Course Description

Cybersecurity is a problem facing individuals, businesses and government at all levels. For instance, parents are worried about online safety of their children and the privacy of their confidential information. Organizations, such as the government maintain a huge amount of confidential information, including intellectual property and critical infrastructures. These infrastructures and information require protection from the prying eyes of cyber intruders and other actors. In order to be part of a team that is responsible for providing this protection, you need the appropriate training and certification first. This class will help you to acquire those fundamental skills.   

Course Outline

Threats, Attacks and Vulnerabilities 
This module introduces students to various types of threats, attacks and vulnerabilities, including: malware, social engineering, application/service and wireless attacks. Students will also be introduced to threat vectors and their attributes, as well as penetration testing concepts. 

•    Technologies and Tools 
In this module, students will learn how to install, configure, and deploy network components, including firewall, virtual private network, intrusion detection/prevention systems, routers, proxies, protocol analyzers, network scanners, etc. Students will also learn how to troubleshoot common security issues, implement secure protocols, as well as analyze and interpret output from security technologies.  

•    Architecture and Design 
In this module, the instructor will explain how to implement secure network architecture, including DMZ, NAT, intranet, VPN and VLAN. Students will also learn how to secure systems design, such as Trusted Platform Module and secure boot, as well as secure application development and deployment concepts. This module will also introduce students to the cloud and virtualization concepts, such as hypervisor and security as a service.

•    Identity and Access Management 
This module will introduce students to identity and access management concepts. Students will learn how to install and configure identity and access services, such as Kerberos, CHAP and RADIUS. They will also learn how to implement identity and access controls, such as biometrics and tokens. 

•    Risk Management 
This module introduces students to the concepts of policies, plans and procedures relative to organizational security. Students will learn risk assessment concepts, incident response procedures, disaster recovery and business continuity concepts. 

•    Data Security and Privacy Practices 
In this module, the instructor will explain various data security and privacy practices, including shredding and wiping. Students will also review data sensitivity labeling and handling concepts, such as confidentiality and private.

•    Cryptography and PKI 
In this module, students will learn cryptography concepts, such as symmetric algorithms, hashing, key exchange, obfuscation, stream and block. Students will also learn how to install and configure wireless security settings, as well as implement public key infrastructure. 

•    Review and Final Exam 

Learner Outcomes

   Upon completion of this workshop participants will be familiar with how to:
•    Detect threats, vulnerabilities and attacks. 
•    Assess and troubleshoot security issues. 
•    Implement secure network architecture. 
•    Manage risk, access and identity. 
•    Implement Cryptography and public key infrastructure 


 Materials Required:
  CompTIA Security+ iLabs with practice exam/test engine by ITProTV, 1st edition, by ITProTV,     
ISBN: 2819390061496, Price: $105.35


Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .