Learn: in:
» back to Search Results

Course rating of 0 Vendor rating of 5


The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. It is an international, vendor-neutral certification that proves competency in system security, network ...


 
Course Outline
The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. It is an international, vendor-neutral certification that proves competency in system security, network infrastructure, access control and organizational security.

Introducing the Acend Modern Classroom Classes Guaranteed to Run

An assessment process takes place at the start of class that results in the creation of a personalized learning plan for each participant . We integrate each individual's specific project objectives with their skill gaps to create the learning prescription. The instructor assumes the role of consultant and guides each participant through the process of filling the critical gaps identified in the learning plan.

Course Outline Course Introduction
Unit 01 - Mitigating Threats 3h 58m
Topic A: Core System Maintenance
Primary Causes for Compromised Security
The Goal - CIA
Technology Weaknesses
Configuration Weaknesses
Human Error and Malice
Securing the Operating System
Microsoft Update
Demo - Windows Update
Windows Update Categories
Update History List
Service Packs
Demo - Installing Service Pack
BIOS Version
BIOS Update
Windows Firewall
Demo - BIOS and Firewall
Tasks Requiring Administrative Privileges
User Account Control Consent
User Account Control Credential

Topic B: Virus and Spyware Management

Viruses

Worms

Trojan Horses

Antivirus Software

Demo - Antivirus

Spyware

Windows Defender

Demo - Spyware

Spybot Search & Destroy

Network AV & Spyware

Demo - Securing Mail

Topic C: Browser Security

Pop-ups

Demo - Managing Pop-ups

Cookies

Cookie Vulnerabilities

Cookie Safeguards

Demo - Managing Cookies

Web Application Security Threats

JavaScript

Simple JavaScript Code

JavaScript Security Holes

ActiveX

ActiveX Vulnerabilities and Safeguards

Java Applets

Signed and Unsigned Applets

CGI

Form Submission

CGI Vulnerabilities and Safeguards

Cross-site Scripting

Buffer Overflow Attacks

Preventing Input Attacks

Demo - Script Weaknesses

Topic D: Social Engineering Threats

Social Engineering

Dumpster Diving

Online Attacks

Social Engineering Countermeasures

Phishing

Domain Kiting

Unit 01 Review

 

Unit 02 - Cryptography 1h 31m

Topic A: Symmetric Cryptography

Cryptography

Alice, Bob, and Eve

ROT13 Cipher

Keys

Symmetric Encryption in Action

Common Symmetric Ciphers

Demo - Encrypting and Decrypting Data

Hashes

Hashing Example

Uses for Hashes

MD5 Hash Algorithm

SHA Algorithm

Hash Vulnerabilities

Steganography

Demo - Steganography

Topic B: Public Key Cryptography

Public Key Cryptography

Asymmetric Encryption in Action

Common Asymmetric Ciphers

Demo - Public Key Encryption

Digital Signatures

Signature Process

Features of Signatures

Digital Certificates

Certificate Types

Demo - Examining Certificates

Public Key Infrastructure

Certificate Policy

Certificate Practice Statement

Trust Models

Single Authority Trust Model

Hierarchical Trust Model

Web of Trust Model

Single- and Dual-key Certificates

Unit 02 Review

 

Unit 03 - Authentication Systems 2h 22m

Topic A: Authentication

3 Steps to Secure Resources

Usernames and Passwords

Password Protection

Strong Passwords

Multiple passwords

Run As Administrator

Demo - Identifying Components of Authentication

Authentication Factors

One-factor Authentication

Two-factor Authentication

Three-factor Authentication

Network Monitor Data

Demo - Network Monitor

Active Directory Services and Features

Demo - Installing Active Directory

Demo - Joining a Domain

Topic B: Hashing

Authentication Protocols

Encryption

Weak Keys

Mathematical Attacks

Birthday Attack

Password Guessing

SAM and System Files

Demo - Password Cracking

Topic C: Authentication Systems

Preventing Impersonation

Identity Proofing

Single Sign-on

Kerberos

Kerberos System Composed Of

Kerberos Data Types

Kerberos Authentication Process

Cross-realm Authentication

Kerberos Security Weaknesses

CHAP

PAP

EAP

Mutual Authentication

Unit 03 Review

 

