Upon successful completion of this course, students will be able to: identify the fundamental concepts of computer security. identify security threats and vulnerabilities. examine network security. manage application, data and host security. identify access control and account management security measures. manage certificates. identify compliance and operational security measures. manage risk. manage security incidents. develop business continuity and disaster recovery plans.
Next Steps and Related Courses
- Certified Ethical Hacker (CEH)
1 - Security Fundamentals
- Information Security Cycle
- Information Security Controls
- Authentication Methods
- Cryptography Fundamentals
- Security Policy Fundamentals
2 - Identifying Security Threats and Vulnerabilities
- Social Engineering
- Malware
- Physical Threats and Vulnerabilities
- Software-Based Threats
- Network-Based Threats
- Wireless Threats and Vulnerabilities
- Physical Threats and Vulnerabilities
3 - Managing Data, Application, and Host Security
- Manage Data Security
- Manage Application Security
- Manage Device and Host Security
- Manage Mobile Security
4 - Implementing Network Security
- Configure Security Parameters on Network Devices and Technologies
- Network Design Elements and Components
- Implement Networking Protocols and Services
- Apply Secure Network Administration Principles
- Secure Wireless Traffic
5 - Implementing Access Control, Authentication, and Account Management
- Access Control and Authentication Services
- Implement Account Management Security Controls
6 - Managing Certificates
- Install a Certificate Authority (CA) Hierarchy
- Enroll Certificates
- Secure Network Traffic by Using Certificates
- Renew Certificates
- Revoke Certificates
- Back Up and Restore Certificates and Private Keys
- Restore Certificates and Private Keys
7 - Implementing Compliance and Operational Security
- Physical Security
- Legal Compliance
- Security Awareness and Training
- Integrate Systems and Data with Third Parties
8 - Risk Management
- Risk Analysis
- Implement Vulnerability Assessment Tools and Techniques
- Scan for Vulnerabilities
- Mitigation and Deterrent Techniques
9 - Troubleshooting and Managing Security Incidents
- Respond to Security Incidents
- Recover from a Security Incident
10 - Business Continuity and Disaster Recovery Planning
- Business Continuity
- Plan for Disaster Recovery
- Execute Disaster Recovery Plans and Procedures