MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

CompTIA Security+ (2011 objectives): Part 1

Course Summary

Part 1 of 3 in the CompTIA Security+ (2011 objectives) series. This CompTIA Security+ course will provide networking professionals with the fundamental concepts necessary to anticipate and address security risks. In this course, you will learn network sec


  • +

    Course Syllabus

    ● Getting Started with CompTIA Security+ Training
        ◦ Introduction
        ◦ About Your Instructor
        ◦ About This Course
    ● Introduction to IT Security
        ◦ Introduction
        ◦ What is IT Security?
        ◦ Key Terms You Should Know
        ◦ The Information Security Triad - CIA
        ◦ The AAA Protocol
        ◦ What We Covered
    ● Types of Attacks
        ◦ Introduction
        ◦ Spoofing/Poisoning
        ◦ Pharming
        ◦ Man-in-the-Middle
        ◦ Replay Attack
        ◦ Denial of Service (DoS)
        ◦ Distributed Denial of Service (DDoS)
        ◦ Smurf Attack
        ◦ Scanners and Sniffers
        ◦ Spam
        ◦ Phishing
        ◦ Privilege Escalation
        ◦ Transitive Access
        ◦ Client-side Attacks
        ◦ What We Covered
    ● Malware Prevention and Cleanup
        ◦ Introduction
        ◦ Malware
        ◦ Viruses
        ◦ Worms
        ◦ Trojans
        ◦ Spyware
        ◦ Adware and Pop-ups
        ◦ Rootkits
        ◦ Backdoors
        ◦ Logic Bombs
        ◦ Botnets
        ◦ Ransomware
        ◦ Malware Mitigation
        ◦ Malware Removal
        ◦ What We Covered
    ● Network Device Security
        ◦ Introduction
        ◦ Firewalls
        ◦ Routers
        ◦ Switches
        ◦ Load Balancers
        ◦ Proxies
        ◦ Web Security Gateways
        ◦ VPN Concentrators
        ◦ Network-based Intrusion Detection Systems (NIDS)
        ◦ Network-based Intrusion Prevention Systems (NIPS)
        ◦ Kinds of NIDS and NIPS
        ◦ Other Security Appliances
        ◦ Protocol Analyzers/Sniffers
        ◦ Host-based Filtering Tools
        ◦ What We Covered
    ● Secure Network Administration
        ◦ Introduction
        ◦ Rule-based Management
        ◦ Access Control Lists (ACLs)
        ◦ Firewall Rules
        ◦ Secure Router Configuration
        ◦ Port Security
        ◦ Flood Guards
        ◦ Network Separation and Network Bridging
        ◦ Log Analysis
        ◦ What We Covered
        ◦ Secure Network Design
        ◦ Introduction
        ◦ Security Zones
        ◦ DMZ (Demilitarized Zone)
        ◦ Subnetting
        ◦ Virtual Local Area Network (VLAN)
        ◦ Network Address Translation (NAT)
        ◦ Remote Access
        ◦ Virtual Private Network (VPN)
        ◦ Telephony
        ◦ Network Access Control (NAC)
        ◦ Virtualization
        ◦ Cloud Computing
        ◦ What We Covered
    ● TCP/IP Protocols and Port Security
        ◦ Introduction
        ◦ TCP/IP
        ◦ FTP
        ◦ SSH and SCP
        ◦ Telnet
        ◦ SMTP
        ◦ DNS
        ◦ TFTP
        ◦ HTTP
        ◦ SFTP
        ◦ SNMP
        ◦ HTTPS
        ◦ FTPS
        ◦ SSL and TLS
        ◦ TCP
        ◦ UDP
        ◦ IP
        ◦ ICMP
        ◦ ARP
        ◦ TCP/IP Ports to Remember
        ◦ IPSec


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top