Unit 04 - Messaging Security 1h 38m

Topic A: E-mail Security

E-mail Vulnerabilities

Spam

Hoaxes and Chain Letters

Hoax – Company Reputation Issue

Phishing

Hoax Countermeasures

SMTP Open Relays

E-mail Server Security

Demo - Configure Security on Email Server

Secure E-mail

Encryption

Hash Function

PGP Symmetric Encryption Methods

PGP Certificates

S/MIME

X.509 Certificates

X.509 Certificate Content

S/MIME Trust Model

PGP and S/MIME Differences

To Install and Configure PGP

Restricting Permissions to Messages

Sending Restricted Messages

Digitally Signed Message

Demo - Digital Signatures

Encrypting Messages

Topic B: Messaging and Peer-to-peer Security

Instant Messaging

IM Risks

Cell Phone SMS

Blocking IM

Corporate IM

Intrusion Detection

Packet Sniffing

Additional IM Features

IM Client Security

Legal Issues

Demo - Configure IM Client Security

Unit 04 Review

 

Unit 05 - User and Role Based Security 2h 4m

Topic A: Security Policies

Group Policy Settings

Local GPO Types

GPO Editor

Local Computer GPO Nodes

Policy Properties Dialog Box

Demo - Creating Console to Manage Local Security Policies

Container Types

Types of Domain GPOs

GPOs Applied in this Order

Demo - GPMC

Windows Applications Configured with Group Policies might Include

Device Installation Policy Settings

Internet Explorer 7 Policy Settings

IE8 Features

Demo - Implementing GPO's

Security Templates

Windows Vista Security Guide Templates

Demo - Analyzing Windows Vista Computer Security

Topic B: Securing File and Print Resources

File and Print Security

Groups

Demo - Groups

File System Security

Permissions

Demo - Permissions

Access Control Models

Printer Permissions

Demo - Securing Printer Resources

Unit 05 Review

 

Unit 06 - Public Key Infrastructure 2h 3m

Topic A: Key Management and Life Cycle

Course Introduction

Unit 01 - Mitigating Threats 3h 58m

Topic A: Core System Maintenance

Primary Causes for Compromised Security

The Goal - CIA

Technology Weaknesses

Configuration Weaknesses

Human Error and Malice

Securing the Operating System

Microsoft Update

Demo - Windows Update

Windows Update Categories

Update History List

Service Packs

Demo - Installing Service Pack

BIOS Version

BIOS Update

Windows Firewall

Demo - BIOS and Firewall

Tasks Requiring Administrative Privileges

User Account Control Consent

User Account Control Credential

Topic B: Virus and Spyware Management

Viruses

Worms

Trojan Horses

Antivirus Software

Demo - Antivirus

Spyware

Windows Defender

Demo - Spyware

Spybot Search & Destroy

Network AV & Spyware

Demo - Securing Mail

Topic C: Browser Security

Pop-ups

Demo - Managing Pop-ups

Cookies

Cookie Vulnerabilities

Cookie Safeguards

Demo - Managing Cookies

Web Application Security Threats

JavaScript

Simple JavaScript Code

JavaScript Security Holes

ActiveX

ActiveX Vulnerabilities and Safeguards

Java Applets

Signed and Unsigned Applets

CGI

Form Submission

CGI Vulnerabilities and Safeguards

Cross-site Scripting

Buffer Overflow Attacks

Preventing Input Attacks

Demo - Script Weaknesses

Topic D: Social Engineering Threats

Social Engineering

Dumpster Diving

Online Attacks

Social Engineering Countermeasures

Phishing

Domain Kiting

Unit 01 Review

 

Unit 02 - Cryptography 1h 31m

Topic A: Symmetric Cryptography

Cryptography

Alice, Bob, and Eve

ROT13 Cipher

Keys

Symmetric Encryption in Action

Common Symmetric Ciphers

Demo - Encrypting and Decrypting Data

Hashes

Hashing Example

Uses for Hashes

MD5 Hash Algorithm

SHA Algorithm

Hash Vulnerabilities

Steganography

Demo - Steganography

Topic B: Public Key Cryptography

Public Key Cryptography

Asymmetric Encryption in Action

Common Asymmetric Ciphers

Demo - Public Key Encryption

Digital Signatures

Signature Process

Features of Signatures

Digital Certificates

Certificate Types

Demo - Examining Certificates

Public Key Infrastructure

Certificate Policy

Certificate Practice Statement

Trust Models

Single Authority Trust Model

Hierarchical Trust Model

Web of Trust Model

Single- and Dual-key Certificates

Unit 02 Review

 

