|
 |
|
|
|
|
This course is currently discontinued |
|
|
COMPTIA Security + Certification Course |
|
|
|
|
Introduction |
|
|
The skills and knowledge measured by the Security+ examination were derived and validated though input from a committee and over 1,000 subject matter experts representative of industry. A job task analysis (JTA), global survey, beta examination and beta results review were each milestones in the development process. The results of these milestones were used in weighing the domains and ensuring that the weighting assigned to each domain is representative of the relative importance of the content.
The Security+ certification is an internationally recognized validation of the technical knowledge required of foundation-level security practitioners. A Security+ certified individual has successfully proven holding a foundation-level of skill and knowledge in General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography and Operational / Organizational Security. Candidates are ecommended to have two years experience in a networking role with preexisting knowledge of TCP/IP, experience in a security related role, Network+ or equivalent certification, and adequate training and self-study materials.
All candidates are encouraged to review the Security+ objectives thoroughly prior to attempting the exam. This examination includes blueprint weighting, test objectives and example content. Example concepts are included to clarify the test objectives and should not be construed as a comprehensive listing of the content of the examination.
The table below lists the domains measured by this examination and the extent to which they are represented in the
examination. |
|
CompTIA Security+ Certification Domains |
% of Exam* |
|
|
1.0 General Security Concepts |
30% |
2.0 Communication Security |
20% |
3.0 Infrastructure Security |
20% |
4.0 Basics of Cryptography |
15% |
5.0 Operational / Organizational Security |
15% |
|
|
Chapter 1. General Security Concepts |
|
|
Understanding Information Security
Securing the Physical Environment
Examining Operational Security
Working with Management and Policies
Understanding the Goals of Information Security
Comprehending the Security Process
Appreciating Antivirus Software
Implementing Access Control
Understanding Authentication
Understanding Networking Services and Protocols
Distinguishing Between Security Topologies
Setting Design Goals
Creating Security Zones
Working with Newer Technologies
Business Concerns to Be Aware Of Summary
Exam Essentials
Hands – On Labs
Lab 1.1: Update a Linux System
Lab 1.2: Update a Windows – Based System
Review Questions
Answers to Review Questions |
|
Chapter 2. Identifying Potential Risks |
|
|
Calculating Attack Strategies
Types of Access Attacks
Recognizing Modification and Repudiation Attacks
Identifying Denial – of – Service (DoS) and Distributed DoS
(DDoS) Attacks
Recognizing Common Attacks
Back Door Attacks
Spoofing Attacks
Man-in-the-Middle Attacks
Replay Attacks
Password-Guessing Attacks
dentifying TCP/IP Security Concerns
Working with the TCP/IP Protocol Suite
Encapsulation
Working with Protocols and Services
Recognizing TCP/IP Attacks
Understanding Software Exploitation
Surviving Malicious Code
Viruses
Trojan Horses
Logic Bombs
Worms
Antivirus Software
Understanding Social Engineering
An Introduction to Auditing Processes and Files
Summary
Exam Essentials
Hands-on Labs
Lab 2.1: Identify Running Processes
On a Windows-Based Machine
Lab 2.2: Identify Running Processes
On a Linux-Based Machine
Review Questions
Answers to Review Questions |
 |
Chapter 3. Infrastructure and Connectivity |
|
|
Understanding Infrastructure Security
Working with Hardware Components
Working with Software Components
Understanding the Different Network Infrastructure Devices
Firewalls
Hubs
Routers
Switches
Wireless Access Points
Modems
Remote Access Services
Telecom/PBX System
Virtual Private Networks
Monitoring and Diagnosing Networks
Network Monitors
Securing Workstations and Servers
Understanding Mobile Devices
Understanding Remote Access
Using the Point –to –Point Protocol
Tunneling Protocols
802.1x Wireless Protocols
RADIUS
TACACS/+
Securing Internet Connections
Working with Ports and Sockets
