  • Remote Access Security • What is Remote Access? • Remote Connectivity Protocols • Remote
  • Access Servers • Remote Administration Tools • Hardening Remote Access Infrastructure
  • Wireless Access Security • Wireless LAN Security • Bluetooth
  • Course overview

Module 5 - Organizational Security

  • Site Security • Physical Access Controls • Environmental Security • Mobile Device Security •
  • Telephony
  • Disaster Recovery and Business Continuity • Disaster Recovery Planning • Business Continuity
  • and Risk Management • Fault Tolerance • Backup Strategies
  • Incident Response and Forensics • Incident Response Policy • Forensic Investigations
  • Operational Security • Corporate Security Policy • Data Handling • HR Policies
  • Next Generation Networks • Virtualization Defined • Virtual Platform Applications • Virtualization
  • Security and Best Practice • Cloud Computing • IPv4 versus IPv6

Make Enquiry

Course Enquiry
  •  
  •  

Book Now

Course Enquiry
  •  
  •  

Find your local training centre