|
ITM 3160 - Security+ Cert Prep
Clock Hours: 156
Delivery Mode on-ground
Prerequisites: ITM-3150 Net Security & Compliance
Industry Certifications Computer Technology Industry Association (CompTIA) Security + or Computer Technology Industry Association (CompTIA) CySA+
Course Description: This course covers CompTIA’s Security+ and CySA+ (Cyber Security Analyst) certification and objectives. Students electing to take the exams will meet IAT Standards Level II of DoD 8570.1. Topics include Network Security, Information Assurance, Compliance and Operational Security, Threats and Vulnerabilities, Application, Data and Host Security, Access Control and Identity Management, Cryptography and other advanced security items such as SEIM, SCADA/PLCs, logs, auditing, network attacks, pen testing, software testing and items that meet and exceed CompTIA’s requirements. The capstone project for this course includes live penetration tests including a 50+ page paper along with mitigation of vulnerabilities that are found.
Student Learning Outcomes:
- Given a scenario, analyze indicators of compromise and determine the type of malware.
- Compare and contrast types of attacks.
- Explain threat actor types and attributes.
- Explain penetration testing concepts.
- Explain vulnerability scanning concepts.
- Explain the impact associated with types of vulnerabilities.
- Install and configure network components, both hardware and software-based, to support organizational security.
- Install and configure network components, both hardware and software-based, to support organizational security.
- Given a scenario, troubleshoot common security issues.
- Given a scenario, analyze and interpret output from security technologies
- Given a scenario, deploy mobile devices securely.
- Given a scenario, implement secure protocols.
- Explain use cases and purpose for frameworks, best practices and secure configuration guides.
- Given a scenario, implement secure network architecture concepts.
- Given a scenario, implement secure systems design.
- Explain the importance of secure staging deployment concepts.
- Explain the security implications of embedded systems.
- Summarize secure application development and deployment concepts
- Summarize cloud and virtualization concepts.
- Explain how resiliency and automation strategies reduce risk
- Explain the importance of physical security controls.
- Compare and contrast identity and access management concepts
- Given a scenario, install and configure identity and access services.
- Given a scenario, implement identity and access management controls.
- Given a scenario, differentiate common account management practices.
- Explain the importance of policies, plans and procedures related to organizational security.
- Summarize business impact analysis concepts.
- Explain risk management processes and concepts.
- Given a scenario, follow incident response procedures.
- Summarize basic concepts of forensics.
- Explain disaster recovery and continuity of operation concepts.
- Compare and contrast various types of controls.
- Given a scenario, carry out data security and privacy practices.
- Compare and contrast basic concepts of cryptography.
- Explain cryptography algorithms and their basic characteristics.
- Given a scenario, install and configure wireless security settings.
- Given a scenario, implement public key infrastructure
- Discuss, Review, Summarize, demonstrate and write the results of a live pen/vulnerability test.
Cyber Security Analyst
-
- Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
- Given a scenario, analyze the results of a network reconnaissance.
- Given a network-based threat, implement or recommend the appropriate response and countermeasure.
- Explain the purpose of practices used to secure a corporate environment
- Given a scenario, implement an information security vulnerability management process.
- Given a scenario, analyze the output resulting from a vulnerability scan.
- Compare and contrast common vulnerabilities found in the following targets within an organization.
- Given a scenario, distinguish threat data or behavior to determine the impact of an incident.
- Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
- Explain the importance of communication during the incident response process.
- Given a scenario, analyze common symptoms to select the best course of action to support incident response
- Summarize the incident recovery and post-incident response process.
- Explain the relationship between frameworks, common policies, controls, and procedures.
- Given a scenario, use data to recommend remediation of security issues related to identity and access management.
- Given a scenario, review security architecture and make recommendations to implement compensating controls.
- Given a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC).
- Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.
|
|