Working with E-mail
Working with the Web
Working with the File Transfer Protocol
Understanding SNMP and Other TCP/IP Protocols
The Basics of Cabling, Wires, and Communications
Coax
Unshielded Twisted Pair and Shielded Twisted Pair
Fiber Optic
Infrared
Radio Frequencies
Microwave Systems
Employing Removable Media
Tape
CD-R
Hard Drives
Diskettes
Flash Cards
Smart Cards
Summary
Exam Essentials<
Hands-on Labs
Lab 3.1: Examine the Windows Routing Table
Lab 3.2: Examine the Linux Routing Table
Review Questions
Answers to Review Questions
|
|
Chapter 4. Monitoring Activity and Intrusion Detection |
|
|
Monitoring the Network
Recognizing the Different Types of Network Traffic
Monitoring Network Systems
Understanding Intrusion Detection Systems
Working with a Network-Based IDS
Working with a Host-Based IDS
Utilizing Honey Pots
Understanding Incident Response
Working with Wireless Systems
Wireless Transport Layer Security
IEEE 802.11x Wireless Protocols
WEP/WAP
Wireless Vulnerabilities to Know
Understanding Instant Messaging’s Features
IM Vulnerabilities
Controlling Privacy
Working with 8.3 File Naming
Understanding Packet Sniffing
Understanding Signal Analysis and Intelligence
Footprinting
Scanning
Summary
Exam Essentials
Hands-On-Labs
Lab 4.1: View the Active TCP and UCP Ports
Lab 4.2: Run Windows Network Monitor
Lab 4.3: Install snort in Linux
Lab 4.4: Make File Extensions Visible in Windows XP
Lab 4.5: Monitor Network Traffic in Linux
Review Questions
Answers to Review Questions |
|
Chapter 5. Implementing and Maintaining a Secure Network |
|
|
Overview of Network Security Threats
Defining Security Baselines
Hardening the OS and NOS
Configuring Network Protocols
Hardening Microsoft Windows 2000
Hardening Microsoft Windows XP
Hardening Microsoft Windows 2003
Hardening Unix/Linux
Hardening Novell NetWare
Hardening Apple Macintosh
Hardening Filesystems
Updating Your Operating System
Hardening Network Devices
Updating Network Devices
Configuring Routers and Firewalls
Hardening Applications
Hardening Web Servers
Hardening E-mail Servers
Hardening FTP Servers
Hardening DNS Servers
Hardening NNTP Servers
Hardening File and Print Servers and Services
Hardening DHCP Services
Working with Data Repositories
Summary
Exam Essentials
Hands-On Labs
Lab 5.1: Install OpenLDAP On a SuSE Server
Lab 5.2: Work with Performance Monitor and Windows
Lab 5.3: Work with Unix/Linux Networking
Lab 5.4: Install and Configure the E-mail Service on a SuSE Server
Review Questions
Answers to Review Questions |
|
Chapter 6. Securing the Network Environment |
|
|
Understanding Physical and Network Security
Implementing Access Control
Understanding Social Engineering
Scanning the Environment
Understanding Business Continuity Planning
Understanding Business Impact Analysis
Assessing Risk
Developing Policies, Standards, and Guidelines
Implementing Policies
Incorporating Standards
Following Guidelines
Working with Security Standards and ISO 17799
Classifying Information
Public Information
Private Information
Roles in the Security Process
Information Access Controls
.Summary
Exam Essentials
Hands-On Lab
Lab 6.1: Test Social Engineering
Review Questions
Answers to Review Questions |
 |
Chapter 7. Cryptography Basics, Methods, and Standards |
|
|
An Overview of Cryptography
Understanding Physical Cryptography
Understanding Mathematical Cryptography
Understanding Quantum Cryptography
Uncovering the Myth of Unbreakable Codes
Understanding Cryptographic Algorithms
The Science of Hashing
Working with Symmetric Algorithms
Working with Asymmetric Algorithms
Using Cryptographic Systems
Confidentiality
Integrity
Authentication
Nonrepudiation
Access Control
Using Public Key Infrastructure
Using a Certificate Authority
Working with Registration Authorities and Local
Registration Authorities
Implementing Certificates
Understanding Certificate Revocation
Implementing Trust Models
Preparing for Cryptographic Attacks
Understanding Cryptography Standards and Protocols
The Origins of Encryption Standards
PKIX/PKCS
X.509
SSL and TLS
CMP
S/MIME
SET
SSH
PGP
HTTPS
S-HTTP
IPSec
FIPS
Common Criteria
WTLS
WEP
ISO 17799
Understanding Key Management and the Key Life Cycle
Comparing Centralized and Decentralized Key Generation
Storing and Distributing Keys
