Jan 17, 2025  
Course/Program Inventory 
    
Course/Program Inventory

TNC 3010 - Security Fundamentals



Clock Hours: 200

Delivery Mode
on-ground

Industry Certifications Comptia Security + Microsoft - Security Fundamentals

Course Description:
This course is a comprehensive study of the principles and practices of computer system security including operating system security, network security, software security and web security. 

 

Student Learning Outcomes:
Students will be able to demonstrate knowledge of:

  1. Understand network security.
  2. Understand security threat trends and their ramifications.
  3. Understand the goals of network security.
  4. Determine the factors involved in a secure network strategy.
  5. Explain denial-of-service (DOS) attacks
  6. Explain and discuss ping-of-death attacks
  7. Identify the major components used in DDOS attacks and how they are installed
  8. Understand the major types of spoofing attacks
  9. Discuss man-in-the middle attacks, replay attacks, and TCP session hijacking
  10. Detail three types of social-engineering attacks and explain why they can be incredibly damaging.
  11. List the major types of attacks used against encrypted data.
  12. List the major types of malicious software and identify a counter-measure for each one.
  13. Understand the implications of IEEE 802.1x and how it is used.
  14. Understand VPN technology and its uses for securing remote access to networks.
  15. Understand how RADIUS authentication works.
  16. Understand how TACACS+ operates.
  17. Understand how PPTP works and when it is used.
  18. Understand how L2TP works and when it is used.
  19. Understand how SSH operates and when it is used.
  20. Understand how IPSec works and when it is used.
  21. Understand the different vulnerabilities associated with telecommuting.
  22. Understand the need for secure e-mail.
  23. Outline the benefits of PGP and S/MIME.
  24. Understand e-mail vulnerabilities and how to safeguard against them.
  25. Explain the dangers posed by e-mail hoaxes and spam, as well as actions that can be taken to counteract them.
  26. Understand SSL/TLS protocols and their implementation on the Internet.
  27. Understand HTTPS protocol as it relates to SSL.
  28. Explore some of the most common uses of instant messaging applications and identify vulnerabilities associated with those applications.
  29. Understand the vulnerabilities of JavaScript, buffer overflow, ActiveX, cookies, CGI, applets, SMTP relay, and how they are commonly exploited.
  30. Explain the benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems.
  31. Identify the major vulnerabilities of the FTP method of exchanging data.
  32. Describe S/FTP, the major alternative to using FTP, in order to better secure your network infrastructure.
  33. Illustrate the threat posed to your network by unmonitored file shares
  34. Understand security issues related to wireless data transfer.
  35. Understand the 802.11x standards.
  36. Understand the Wireless Application Protocol (WAP) and how it works.
  37. Understand the Wireless Transport Layer Security (WTLS) protocol and how it works.
  38. Understand the All wireless security protocols and how it works.
  39. Conduct a wireless site survey.
  40. Understand instant messaging.
  41. Understand the purpose of a network firewall and the different kinds of firewall technology available on the market.
  42. Understand the role of routers, switches, and other networking hardware in security.
  43. Determine when VPN or RAS technology works to provide a secure network connection.
  44. Identify and discuss the various types of transmission media.
  45. Explain how to physically protect transmission media adequately.
  46. Identify and discuss the various types of storage media.
  47. Know how to lessen the risk of catastrophic loss of information.
  48. Understand the various ways to encrypt data.
  49. Properly maintain or destroy stored data.
  50. Explain the network perimeter’s importance to an organization’s security policies.
  51. Identify the place and role of the demilitarized zone in the network.
  52. Explain how network address translation is used to help secure networks.
  53. Spell out the role of tunneling in network security.
  54. Describe the security features of virtual local area networks.
  55. Explain what intrusion detection systems are and identify some of the major characteristics of intrusion detection products.
  56. Detail the differences between host-based and network-based intrusion detection.
  57. Identify active detection and passive detection features of both host- and network-based IDS products.
  58. Explain what honeypots are and how they are employed to increase network security.
  59. Clarify the role of security incident response teams in the organization.
  60. Gain an understanding of OS/NOS vulnerabilities and hardening practices.
  61. Understand the operation of a file system and how to secure a file system.
  62. Explore common network hardening practices, including firmware updates and configuration best practices.
  63. Identify network services that are commonly exploited by attackers and learn about best practices for writing access control lists.
  64. Explore vulnerabilities regarding network services such as Web, FTP, DNS, DHCP, Mail, File/Print Servers and Data Repositories as well as best practices in securing such devices.
  65. Understand the basics of algorithms and how they are used in modern cryptography.
  66. Identify the differences between asymmetric and symmetric algorithms.
  67. Have a basic understanding of the concepts of cryptography and how they relate to network security.
  68. Discuss the characteristics of PKI certificates and the policies and procedures surrounding them.
  69. Understand the implications of key management and a certificate’s lifecycle
  70. Understand the importance of physical security.
  71. Discuss the impact of location on a facility’s security.
  72. Identify major material factors when constructing a facility.
  73. Discuss the various biometric techniques used for access control
  74. Understand the importance of fire safety and fire detection
  75. Understand business continuity
  76. Understand the disaster recovery planning process
  77. Explain the importance of defining and documenting security policies and procedures
  78. Discuss the implications of privilege management and its impact on disaster recovery and business continuity
  79. Understand the basic computer forensics methods
  80. Identify assets, vulnerabilities, and threats involved in risk management
  81. Understand the importance of education in security
  82. Understand the role of auditing in network security
  83. Identify how documentation enables and improves systems management and security