6232 implementing a microsoft sql server 2008 database
Security+
1. Security+ Course Outline<br />Course Length: 5 Days<br />Overview:This course will prepare students to pass the current CompTIA Security+ certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field.<br />Prerequisites:A+ CertificationNetwork+ Certification<br />Course Content<br />Lesson 1: Mitigating Threats <br />Core system maintenance<br />Virus and spyware management<br />Browser security<br />Social engineering threats<br />Lesson 2: Cryptography <br />Symmetric cryptography<br />Public Key cryptography<br />Lesson 3: Authentication Systems <br />Authentication <br />Hashing<br />Authentication systems<br />Lesson 4: Messaging Security <br />E-mail Security<br />Messaging and peer-to-peer security<br />Lesson 5: User and Role Based Security <br />Security policies<br />Securing file and print resources<br />Lesson 6: Public Key Infrastructure <br />Key management and life cycle<br />Setting up a certificate server<br />Web server security with PKI<br />Lesson 7: Access Security <br />Biometric systems <br />Physical access security <br />Peripheral and component security <br />Storage device security<br />Lesson 8: Ports and Protocols <br />TCP/IP review <br />Protocol-based attacks<br />Lesson 9: Network Security <br />Common network devices <br />Secure network topologies<br />Browser-related network security<br />Virtualization<br />Lesson 10: Wireless Security <br />Wi-Fi network security <br />Non-PC wireless devices<br />Lesson 11: Remote Access Security <br />Remote Access<br />Virtual private networks<br />Lesson 12: Auditing, Logging, and Monitoring <br />System logging <br />Server monitoring<br />Lesson 13: Network-to-Network Connections <br />Risk and vulnerability assessment <br />IDS and IPS<br />Forensics<br />Lesson 14: Organizational Security <br />Organizational policies<br />Education and training<br />Disposal and destruction<br />Lesson 15: Business Continuity <br />Redundancy planning<br />Backups<br />Environmental Controls<br />