Using Key Escrow
Key Expiration
Revoking Keys
Suspending Keys
Recovering and Archiving Keys
Renewing Keys
Destroying Keys
Key Usage
Summary
Exam Essentials
Hands-On Labs
Lab 7.1: Hash Rules in Windows Server
Lab 7.2: SSL Settings in Windows Server
Lab 7.3: Encrypting a File System in Linux
Lab 7.4: Look for Errors in IPSec Performance Statistics
Review Questions
Answers to Review Questions |
|
Chapter 8. Security Policies Procedures |
|
|
Understanding Business Continuity
Utilities
High Availability
Disaster Recovery
Reinforcing Vendor Support
Service-Level Agreements (SLAs)
Code Escrow
Generating Policies and Procedures
Human Recource Policies
Business Policies
Certificate Policies
Incident-Response Policies
Enforcing Privilege Management
User and Group Role Management
Privilege Escalation
Single Sign –On
Privilege Decision Making
Auditing
Access Control
Summary
Exam Essential
Hand-On Labs
Lab 8.1: Use Automated System Recovery in Windows Server
Lab 8.2: Create a Rescue Disk in Linux
Lab 8.3: Create a Backup with SuSE Linux
Review Questions
Answers to Review Questions |
|
Chapter 9. Security Management |
|
|
Understanding Computer Forensics
Methodology of a Forensic Investigation
Enforcing the Chain of Custody
Preserving Evidence
Collecting Evidence
Understanding Security Management
Drafting Best Practices and Documentation
Understanding Security Awareness and Education
Using Communication and Awareness
Providing Education
Staying on Top of Security
Websites
Trade Publications
Regulating Privacy and Security
Health Insurance Portability and Accountability Act
Gramm-Leach-Bliley Act of 1999
Computer Fraud and Abuse Act
Family Educational Rights and Privacy Act
Computer Security Act of 1987
Cyberspace Electronic Security Act
Cyber Security Enhancement Act
Patriot Act
Familiarizing Yourself with International Efforts
Summary
Exam Essential
Hand-On Labs
Lab 9.1: Configure Windows Automatic Updates
Lab 9.2: Configure Linux Automatic Updates
Review Questions
Answers to Review Questions |
|
Glossary |
|
|
Appendix Security + Practical Application Getting Started
General Security Concepts
Access Control
Accountability
Authentication
Basic System Hardening
Recognition and Prevention of Common Malicious Events
Auditing
Communication Security
Dial-up
Virtual Private Networks
Remote Control/Remote Shell
E-mail
Internet Communications
Directory Services
File Sharing
Wireless
Infrastructure Security
Security Zones
IDSs and Honey Pots
Security Baselines
Basics of Cryptography
Certificates
Key Managements
Operational /Organizational Security
Physical Security
Backups
Disaster Planning
Personnel Management
Incident Handling
Documentation |
 |
|
|
|
COMPTIA Security + Certification Course |
|
|
|
|
Introduction |
|
|
The skills and knowledge measured by the Security+ examination were derived and validated though input from a committee and over 1,000 subject matter experts representative of industry. A job task analysis (JTA), global survey, beta examination and beta results review were each milestones in the development process. The results of these milestones were used in weighing the domains and ensuring that the weighting assigned to each domain is representative of the relative importance of the content.
The Security+ certification is an internationally recognized validation of the technical knowledge required of foundation-level security practitioners. A Security+ certified individual has successfully proven holding a foundation-level of skill and knowledge in General Security Concepts, Communication Security, Infrastructure Security, Basics of Cryptography and Operational / Organizational Security. Candidates are ecommended to have two years experience in a networking role with preexisting knowledge of TCP/IP, experience in a security related role, Network+ or equivalent certification, and adequate training and self-study materials.
All candidates are encouraged to review the Security+ objectives thoroughly prior to attempting the exam. This examination includes blueprint weighting, test objectives and example content. Example concepts are included to clarify the test objectives and should not be construed as a comprehensive listing of the content of the examination.
