MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

CompTIA Security+ (2011 objectives): Part 2

Course Summary

Part 2 of 3 in the CompTIA Security+ (2011 objectives) series. This CompTIA Security+ course will provide networking professionals with the fundamental concepts necessary to anticipate and address security risks. In this course, you will learn network sec


  • +

    Course Syllabus

    ● Host Security
        ◦ Introduction
        ◦ Antimalware
        ◦ Host-based Firewalls
        ◦ Updates and Patch Management
        ◦ Disabling Unused Services
        ◦ Users and Accounts
        ◦ Virtualization
        ◦ Host Software Baselining
        ◦ Securing Servers
        ◦ Securing Mobile Devices
        ◦ What We Covered
    ● Securing Applications
        ◦ Introduction
        ◦ Cookies
        ◦ Session Hijacking
        ◦ Header Manipulation
        ◦ Cross-site Scripting (XSS)
        ◦ Cross-site Request Forgery (XSRF or CSRF)
        ◦ Injection Attacks
        ◦ Preventing Injection Attacks
        ◦ Buffer Overflow
        ◦ Java Applets and JavaScript
        ◦ ActiveX Controls
        ◦ Malicious Add-ons, Attachments, and Zero Day Exploits
        ◦ Secure Coding Concepts
        ◦ Fuzzing
        ◦ Application Hardening
        ◦ What We Covered
    ● Data Security
        ◦ Introduction
        ◦ Data Loss Protection (DLP)
        ◦ Individual Files/Folders Encryption
        ◦ Full Disk/Whole Disk Encryption
        ◦ Database Encryption
        ◦ Removable Media Encryption
        ◦ Mobile Device Encryption
        ◦ Trusted Platform Module (TPM)
        ◦ Hardware Security Module (HSM)
        ◦ USB Encryption
        ◦ Hard Drive Encryption
        ◦ Encryption Key Management
        ◦ Data in the Cloud
        ◦ What We Covered
    ● Authentication, Authorization, and Access Control
        ◦ Introduction
        ◦ Identification vs. Authentication
        ◦ Authentication and Authorization
        ◦ Something You Know, Something You Have, Something You Are
        ◦ Single Factor vs. Multifactor Authentication
        ◦ Types of Access Control
        ◦ Information Models
        ◦ Mandatory Vacations
        ◦ Job Rotation
        ◦ Separation of Duties
        ◦ Trusted OS
        ◦ What We Covered
    ● Physical and Environmental Security
        ◦ Introduction
        ◦ Physical Security
        ◦ Fencing and Mantraps
        ◦ Access Lists
        ◦ Proximity Readers
        ◦ Video Surveillance and Monitoring
        ◦ Hardware Locks
        ◦ HVAC Considerations
        ◦ Hot and Cold Aisles
        ◦ Environmental Monitoring and Controls
        ◦ Fire Suppression
        ◦ Power Systems
        ◦ What We Covered
    ● Authentication Services
        ◦ Introduction
        ◦ Introduction to Authentication Services
        ◦ RADIUS
        ◦ TACACS+
        ◦ TACACS and XTACACS
        ◦ Kerberos
        ◦ LDAP
        ◦ What We Covered
    ● User Account Management
        ◦ Introduction
        ◦ Privilege Management
        ◦ Group Based Privileges
        ◦ User Account Policy
        ◦ Password Policies
        ◦ What We Covered
    ● Risk Management
        ◦ Introduction
        ◦ Risk Management Vocabulary
        ◦ Risk Management Steps
        ◦ Impact Analysis
        ◦ Risk Calculation
        ◦ Options for Handling Risk
        ◦ Control Types
        ◦ What We Covered
    ● Threat and Vulnerability Assessment and Detection
        ◦ Introduction
     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top