top of page

1.Mitigating Threats

  • Core system maintenance

  • Identifying common security threats

  • Updating the operating system

  • Managing software patches

  • Installing service packs

  • Determining whether you need to update your computer's BIOS

  • Configuring Windows Firewall

  • Virus and spyware management

  • Installing antivirus software

  • Scanning your system for spyware

  • Configuring Windows Mail to prevent spam

  • Browser security

  • Managing pop-ups

  • Managing cookies

  • Managing scripting, Java, and ActiveX components

  • Examining input validation, buffer overflows, and XSS

  • Social engineering threats

  • Discussing social engineering

  • Examining phishing


2. Cryptography

  • Symmetric cryptography

  • Encrypting and decrypting data

  • Calculating hashes

  • Sharing a secret message with steganography

  • Public key cryptography

  • Exploring public key cryptography

  • Examining certificates

  • Examining certificate trusts

  • Comparing single- and dual-sided certificates

  • Mapping algorithms to applications


3. Authentication Systems

  • Authentication

  • Identifying the components of authentication

  • Comparing one-, two-, and three-factor authentication

  • Capturing passwords with a protocol analyzer

  • Installing Active Directory Services

  • Joining a domain

  • Hashing

  • Hashing data

  • Cracking passwords

  • Authentication systems

  • Identifying the requirements of a secure authentication system

  • Examining the components of Kerberos

  • Examining null sessions

  • Comparing authentication systems


4. Messaging Security

  • E-mail security

  • Identifying the security risks of an e-mail system

  • Configuring security on an e-mail server

  • Digitally signing a message

  • Sending an encrypted message

  • Messaging and peer-to-peer security

  • Identifying the security risks of messaging systems

  • Configuring security on an IM server

  • Configuring IM client security


5. User and Role-Based Security

  • Security policies

  • Creating a console to manage local security policies

  • Using the GPMC

  • Implementing domain GPOs

  • Analyzing a Windows Vista computer's security

  • Securing file and print resources

  • Creating users and groups based on security needs

  • Securing file resources

  • Securing printer resources


6. Public Key Infrastructure (PKI)

  • Key management and life cycle

  • Understanding certificate life cycle and management

  • Setting up a certificate server

  • Installing a stand-alone root certificate authority (CA)

  • Installing an enterprise subordinate CA

  • Implementing a file-based certificate request

  • Managing your certificate server

  • Side trip: Granting the log on locally right

  • Requesting a user certificate

  • Revoking a certificate

  • Enabling the EFS recovery agent template

  • Enrolling for a recovery agent certificate

  • Enabling key archival

  • Re-enrolling all certificates

  • Web server security with PKI

  • Requesting and installing a web server certificate

  • Enabling SSL for the certificate server web site

  • Making a secure connection

  • Requesting a client certificate via the web


7. Access Security

  • Biometric systems

  • Identifying biometric authentication systems

  • Installing a fingerprint reader

  • Physical access security

  • Identifying the risks associated with physical access to systems

  • Examining logging and surveillance best practices

  • Peripheral and component security

  • Identifying the risks associated with common peripherals

  • Mitigating security risks of peripherals

  • Storage device security

  • Enabling file-based encryption

  • Enabling whole disk encryption systems (optional)


8. Ports and Protocols

  • TCP/IP review

  • Examining protocols in the TCP/IP suite

  • Comparing IPv4 and IPv6 packets

  • Protocol-based attacks

  • Preventing common protocol-based attacks

  • Assessing your vulnerability to DDoS attacks

  • Port scanning

  • Checking ARP cache

  • Examining spoofing attacks

  • Examining replay and hijacking attacks

  • Examining antiquated protocols


9. Network Security

  • Common network devices

  • Examining switches and bridges

  • Examining routers

  • Examining NAT/PAT devices

  • Examining firewalls and proxy servers

  • Identifying inherent weaknesses in network devices

  • Examining the ways to overcome device threats

  • Secure network topologies

  • Comparing firewall-based secure topologies

  • Identifying the benefits of NAC

  • Examining the security enabled by VPNs

  • Browser-related network security

  • Configuring the Phishing Filter

  • Setting security zones

  • Setting privacy options

  • Virtualization

  • Exploring the benefits of virtualization technologies


10. Wireless Security

  • Wi-Fi network security

  • Identifying wireless networking vulnerabilities

  • Scanning for insecure access points

  • Installing third-party router firmware

  • Configuring basic router security

  • Enabling transmission encryption

  • Non-PC wireless devices

  • Identifying cell phone and PDA-related threats


11. Remote Access Security

  • Remote access

  • Examining RADIUS and Diameter authentication

  • Examining the role of LDAP in a remote access environment

  • Examining TACACS+ authentication

  • Examining how 802.1x adds security to your network

  • Installing Network Policy and Access Services

  • Configuring an NPS network policy

  • Configuring NPS accounting

  • Virtual private networks

  • Comparing VPN protocols

  • Installing Routing and Remote Access Services

  • Enabling a VPN

  • Configuring NPS to provide RADIUS authentication for your VPN

  • Making a VPN connection


12. Auditing, Logging, and Monitoring

  • System logging

  • Viewing event logs

  • Discussing device and application logging

  • Server monitoring

  • Monitoring with Performance Monitor

  • Running a Data Collector Set

  • Viewing a Data Collector Set report

  • Considering auditing policies and practices


13. Vulnerability Testing

  • Risk and vulnerability assessment

  • Analyzing risks

  • Installing the MBSA

  • Analyzing your system with the MBSA

  • Downloading and installing OVAL

  • Downloading an OVAL XML file

  • Scanning with OVAL

  • Downloading and installing Nessus

  • Scanning with Nessus

  • IDS and IPS

  • Discussing IDS characteristics

  • Installing and monitoring with the Snort IDS

  • Comparing HIDS and NIDS

  • Examining the role and use of honeypots

  • Forensics

  • Examining the forensics process


14. Organizational Security

  • Organizational policies

  • Creating a security policy

  • Creating a human resources policy

  • Creating an incidence response and reporting policy

  • Implementing change management

  • Education and training

  • Identifying the need for user education and training

  • Identifying education opportunities and methods

  • Disposal and destruction

  • Deciding whether to destroy or dispose of IT equipment


15. Business Continuity

  • Redundancy planning

  • Identifying the need for and appropriate use of redundancy

  • Creating a disaster recovery plan

  • Backups

  • Selecting backup schemes

  • Backing up data

  • Restoring data

  • Identifying appropriate media rotation and storage plans

  • Environmental controls

  • Examining environmental controls

CompTIA Security +

Virtual $995

On-Site: Request



Reserve seat

bottom of page