The table below lists the domains measured by this examination and the extent to which they are represented in the
examination. |
|
CompTIA Security+ Certification Domains |
% of Exam* |
|
|
1.0 General Security Concepts |
30% |
2.0 Communication Security |
20% |
3.0 Infrastructure Security |
20% |
4.0 Basics of Cryptography |
15% |
5.0 Operational / Organizational Security |
15% |
|
|
Chapter 1. General Security Concepts |
|
|
Understanding Information Security
Securing the Physical Environment
Examining Operational Security
Working with Management and Policies
Understanding the Goals of Information Security
Comprehending the Security Process
Appreciating Antivirus Software
Implementing Access Control
Understanding Authentication
Understanding Networking Services and Protocols
Distinguishing Between Security Topologies
Setting Design Goals
Creating Security Zones
Working with Newer Technologies
Business Concerns to Be Aware Of Summary
Exam Essentials
Hands – On Labs
Lab 1.1: Update a Linux System
Lab 1.2: Update a Windows – Based System
Review Questions
Answers to Review Questions |
|
Chapter 2. Identifying Potential Risks |
|
|
Calculating Attack Strategies
Types of Access Attacks
Recognizing Modification and Repudiation Attacks
Identifying Denial – of – Service (DoS) and Distributed DoS
(DDoS) Attacks
Recognizing Common Attacks
Back Door Attacks
Spoofing Attacks
Man-in-the-Middle Attacks
Replay Attacks
Password-Guessing Attacks
dentifying TCP/IP Security Concerns
Working with the TCP/IP Protocol Suite
Encapsulation
Working with Protocols and Services
Recognizing TCP/IP Attacks
Understanding Software Exploitation
Surviving Malicious Code
Viruses
Trojan Horses
Logic Bombs
Worms
Antivirus Software
Understanding Social Engineering
An Introduction to Auditing Processes and Files
Summary
Exam Essentials
Hands-on Labs
Lab 2.1: Identify Running Processes
On a Windows-Based Machine
Lab 2.2: Identify Running Processes
On a Linux-Based Machine
Review Questions
Answers to Review Questions |
 |
Chapter 3. Infrastructure and Connectivity |
|
|
Understanding Infrastructure Security
Working with Hardware Components
Working with Software Components
Understanding the Different Network Infrastructure Devices
Firewalls
Hubs
Routers
Switches
Wireless Access Points
Modems
Remote Access Services
Telecom/PBX System
Virtual Private Networks
Monitoring and Diagnosing Networks
Network Monitors
Securing Workstations and Servers
Understanding Mobile Devices
Understanding Remote Access
Using the Point –to –Point Protocol
Tunneling Protocols
802.1x Wireless Protocols
RADIUS
TACACS/+
Securing Internet Connections
Working with Ports and Sockets
Working with E-mail
Working with the Web
Working with the File Transfer Protocol
Understanding SNMP and Other TCP/IP Protocols
The Basics of Cabling, Wires, and Communications
Coax
Unshielded Twisted Pair and Shielded Twisted Pair
Fiber Optic
Infrared
Radio Frequencies
Microwave Systems
Employing Removable Media
Tape
CD-R
Hard Drives
Diskettes
Flash Cards
Smart Cards
Summary
Exam Essentials<
Hands-on Labs
Lab 3.1: Examine the Windows Routing Table
Lab 3.2: Examine the Linux Routing Table
Review Questions
Answers to Review Questions
|
|
Chapter 4. Monitoring Activity and Intrusion Detection |
|
|
Monitoring the Network
Recognizing the Different Types of Network Traffic
Monitoring Network Systems
Understanding Intrusion Detection Systems
Working with a Network-Based IDS
Working with a Host-Based IDS
Utilizing Honey Pots
Understanding Incident Response
Working with Wireless Systems
Wireless Transport Layer Security
IEEE 802.11x Wireless Protocols
WEP/WAP
Wireless Vulnerabilities to Know
Understanding Instant Messaging’s Features
IM Vulnerabilities
Controlling Privacy
Working with 8.3 File Naming
Understanding Packet Sniffing
Understanding Signal Analysis and Intelligence
Footprinting
Scanning
Summary
Exam Essentials
Hands-On-Labs
Lab 4.1: View the Active TCP and UCP Ports
Lab 4.2: Run Windows Network Monitor
Lab 4.3: Install snort in Linux
Lab 4.4: Make File Extensions Visible in Windows XP
Lab 4.5: Monitor Network Traffic in Linux
Review Questions
Answers to Review Questions |
|
Chapter 5. Implementing and Maintaining a Secure Network |
|
|
Overview of Network Security Threats
Defining Security Baselines
Hardening the OS and NOS
Configuring Network Protocols
Hardening Microsoft Windows 2000
Hardening Microsoft Windows XP
Hardening Microsoft Windows 2003
Hardening Unix/Linux
Hardening Novell NetWare
Hardening Apple Macintosh
Hardening Filesystems
Updating Your Operating System
Hardening Network Devices
Updating Network Devices
Configuring Routers and Firewalls
Hardening Applications
Hardening Web Servers
Hardening E-mail Servers
Hardening FTP Servers
Hardening DNS Servers
Hardening NNTP Servers