Unit 03 - Authentication Systems 2h 22m

Topic A: Authentication

3 Steps to Secure Resources

Usernames and Passwords

Password Protection

Strong Passwords

Multiple passwords

Run As Administrator

Demo - Identifying Components of Authentication

Authentication Factors

One-factor Authentication

Two-factor Authentication

Three-factor Authentication

Network Monitor Data

Demo - Network Monitor

Active Directory Services and Features

Demo - Installing Active Directory

Demo - Joining a Domain

Topic B: Hashing

Authentication Protocols

Encryption

Weak Keys

Mathematical Attacks

Birthday Attack

Password Guessing

SAM and System Files

Demo - Password Cracking

Topic C: Authentication Systems

Preventing Impersonation

Identity Proofing

Single Sign-on

Kerberos

Kerberos System Composed Of

Kerberos Data Types

Kerberos Authentication Process

Cross-realm Authentication

Kerberos Security Weaknesses

CHAP

PAP

EAP

Mutual Authentication

Unit 03 Review

 

Unit 04 - Messaging Security 1h 38m

Topic A: E-mail Security

E-mail Vulnerabilities

Spam

Hoaxes and Chain Letters

Hoax – Company Reputation Issue

Phishing

Hoax Countermeasures

SMTP Open Relays

E-mail Server Security

Demo - Configure Security on Email Server

Secure E-mail

Encryption

Hash Function

PGP Symmetric Encryption Methods

PGP Certificates

S/MIME

X.509 Certificates

X.509 Certificate Content

S/MIME Trust Model

PGP and S/MIME Differences

To Install and Configure PGP

Restricting Permissions to Messages

Sending Restricted Messages

Digitally Signed Message

Demo - Digital Signatures

Encrypting Messages

Topic B: Messaging and Peer-to-peer Security

Instant Messaging

IM Risks

Cell Phone SMS

Blocking IM

Corporate IM

Intrusion Detection

Packet Sniffing

Additional IM Features

IM Client Security

Legal Issues

Demo - Configure IM Client Security

Unit 04 Review

 

Unit 05 - User and Role Based Security 2h 4m

Topic A: Security Policies

Group Policy Settings

Local GPO Types

GPO Editor

Local Computer GPO Nodes

Policy Properties Dialog Box

Demo - Creating Console to Manage Local Security Policies

Container Types

Types of Domain GPOs

GPOs Applied in this Order

Demo - GPMC

Windows Applications Configured with Group Policies might Include

Device Installation Policy Settings

Internet Explorer 7 Policy Settings

IE8 Features

Demo - Implementing GPO's

Security Templates

Windows Vista Security Guide Templates

Demo - Analyzing Windows Vista Computer Security

Topic B: Securing File and Print Resources

File and Print Security

Groups

Demo - Groups

File System Security

Permissions

Demo - Permissions

Access Control Models

Printer Permissions

Demo - Securing Printer Resources

Unit 05 Review

 

Unit 06 - Public Key Infrastructure 2h 3m

Topic A: Key Management and Life Cycle
Prerequisites & Certificates
Pre-Requisites

Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years of technical networking experience, with an emphasis on security. The CompTIA Network+ certification is also recommended.

Certificates offered

Certificate of completion


Cancellation Policy
Cancellations or postponements received more than ten business days prior to the first day of the course will be fully refunded less a $75 processing fee. The cost of the course is payable, in full, for any cancellations or postponements received within ten business days, or less, prior to the first day of the course.
Map & Reviews
Acend Corporate Learning
[ View Provider's Profile ]

Reviews
 

This course has not yet been rated by one of our members.

If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.

