Jul 25, 2025  
Course/Program Inventory 
    
Course/Program Inventory

ITS 3031 - Security - Application Defense, Assessments and Audits



Clock Hours: 78

Delivery Mode
on-ground

Prerequisites: All ITS 1000 and 2000 series Modules, ITS-3020 Security-Physical, Perimeter and Defense

Industry Certifications TestOut Security Pro, CompTIA Security +

Course Description:
The course provides instruction in the areas of Application Defense, Assessments and Audits based on the CompTIA Security+ Certification objective requirements.

Student Learning Outcomes:
Course Competencies:

  • Given a scenario, analyze indicators of compromise and determine the type of malware.
  • Compare and contrast types of attacks.
  • Given a scenario, use appropriate software tools to assess the security posture of an organization.
  • Given a scenario, differentiate common account management practices.
  • Given a scenario, analyze and interpret output from security technologies.
  • Given a scenario, implement secure network architecture concepts.
  • Given a scenario, implement secure systems design.
  • Explain penetration testing concepts.
  • Install and configure network components, both hardware- and software-based, to support organizational security.
  • Explain the impact associated with types of vulnerabilities.
  • Explain the security implications of embedded systems.
  • Given a scenario, troubleshoot common security issues.
  • Explain the importance of policies, plans and procedures related to organizational security.
  • Given a scenario, implement public key infrastructure.
  • Given a scenario, deploy mobile devices securely.
  • Summarize cloud and virtualization concepts.
  • Compare and contrast identity and access management concepts.
  • Given a scenario, implement identity and access management controls.
  • Compare and contrast identity and access management concepts.
  • Explain the importance of secure staging deployment concepts.
  • Summarize secure application development and deployment concepts.
  • Explain the importance of physical security controls.
  • Given a scenario, carry out data security and privacy practices.
  • Compare and contrast basic concepts of cryptography.
  • Explain cryptography algorithms and their basic characteristics.
  • Explain how resiliency and automation strategies reduce risk.
  • Summarize business impact analysis concepts.
  • Explain disaster recovery and continuity of operation concepts.