Hardening File and Print Servers and Services
Hardening DHCP Services
Working with Data Repositories
Summary
Exam Essentials
Hands-On Labs
Lab 5.1: Install OpenLDAP On a SuSE Server
Lab 5.2: Work with Performance Monitor and Windows
Lab 5.3: Work with Unix/Linux Networking
Lab 5.4: Install and Configure the E-mail Service on a SuSE Server
Review Questions
Answers to Review Questions |
|
Chapter 6. Securing the Network Environment |
|
|
Understanding Physical and Network Security
Implementing Access Control
Understanding Social Engineering
Scanning the Environment
Understanding Business Continuity Planning
Understanding Business Impact Analysis
Assessing Risk
Developing Policies, Standards, and Guidelines
Implementing Policies
Incorporating Standards
Following Guidelines
Working with Security Standards and ISO 17799
Classifying Information
Public Information
Private Information
Roles in the Security Process
Information Access Controls
.Summary
Exam Essentials
Hands-On Lab
Lab 6.1: Test Social Engineering
Review Questions
Answers to Review Questions |
 |
Chapter 7. Cryptography Basics, Methods, and Standards |
|
|
An Overview of Cryptography
Understanding Physical Cryptography
Understanding Mathematical Cryptography
Understanding Quantum Cryptography
Uncovering the Myth of Unbreakable Codes
Understanding Cryptographic Algorithms
The Science of Hashing
Working with Symmetric Algorithms
Working with Asymmetric Algorithms
Using Cryptographic Systems
Confidentiality
Integrity
Authentication
Nonrepudiation
Access Control
Using Public Key Infrastructure
Using a Certificate Authority
Working with Registration Authorities and Local
Registration Authorities
Implementing Certificates
Understanding Certificate Revocation
Implementing Trust Models
Preparing for Cryptographic Attacks
Understanding Cryptography Standards and Protocols
The Origins of Encryption Standards
PKIX/PKCS
X.509
SSL and TLS
CMP
S/MIME
SET
SSH
PGP
HTTPS
S-HTTP
IPSec
FIPS
Common Criteria
WTLS
WEP
ISO 17799
Understanding Key Management and the Key Life Cycle
Comparing Centralized and Decentralized Key Generation
Storing and Distributing Keys
Using Key Escrow
Key Expiration
Revoking Keys
Suspending Keys
Recovering and Archiving Keys
Renewing Keys
Destroying Keys
Key Usage
Summary
Exam Essentials
Hands-On Labs
Lab 7.1: Hash Rules in Windows Server
Lab 7.2: SSL Settings in Windows Server
Lab 7.3: Encrypting a File System in Linux
Lab 7.4: Look for Errors in IPSec Performance Statistics
Review Questions
Answers to Review Questions |
|
Chapter 8. Security Policies Procedures |
|
|
Understanding Business Continuity
Utilities
High Availability
Disaster Recovery
Reinforcing Vendor Support
Service-Level Agreements (SLAs)
Code Escrow
Generating Policies and Procedures
Human Recource Policies
Business Policies
Certificate Policies
Incident-Response Policies
Enforcing Privilege Management
User and Group Role Management
Privilege Escalation
Single Sign –On
Privilege Decision Making
Auditing
Access Control
Summary
Exam Essential
Hand-On Labs
Lab 8.1: Use Automated System Recovery in Windows Server
Lab 8.2: Create a Rescue Disk in Linux
Lab 8.3: Create a Backup with SuSE Linux
Review Questions
Answers to Review Questions |
|
Chapter 9. Security Management |
|
|
Understanding Computer Forensics
Methodology of a Forensic Investigation
Enforcing the Chain of Custody
Preserving Evidence
Collecting Evidence
Understanding Security Management
Drafting Best Practices and Documentation
Understanding Security Awareness and Education
Using Communication and Awareness
Providing Education
Staying on Top of Security
Websites
Trade Publications
Regulating Privacy and Security
Health Insurance Portability and Accountability Act
Gramm-Leach-Bliley Act of 1999
Computer Fraud and Abuse Act
Family Educational Rights and Privacy Act
Computer Security Act of 1987
Cyberspace Electronic Security Act
Cyber Security Enhancement Act
Patriot Act
Familiarizing Yourself with International Efforts
Summary
Exam Essential
Hand-On Labs
Lab 9.1: Configure Windows Automatic Updates
Lab 9.2: Configure Linux Automatic Updates
Review Questions
Answers to Review Questions |
|
Glossary |
|
|
Appendix Security + Practical Application Getting Started
General Security Concepts
Access Control
Accountability
Authentication
Basic System Hardening
Recognition and Prevention of Common Malicious Events
Auditing
Communication Security
Dial-up
Virtual Private Networks
Remote Control/Remote Shell
E-mail
Internet Communications
Directory Services
File Sharing
Wireless
Infrastructure Security
Security Zones
IDSs and Honey Pots
Security Baselines
Basics of Cryptography
Certificates
Key Managements
Operational /Organizational Security
Physical Security
Backups
Disaster Planning
Personnel Management
Incident Handling
Documentation |
 |
|