Checkpoint Security Course
by Compufield Computer InstituteMumbai |
Request Info |
Category: IT Certification | Networking | Operating Systems | IT Security and Ethical Hacking
Medium of instruction: | English |
Introduction
The skills and knowledge measured by the Security+ examination were derived and validated though input from a committee and over 1,000 subject matter experts representative of industry. A job task analysis (JTA), global survey, beta examination and beta results review were each milestones in the development process. The results of these milestones were used in weighing the domains and ensuring that the weighting assigned to each domain is representative of the relative importance of the content.
The Security+ certification is an internationally recognized validation of the technical knowledge required of foundation-level security practitioners. A Security+ certified individual has successfully proven holding a foundation-level of skill and knowledge in General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography and Operational / Organizational Security. Candidates are ecommended to have two years experience in a networking role with preexisting knowledge of TCP/IP, experience in a security related role, Network+ or equivalent certification, and adequate training and self-study materials.
All candidates are encouraged to review the Security+ objectives thoroughly prior to attempting the exam. This examination includes blueprint weighting, test objectives and example content. Example concepts are included to clarify the test objectives and should not be construed as a comprehensive listing of the content of the examination.
The table below lists the domains measured by this examination and the extent to which they are represented in the
examination.
CompTIA Security+ Certification Domains |
% of Exam |
1.0 General Security Concepts |
30.00% |
2.0 Communication Security |
20.00% |
3.0 Infrastructure Security |
20.00% |
4.0 Basics of Cryptography |
15.00% |
5.0 Operational / Organizational Security |
15.00% |
Chapter 1. General Security Concepts
-
Understanding Information Security
-
Securing the Physical Environment
-
Examining Operational Security
-
Working with Management and Policies
-
Understanding the Goals of Information Security
-
Comprehending the Security Process
-
Appreciating Antivirus Software
-
Implementing Access Control
-
Understanding Authentication
-
Understanding Networking Services and Protocols
-
Distinguishing Between Security Topologies
-
Setting Design Goals
-
Creating Security Zones
-
Working with Newer Technologies
-
Business Concerns to Be Aware Of Summary
Exam Essentials
Hands – On Labs
Lab 1.1: Update a Linux System
Lab 1.2: Update a Windows – Based System
Review Questions
Answers to Review Questions
Chapter 2. Identifying Potential Risks
-
Calculating Attack Strategies
-
Types of Access Attacks
-
Recognizing Modification and Repudiation Attacks
-
Identifying Denial – of – Service (DoS) and Distributed DoS
-
(DDoS) Attacks
-
Recognizing Common Attacks
-
Back Door Attacks
-
Spoofing Attacks
-
Man-in-the-Middle Attacks
-
Replay Attacks
-
Password-Guessing Attacks dentifying TCP/IP Security Concerns
-
Working with the TCP/IP Protocol Suite Encapsulation
-
Working with Protocols and Services
-
Recognizing TCP/IP Attacks Understanding Software Exploitation
-
Surviving Malicious Code
-
Viruses
-
Trojan Horses
-
Logic Bombs
-
Worms
-
Antivirus Software
-
Understanding Social Engineering
-
An Introduction to Auditing Processes and Files
-
Summary
Exam Essentials
Hands-on Labs
Lab 2.1: Identify Running Processes
On a Windows-Based Machine
Lab 2.2: Identify Running Processes
On a Linux-Based Machine
Review Questions
Answers to Review Questions
Chapter 3. Infrastructure and Connectivity
-
Understanding Infrastructure Security
-
Working with Hardware Components
-
Working with Software Components
-
Understanding the Different Network Infrastructure Devices Firewalls
-
Hubs
-
Routers
-
Switches
-
Wireless Access Points
-
Modems
-
Remote Access Services
-
Telecom/PBX System
-
Virtual Private Networks
-
Monitoring and Diagnosing Networks
-
Network Monitors
-
Securing Workstations and Servers
-
Understanding Mobile Devices
-
Understanding Remote Access Using the Point –to –Point Protocol
-
Tunneling Protocols
-
802.1x Wireless Protocols
-
RADIUS
-
TACACS/+
-
Securing Internet Connections
-
Working with Ports and Sockets
-
Working with E-mail
-
Working with the Web
-
Working with the File Transfer Protocol
-
Understanding SNMP and Other TCP/IP Protocols
-
The Basics of Cabling, Wires, and Communications
-
Coax
-
Unshielded Twisted Pair and Shielded Twisted Pair Fiber Optic
-
Infrared
-
Radio Frequencies
-
