Course DescriptionCybersecurity is a problem facing individuals, businesses and government at all levels. For instance, parents are worried about online safety of their children and the privacy of their confidential information. Organizations, such as the government maintain a huge amount of confidential information, including intellectual property and critical infrastructures. These infrastructures and information require protection from the prying eyes of cyber intruders and other actors. In order to be part of a team that is responsible for providing this protection, you need the appropriate training and certification first. This class will help you to acquire those fundamental skills.
Threats, Attacks and Vulnerabilities
This module introduces students to various types of threats, attacks and vulnerabilities, including: malware, social engineering, application/service and wireless attacks. Students will also be introduced to threat vectors and their attributes, as well as penetration testing concepts.
• Technologies and Tools
In this module, students will learn how to install, configure, and deploy network components, including firewall, virtual private network, intrusion detection/prevention systems, routers, proxies, protocol analyzers, network scanners, etc. Students will also learn how to troubleshoot common security issues, implement secure protocols, as well as analyze and interpret output from security technologies.
• Architecture and Design
In this module, the instructor will explain how to implement secure network architecture, including DMZ, NAT, intranet, VPN and VLAN. Students will also learn how to secure systems design, such as Trusted Platform Module and secure boot, as well as secure application development and deployment concepts. This module will also introduce students to the cloud and virtualization concepts, such as hypervisor and security as a service.
• Identity and Access Management
This module will introduce students to identity and access management concepts. Students will learn how to install and configure identity and access services, such as Kerberos, CHAP and RADIUS. They will also learn how to implement identity and access controls, such as biometrics and tokens.
• Risk Management
This module introduces students to the concepts of policies, plans and procedures relative to organizational security. Students will learn risk assessment concepts, incident response procedures, disaster recovery and business continuity concepts.
• Data Security and Privacy Practices
In this module, the instructor will explain various data security and privacy practices, including shredding and wiping. Students will also review data sensitivity labeling and handling concepts, such as confidentiality and private.
• Cryptography and PKI
In this module, students will learn cryptography concepts, such as symmetric algorithms, hashing, key exchange, obfuscation, stream and block. Students will also learn how to install and configure wireless security settings, as well as implement public key infrastructure.
• Review and Final Exam
Learner OutcomesUpon completion of this workshop participants will be familiar with how to:
• Detect threats, vulnerabilities and attacks.
• Assess and troubleshoot security issues.
• Implement secure network architecture.
• Manage risk, access and identity.
• Implement Cryptography and public key infrastructure
CompTIA Security+ iLabs with practice exam/test engine by ITProTV, 1st edition, by ITProTV,
ISBN: 2819390061496, Price: $105.35