Apr 19, 2024  
Course/Program Inventory 
    
Course/Program Inventory

CIS 3035 - Introduction to Security



Clock Hours: 142

Delivery Mode
on-ground

Prerequisites: Information Processing Technician 

Industry Certifications CompTIA Security+ and Testout Security Pro Certifications

Course Description:
The CompTIA Security+ and Testout Security Pro validate knowledge of communication security, infrastructure security, cryptography, operational security, and general security concepts.  After completing this course, the student will be familiar with the fundamental concepts of information security.  At the completion of the competencies, the student should be able to pass a nationally recognized certification.

Student Learning Outcomes:
  1. Explain the security function and purpose of network devices and technologies.
  2. Apply and implement secure network administration principles.
  3. Distinguish and differentiate network design elements and compounds.
  4. Implement and use common protocols.
  5. Identify commonly used default network ports.
  6. Implement wireless network in a secure manner.
  7. Explain risk related concepts: control types, false positives, importance of policies in reducing risk, risk calculation, quantitative vs. qualitative, risk-avoidance, transference, acceptance, mitigation, deterrence, cloud computing and virtualization.
  8. Carry out appropriate risk mitigation strategies.
  9. Execute appropriate incident response procedures.
  10. Explain the importance of security related awareness and training.
  11. Compare and contrast aspects of business continuity.
  12. Explain the impact and proper use of environmental controls.
  13. Execute disaster recovery plans and procedures.
  14. Analyze and differentiate among different types of malware.
  15. Analyze and differentiate among types of attacks.
  16. Analyze and differentiate among types of social engineering attacks.
  17. Analyze and differentiate among types of wireless attacks.
  18. Analyze and differentiate among types of application attacks.
  19. Analyze and differentiate among types of mitigation and deterrent techniques.
  20. Implement assessment tools and techniques to discover security threats and vulnerabilities.
  21. Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning.
  22. Explain the importance of application security.
  23. Carry out appropriate procedures to establish host security.
  24. Explain the importance of data security.
  25. Explain the function and purpose of authentication services.
  26. Explain the fundamental concepts and best practices related to authentication, authorization and access control.
  27. Implement appropriate security controls when performing account management.
  28. Summarize general cryptography concepts.
  29. Use and apply appropriate cryptographic tools and products.
  30. Explain the core concepts of public key infrastructure.
  31. Implement PKI, certificate management and associated components.