Microwave Systems
-
Employing Removable Media
-
Tape
-
CD-R
-
Hard Drives
-
Diskettes
-
Flash Cards
-
Smart Cards
-
Summary
Exam Essentials< Hands-on Labs
Lab 3.1: Examine the Windows Routing Table
Lab 3.2: Examine the Linux Routing Table
Review Questions
Answers to Review Questions
Chapter 4. Monitoring Activity and Intrusion Detection
-
Monitoring the Network
-
Recognizing the Different Types of Network Traffic
-
Monitoring Network Systems
-
Understanding Intrusion Detection Systems
-
Working with a Network-Based IDS
-
Working with a Host-Based IDS
-
Utilizing Honey Pots
-
Understanding Incident Response
-
Working with Wireless Systems
-
Wireless Transport Layer Security
-
IEEE 802.11x Wireless Protocols
-
WEP/WAP
-
Wireless Vulnerabilities to Know
-
Understanding Instant Messaging’s Features
-
IM Vulnerabilities
-
Controlling Privacy
-
Working with 8.3 File Naming
-
Understanding Packet Sniffing
-
Understanding Signal Analysis and Intelligence
-
Footprinting
-
Scanning
-
Summary
Exam Essentials
Hands-On-Labs
Lab 4.1: View the Active TCP and UCP Ports
Lab 4.2: Run Windows Network Monitor
Lab 4.3: Install snort in Linux
Lab 4.4: Make File Extensions Visible in Windows XP
Lab 4.5: Monitor Network Traffic in Linux
Review Questions
Answers to Review Questions
Chapter 5. Implementing and Maintaining a Secure Network
-
Overview of Network Security Threats
-
Defining Security Baselines
-
Hardening the OS and NOS
-
Configuring Network Protocols
-
Hardening Microsoft Windows 2000
-
Hardening Microsoft Windows XP
-
Hardening Microsoft Windows 2003
-
Hardening Unix/Linux
-
Hardening Novell NetWare
-
Hardening Apple Macintosh
-
Hardening Filesystems
-
Updating Your Operating System
-
Hardening Network Devices
-
Updating Network Devices
-
Configuring Routers and Firewalls
-
Hardening Applications
-
Hardening Web Servers
-
Hardening E-mail Servers
-
Hardening FTP Servers
-
Hardening DNS Servers
-
Hardening NNTP Servers
-
Hardening File and Print Servers and Services
-
Hardening DHCP Services
-
Working with Data Repositories
-
Summary
Exam Essentials
Hands-On Labs
Lab 5.1: Install OpenLDAP On a SuSE Server
Lab 5.2: Work with Performance Monitor and Windows
Lab 5.3: Work with Unix/Linux Networking
Lab 5.4: Install and Configure the E-mail Service on a SuSE Server
Review Questions
Answers to Review Questions
Chapter 6. Securing the Network Environment
-
Understanding Physical and Network Security
-
Implementing Access Control
-
Understanding Social Engineering
-
Scanning the Environment
-
Understanding Business Continuity Planning
-
Understanding Business Impact Analysis
-
Assessing Risk
-
Developing Policies, Standards, and Guidelines
-
Implementing Policies
-
Incorporating Standards
-
Following Guidelines
-
Working with Security Standards and ISO 17799
-
Classifying Information
-
Public Information
-
Private Information
-
Roles in the Security Process
-
Information Access Controls
-
.Summary
Exam Essentials
Hands-On Lab
Lab 6.1: Test Social Engineering
Review Questions
Answers to Review Questions
Chapter 7. Cryptography Basics, Methods, and Standards
-
An Overview of Cryptography
-
Understanding Physical Cryptography
-
Understanding Mathematical Cryptography
-
Understanding Quantum Cryptography
-
Uncovering the Myth of Unbreakable Codes
-
Understanding Cryptographic Algorithms
-
The Science of Hashing
-
Working with Symmetric Algorithms
-
Working with Asymmetric Algorithms
-
Using Cryptographic Systems
-
Confidentiality
-
Integrity
-
Authentication
-
Nonrepudiation
-
Access Control
-
Using Public Key Infrastructure
-
Using a Certificate Authority
-
Working with Registration Authorities and Local
-
Registration Authorities
-
Implementing Certificates
-
Understanding Certificate Revocation
-
Implementing Trust Models
-
Preparing for Cryptographic Attacks
-
Understanding Cryptography Standards and Protocols
-
The Origins of Encryption Standards
-
PKIX/PKCS
-
X.509
-
SSL and TLS
-
CMP
-
S/MIME
-
SET
-
SSH
-
PGP
-
HTTPS
-
S-HTTP
-
IPSec
-
FIPS
-
Common Criteria
-
WTLS
-
WEP
-
ISO 17799
-
Understanding Key Management and the Key Life Cycle
-
Comparing Centralized and Decentralized Key Generation
-
Storing and Distributing Keys
-
Using Key Escrow
-
Key Expiration
-
Revoking Keys
-
Suspending Keys
-
Recovering and Archiving Keys
-
Renewing Keys
-
Destroying Keys
-
Key Usage
-
Summary
Exam Essentials
Hands-On Labs
Lab 7.1: Hash Rules in Windows Server
Lab 7.2: SSL Settings in Windows Server
Lab 7.3: Encrypting a File System in Linux
Lab 7.4: Look for Errors in IPSec Performance Statistics
Review Questions
Answers to Review Questions
Chapter 8. Security Policies Procedures
-
Understanding Business Continuity
-
Utilities
-
High Availability
-
Disaster Recovery
-
Reinforcing Vendor Support
