Cybersecurity is a problem facing individuals, businesses and government at all levels. For instance, parents are worried about online safety of their children and the privacy of their confidential information. Organizations, such as the government maintain a huge amount of confidential information, including intellectual property and critical infrastructures. These infrastructures and information require protection from the prying eyes of cyber intruders and other actors. In order to be part of a team that is responsible for providing this protection, you need the appropriate training and certification first. This class will help you to acquire those fundamental skills.
- Threats, Attacks and Vulnerabilities - Introduces students to various types of threats, attacks and vulnerabilities, including: malware, social engineering, application/service and wireless attacks. Students will also be introduced to threat vectors and their attributes, as well as penetration testing concepts.
- Technologies and Tools - Students will learn how to install, configure, and deploy network components, including firewall, virtual private network, intrusion detection/prevention systems, routers, proxies, protocol analyzers, network scanners, etc. Students will also learn how to troubleshoot common security issues, implement secure protocols, as well as analyze and interpret output from security technologies.
- Architecture and Design - The instructor will explain how to implement secure network architecture, including DMZ, NAT, intranet, VPN and VLAN. Students will also learn how to secure systems design, such as Trusted Platform Module and secure boot, as well as secure application development and deployment concepts. This module will also introduce students to the cloud and virtualization concepts, such as hypervisor and security as a service.
- Identity and Access Management - Introduce students to identity and access management concepts. Students will learn how to install and configure identity and access services, such as Kerberos, CHAP and RADIUS. They will also learn how to implement identity and access controls, such as biometrics and tokens.
- Risk Management - Learn concepts of policies, plans and procedures relative to organizational security. Students will learn risk assessment concepts, incident response procedures, disaster recovery and business continuity concepts.
- Data Security and Privacy Practices - The instructor will explain various data security and privacy practices, including shredding and wiping. Students will review data sensitivity labeling and handling concepts, such as confidentiality and private.
- Cryptography and PKI - Learn cryptography concepts, such as symmetric algorithms, hashing, key exchange, obfuscation, stream and block. Students will also learn how to install and configure wireless security settings, as well as implement public key infrastructure.
Textbook required and available for purchase in the college bookstore:
CompTIA Security+ iLabs with practice exam/test engine by ITProTV, 1st edition, by ITProTV, ISBN: 2819390061496
Course Dates and Times
|Date and Times|
Are you an organization looking to empower your workforce? If you are interested in providing customized training to your employees visit Contract Training to review all available training options or contact Peggy Dugan at firstname.lastname@example.org for more information.