Security +

Security+ Certification Course Outline

The Security+ Certification course teaches material that maps to all skill and knowledge objectives for the CompTIA Security+ certification exam (SY0-101). Skills the student will learn include identifying access control and authentication methods, identifying services provided by encryption, and managing a Public Key Infrastructure (PKI). Upon completing this course, the student will better understand common types of network-based attacks, and how to respond to them. The student will also learn how to harden operating systems, secure remote access, and ensure physical security. In addition to teaching firewall and intrusion-detection technologies, this course teaches critical incident response and system forensics concepts. This course also addresses essential auditing and documentation practices that help measure significant gaps between security policy and actual practice. Finally, the student will learn about the essentials of a disaster recovery plan, how to ensure business continuity, and how to create and manage a security policy. Throughout this course, case studies help ensure that best practices are employed throughout the network using the latest technologies, including wireless implementations.


Authentication Methods

Defining Security Terms

Authentication, Multifactor, Single

Sign-on and Mutual Authentication

User Name and Password

Understanding Kerberos


Token-Based and Challenge Handshake

Authentication Protocol (CHAP)

Smart Cards


Extensible Authentication Protocol


Access Control

Access Control Terminology and

Concepts and Methods

Balancing Responsibilities of Security

Cryptography Essentials

Cryptography and Encryption

Hash, Symmetric-Key, Asymmetric-

Key and Applied Encryption

Creating a Security Matrix

Public Key Infrastructure

Public Key Infrastructure (PKI)


Key Management and the Certificate

Life Cycle

Network Attacks and Vulnerabilities

Network Attack Overview

Protocol Overview

Spoofing and Scanning, Denial-of-Service

(DOS), Distributed Denial-of-Service

(DDOS), Man-in-the-Middle, and

Password-Guessing Attacks

Profile of an Attack

Software Exploitation

Attacks Against Encryption

Social Engineering

Malicious Code and Auditing


Operating System and Application


Security Baselines

Client Security Issues

Server-Side Issues: Application Hardening

Operating System Hardening

Securing Remote Access

Remote Access Concepts and Terminology

Overview of Remote Access Methods

Virtual Private Networks (VPNs)

Terminal Access Controller Access Control

System (TACACS) and TACACS+

Remote Authentication Dial-In User Service

(RADIUS), IPsec and 802.1x

Remote Administration Methods

Secure Shell (SSH)

Wireless Network Security

Wireless Network Technologies

Wireless Application Protocol (WAP)

Wireless Security Vulnerabilities

Solutions for Wireless Network


Site Surveys

Security Topologies and

Infrastructure Security

Firewall Overview

Security Topologies

Traffic Control Methods

Configuring Firewalls

Network Hardening, Network Security and Physical Security Concerns

Cabling and Network Security

Risk Analysis, Intrusion Detection

and Business Continuity

Risk Identification

Intrusion Detection

Elements of an Incident Response

Policy, Forensics and Disaster


Business Continuity

Security Policy Management

Security Policy, Privilege Management,

Training Secure Practices and Documentation

Target Audience

All professionals supporting network operating systems in a production environment.

Job Responsibilities

Support network operating systems, secure remote access and ensure physical security. Create and manage security policies. Understand common types of network-based attacks, and how to respond to them.


Network+ or equivalent certification.



   Scheduled Upon Request

Course Outlines

Price List Course Schedule