-
Service-Level Agreements (SLAs)
-
Code Escrow
-
Generating Policies and Procedures
-
Human Recource Policies
-
Business Policies
-
Certificate Policies
-
Incident-Response Policies
-
Enforcing Privilege Management
-
User and Group Role Management
-
Privilege Escalation
-
Single Sign –On Privilege Decision Making
-
Auditing
-
Access Control
-
Summary
Exam Essential
Hand-On Labs
Lab 8.1: Use Automated System Recovery in Windows Server
Lab 8.2: Create a Rescue Disk in Linux
Lab 8.3: Create a Backup with SuSE Linux
Review Questions
Answers to Review Questions
Chapter 9. Security Management
-
Understanding Computer Forensics
-
Methodology of a Forensic Investigation
-
Enforcing the Chain of Custody
-
Preserving Evidence
-
Collecting Evidence
-
Understanding Security Management
-
Drafting Best Practices and Documentation
-
Understanding Security Awareness and Education
-
Using Communication and Awareness
-
Providing Education
-
Staying on Top of Security
-
Websites
-
Trade Publications
-
Regulating Privacy and Security
-
Health Insurance Portability and Accountability Act
-
Gramm-Leach-Bliley Act of 1999
-
Computer Fraud and Abuse Act
-
Family Educational Rights and Privacy Act
-
Computer Security Act of 1987
-
Cyberspace Electronic Security Act
-
Cyber Security Enhancement Act
-
Patriot Act
-
Familiarizing Yourself with International Efforts
-
Summary
Exam Essential
Hand-On Labs
Lab 9.1: Configure Windows Automatic Updates
Lab 9.2: Configure Linux Automatic Updates
Review Questions
Answers to Review Questions
Glossary
-
Appendix Security + Practical Application Getting Started General Security Concepts
-
Access Control
-
Accountability
-
Authentication
-
Basic System Hardening
-
Recognition and Prevention of Common Malicious Events
-
Auditing
-
Communication Security
-
Dial-up
-
Virtual Private Networks
-
Remote Control/Remote Shell
-
E-mail
-
Internet Communications
-
Directory Services
-
File Sharing
-
Wireless
-
Infrastructure Security
-
Security Zones
-
IDSs and Honey Pots
-
Security Baselines
-
Basics of Cryptography
-
Certificates
-
Key Managements
-
Operational /Organizational Security
-
Physical Security
-
Backups
-
Disaster Planning
-
Personnel Management
-
Incident Handling
-
Documentation
Classroom - Regular | ||||
When | Duration | Where | Remarks | Price |
Not Specified |
50 Sessions |
All Venues | 1 session is of 1hr. | Price On Request |
Mumbai, Bandra West (Branch):- 1st Floor. O'Priya Building, Near Mehboob Studio Peter Dias Road Bandra West, Mumbai - 400050, Maharashtra, India
Mumbai, Andheri West (Branch):- Wembley Society, Shop No 3 Shastri Nagar, Lane no2, Lokhandwala Andheri West, Mumbai - 400053, Maharashtra, India
Compufield Computer Institute
COMPUFIELD® Computer Institute was started in 1985 by Mr. M. E. Khairaz to impart training in Internet, Digital Art, Multimedia, Software and Network Engineering. Today we offer many different courses covering the latest and most widely used software worldwide.
-
Creative courses, Designing and Digital Video courses
-
Multimedia and Internet courses
-
Programming courses
-
Network Engineering, MCSE, CCNA, CCNP
-
Office Automation & Financial Application
-
Kids courses
Our Training
-
Our courses are upgraded frequently to meet the ever changing standards of the Industry.
-
Our Students design galleries substantiate our claim of providing our students a creative and informative learning environment directed at all round growth.
-
Our faculty are highly experienced in the respective software and help the students in the best possible manner.
-
We have state of the art Hardware and Software facilities.
-
We offer Crash courses of 6-10 hours per day to students who wish to complete their learning in a short period.
-
Professional Job Assignments and Tutorials have been devised to help students practically apply what they learn.
-
After successful completion of the course, job assistance is provided by us.;
We offer a unique style of learning -
-
One computer : One student : One Instructor
-
Maximum Instructor to Student Ratio 1:4
-
Sessions : Each session will be of 1 hour
-
Fees is for one course and it includes instructions, practicals,practice, project, preparation for exam (if any)
-
Overseas / local Students take 5 to 10 hours per day to complete their courses earlier.
-
The timing can be fixed based on our mutual convenience,
between 9.00 a.m. to 7.00 p.m. -
Course duration in working days = Total sessions divided by number of sessions (hours) per day.
-
No extra charges/refund for more/less time taken to complete the course.
-
Lodging, boarding and travelling not included in the fees.
-
Management has full right to change courses, contents, tuition fees without prior notice.