SlideShare uma empresa Scribd logo
1 de 3
Security+ Course Outline<br />Course Length: 5 Days<br />Overview:This course will prepare students to pass the current CompTIA Security+ certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field.<br />Prerequisites:A+ CertificationNetwork+ Certification<br />Course Content<br />Lesson 1: Mitigating Threats <br />Core system maintenance<br />Virus and spyware management<br />Browser security<br />Social engineering threats<br />Lesson 2: Cryptography <br />Symmetric cryptography<br />Public Key cryptography<br />Lesson 3: Authentication Systems <br />Authentication <br />Hashing<br />Authentication systems<br />Lesson 4: Messaging Security <br />E-mail Security<br />Messaging and peer-to-peer security<br />Lesson 5: User and Role Based Security <br />Security policies<br />Securing file and print resources<br />Lesson 6: Public Key Infrastructure <br />Key management and life cycle<br />Setting up a certificate server<br />Web server security with PKI<br />Lesson 7: Access Security <br />Biometric systems <br />Physical access security <br />Peripheral and component security <br />Storage device security<br />Lesson 8: Ports and Protocols <br />TCP/IP review <br />Protocol-based attacks<br />Lesson 9: Network Security <br />Common network devices <br />Secure network topologies<br />Browser-related network security<br />Virtualization<br />Lesson 10: Wireless Security <br />Wi-Fi network security <br />Non-PC wireless devices<br />Lesson 11: Remote Access Security <br />Remote Access<br />Virtual private networks<br />Lesson 12: Auditing, Logging, and Monitoring <br />System logging <br />Server monitoring<br />Lesson 13: Network-to-Network Connections <br />Risk and vulnerability assessment <br />IDS and IPS<br />Forensics<br />Lesson 14: Organizational Security <br />Organizational policies<br />Education and training<br />Disposal and destruction<br />Lesson 15: Business Continuity <br />Redundancy planning<br />Backups<br />Environmental Controls<br />
Security+
Security+

Mais conteúdo relacionado

Mais procurados

a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...ZTech Proje
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhdtopiccom
 
PhD-Guidance-in-Security
PhD-Guidance-in-SecurityPhD-Guidance-in-Security
PhD-Guidance-in-SecurityPhdtopiccom
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)FloydCarrasquillo
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003jmailen
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhdtopiccom
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityComputing Cage
 
Network security
Network securityNetwork security
Network securityAli Kamil
 

Mais procurados (20)

a famework for analyzing template security and privacy in biometric authenti...
 a famework for analyzing template security and privacy in biometric authenti... a famework for analyzing template security and privacy in biometric authenti...
a famework for analyzing template security and privacy in biometric authenti...
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Network security
Network securityNetwork security
Network security
 
PhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-SecurityPhD-Guidance-in-Information-Security
PhD-Guidance-in-Information-Security
 
PhD-Guidance-in-Security
PhD-Guidance-in-SecurityPhD-Guidance-in-Security
PhD-Guidance-in-Security
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003NSF Program Announcement in CompTIA News 2003
NSF Program Announcement in CompTIA News 2003
 
Steganography
SteganographySteganography
Steganography
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Jb ia
Jb   iaJb   ia
Jb ia
 
Network security
Network securityNetwork security
Network security
 
Network security
Network security Network security
Network security
 

Destaque

6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6bestip
 
V mware v sphere boot camp
V mware v sphere boot campV mware v sphere boot camp
V mware v sphere boot campbestip
 
V mware v sphere 4.0
V mware v sphere 4.0V mware v sphere 4.0
V mware v sphere 4.0bestip
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructurebestip
 
Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1bestip
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2bestip
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 serversbestip
 

Destaque (7)

6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6
 
V mware v sphere boot camp
V mware v sphere boot campV mware v sphere boot camp
V mware v sphere boot camp
 
V mware v sphere 4.0
V mware v sphere 4.0V mware v sphere 4.0
V mware v sphere 4.0
 
6421 configuring and troubleshooting win server 2008 network infrastructure
6421   configuring and troubleshooting win server 2008 network infrastructure6421   configuring and troubleshooting win server 2008 network infrastructure
6421 configuring and troubleshooting win server 2008 network infrastructure
 
Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2
 
6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers6419 a configuring, managing and maintaining windows server 2008 servers
6419 a configuring, managing and maintaining windows server 2008 servers
 

Semelhante a Security+

Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)GTS Learning, Inc.
 
Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsSanket Shikhar
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingBryan Len
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ SagarNegi10
 
IS_Syllabus_4_credits_2018.docx
IS_Syllabus_4_credits_2018.docxIS_Syllabus_4_credits_2018.docx
IS_Syllabus_4_credits_2018.docxTinTin271940
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity AnalystMustafa TOPÇU
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Principles of computer security comptia security
Principles of computer security comptia securityPrinciples of computer security comptia security
Principles of computer security comptia securityssuserfdfec1
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingMehedi Hasan
 
Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...CCI Training Center
 
IT Fundamentals for Cybersecurity
IT Fundamentals for CybersecurityIT Fundamentals for Cybersecurity
IT Fundamentals for CybersecurityMustafa TOPÇU
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 
All About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfAll About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfInfosec Train
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance EvolvedSafeNet
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 

Semelhante a Security+ (20)

Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)
 
Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applications
 
Ccsk course content v1
Ccsk course content v1Ccsk course content v1
Ccsk course content v1
 
Cybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex TrainingCybersecurity Training Seminars, 44 Courses : Tonex Training
Cybersecurity Training Seminars, 44 Courses : Tonex Training
 
CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+ CompTIA Security+ Certification | Sec+
CompTIA Security+ Certification | Sec+
 
Security+
Security+Security+
Security+
 
IS_Syllabus_4_credits_2018.docx
IS_Syllabus_4_credits_2018.docxIS_Syllabus_4_credits_2018.docx
IS_Syllabus_4_credits_2018.docx
 
IBM Cybersecurity Analyst
IBM Cybersecurity AnalystIBM Cybersecurity Analyst
IBM Cybersecurity Analyst
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Principles of computer security comptia security
Principles of computer security comptia securityPrinciples of computer security comptia security
Principles of computer security comptia security
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...Get training in cyber security &amp; place yourself in good companies through...
Get training in cyber security &amp; place yourself in good companies through...
 
IT Fundamentals for Cybersecurity
IT Fundamentals for CybersecurityIT Fundamentals for Cybersecurity
IT Fundamentals for Cybersecurity
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 
All About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdfAll About Cyber Security Orientation Program.pdf
All About Cyber Security Orientation Program.pdf
 
PCI Compliance Evolved
PCI Compliance EvolvedPCI Compliance Evolved
PCI Compliance Evolved
 
Activity1 c1
Activity1 c1Activity1 c1
Activity1 c1
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 

Mais de bestip

6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environmentsbestip
 
Lab view daq signal conditioniing
Lab view daq signal conditioniingLab view daq signal conditioniing
Lab view daq signal conditioniingbestip
 
Lab view instrument control
Lab view instrument controlLab view instrument control
Lab view instrument controlbestip
 
Lab view core 2 outline
Lab view core 2 outlineLab view core 2 outline
Lab view core 2 outlinebestip
 
Lab view core 1 outline
Lab view core 1 outlineLab view core 1 outline
Lab view core 1 outlinebestip
 
Deploying cisco asa firewall features
Deploying cisco asa firewall featuresDeploying cisco asa firewall features
Deploying cisco asa firewall featuresbestip
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010bestip
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010bestip
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipsebestip
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010bestip
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1bestip
 
Ms 5050
Ms 5050Ms 5050
Ms 5050bestip
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications bestip
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hackerbestip
 
Network+
Network+Network+
Network+bestip
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...bestip
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...bestip
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011bestip
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 clientbestip
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 databasebestip
 

Mais de bestip (20)

6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments
 
Lab view daq signal conditioniing
Lab view daq signal conditioniingLab view daq signal conditioniing
Lab view daq signal conditioniing
 
Lab view instrument control
Lab view instrument controlLab view instrument control
Lab view instrument control
 
Lab view core 2 outline
Lab view core 2 outlineLab view core 2 outline
Lab view core 2 outline
 
Lab view core 1 outline
Lab view core 1 outlineLab view core 1 outline
Lab view core 1 outline
 
Deploying cisco asa firewall features
Deploying cisco asa firewall featuresDeploying cisco asa firewall features
Deploying cisco asa firewall features
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1
 
Ms 5050
Ms 5050Ms 5050
Ms 5050
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Network+
Network+Network+
Network+
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...
 
BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011BEST IP Training Schedule Winter and Spring 2011
BEST IP Training Schedule Winter and Spring 2011
 
6292 installing and configuring windows 7 client
6292   installing and configuring windows 7 client6292   installing and configuring windows 7 client
6292 installing and configuring windows 7 client
 
6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database6232 implementing a microsoft sql server 2008 database
6232 implementing a microsoft sql server 2008 database
 

Security+

  • 1. Security+ Course Outline<br />Course Length: 5 Days<br />Overview:This course will prepare students to pass the current CompTIA Security+ certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field.<br />Prerequisites:A+ CertificationNetwork+ Certification<br />Course Content<br />Lesson 1: Mitigating Threats <br />Core system maintenance<br />Virus and spyware management<br />Browser security<br />Social engineering threats<br />Lesson 2: Cryptography <br />Symmetric cryptography<br />Public Key cryptography<br />Lesson 3: Authentication Systems <br />Authentication <br />Hashing<br />Authentication systems<br />Lesson 4: Messaging Security <br />E-mail Security<br />Messaging and peer-to-peer security<br />Lesson 5: User and Role Based Security <br />Security policies<br />Securing file and print resources<br />Lesson 6: Public Key Infrastructure <br />Key management and life cycle<br />Setting up a certificate server<br />Web server security with PKI<br />Lesson 7: Access Security <br />Biometric systems <br />Physical access security <br />Peripheral and component security <br />Storage device security<br />Lesson 8: Ports and Protocols <br />TCP/IP review <br />Protocol-based attacks<br />Lesson 9: Network Security <br />Common network devices <br />Secure network topologies<br />Browser-related network security<br />Virtualization<br />Lesson 10: Wireless Security <br />Wi-Fi network security <br />Non-PC wireless devices<br />Lesson 11: Remote Access Security <br />Remote Access<br />Virtual private networks<br />Lesson 12: Auditing, Logging, and Monitoring <br />System logging <br />Server monitoring<br />Lesson 13: Network-to-Network Connections <br />Risk and vulnerability assessment <br />IDS and IPS<br />Forensics<br />Lesson 14: Organizational Security <br />Organizational policies<br />Education and training<br />Disposal and destruction<br />Lesson 15: Business Continuity <br />Redundancy planning<br />Backups<br />Environmental Controls<br />