Here are some reviews of the training vendor.
The course content was excellent ... if there was things that weren't relevant you could skip and spend more time on things that you needed to learn. Training provider was excellent as her skill level was superb and her communication skills were superb.
Reviewed by 2015
This course should have dual screens
Reviewed by 2015
I was not able to finish the whole entire course. When creating course training please make sure that it fits the allotted time (beginning to the end). We had two breaks and Instructor did not allow us to listen to the course. I had maybe another 10 mins to finish the whole course, but the Instructor said that it was 4:30pm and it is Ok and we can go home. It is not Ok not to be able to finish the course..
Reviewed by 2014
Mentored training actually worked quite well for me. The instructor is there in the room all the time, available if needed. A lot of material for one day, but I did manage to complete it without feeling too rushed.
Reviewed by 2014
It is not possible to complete a beginner's course in one day. There is a lot of information to absorb. It is wonderful that one can re-sit a session within a limited time.
Reviewed by 2013
To bottom line my feelings about the course: Course -- helpful but this comment is made with reservations. Instructor -- excellent !
Reviewed by 2013
The course material was far too heavy for the duration of the course. The material needs to be reduced so that students do not feel rushed or pressured with time, or the duration of the class needs to be extended.
Reviewed by 2013
Overall, the course has been well handled by the Training Provider. But i would expect that, somehow, there is a time allotted in the afternoon for more visible and face to face interaction between the TP and the whole class. Others may be asking questions that may not have been thought of by other learners but may be helpful.
Reviewed by 2013
Very impressed and would highly recommend.
Reviewed by 2013
The trainer was excellent...easy to talk to and very helpful and informed.
Reviewed by 2013
This was a very good learning environment. I prefer having an instructor present in case I have questions but also be able to work at my own pace.
Reviewed by 2013
I could have used some more time to go through the exercises in the sharepoint database.
Reviewed by 2013
re Instructor assessment. ques. are N/A as it was independant mentored study. Flash based training module had 1 hiccup where ctrl-b key was captured by OS and I had to hunt for alt-b to complete the module. Class mentor was unaware of flaw. I felt that the design of the module would have prevented me from completing the section if I was unable to locate alternative keystroke. Worthwhile day.
Reviewed by 2012
Course is very good but not enough time to complete the exercises. Should be at least another 1.5 hours longer.
Reviewed by 2012
Using the self-teaching method made for a more relaxed working environment. As the instructor's assistance was on a one-on-one basis I was not hesitate to ask questions.
Reviewed by 2012
Would prefer an instructor led (classroom) style of training over a computer based course.
Reviewed by 2012
I would suggest that the course manual contain more visual material (e.g. screen shots) versus words. The course was very well. I did not think I would like the on line method of training but I did. I also liked the fact that I could work through my lunch to complete the course earlier. I had to catch the go train so it worked better for me.
Reviewed by 2012
Susan was an excellent instructor, and was very helpful with providing extra "tips" not covered within the course material.
Reviewed by 2012
I only realized after completing 2 units thoroughly that there is not enough time allotted for a lot practicing. I would tell students in advance that getting through the videos and practicing later in your own time is recommended.
Reviewed by 2012
Enjoyed the flexibility of the "Modern Classroom" style of learning where you can move at your own pace and focus on what you need most. You can even move to the next chapter if you need help and the instructor is busy. Definitely dress warmly as the classroom was really over air-conditioned!
Reviewed by 2012
I loved the Adobe InDesign course but as a new user I felt there was so much material to cover and I wanted to take my time getting familiar with the program and learning about everything. I think if the class had been 2 days instead of 1 it would have been perfect!
Reviewed by 2012
Manual provided was totally different then computer training. Expected more hands on training instead of just watching an instruction video.
Reviewed by 2012
Great
Reviewed by 2012
The video - was not at all interactive - only concepts were presented. The manual completedly different from the video material. I have no objections to using different approaches but a course on any software must include interactive materials.
Reviewed by 2012
The course was set up in a way which was easy to follow. However, I thought there was a lot of information to take in the day. The instructor was very helpful and very knowledgeable.
Reviewed by 2012
The training provider, Melanie, was exceptional. She was very knowledgeable and sat with me personally for hands on training. I found the course to be long and difficult to complete in one day.
Reviewed by 2012
The amount of material was a little much (maybe an hour) to cover in the allotted time - but otherwise good.
Reviewed by 2011
The room was too cold for me. The Instructor was very helpful.
Reviewed by 2011
A co worker of mine, did not receive the certificate of completing the course. As well, I received a website to log to after the course for 30 days (The Online Support). Although the vendor ID number does not exisit. I have gone back to my contact at Last Minute Training, and haven't received any feedback from her. The course was good, the follow up, was the greatest service.
Reviewed by 2011
Would like to have access to the on-line training materials for this course for a period of time after course completion
Reviewed by 2011
Hi - the server crashed during my session and I would like to reschedule. Can someone contact me to do this?
Reviewed by 2011
need-to-train-a-group-banner

This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.

This page has been viewed 240 times.