|
Jan 17, 2025
|
|
|
|
TNC 3010 - Security Fundamentals
Clock Hours: 200
Delivery Mode on-ground
Industry Certifications Comptia Security + Microsoft - Security Fundamentals
Course Description: This course is a comprehensive study of the principles and practices of computer system security including operating system security, network security, software security and web security.
Student Learning Outcomes: Students will be able to demonstrate knowledge of:
- Understand network security.
- Understand security threat trends and their ramifications.
- Understand the goals of network security.
- Determine the factors involved in a secure network strategy.
- Explain denial-of-service (DOS) attacks
- Explain and discuss ping-of-death attacks
- Identify the major components used in DDOS attacks and how they are installed
- Understand the major types of spoofing attacks
- Discuss man-in-the middle attacks, replay attacks, and TCP session hijacking
- Detail three types of social-engineering attacks and explain why they can be incredibly damaging.
- List the major types of attacks used against encrypted data.
- List the major types of malicious software and identify a counter-measure for each one.
- Understand the implications of IEEE 802.1x and how it is used.
- Understand VPN technology and its uses for securing remote access to networks.
- Understand how RADIUS authentication works.
- Understand how TACACS+ operates.
- Understand how PPTP works and when it is used.
- Understand how L2TP works and when it is used.
- Understand how SSH operates and when it is used.
- Understand how IPSec works and when it is used.
- Understand the different vulnerabilities associated with telecommuting.
- Understand the need for secure e-mail.
- Outline the benefits of PGP and S/MIME.
- Understand e-mail vulnerabilities and how to safeguard against them.
- Explain the dangers posed by e-mail hoaxes and spam, as well as actions that can be taken to counteract them.
- Understand SSL/TLS protocols and their implementation on the Internet.
- Understand HTTPS protocol as it relates to SSL.
- Explore some of the most common uses of instant messaging applications and identify vulnerabilities associated with those applications.
- Understand the vulnerabilities of JavaScript, buffer overflow, ActiveX, cookies, CGI, applets, SMTP relay, and how they are commonly exploited.
- Explain the benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems.
- Identify the major vulnerabilities of the FTP method of exchanging data.
- Describe S/FTP, the major alternative to using FTP, in order to better secure your network infrastructure.
- Illustrate the threat posed to your network by unmonitored file shares
- Understand security issues related to wireless data transfer.
- Understand the 802.11x standards.
- Understand the Wireless Application Protocol (WAP) and how it works.
- Understand the Wireless Transport Layer Security (WTLS) protocol and how it works.
- Understand the All wireless security protocols and how it works.
- Conduct a wireless site survey.
- Understand instant messaging.
- Understand the purpose of a network firewall and the different kinds of firewall technology available on the market.
- Understand the role of routers, switches, and other networking hardware in security.
- Determine when VPN or RAS technology works to provide a secure network connection.
- Identify and discuss the various types of transmission media.
- Explain how to physically protect transmission media adequately.
- Identify and discuss the various types of storage media.
- Know how to lessen the risk of catastrophic loss of information.
- Understand the various ways to encrypt data.
- Properly maintain or destroy stored data.
- Explain the network perimeter’s importance to an organization’s security policies.
- Identify the place and role of the demilitarized zone in the network.
- Explain how network address translation is used to help secure networks.
- Spell out the role of tunneling in network security.
- Describe the security features of virtual local area networks.
- Explain what intrusion detection systems are and identify some of the major characteristics of intrusion detection products.
- Detail the differences between host-based and network-based intrusion detection.
- Identify active detection and passive detection features of both host- and network-based IDS products.
- Explain what honeypots are and how they are employed to increase network security.
- Clarify the role of security incident response teams in the organization.
- Gain an understanding of OS/NOS vulnerabilities and hardening practices.
- Understand the operation of a file system and how to secure a file system.
- Explore common network hardening practices, including firmware updates and configuration best practices.
- Identify network services that are commonly exploited by attackers and learn about best practices for writing access control lists.
- Explore vulnerabilities regarding network services such as Web, FTP, DNS, DHCP, Mail, File/Print Servers and Data Repositories as well as best practices in securing such devices.
- Understand the basics of algorithms and how they are used in modern cryptography.
- Identify the differences between asymmetric and symmetric algorithms.
- Have a basic understanding of the concepts of cryptography and how they relate to network security.
- Discuss the characteristics of PKI certificates and the policies and procedures surrounding them.
- Understand the implications of key management and a certificate’s lifecycle
- Understand the importance of physical security.
- Discuss the impact of location on a facility’s security.
- Identify major material factors when constructing a facility.
- Discuss the various biometric techniques used for access control
- Understand the importance of fire safety and fire detection
- Understand business continuity
- Understand the disaster recovery planning process
- Explain the importance of defining and documenting security policies and procedures
- Discuss the implications of privilege management and its impact on disaster recovery and business continuity
- Understand the basic computer forensics methods
- Identify assets, vulnerabilities, and threats involved in risk management
- Understand the importance of education in security
- Understand the role of auditing in network security
- Identify how documentation enables and improves systems management and security
|
|